Method for transferring data

ABSTRACT

The method for transferring data sends the data as part of first and second permanent identifiers during a communication procedure prior to establishing a traffic channel in the communication system. Besides the data, the first permanent identifier includes routing information to a home system forming part of the communication system. The second permanent identifier is an expanded permanent identifier with the data forming at least part of the expanded portion thereof. Based at least on recognizing a portion of the second permanent identifier, a home system sends the first and second permanent identifiers to a destination entity. The destination entity extracts the data from the first and second permanent identifiers. In this manner, a traffic channel does not need to be established to transmit the data.

RELATED APPLICATIONS

The following applications, filed concurrently with the subjectapplication, are related to the subject application: U.S. Ser. No.09/261,735 (METHOD FOR TRANSFERRING DATA USING EXPANDED PERMANENTIDENTIFIER) filed Mar. 3, 1999 U.S. Ser. No. 09/261,737 (METHOD FORTRANSFERRING DATA USING PERMANENT IDENTIFIER INCLUDING ROUTINGINFORMATION) filed Mar. 3, 1999 by the inventor of the subjectapplication.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to the field of communication; and moreparticularly, a method for transferring data.

2. Description of Related Art

FIG. 1 illustrates a logical block diagram of a conventionalcommunication system that provides mobility. This logical block diagramrepresents either wireless or wireline (or landline) communicationsystems that provide subscriber mobility. As shown, an end user 2communicates with a destination entity 6 via a first communicationdevice 4, a serving system 12, a network 14, a home system 16, and asecond communication device 8. The end user 2 represents an entity(human, system or machine) which generates information for communicationto the destination entity 6 (also a human, system or machine).

The first communication device 4 represents a device for interfacingwith the serving system 12. For instance, taking wireless communicationas an example, the serving system 12 includes any number of basestations, mobile switching centers, authentication centers, etc. toprovide wireless communication services for a coverage area in which thecommunication device 4 is located, and the communication device 4represents a mobile station. Continuing with the wireless communicationexample, the network 14 presents a public or private communicationnetwork such as the Public Switch Telephone Network, a public packetnetwork or a private packet network, and the home system 16 representsthe wireless communication service provider with whom the user of themobile station (i.e., the communication device 4) has established anagreement to provide mobile wireless communication services.Accordingly, the home system 16, like the serving system 12, alsoincludes any number of base a stations, mobile switching centers,authentication centers, etc. to provide mobile wireless communicationservices for a coverage area. Because a particular mobile wirelesscommunication service provider has a limited coverage area, serviceproviders having different coverage areas establish roaming agreementsto serve each other's customers. In this example, the secondcommunication device 8 could be a mobile station or wireline connectionto the home system 16. Alternatively, in this example or any otherembodiment, the second communication device 8 is connected to the homesystem 16 via a network such as the network 14. As a furtheralternative, the second communication device 8 forms part of the homesystem 16.

As an example of how FIG. 1 represents a wireline mobile communicationsystem, the serving system 12 represents the landline mobilecommunication service provider for the location in which thecommunication device 4 is located, the network 14 represents, forexample, a long distance landline carrier, and the home system 16represents another landline mobile communication service provider withwhom the end user 2 has established an agreement to provide landlinemobile communication services. The first communication device 4 couldthen represent an intelligent or programmable phone. One embodiment ofan intelligent phone allows the end user 2 to place a programmedintegrated circuit card into the intelligent phone, and convert theintelligent phone into the end user's personal phone. Namely, theprogrammed integrated circuit card provides the intelligent phone withthe subscriber information for the end user 2 such that communication ofthis information to the serving system 12 and communication between theserving system 12 and the home system 16 allows, for example, (1) callsto the end user 2 to be routed to the intelligent phone (i.e.,communication device 4) or (2) the end user 2 to originate calls in theserving system 12 as if he were still in the area served by the homesystem 16.

The wireline and wireless examples given above provide only two examplesof the many possible mobile communication systems represented by FIG. 1.

The mobile communication systems represented by the logical blockdiagram of FIG. 1 present various challenges to the serving system 12and the home system 16 which want to provide communication services onlyto valid users and receive appropriate payment for having provided thoseservices. Accordingly, each communication system has associatedtherewith numerous different standards and protocols for ensuring thatthe above mentioned goals are achieved.

The most prevalent techniques employed by these standards utilizepermanent identifiers associated with the end user 2. One of theidentifiers is assigned by the home system 16, and is referred tohereinafter as the first permanent identifier. The first permanentidentifier includes two portions. The first portion includes routinginformation to the home system 16, and identifies the home system 16with which the serving system 12 should communicate. The second portionof the first permanent identifier identifies the end user 2 to the homesystem 16, and is often an identification number. Many wirelesscommunication standards refer to the first permanent identifier as themobile station identifier (MSID).

An example of the first permanent identifier is the International MobileStation (or Subscriber) Identification (IMSI) specified by theInternational Telecommunication Union—Telecommunication Sector (ITU-T)Recommendation E.212. The format of the IMSI is given below: IMSI (up to15 digits)=MCC (3 digits)+MNC (1 to 3 digits)+MSIN (9-11 digits)

The mobile country code (MCC) forms the first three digits of the IMSIand identifies the country in which the home system 16 is located.Together with the mobile network code (MNC), which forms the next 1 to 3digits, the MCC forms a home system code identifying the home system 16.Communication standards in the United States often refer to this homesystem code as the home network identifier (HNI). The next 9-11 digitsform the identification number pre-assigned to the end user 2 by thehome system 16.

Another permanent user identifier (hereinafter “the second permanentidentifier”), while known by the home system 16 and associated with theend user 2, is not necessarily assigned by the home system 16. Thisidentifier is also associated in some manner with the firstcommunication device 4 or a portion thereof being used by the end user2. In a mobile wireless communication system, the second permanentidentifier could be the electronic serial number (ESN) of the mobilestation serving as the first communication device 4. In a wirelinemobile communication system such as the intelligent phone examplediscussed above, the second permanent identifier could be the serialnumber of the programmed integrated circuit card. The second permanentidentifier could even be the phone number of, for example, andintegrated services digital network (ISDN) phone.

There are plans to expand the second permanent identifier in the future.The expanded second permanent identifier includes three portions. Thefirst and second portions generally represent the unexpanded secondpermanent identifier, while the third portion represents the expandedportion of the second permanent identifier. The first portion includes acode. When that code is a pre-established code, the expanded secondpermanent identifier is triggered. Accordingly, this technique permitsuse of either unexpanded or expanded second permanent identifiers. Ifthe expanded second permanent identifier is triggered, the system ordevice receiving the first and second portions of the expanded secondpermanent identifier will expect the third portion to follow, and if thethird portion is not received, a request therefor will be generated.

When the first portion of the second permanent identifier does notinclude the pre-established code, the first portion represents a firstidentification number as in the unexpanded second permanent identifier.The second portion of the second permanent identifier, and also theexpanded second permanent identifier, includes a second identificationnumber. The expanded portion represents a third identification number.

An example of an expanded second permanent identifier is the expandedESN (EESN) currently being proposed for wireless communication. Theformat of the EESN is given below:

EESN(56 bits)=ESN(32 bits)+ESN-expansion(24 bits)

ESN(32 bits)=manufacturer's code of 128(8 bits)+identification number(24 bits)

ESN-expansion=expanded manufacture's code(24 bits)

When the manufacturer's code is 128, the expanded ESN is triggered.

The home system 16 typically stores the first and expanded secondpermanent identifier pair for each subscriber such as the end user 2.When communicating with the serving system 12, the communication device4 supplies the first and expanded second permanent identifiers to theserving system 12. Based on the routing information in the firstpermanent identifier, the serving system 12 knows to communicate withthe home system 16 to, for example, validate the end user 2. To validatethe end user 2, the serving system 12 provides one or both of the firstand expanded second permanent identifiers to the home system 16.Typically, if the home system 16 receives only one of these identifiers,the home system 16 will request the other identifier from the servingsystem 12. Furthermore, if an expanded second permanent identifier issupplied without the third or expanded portion, the home system 16 willrequest the expanded portion.

If both the first and expanded second permanent identifiers provided bythe serving system 12 match a corresponding first and expanded secondpermanent identifier pair stored at the home station 16, the homestation 16 validates the end user 2. This process may be used as part ofa procedure to verify (for billing purposes) or authenticate (toeliminate fraud) the end user 2 as well. Referring again to the wirelessexample, this validation process is typically performed as part of theregistration procedure included in most wireless communicationstandards.

Once validated, the serving system 12 provides communication services tothe end user 2. For example, in a wireless system, a serving system 12will open a traffic channel to a valid mobile station upon receivingsuch a request from the mobile station by the end user 2 originating thecall. Having opened this traffic channel, the end user 2 can nowtransmit data to the destination entity 6.

A need, however, exists for end users to more efficiently transmit datathan available through the lengthy process of requesting andestablishing a traffic channel.

SUMMARY OF THE INVENTION

The method for transferring data according to the present inventionforms a first permanent identifier associated with an end user (human,system or machine) in a mobile communication system. The first permanentidentifier includes routing information to a home system in the mobilecommunication system, and also includes data associated with the enduser in a predetermined portion thereof. An expanded permanentidentifier is also formed. The expanded portion of the expandedpermanent identifier includes data, and another portion thereof,associated in some manner with the end user, serves to identify the enduser. A communication device in the mobile communication system used bythe end user sends the expanded permanent identifier and the firstpermanent identifier, both destined for the home system.

Based on the expanded permanent identifier, a home system can recognizethe end user associated with a received first and expanded permanentidentifier pair, and at least in accordance with this recognition, sendsthe first and expanded permanent identifier to destination entity(human, system or machine). The destination entity extracts the datafrom the first and expanded permanent identifier. In this manner data istransferred from the end user to the destination entity over the mobilecommunication system without having to establish a traffic channel.

DETAILED DESCRIPTION OF THE DRAWINGS

The present invention will become more fully understood from thedetailed description given below and the accompanying drawings which aregiven by way of illustration only, wherein like reference numeralsdesignate corresponding parts in the various drawings, and wherein:

FIG. 1 illustrates a logical block diagram of a conventionalcommunication system;

FIG. 2 illustrates a logical block diagram of a system embodiment forthe end user in FIG. 1;

FIG. 3 illustrates a logical block diagram of a system embodiment of thedestination entity in FIG. 1; and

FIG. 4 illustrates a logical block diagram of an embodiment of acommunication system according to the present invention.

FIG. 5 illustrates a flowchart of a method of transferring dataaccording to the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

The method of transferring data using the conventional communicationsystem illustrated in FIG. 1 will be described in connection with FIG.5. According a description of the elements illustrated in FIG. 1 willnot be repeated.

As discussed above, the numerous standards and protocols associated withthe many mobile communication systems represented by FIG. 1 will employa first permanent identifier and an expanded second permanentidentifier. To transmit data, the communication device 4 initiates aprocedure within the standard or protocol that requires the transfer ofthe first and expanded second permanent identifiers. For example, in amobile wireless communication system, many standards require that themobile station transmit the first and expanded second permanentidentifiers as part of the registration procedure.

However, in steps S10 and S20 of FIG. 5, the communication device 4forms modified first and modified expanded second permanent identifiers,respectively, prior to transmission. Alternatively, the end user 2supplies the communication device with the modified first and modifiedexpanded second permanent identifiers. The term modified has been usedhere to denote a difference between the first and expanded secondpermanent identifiers created according to the present invention andtheir conventional counterparts, and does not necessarily mean thateither the communication device 4 or the end user 2 modified existingfirst and expanded second permanent identifiers; although the presentinvention is contemplated as covering this alternative as well.

The first portion of the modified first permanent identifier containsthe routing information to the home system 16, but the second portion ora part thereof, which normally includes the user identification numberpre-assigned by the home system 16, includes data from the end user 2.

The first portion of the modified expanded second permanent identifierincludes the pre-established code to trigger the expanded secondpermanent identifier, and the second portion includes an identificationnumber as did the conventional expanded second permanent identifier.However, the third or expanded portion of the modified expanded secondpermanent identifier, which normally includes another identificationnumber, includes data from the end user 2.

For instance, when the IMSI is the first permanent identifier, themodified IMSI has the format given below:

IMSI(up to 15 digits)=MCC(3 digits)+MNC(1-3 digits)+data(9-11 digits).

And, when the EESN is the expanded second permanent identifier, themodified EESN has the format given below:

EESN(56 bits)=ESN(32 bits)+ESN-expansion(24 bits)

ESN(32 bits)=manufacturer's code of 128(8 bits)+identification number(24bits)

ESN-expansion=data(24 bits)

As part of the initiated procedure, the serving system 12 supplies themodified first and modified expanded second permanent identifiers to thehome system 16, as shown in step S30, via the network 14 and the secondcommunication device 8. If the serving system 12 only supplies one ofthe modified first and modified expanded second permanent identifiers,the home system 16 requests the other identifier. If the home system 16does not receive the expanded portion of the modified expanded secondpermanent identifier, the home system 16 requests the expanded portionfrom the serving system 12.

In step S40, the home system 16 compares the modified first and modifiedexpanded second permanent identifiers to stored first and expandedsecond permanent identifier pairs. If, in step S50, the home system 16finds a match between the second portion of the received modified secondpermanent identifier and a second portion of a stored expanded secondpermanent identifier, but, in step S60, the received modified firstpermanent identifier and/or expanded portion of the received modifiedexpanded second permanent identifier does not match the storedcounterpart associated with the matching, stored second portion of theexpanded second permanent identifier, then the home system 16 recognizesthat the received modified first permanent and the received modifiedexpanded second permanent identifiers store data. When the home system16 recognizes that the received modified first and modified expandedsecond permanent identifiers store data, the home system 16 sends thereceived modified first and modified expanded second permanentidentifiers to the destination entity 6 associated with the matchingstored second portion of the expanded second permanent identifier viathe second communication device 8, according to step S70. The homesystem 16 also falls to validate the first communication device 4 forthe serving system 12. As a result, the serving system 12 has the optionto deny service to the first communication device 4.

Based on the received modified first permanent identifier, thedestination entity 6 recognizes that the received modified first andmodified expanded second permanent identifiers originated from the enduser 2. Furthermore, because the modified first permanent identifierand/or the modified expanded second permanent identifier does not matchthe respective first permanent identifier and/or expanded secondpermanent identifier for the end user 2, the destination entity 6recognizes the modified first and modified expanded second permanentidentifiers as containing data. Alternatively, simply receiving theidentifiers from the home system 16 causes a recognition that themodified first and modified expanded second permanent identifierscontain data. In step S80, the destination entity 6, having recognizedthat the modified first and modified expanded second permanentidentifiers contain data, extracts the data.

As one skilled in the art will appreciate, the method according to thepresent invention allows an end user 2 to transfer data to a destinationentity without having to request and establish a traffic channel.

As discussed previously, the end user 2 can be a human, system ormachine. For instance, the end user 2 may be an end user system as shownin FIG. 2. FIG. 2 illustrates a logical block diagram of an end usersystem 100. As shown, an end user system 100 includes a first centralprocessing unit (CPU) 102 connected to a first read-only memory (104)and a first random access memory (106). The first CPU 102 performs somefunction in accordance with received input based on a predeterminedprogram stored in the first ROM 104. Intermediate and final processingresults are stored in the first RAM 106. According to the programmingstored in the first ROM 104, the first CPU 102 transfers data to thecommunication device 2 for transmission.

As one skilled in the art will appreciate, the end user system 100 couldbe any of a plurality of end user systems, such as an automated tellermachine, a sensing or measuring device (e.g., gas or electric meter), avending machine, a vehicle, an autonomous vehicle, a robot, a securityalarm system, an environmental or weather tracking system, etc., whichreceive input in some fashion, such as from a human or sensor(s).Consequently, a need exists for the end user system 100 to transfer dataaccumulated in the processing of its function to a remotely locateddestination entity 6 associated therewith.

As a more specific example, the end user system 100 could be a vehicletracking device measuring the distance traveled by the vehicle anddetecting the location of the vehicle. By means of the firstcommunication device 4, the serving system 12, the network 14, the homesystem 16 and the second communication device 8, the end user system 100transfers data on distance and location to the destination entity 6according to the method of the present invention.

In an alternative embodiment, the first communication device 4 forms apart of the end user system 100 or the end user system 100 forms a partof the first communication device 4. In a possible mobile wirelesscommunication system, the first communication device 4 is a mobilestation, and the mobile station forms part of the end user system 100.

As also discussed previously, the destination entity 6 could be a human,system or machine. For instance, the destination entity 6 may be theprocessing system 110 shown in FIG. 3. As shown, the processing system110 includes a second CPU 112 connected to a second ROM 114 and a secondRAM 116. The second CPU 112 performs processing functions in accordancewith a predetermined program stored in the second ROM 114, and storesintermediate and final processing results in the second RAM 116.

Continuing with the vehicle tracking example, the processing system 110is a processing system for a transport company that extracts the datatransferred thereto by the end user system 100, and uses the extracteddata to, for example, prepare appropriate billing of the customer.

As an alternative, the second communication device 8 could form part ofthe destination entity 6, or the destination entity 6 could form part ofthe second communication device 8.

Furthermore, the home system 16 could communicate directly with thedestination entity 6 via a communication line (e.g., fiber optic, cable,etc.); thus, eliminating the second communication device 8. The secondcommunication device 8 could also be eliminated in another alternativeembodiment wherein the destination entity 6 forms part of the homesystem 16 or the home system 16 forms part of the destination entity 6.

As a further alternative, and preferably as part of the embodimentwherein the destination entity 6 forms a part of the home system 16 orthe home system 16 forms a part of the destination entity 6, the homesystem 16 does not store any first permanent identifiers. Instead, thehome system 16 does not expect to ever validate the end user 2 so thatcommunication services can be provided thereto. The home system 16expects only to receive data from the end user 2. Accordingly, when thehome system 16 receives a modified expanded second permanent identifierhaving a second portion that matches a second portion of a storedexpanded second permanent identifier, the home system 16 sends themodified first and modified expanded second permanent identifiers to thedestination entity 6.

FIG. 4 illustrates another logical block diagram of a mobilecommunication system according to the present invention. The embodimentof FIG. 4 is the same as that shown in FIG. 1 except for the addition of(1) third—Mth communication devices 8-1, . . . , 8-M connected to thehome system 16 and (2) second—Nth destination entities 6-1, . . . , 6-Nconnected to the third—Mth communication devices 8-1, . . . , 8-M.

In this embodiment, the home system 16 supports multiple destinationentities 6, 6-1, . . . , 6-N. The home system 16 stores a unique addressfor each of the first—Nth destination entities 6, 6-1, . . . , 6-N.Accordingly, to properly direct data to one of the first—Nth destinationentities 6, 6-1, . . . , 6-N the end user 2 or communication device 4modifies the second portion of the modified first permanent identifieror the expanded portion of the modified expanded second permanentidentifier such that a predetermined part thereof includes the uniqueaddress of the intended destination entity recipient. The remainingparts of (1) the second portion of the modified first permanentidentifier or (2) the expanded portion of the modified expanded secondpermanent identifier are then available for sending data.

For example, assume ten or less destination entities are supported bythe home system 16 such that a single digit could be used to uniquelyidentify the destination entities. Also assume for the purposes of thisexample that the first permanent identifier is the IMSI. Then, themodified IMSI could have the format given below:

IMSI(up to 15 digits)=MCC(3 digits)+MNC(1-3 digits)+unique destinationentity identifier or address(1 digit)+data(8-10 digits).

While in this example, the unique destination entity identifier is shownas forming the first part of the second portion of the modified firstpermanent identifier, the unique destination entity may form any part ofthe second portion of the modified first permanent identifier or anypart of the expanded portion of the modified expanded second permanentidentifier.

When handling a received modified first and modified expanded secondpermanent identifier pair wherein the second portion of the receivedmodified expanded second permanent identifier matches the second portionof an expanded second permanent identifier stored at the home system 16,the home system 16 obtains the destination entity identifier in thepredetermined part of the second portion of the modified first permanentidentifier or in the predetermined part of the expanded portion of themodified expanded second permanent identifier. The home system 16 thensends the modified first and modified expanded second permanentidentifiers to the destination entity 6, 6-1, . . . , 6-N identified bythe destination entity identifier.

As an alternative, the second communication devices 8, 8-1, . . . , 87-Mcould form part of the destination entities 6, 6-1, . . . , 6-N or thedestination entities 6, 6-1, . . . , 6-N could form part of the secondcommunication devices 8, 8-1, . . . , 8-M.

Furthermore, the home system 16 could communicate directly with one ormore of the destination entities 6, 6-1, . . . , 6-N via a communicationline (e.g., fiber optic, cable, etc.); thus, eliminating one or more ofthe second communication devices 8, 8-1, . . . , 8-M. The secondcommunication devices 8, 8-1, . . . , 8-M could also be eliminated inanother alternative embodiment wherein the destination entities 6, 6-1,. . . , 6-N form part of the home system 16.

While most of the examples given with respect to the present inventionhave been of wireless mobile communication systems, one skilled in theart will recognize from the forgoing disclosure that the presentinvention also applies to wireline mobile communication systems.

The invention being thus described, it will be obvious that the same maybe varied in many ways. Such variations are not to be regarded as adeparture from the spirit and scope of the invention, and all suchmodifications are intended to included within the scope of the followingclaims.

I claim:
 1. A method of processing permanent identifiers, comprising: a)storing at least one permanent identifier of a first type, permanentidentifiers of the first type being expanded permanent identifiers; b)receiving a permanent identifier of the first type and a permanentidentifier of a second type; c) determining if a predetermined portionof the received permanent identifier of the first type matches acorresponding portion in one of the stored permanent identifiers of thefirst type; d) sending the received permanent identifiers of the firstand second types to a destination entity if the step c) determines amatch exists; e) storing a permanent identifier of the second typeassociated with each stored permanent identifier of the first type; f)determining if the received permanent identifier of the second typematches the stored permanent identifier of the second type associatedwith the stored permanent identifier of the first type that the step c)determined had a corresponding portion which matched the predeterminedportion of the received permanent identifier of the first type when thestep c) determines a match exists; and wherein the step d) sends thereceived permanent identifiers of the first and second types to adestination entity associated with the received permanent identifier ofthe first type when the step c) determines a match exists and the stepf) determines that a match does not exist.
 2. The method of claim 1,wherein the step b) receives the permanent identifiers of the first andsecond types at a home system; and the received permanent identifier ofthe second type includes first routing information to the home system.3. The method of claim 2, wherein the received permanent identifier ofthe second type further includes second routing information to adestination entity.
 4. The method of claim 3, wherein the step d) sendsthe received permanent identifiers of the first and second types to thedestination entity indicated in the second routing information.
 5. Themethod of claim 2, wherein the received permanent identifier of thefirst type further includes second routing information to a destinationentity.
 6. The method of claim 5, wherein the step d) sends the receivedpermanent identifiers of the first and second types to the destinationentity indicated in the second routing information.
 7. The method ofclaim 2, wherein the destination entity forms part of the home system.8. The method of claim 2, wherein the home system forms part of awireless communication system.
 9. The method of claim 2, wherein thehome system forms part of a wireline communication system.
 10. Themethod of claim 1, further comprising: e) extracting, at the destinationentity, a portion of the received permanent identifiers of the first andsecond types as data.
 11. The method of claim 1, wherein the receivedpermanent identifier of the first type is associated with a source ofthe received permanent identifiers of the first and second types.
 12. Amethod of processing permanent identifiers, comprising: a) storing atleast one permanent identifier of a first type, permanent identifiers ofthe first type being expanded permanent identifiers; b) receiving apermanent identifier of the first type and a permanent identifier of asecond type; c) determining if a predetermined portion of the receivedpermanent identifier of the first type matches a corresponding portionin one of the stored permanent identifiers of the first type; d) sendingthe received permanent identifiers of the first and second types to adestination entity if the step c) determines a match exists; e)determining if the expanded portion of the received permanent identifierof the first type matches the expanded portion of the stored permanentidentifier of the first type that the step c) determined had acorresponding portion which matched the predetermined portion of thereceived permanent identifier of the first type when the step c)determines a match exists; and wherein the step d) sends the receivedpermanent identifiers of the first and second types to a destinationentity associated with the received permanent identifier of the firsttype when the step c) determines a match exists and the step e)determines that a match does not exist.
 13. The method of claim 12,wherein the step b) receives the permanent identifiers of the first andsecond types at a home system; and the received permanent identifier ofthe second type includes first routing information to the home system.14. The method of claim 13, wherein the received permanent identifier ofthe second type further includes second routing information to adestination entity.
 15. The method of claim 14, wherein the step d)sends the received permanent identifiers of the first and second typesto the destination entity indicated in the second routing information.16. The method of claim 13, wherein the received permanent identifier ofthe first type further includes second routing information to adestination entity.
 17. The method of claim 16, wherein the step d)sends the received permanent identifiers of the first and second typesto the destination entity indicated in the second routing information.18. The method of claim 13, wherein the destination entity forms part ofthe home system.
 19. The method of claim 13, wherein the home systemforms part of a wireless communication system.
 20. The method of claim13, wherein the home system forms part of a wireline communicationsystem.
 21. The method of claim 12, further comprising: extracting, atthe destination entity, a portion of the received permanent identifiersof the first and second types as data.
 22. The method of claim 12,wherein the received permanent identifier of the first type isassociated with a source of the received permanent identifiers of thefirst and second types.