System and Method for Pushing Content to a Terminal Utilizing a Network-Initiated Data Service Technique

ABSTRACT

A system is provided for pushing content to a terminal located within a mobile network or a private network. The system includes a network node, such as a Session Initiation Protocol (SIP) proxy, located across a public network from the network including the terminal. The network node is capable of subscribing to a push service on behalf of the terminal such that the network node is also capable of receiving push content in accordance with the push service. Thereafter, the network node is capable of establishing a network-initiated data session with the terminal. In response to the network-initiated data session, the network node is further capable of registering the terminal such that the terminal is capable of receiving the push content based upon the registration.

FIELD OF THE INVENTION

The present invention generally relates to systems and methods forpushing content to a terminal and, more particularly, to pushing contentto a terminal utilizing both a network-initiated data session techniqueand the Session Initiation Protocol (SIP).

BACKGROUND OF THE INVENTION

The modern communications era has brought about a tremendous expansionof wireline and wireless networks. Computer networks, televisionnetworks, and telephony networks are experiencing an unprecedentedtechnological expansion, fueled by consumer demand. Wireless and mobilenetworking technologies have addressed related consumer demands, whileproviding more flexibility and immediacy of information transfer.

Current and future networking technologies continue to facilitate easeof information transfer and convenience to users. The proliferation oflocal, regional, and global networks such as the Internet has availed asea of information to society. These networking technologies haveexpanded to increasingly include wireless and mobile technologies.Through these networks, information can be downloaded to desktopsystems, wireless systems, mobile systems, etc. For example, informationavailable via the Internet can now be downloaded onto mobile wirelessunits, such as cellular telephones, personal digital assistants (PDAs),laptop computers, etc.

Second generation wireless service, often referred to as 2G wirelessservice, is a current wireless service based on circuit-switchedtechnology. In this regard, 2G systems, such as Global System for Mobilecommunications (GSM), use digital radio technology for improved qualityand a broader range of services over first generation mobiletechnologies. Third generation wireless service, often referred to as 3Gwireless service, refers to a set of digital technologies that promisesimprovements in capacity, speed and efficiency by deploying newpacket-based transmission methodologies between terminals and thenetwork. Users of 3G devices and networks will have access to multimediaservices such as video-on-demand, video conferencing, fast web accessand file transfer. Existing and future services are, and will continueto be, provided by network service operators who make services andapplications available to mobile device users via the network.

One particular service feature currently available for communicatinginformation is a “push” feature (also known as a “notification” featureor “alert” feature). In a typical client/server model, a client requestsa service or information from a server, which then responds intransmitting information to the client. This is generally referred to as“pull” technology, where the client pulls the information from theserver. For example, entry of a Uniform Resource Locator (URL) at aclient device which is then dispatched to the server to retrieve theassociated information is a pull transaction.

In contrast, “push” technology generally refers to a means to transmitinformation to one or more devices without a previous user action. Thus,there is no explicit request from the client before the server transmitsits information, and therefore push technology essentially includesserver-initiated transactions. Push technologies can be used inconnection with various protocols and communication technologies. Forexample, some representative push technologies include Short MessageService (SMS), Wireless Application Protocol (WAP) Push, MultimediaMessaging Service (MMS), Session Initiation Protocol (SIP), as well asothers.

Whereas traditional push technologies are adequate to push content toclients, such technologies suffer from drawbacks. Consider a privatenetwork comprising, connected to or otherwise associated with a mobilenetwork, such as a General Packet Radio Service (GPRS) network. In suchinstances, a client, such as a mobile terminal, communicating across themobile network can generally initiate a communication session (e.g., SIPcommunication session) with a server across a Network Address Translator(NAT) located between the client and the server, such as in accordancewith “pull” techniques. As will be appreciated, the NAT can translate aprivate IP address of the client to a public IP address recognizable tothe server. A server typically cannot, however, initiate a similarcommunication session with the client across the NAT, such as inaccordance with “push” techniques. In this regard, clients withinprivate and cellular networks typically lack a static and publicidentity like a fixed IP-address, and as such, servers often cannotidentify a desired client to the NAT.

Mobile networks are typically configured in a manner that prevents aserver from initiating a SIP communication session with a respectiveclient for a number of reasons. Firstly, depending upon the networktopology, enabling IP-connectivity to clients within the network canconsume an undesirable amount of resources or reduce performance of thenetwork even when there is no IP-traffic across the network. Secondly,in the network, as in many private networks, there may be more clientsthan available IP-addresses. As such, the network may include a NAT,dynamically allocated IP addresses and/or private IP addresses. Thirdly,the security needs and policies of many networks require that variousIP-traffic be prevented from passing into the network. Such an instancealso often leads to the use of the NAT, particularly when the mobilenetworks include an associated firewall/gateway.

To overcome the drawback of the NAT to permit servers to initiate acommunication session with a client in accordance with “push”techniques, networks can be configured such that each client has aunique, fixed IP address, where those addresses are entered into arespective Domain Name System (DNS) server. The NAT and any securitycomponents (e.g., firewall/gateway, etc.) of the network can also beconfigured to allow a server to initiate a communication session with aclient and allow routing of traffic to and from the IP address allocatedto the client. In addition, for example, network technology-specificresources required for IP connectivity with each client in the networkcan be allocated when the client is connected to the network.

Such a technique for permitting servers to push content to clients,however, ignores the limitations of public networks that lead to the useof NAT components. Namely, such a technique ignores the limitation ofavailable public IP addresses. Also, such a technique ignores theability of NAT components to communicate with firewalls/gateways, whichprovide security functionality. Thus, it would be desirable to design asystem capable of permitting servers to push content to clients in amobile or private network utilizing a network-initiated communicationsession technique that accounts for the limited address space of publicnetworks and maintains firewall and/or gateway functionality to therespective network.

SUMMARY OF THE INVENTION

In light of the foregoing background, embodiments of the presentinvention provide an improved system and method for pushing content to aterminal, typically a mobile terminal having an associated private IPaddress, utilizing a network-initiated data session technique. Incontrast to conventional techniques for pushing content to a terminal,embodiments of the present invention permit a network-initiated datasession to be established with the terminal from a network node across apublic network from the terminal. More particularly, embodiments of thepresent invention permit network nodes to establish a network-initiateddata session with the terminal in a manner that accounts for the limitednumber of available public IP addresses, and maintains firewall and/orgateway functionality to the mobile network including the terminal.

According to one aspect of the present invention, a system is providedfor pushing content to a terminal located within a mobile network or aprivate network. The system includes a network node, such as a SessionInitiation Protocol (SIP) proxy, located across a public network fromthe network including the terminal. The network node is capable ofsubscribing to a push service on behalf of the terminal such that thenetwork node is also capable of receiving push content in accordancewith the push service. Thereafter, the network node is capable ofestablishing a network-initiated data session with the terminal. Forexample, the network node can be capable of sending a trigger to theterminal independent of the public network to thereby trigger theterminal to register with the network node and establish thenetwork-initiated data session. In response to the network-initiateddata session, the network node is further capable of registering theterminal such that the terminal is capable of receiving the push contentbased upon the registration.

More particularly, the network node can be capable of receiving, andthereafter storing in a buffer, the push content. In such instances, thenetwork node can be capable of sending the push content to the terminalfrom the buffer. Alternatively, the network node can be capable ofregistering the terminal such that the terminal is capable ofsubscribing to the push service based upon the registration. In suchinstances, the terminal can be capable of receiving the push contentbased upon the terminal subscribing to the push service.

The network node can be capable of receiving a registration message fromthe terminal across the public network to thereby identify the terminalacross the public network and register the terminal. For example, thenetwork node can be capable of receiving the registration message fromthe terminal via a network address translator (NAT) and/or a firewall(FW) located between the network node and the terminal. In suchinstances, the network node can be capable of establishing anetwork-initiated data session in a manner independent of the NAT and/orFW. The network node can additionally or alternatively be capable ofregistering the terminal such that the terminal is capable of receivingthe push content based upon the identity of the terminal across thepublic network.

According to other aspects of the present invention, a terminal andmethod for pushing content to a terminal are provided. Therefore,embodiments of the present invention provide an improved system andmethod for pushing content to a terminal utilizing a network-initiateddata session technique. Embodiments of the present invention permit aterminal (i.e., terminating node) to subscribe to, and thereafterreceive content from, a push service without requiring additional, ormany additional, public IP addresses. Embodiments of the presentinvention further permit the network node to establish anetwork-initiated data session with the terminal without obviatingfirewall and/or gateway functionality otherwise provided to a mobilenetwork including the terminal, such as by a FW. Therefore, the systemand method of embodiments of the present invention solve the problemsidentified by prior techniques and provide additional advantages.

BRIEF DESCRIPTION OF THE DRAWINGS

Having thus described the invention in general terms, reference will nowbe made to the accompanying drawings, which are not necessarily drawn toscale, and wherein:

FIG. 1 is a schematic block diagram of a communications system accordingto one embodiment of the present invention including a public networkand a mobile network to which an originating node and a terminating nodeare bi-directionally coupled directly or indirectly;

FIG. 2 is a schematic block diagram of an entity capable of operating asa SIP client, in accordance with embodiments of the present invention;

FIG. 3 is a schematic block diagram of a mobile station that may operateas a SIP client, according to embodiments of the present invention;

FIG. 4A is a control flow diagram more particularly illustrating amethod of pushing content to a terminal, in accordance with oneembodiment of the present invention; and

FIG. 4B is a control flow diagram more particularly illustrating amethod of pushing content to a terminal, in accordance with anotherembodiment of the present invention.

DETAILED DESCRIPTION OF THE INVENTION

The present invention now will be described more fully hereinafter withreference to the accompanying drawings, in which preferred embodimentsof the invention are shown. This invention may, however, be embodied inmany different forms and should not be construed as limited to theembodiments set forth herein; rather, these embodiments are provided sothat this disclosure will be thorough and complete, and will fullyconvey the scope of the invention to those skilled in the art. Likenumbers refer to like elements throughout.

Referring to FIG. 1, an illustration of one type of system that wouldbenefit from the present invention is provided. The system and method ofembodiments of the present invention will be primarily described inconjunction with mobile communications applications. It should beunderstood, however, that the system and method of embodiments of thepresent invention can be utilized in conjunction with a variety of otherapplications, both in the mobile communications industries and outsideof the mobile communications industries.

As shown, the system 10 includes a public network 12, such as a publicInternet Protocol (IP) network like the Internet. The public networkincludes a number of network nodes, each of which typically comprise aprocessing element such as a server computer, personal computer, laptopcomputer or the like. More particularly, the public network can includeone or more network nodes comprising fixed terminals 14, each of whichare capable of communicating within or across the public network. Thenetwork nodes of the public network 12 can also include a proxy 16, suchas Session Initiation Protocol (SIP) proxy. Although not shown, thenetwork nodes of the public network can also include a SIP registrar. Inthis regard, the registrar can be implemented in the SIP proxy, as iswell known to those skilled in the art. As will be appreciated, callingmodels such as SIP provide an application layer signaling protocolrelated to multimedia sessions (see, e.g., IETF request for commentdocument RFC 3261, entitled: SIP: Session Initiation Protocol, June2002, the contents of which are hereby incorporated by reference in itsentirety). The SIP proxy is therefore capable of receiving andforwarding SIP signaling messages, such as SIP signaling messages toand/or from a network node comprising a fixed terminal operating as anoriginating node 20, as such is described in greater detail below. Thepublic network can also include one or more Domain Name System (DNS)servers 18. In this regard, each network node typically has a unique IPaddress that has an associated, typically easier to recall, host DNSname. The DNS servers, then, can be capable of transforming a host DNSname into the associated IP address such that network traffic can berouted to the appropriate network node.

In addition to the public network 12, the system 10 includes one or moreprivate networks 24, such as Local Area Networks (LANs). Each privatenetwork, like the public network, can include a number of network nodes.Also, like the public network 12, the network nodes of each privatenetwork can include one or more DNS servers 26. Similar to before, theDNS servers of the private networks can be capable of transforming ahost DNS name into an associated IP address such that network trafficcan be routed to the appropriate public or network node. The privatenetwork can also include one or more network nodes comprising mobileterminals 32, each of which are capable of communicating within oracross the private network. The terminals 32 can comprise, for example,mobile telephones, portable digital assistants (PDAs), pagers, laptopcomputers, smart cards and other types of electronic systems.

To facilitate the terminals 32 accessing the private network, theprivate network 24 can include one or more wireless access points (AP's)(not shown), each of which can be coupled to one or more terminals. Inthis regard, the AP's can comprise access points configured tocommunicate with the terminal in accordance techniques such as, forexample, radio frequency (RF), Bluetooth (BT), infrared (IrDA) or any ofa number of different wireline and/or wireless networking techniques,including LAN and/or WLAN techniques. Also like the public network, theprivate network can include an originating node 20, which is describedin greater detail below. As described below, the private network caninclude a terminating node 36, which can be capable of communicatingwith an originating node. And as also described below, one or more ofthe terminals of the private network can be capable of operating as anoriginating node or a terminating node.

To facilitate communications between network nodes of the public network12 and network nodes of the private networks 24, each private networkcan further include a Network Address Translator (NAT) interconnectingthe public network and the private network. As explained above in thebackground section, each NAT can be capable of transforming a public IPaddress from the public network into a private IP address of a networknode of a respective private network, and vice versa, for communicationsbetween the public network and the respective private network. As willbe appreciated, the NAT can also include an Application Level Gateway(ALG) (not shown) capable of transforming IP addresses embedded in, forexample, application protocol data units (PDUs). In addition, the NATcan include or be associated with a firewall and/or gateway for therespective private network. As shown, then, a NAT including orassociated with a firewall/gateway is shown as a NAT/FW 28.

The system 10 can also include one or more mobile or cellular networks30. The cellular networks can comprise one or more of a number ofdifferent mobile networks. In this regard, the cellular networks cancomprise any of a number of first-generation (1G), second-generation(2G), 2.5G and/or third-generation (3G) cellular networks, and/or any ofa number of other cellular networks capable of operating in accordancewith embodiments of the present invention. For example, each cellularnetwork can comprise a GSM (Global System for Mobile Communication),IS-136 (Time Domain Multiple Access—TDMA), IS-95 (Code Division MultipleAccess—CDMA), or EDGE (Enhanced Data GSM Environment) network.Alternatively, one or more of the cellular networks can comprise GPRS(General Radio Packet Service) or GPRS-based (e.g., Universal MobileTelecommunications System—UMTS) networks.

Like the public and private networks 12, 24, the cellular networks 30also include one or more network nodes. In this regard, the networknodes of each cellular network can include one or more mobile terminals32 capable of communicating within and/or across a respective cellularnetwork. And as described below, one or more of the mobile terminals arecapable of operating as an originating node 20, such as in the samemanner as the originating nodes of the public and private networks. Inaddition, as also described below, one or more of the mobile terminalsare capable of operating as a terminating node 38 which, as indicatedabove and described below, can be capable of communicating with anoriginating node via a SIP proxy 16 in accordance with SIP.

Within the cellular networks 30, the network nodes can also include oneor more network signaling support nodes such as one or more SGSNs(signaling GPRS support nodes) 38, and one or more gateway support nodessuch as one or more GGSNs (gateway GPRS support nodes) 40. For example,the network nodes can include one or more SGSNs and one or more GGSNs,as such are described in a number of specifications of the 3GPartnership Project (3GPP). As will be appreciated by those skilled inthe art, the SGSNs are capable of routing communications to and from themobile terminals 32, and can also provide a connection to the othernetwork nodes when the terminals are involved in a communication sessionwith such network nodes. The GGSNs, on the other hand, are capable ofinterconnecting the cellular networks and the private networks 24. Inthis regard, the GGSNs are capable of performing traditional gatewayactions, as such are well known. It should be noted that although thecellular networks can include SGSNs and GGSNs, the cellular networks cancomprise other similarly operating network nodes for other types ofcellular networks.

Reference is now made to FIG. 2, which illustrates a block diagram of anentity capable of operating as a network node (e.g., SIP proxy 16,originating node 20, NAT/FW 28, terminating node 36, SGSN 38, GGSN 40,etc.) within the public network 12, private networks 24 or cellularnetworks 30, in accordance with one embodiment of the present invention.Although shown as separate entities, in some embodiments, one or moreentities may support one or more of the network nodes, logicallyseparated but co-located within the entit(ies). For example, a singleentity may support a logically separate, but co-located, originatingnode and SIP proxy. Also, for example, as indicated above, a singleentity may support a logically separate, but co-located NAT andfirewall/gateway.

As shown, the entity capable of operating as a network node cangenerally include a controller 42, processor or the like connected to amemory 44. The controller can also be connected to at least oneinterface 46 or other means for transmitting and/or receiving data,content or the like. The memory can comprise volatile and/ornon-volatile memory, and typically stores content, data or the like. Forexample, the memory typically stores software applications, instructionsor the like for the controller to perform steps associated withoperation of the entity in accordance with embodiments of the presentinvention. Also, for example, the memory typically stores contenttransmitted from, or received by, the network node.

FIG. 3 illustrates a functional diagram of a mobile station that mayoperate as a mobile terminal 32 and, as such, an originating node 20 orterminating node 36, according to embodiments of the invention. Itshould be understood, that the mobile station illustrated andhereinafter described is merely illustrative of one type of mobileterminal that would benefit from the present invention and, therefore,should not be taken to limit the scope of the present invention. Whileseveral embodiments of the mobile station are illustrated and will behereinafter described for purposes of example, other types of mobileterminals, such as portable digital assistants (PDAs), pagers, laptopcomputers and other types of voice and text communications systems, canreadily employ the present invention.

The mobile station includes a transmitter 48, a receiver 50, and acontroller 52 that provides signals to and receives signals from thetransmitter and receiver, respectively. These signals include signalinginformation in accordance with the air interface standard of theapplicable cellular system, and also user speech and/or user generateddata. In this regard, the mobile station can be capable of operatingwith one or more air interface standards, communication protocols,modulation types, and access types. More particularly, the mobilestation can be capable of operating in accordance with any of a numberof 1G, 2G, 2.5G and/or 3 G communication protocols or the like. Forexample, the mobile station may be capable of operating in accordancewith 2G wireless communication protocols IS-136 (TDMA), GSM, and IS-95(CDMA). Also, for example, the mobile station may be capable ofoperating in accordance with 2.5G wireless communication protocols GPRS,Enhanced Data GSM Environment (EDGE), or the like. Some narrow-band AMPS(NAMPS), as well as TACS, mobile stations may also benefit fromembodiments of the present invention, as should dual or higher modemobile stations (e.g., digital/analog or TDMA/CDMA/analog phones).

It is understood that the controller 52 includes the circuitry requiredfor implementing the audio and logic functions of the mobile station.For example, the controller may be comprised of a digital signalprocessor device, a microprocessor device, and various analog to digitalconverters, digital to analog converters, and other support circuits.The control and signal processing functions of the mobile station areallocated between these devices according to their respectivecapabilities. The controller thus also includes the functionality toconvolutionally encode and interleave message and data prior tomodulation and transmission. The controller can additionally include aninternal voice coder (VC) 52A, and may include an internal data modem(DM) 52B. Further, the controller may include the functionally tooperate one or more software applications, which may be stored inmemory.

The mobile station also comprises a user interface including aconventional earphone or speaker 54, a ringer 56, a microphone 60, adisplay 62, and a user input interface, all of which are coupled to thecontroller 52. The user input interface, which allows the mobile stationto receive data, can comprise any of a number of devices allowing themobile station to receive data, such as a keypad 64, a touch display(not shown) or other input device. In embodiments including a keypad,the keypad includes the conventional numeric (0-9) and related keys (#,*), and other keys used for operating the mobile station.

Although not shown, the mobile station can further include an IrDAtransceiver or another local data transfer device so that data can beshared with and/or obtained from other devices such as other mobilestations, car guidance systems, personal computers, printers, printedmaterials including barcodes and the like. The sharing of data, as wellas the remote sharing of data, can also be provided according to anumber of different techniques. For example, the mobile station mayinclude a RF transceiver capable of sharing data with other radiofrequency transceivers, and/or with a Radio Frequency Identification(RFID) transponder tag, as such is known to those skilled in the art.Additionally, or alternatively, the mobile station may share data usingBT brand wireless technology developed by the Bluetooth Special InterestGroup. Further, the mobile station may be capable of sharing data inaccordance with any of a number of different wireline and/or wirelessnetworking techniques, including LAN and/or WLAN techniques.

The mobile station can also include memory, such as a subscriberidentity module (SIM) 66, a removable user identity module (R-UIM) orthe like, which typically stores information elements related to amobile subscriber. In addition to the SIM, the mobile station caninclude other memory. In this regard, the mobile station can includevolatile memory 68, as well as other non-volatile memory 70, which canbe embedded and/or may be removable. For example, the other non-volatilememory can comprise embedded or removable multimedia memory cards(MMCs), Memory Sticks manufactured by Sony Corporation, EEPROM, flashmemory, hard disk or the like. The memories can store any of a number ofpieces of information, and data, used by the mobile station to implementthe functions of the mobile station. For example, the memories can storean identifier, such as an international mobile equipment identification(IMEI) code, international mobile subscriber identification (IMSI) code,mobile station integrated services digital network (MSISDN) code or thelike, capable of uniquely identifying the mobile station. The memoriescan also store content, such as that to transmit to, or that receivedfrom, an originating node 20.

As indicated in the background section, conventional techniques forpermitting an originating node 20, to push content to a terminating node36, such as a mobile terminal, ignore the limitations of the publicdomains like the public network 12 (e.g., Internet) that lead to the useof the NAP/FW 28 to interconnect the public network to a respectiveprivate network 24. Namely, such techniques ignore the limitation ofavailable public IP addresses. Also, such a technique ignores theability of the NAP/FW to provide firewall and/or gateway functionalityto a respective private network. Thus, embodiments of the presentinvention provide an improved system and method for pushing content to aterminating node, where the terminating node resides in a private orcellular (i.e., mobile network). More particularly, embodiments of thepresent invention provide a system and method that permit originatingnodes to push content to terminating nodes utilizing a network-initiateddata session technique that accounts for the limited address space ofpublic domains. In addition, the system and method can, but need not,permit originating nodes to push content to terminating nodes whilemaintaining firewall and/or gateway functionality to the mobile network.As described below, the originating node initiates communication with aterminating node comprising a terminal within a cellular network 30. Itshould be understood, however, that the terminating node canalternatively comprise a network node of a private network, withoutdeparting from the spirit and scope of the present invention.

As well known to those skilled in the art, SIP is an application-layercontrol protocol that can establish, modify and terminate multimediasessions or calls. SIP is text-based, using ISO 10646 in UTF-8 encodingthroughout. The syntax of the messages is similar to HTTP, except thatSIP can carry the transaction using either User Datagram Protocol (UDP)or Transmission Control Protocol (TCP). A SIP message can typically becharacterized as either a request or a response, and it can be createdfollowing the format of Internet Engineering Task Force (IETF) requestfor comment document RFC 822, entitled: Standard for the Format of ARPAInternet Text Messages, August 1982, the contents of which are herebyincorporated by reference in its entirety.

Generally, the entities involved in a SIP session include a user agent(e.g., originating node 20, terminating node 36, etc.), the SIP proxy16, a registrar and a location service. The user agent can function as aclient (UAC) that initiates a SIP request. The user agent can alsooperate as a server (UAS) that contacts the user when a SIP request isreceived, and sends back a response on behalf of the user. The SIPproxy, as indicated above, comprises an intermediate entity that cansimultaneously function like a client and server. In this regard, theSIP proxy can interpret and modify a SIP request before forwarding it toother servers. The registrar which, as shown, can be implemented in theSIP proxy, accepts user registrations (e.g., REGISTER messages) and canmake this information available through a location service, also capableof being implemented in the SIP proxy. The location service, then,comprises an element used by the SIP proxy to obtain information aboutthe possible location of a terminating node.

A SIP message generally comprises a start line, one or more headerfields, an empty line (carriage-return line-feed—CRLF) and an optionalbody. Generally, the start line of a SIP message indicates if themessage is a request (e.g., INVITE, ACK, OPTIONS, BYE, CANCEL, REGISTER,REFER, etc.) or a response (e.g., 100 Informational, 200 Success, 300Redirection, 400 Client Error, 500 Server Error, 600 Global Failure,etc.). The message header can include multiple headers indicating, forexample, the source (“From:”), destination (“To:”), call identifier(“Call-ID:”), message sequence (“Cseq:”), contact (“Contact:”),transaction path (“Via:”), length (“Content-Length:”) and content(“Content-Type:”) of the body, if carried in the message. The messagebody, on the other hand, can include any of a number of different typesof data, the interpretation of which typically depends upon the type ofmessage. Generally, the content of the body can contain a sessiondescription following a specific format such as the Session DescriptionProtocol (SDP), text or Extensible Markup Language (XML) scripts. Inthis regard, the “Content-Type” header field gives the media type of themessage body. If the body is encoded, such encoding is typicallyindicated in the “Content-Encoding” header field, and the body length istypically given in the “Content-Length” header field.

The entities addressed by SIP can include users that can be accessed viaSIP proxies 16 supporting such users, where the users can be identifiedby a SIP uniform resource locator (URL). Generally, SIP URLs are usedwithin SIP messages to indicate, for example, the originator (From), thecurrent destination in the start line (request URL), and the finalrecipient (To) of a SIP request. As will be appreciated, the URL cantake a form such as “user@host,” where “user” typically identifies auser (e.g., user name, telephone number, etc.) and “host” identifies aSIP proxy (e.g., domain name, IP address, etc.) supporting the user. Inthis regard, SIP URLs can be used for locating a user based upon adomain name-to-IP address translation by a DNS server 18, particularlywhen the URL includes the domain name of the respective SIP proxy. Inthis regard, the originator can query the DNS server including thedestination address including the domain name of the SIP proxy.

As indicated above, the system 10 can include an originating node 20 anda terminating node 36. Generally, the terminating node is capable ofsubscribing to a push service, such as a SIP push service, of theoriginating node such that the originating node can thereafter pushcontent to the terminating node via a SIP proxy 16 supporting theterminating node. As well known to those skilled in the art, the SIPproxy can be capable of forwarding SIP signaling messages to theterminating node from the originating node, and vice versa. In contrastto conventional SIP communication techniques, however, when theterminating node is located behind a NAT/FW 28 from the originatingnode, the SIP proxy may not be capable of identifying the terminatingnode across the NAT/FW when the originating node desires to initiate aSIP communication session with the terminating node. More particularly,for example, the SIP proxy may not be capable of identifying theterminating node when the NAT/FW no longer maintains a translation tableentry for the terminating node or the SIP proxy no longer maintains aregistration for a public IP address and port assigned by the NAT/FW tothe terminating node.

In accordance with embodiments of the present invention, then, theterminating node 36 can be capable of instructing the SIP proxy 16 tosubscribe to a push service of an originating node 20 on behalf of theterminating node. The originating node can then provide the push serviceto the SIP proxy on behalf of the terminating node. In turn, the SIPproxy can utilize a network-initiated data session technique tocommunicate with the terminating node across the NAT/FW 28 to deliverthe push content to the terminating node. The SIP proxy can utilize anyof a number of different network-initiated data sessions with theterminating node to thereby initiate communication with the terminatingnode such that the SIP proxy can deliver the push content to theterminating node. For example, the SIP proxy can utilize anetwork-initiated data session technique in accordance with the ThirdGeneration Partnership Project 2 (3GPP2) specification 3GPP2 S.P0090,entitled: Network-initiated Data Session (NIDS), the contents of whichare hereby incorporated by reference in its entirety.

In another example, the SIP proxy 16 can be capable of sending anon-IP-based trigger to the terminating node 36 independent of thepublic and private networks 12, 24, to thereby instruct the terminatingnode to re-register with the SIP proxy, such as across the NAT/FW 28. Inthis regard, the SIP proxy can be capable of sending a short messagingservice (SMS) message, enhanced messaging service (EMS) message,multimedia messaging service (MMS) message or Wireless ApplicationProtocol (WAP) push trigger to the terminating node. In response to thetrigger, the terminating node can re-register with the SIP proxy suchthat the SIP proxy can thereafter communicate with the terminating nodeacross the NAT/FW. More particularly, in response to the trigger, theterminating node can register with the SIP proxy through the NAT/FW suchthat the NAT/FW assigns a public IP address to the terminating node, andsuch that the SIP proxy can register the terminating node including theassigned public IP address. As indicated above, the SIP proxy canimplement a registrar in accordance with SIP to thereby carry out thefunctions of the registrar, such as to register the terminating node. Assuch, as described herein, it should be understood that the SEP proxycan comprise a SIP proxy implementing a corresponding registrar, such asto register and/or re-register the terminating node.

To permit the SIP proxy 16 to send a non-IP-based trigger to theterminating node 36, the SIP proxy is capable of identifying theterminating node independent of an IP communication channel of thepublic and private networks 12, 24, and thus over a communicationchannel independent of the NAT/FW 28. For example, the SIP proxy can becapable of identifying a MSISDN or other global identifier associatedwith a terminating node. Based upon the MSISDN, then, the SIP proxy cansend a SMS, EMS, MMS or WAP-push trigger to the terminating node. Inthis regard, the SIP proxy can be capable of identifying a non-LP-basedidentifier of the terminating node in any of a number of differentmanners. In one advantageous embodiment, the terminating node registerswith the SIP proxy before the SIP proxy receives push content from theoriginating node 20 for the terminating node. As the terminating noderegisters with the SIP proxy, then, the terminating node can send theSIP proxy an identifier (e.g., MSISDN) of the terminating node outsidean IP communication channel. For more information on such anetwork-initiated data session technique, see U.S. patent applicationSer. No. ______, entitled: System and Method for Establishing a SessionInitiation Protocol Communication Session with a Mobile Terminal, filed______, the contents of which are hereby incorporated by reference inits entirety. And for an example of another network-initiated datasession technique, see U.S. patent application Ser. No. ______,entitled: System and Method for Establishing an Internet ProtocolConnection with a Terminating Network Node, filed ______, the contentsof which are also hereby incorporated by reference in its entirety.

Reference is now made to FIGS. 4A and 4B, which illustrate examples of amethod of pushing content to a terminating node 36 in accordance withembodiments of the present invention. For purposes of the examples shownin FIGS. 4A and 4B, consider a terminating node that has a private IPaddress, and is capable of being identified by a user and a host domainname. Also, consider the terminating node having a MSISDN. In addition,for example, consider an originating node 20 and a SIP proxy 16, eachhaving a public IP address. Further, consider a NAT/FW 28 being capableof assigning one or more IP addresses within a pool of IP addresses.

As shown in FIG. 4A, the terminating node 36 can instruct the SIP proxy16 to subscribe to a push service of the originating node 20 on behalfof the terminating node by sending a SIP REFER message to the SIP proxyvia a respective NAT/FW 28. As will be appreciated by those skilled inthe art, the SIP REFER message can be utilized by the terminating nodeto request that the SIP proxy refer to a resource (i.e., push service ofthe originating node) identified in the REFER message, and to allow theterminating node to be notified of the outcome of the referencedrequest. For more information on the SIP REFER technique, see IETFrequest for comment document RFC 3515, entitled: The Session InitiationProtocol (SIP) Refer Method, April 2003, the contents of which arehereby incorporated by reference in its entirety.

The SIP REFER message can include any of a number of pieces ofinformation, such as that described above. For example, header fields ofthe SIP REFER message can include a source identifying the private IPaddress of the terminating node 36. The header fields can also include,for example, a destination identifying the public IP address of the SIPproxy 16, and a contact identifying the user and domain name of theterminating node. In addition, the header fields can identify theoriginating node 20 in a refer header field (“Refer-To:”) that alsoidentifies the push service of the originating node and instructs theSIP proxy to subscribe (i.e., method=SUBSCRIBE) to the push service.

In response to the SIP REFER message, the NAT/FW 28 can create a newtransformation table entry for the terminating node 36 associating theprivate IP address of the terminating node with a public IP address. Ifthe NAT/FW currently has a transformation table entry for theterminating node with an assigned public IP address, however, the NAT/FWcan lookup the transformation table entry for the terminating node. Inaddition to creating a new transformation table entry, to permitcommunications between the intermediate node and the NAT/FW, if sodesired, the NAT/FW can also add a new firewall (FW) filter allowingcommunications from the NAT/FW and communications to the SIP proxy 16.Although not described herein, messages sent and/or received inaccordance with embodiments of the present invention can also include anopen communication port. In such instances, the NAT/FW can createtransformation table entries further including the same or anothercommunication port, and can further operate in a manner accounting forsuch communication port(s).

After creating a new transformation table entry, or looking up anexisting transformation table entry, the NAT/FW 28 can transform theprivate IP address of the terminating node 36 in the header fields ofthe SIP REFER message into the public IP address assigned to theterminating node by the NAT/FW. Also, depending upon the operation ofthe ALG of the NAT/FW, a contact identifying the user and domain name ofthe terminating node can be translated to identify the public IP addressassigned to the terminating node. Then, after transforming the addressof the SIP REFER message, the NAT/FW can pass the transformed SIP REFERmessage to the SIP proxy 16.

Upon receiving the transformed SIP REFER message, the SIP proxy 16 canaccept the SIP REFER message by returning an acceptance, such as a 202(ACCEPTED) message, back to the terminating node 36 via the NAT/FW 28.In this regard, the 202 (ACCEPTED) message can identify the terminatingnode by the public IP address assigned to the terminating node by theNAT/FW. Upon receipt of the 202 (ACCEPTED) message, then, the NAT/FW cantransform the assigned public IP address into the private IP address ofthe terminating node. The NAT/FW can then forward the 202 (ACCEPTED)message to the terminating node.

Also, because the SIP REFER message requests the SIP proxy 16 to enter asubscription on behalf of the terminating node 36, the SIP proxy cancreate a SIP subscription for the refer request of the terminating node.After creating the subscription, then, the SIP proxy can return a SIPNOTIFY message (i.e., NOTIFY (REFER)) to the terminating node to therebynotify the terminating node that the SIP proxy has created asubscription for the refer request of the terminating node. And asbefore, the SIP proxy can send the SIP NOTIFY message to the terminatingnode via the NAT/FW 28 by addressing the SIP NOTIFY message to theassigned public IP address of the terminating node. In turn, the NAT/FWcan transform the public IP address assigned to the terminating node tothe private IP address of the terminating node and forward the SIPNOTIFY message to terminating node. Then, in response to the SIP NOTIFYmessage, the terminating node can send an acknowledgement of the SIPNOTIFY, such as a 200 (OK) message, back to the SIP proxy via theNAT/FW, which transforms the private IP address of the terminating nodeinto the public IP address assigned to the terminating node by theNAT/FW.

Also upon receipt of the SIP REFER message, the SIP proxy 16 can processthe SIP REFER message by subscribing to the push service of theoriginating node 20 on behalf of the terminating node 36 in accordancewith the SIP REFER message. In this regard, the SIP proxy can send a SIPSUBSCRIBE message to the originating node to thereby subscribe to thepush service of the originating node. The SIP SUBSCRIBE message caninclude any of a number of different pieces of information, but inaccordance with the SIP REFER message, identifies the push serviceidentified in the SIP REFER message. In addition, because the SIP proxyis subscribing to the push service on behalf of the terminating node,the SIP SUBSCRIBE message typically identifies the SIP proxy, as opposedto the terminating node.

Upon receipt of the SIP SUBSCRIBE message, the originating node 20 canacknowledge receipt of the SIP SUBSCRIBE message, such as by returning a200 (OK) message to the SIP proxy 16. In addition, the originating nodecan create a subscription to the push service for the SIP proxy. Aftercreating the subscription, the originating node can return a SIP NOTIFYmessage (i.e., NOTIFY (SUBSCRIBE)) to the SIP proxy to thereby notifythe SIP proxy that the originating node has created a subscription tothe push service of the originating node for the SIP proxy. Upon receiptof the SIP NOTIFY message, the SIP proxy, in accordance with the refersubscription, can notify the terminating node 36 of the successfulsubscription. In this regard, the SIP proxy can send a SIP NOTIFYmessage (i.e., NOTIFY (REFER)) to the terminating node via the NAT/FW 28by, as before, addressing the SIP NOTIFY message to the assigned publicIP address of the terminating node. Also as before, the NAT/FW cantransform the public IP address assigned to the terminating node to theprivate IP address of the terminating node. Further, the terminatingnode can send a 200 (OK) message back to the SIP proxy via the NAT/FW.

At one or more points in time after the SIP proxy 16 has successfullysubscribed to the push service of the originating node 20 on behalf ofthe terminating node 36, the terminating node can receive push contentfrom the originating node via the SIP proxy and in accordance with thepush service. In this regard, in accordance with the subscription to thepush service, the originating node can send a SIP NOTIFY message (i.e.,NOTIFY (INC. CONTENT)) to the SIP proxy including push content. Asbefore, upon receipt of the SIP NOTIFY message, the SIP proxy can returna 200 (OK) message to the originating node. Also, upon receipt of thepush content, the SIP proxy can forward the push content to theterminating node 36 via the NAT/FW 28 in accordance with the refersubscription entered by the SIP proxy for the terminating node.

In various instances, such as after a “time-to-live” period, however,the NAT/FW 28 may remove the translation table entry for the terminatingnode 36. Additionally, or alternatively, for example, the SIP proxy 16may cease to maintain the registration entry for the terminating node,including the public IP address assigned to the terminating node by theNAT/FW. Further, the terminating node can de-register from the SIPproxy, and thereafter enter an “idle” operating state. In any of thoseinstances, as will be appreciated, the SIP proxy may not be capable ofidentifying the terminating node across the NAT/FW to thereby forwardpush content to the terminating node via the NAT/FW.

In accordance with embodiments of the present invention, then, uponreceipt of the push content, the SIP proxy 16 can buffer the pushcontent from the originating node 20, such as into a memory (e.g.,memory 44) of the SIP proxy. Thereafter, the SIP proxy can establish anetwork-initiated data session with the terminating node 36. Forexample, the SIP proxy 16 can send a non-IP-based trigger to theterminating node based upon a non-IP-based identifier of the terminatingnode, such as a MSISDN. The non-IP-based trigger, in turn, can instructthe terminating node to re-register with the SIP proxy. For example, theSIP proxy can send a SMS message, EMS message, MMS message or WAP-pushtrigger to the terminating node across the cellular network 30independent of the public and private networks 12, 24, and thus theNAT/FW.

In response to the SIP proxy 16 establishing a network-initiated datasession with the terminating node 36, the terminating node canre-register with the SIP proxy such that the NAT/FW 28 can again assigna public IP address and communication port to the terminating node, andthe SIP proxy can update its registration entry for the terminatingnode. More particularly, for example, once the terminating node receivesthe trigger, the terminating node can send a SIP REGISTER message to theSIP proxy via a respective NAT/FW. In response to the SIP REGISTERmessage, the NAT/FW can again create a new transformation table entryfor the terminating node associating the private IP address of theterminating node with a public IP address.

After creating a new transformation table entry, the NAT/FW 28 cantransform the private IP address of the terminating node 36 in the SIPREGISTER message into the public IP address assigned to the terminatingnode by the NAT/FW. Then, the NAT/FW can pass the transformed SIPREGISTER message to the SIP proxy 16 for registration. Upon receivingthe transformed register message, the SIP proxy can update the previousregistration entry for the terminating node. Then, the SIP proxy canconfirm reception and creation/updating of the registration entry. Asbefore, for example, the SIP proxy can send a 200 (OK) message to theterminating node via the NAT/FW 28.

After re-registering the terminating node 36, the SIP proxy 16 canforward the push content to the terminating node via the NAT/FW 28, suchas within a SIP MESSAGE. For more information on a technique for sendingsuch a message, see IETF request for comment document RFC 3428,entitled: Session Initiation Protocol (SIP) Extension for InstantMessaging, December 2002, the contents of which are hereby incorporatedby reference in its entirety. In this regard, from the SIP proxy, theNAT/FW can receive the push content and lookup the transformation tableentry for the terminating node based upon the assigned public IP addressof the terminating node (identified as the destination of the pushcontent). The NAT/FW can then transform the destination of the pushcontent from the assigned public IP address to the private IP address ofthe terminating node. After transforming the destination of the pushcontent, the NAT/FW can forward the push content to the terminating nodebased upon the private IP address of the terminating node. Then,although not shown, the terminating node can confirm reception of thepush content, such as by sending a 200 (OK) message to the SIP proxy viathe NAT/FW.

In lieu of the SIP proxy 16 storing the push content in a buffer andforwarding the push content to the terminating node 36, the terminatingnode can be configured such that after re-registering with the SIPproxy, the terminating node subscribes to the push service to therebyreceive the push content. In this regard, reference is now drawn to FIG.4B which illustrates a portion of a method of pushing content to aterminating node in accordance with another embodiment of the presentinvention. As shown in FIG. 4B, as before, after the SIP proxy hassuccessfully subscribed to the push service of the originating node 20on behalf of the terminating node, the originating node can send, to theSIP proxy, a SIP NOTIFY message (i.e., NOTIFY (INC. CONTENT)) thatincludes push content in accordance with the push service. Also asbefore, in response to the SIP NOTIFY message, the SIP proxy can returna 200 (OK) message to the originating node. Thereafter, the SIP proxycan establish a network-initiated data service with the terminatingnode, such as by sending a non-IP-based trigger to the terminating node.Then, as before, the terminating node can re-register with the SIP proxyvia the NAT/FW 28 such that the NAT/FW can again assign a public IPaddress and communication port to the terminating node, and the SIPproxy can update its registration entry for the terminating node.

After re-registering with the SIP proxy 16, the terminating node 36 cansubscribe to the push service of the originating node 20 such that theterminating node can receive the push content from the originating node,as opposed to from a buffer of the SIP proxy, as shown in FIG. 4A. Inthis regard, by configuring the terminating node to instruct the SIPproxy to subscribe to the push service on behalf of the terminating nodeand thereafter subscribe to the push service after the SIP proxyreceives push content, the terminating node need only to occupy networkresources during periods of time when the originating node sends pushcontent in accordance with the push service.

As shown, the terminating node 36 can subscribe to the push service bysending a SIP SUBSCRIBE message to the originating node 20 via theNAT/FW 28 and the SIP proxy 16, as shown in FIG. 4B. More particularly,the terminating node can send a SIP SUBSCRIBE message, as before, thatidentifies the push service of the originating node and identifies theterminating node, typically identifying the private IP address of theterminating node. The NAT/FW can then receive the SIP SUBSCRIBE message,lookup the transformation table entry for the terminating node, andthereafter transform the private IP address of the terminating node inthe SIP SUBSCRIBE message into the public IP address assigned to theterminating node by the NAT/FW. After transforming the private IPaddress of the terminating node into the assigned public IP address, theNAT/FW 28 can forward the SIP SUBSCRIBE message to the SIP proxy. TheSIP proxy, in turn, can forward the SIP SUBSCRIBE message to theoriginating node.

Upon receipt of the SIP SUBSCRIBE message, as before, the originatingnode 20 can acknowledge receipt of the SIP SUBSCRIBE message, such as byreturning a 200 (OK) message to the terminating node 36 via the SIPproxy 16 and the NAT/FW 28, which transforms the private IP address ofthe terminating node into the public IP address assigned to theterminating node. In addition, the originating node can create asubscription to the push service for the terminating node. Aftercreating a subscription to the push service for the terminating node,the originating node can send a SIP NOTIFY message to the terminatingnode via the SIP proxy and NAT/FW. As before, the SIP NOTIFY message caninclude push content in accordance with the subscription to the pushservice. In this regard, the SIP NOTIFY message can comprise the sameSIP NOTIFY message received by the SIP proxy before the SIP proxyestablished the network-initiated data service with the terminatingnode, although the SIP NOTIFY message now received by the terminatingnode via the SIP proxy and NAT/FW identifies the terminating node as thedestination of the message. Upon receipt of the SIP NOTIFY messageincluding the push content, then, the terminating node can return a 200(OK) message to the originating node via the NAT/FW and SIP proxy.

As described herein, the terminating node 36 is located behind a NAT/FW28 from an originating node 20. It should be appreciated, however, thatthe terminating node can be located behind a firewall/gateway (FW)without a NAT between the terminating node and the originating node. Insuch instances, embodiments of the present invention can be capable ofpermitting the originating node to initiate communication with theterminating node in instances in which the communication may otherwisebe restricted by the FW, thereby maintaining the firewall and/or gatewayfunctionality to the network including the terminal.

For example, as will be appreciated by those skilled in the art, asystem 10 including a NAT for private/public address translation istypical of networks communicating in accordance with IP Version 4(IPv4). It should be understood, however, that the system, or portionsthereof, can alternatively be configured to communicate in accordancewith IP Version 6 (IPv6), which supports longer IP addresses than IPv4.In this regard, because IPv6 supports longer IP addresses than IPv4, oneor more of the private networks may not require a NAT to performaddress/port translations. In such instances, the system may not includea NAT or NAT/FW, but instead includes a firewall/gateway (FW) capable ofoperating as a security mechanism to an associated private network, suchas in the same manner as described above. The system can then operate asdescribed above, although the terminating node can have an associatedpublic IPv6 address. As such, the source or destination ofcommunications between the originating node and the terminating node,that otherwise identifies an assigned public IPv4 address of theterminating node that is translated by a NAT into a private IPv4address, can identify the public IPv6 address of the terminating nodeand pass without translation from a public IPv4 address to a privateIPv4 address or vice versa.

Many modifications and other embodiments of the invention will come tomind to one skilled in the art to which this invention pertains havingthe benefit of the teachings presented in the foregoing descriptions andthe associated drawings. Therefore, it is to be understood that theinvention is not to be limited to the specific embodiments disclosed andthat modifications and other embodiments are intended to be includedwithin the scope of the appended claims. Although specific terms areemployed herein, they are used in a generic and descriptive sense onlyand not for purposes of limitation.

1-23. (canceled)
 24. A method comprising: sending, from a terminatingnode, a message to a network node via a first path to subscribe to apush service of an originating node to receive push content, the messagecomprising an identifier of the terminating node that is independent ofa network address of the terminating node; receiving, at the terminatingnode, a trigger from the network node via a second path independent ofthe first path, the trigger indicating that the terminating node is nolonger registered to the network node; and re-registering, by theterminating node, with the network node via the first path.
 25. Themethod of claim 24, further comprising: receiving, at the terminatingnode, push content via the first path.
 26. The method of claim 25,further comprising: sending, from the terminating node, a subscriptionrequest to the network node via the first path to subscribe to the pushservice of the originating node after re-registering with the networknode, such that the network node forwards the subscription request tothe originating node.
 27. The method of claim 24, wherein the networknode is a session initiated protocol (SIP) proxy.
 28. The method ofclaim 24, wherein the trigger is received via one of a short messageservice message, an enhanced messaging service message, a multi-mediamessage service, and a wireless application protocol push trigger. 29.The method of claim 24, wherein the identifier of the terminating nodethat is independent of a network address of the terminating nodecomprises one of a mobile station integrated services digital network(MSISDN) code and a global identifier of the terminating node.
 30. Themethod of claim 24, wherein the trigger is non-internet protocol(IP)-based.
 31. An apparatus of a terminating node comprising: atransmitter; a receiver; and a controller configured to: send, using thetransmitter, a message to a network node via a first path to subscribeto a push service of an originating node to receive push content, themessage comprising an identifier of the terminating node that isindependent of a network address of the terminating node, receive, usingthe receiver, a trigger from the network node via a second pathindependent of the first path, the trigger indicating that theterminating node is no longer registered to the network node, andre-register, using the transmitter, with the network node via the firstpath.
 32. The apparatus of claim 31, wherein the controller is furtherconfigured to receive, using the receiver, push content via the firstpath.
 33. The apparatus of claim 32, wherein the controller is furtherconfigured to: send, using the transmitter, a subscription request tothe network node via the first path to subscribe to the push service ofthe originating node after re-registering with the network node, suchthat the network node forwards the subscription request to theoriginating node.
 34. The apparatus of claim 31, wherein the networknode is a session initiated protocol (SIP) proxy.
 35. The apparatus ofclaim 31, wherein the trigger is received via one of a short messageservice message, an enhanced messaging service message, a multi-mediamessage service, and a wireless application protocol push trigger. 36.The apparatus of claim 31, wherein the identifier of the terminatingnode that is independent of a network address of the terminating nodecomprises one of a mobile station integrated services digital network(MSISDN) code and a global identifier of the terminating node.
 37. Theapparatus of claim 31, wherein the trigger is non-internet protocol (IP)based.
 38. A non-transitory computer-readable storage medium containingprogram instructions for subscribing to a push service, whereinexecution of the program instructions by one or more processors of aterminating node causes the one or more processors to carry out thesteps of: sending, from the terminating node, a message to a networknode via a first path to subscribe to the push service of an originatingnode to receive push content, the message comprising an identifier ofthe terminating node that is independent of a network address of theterminating node; receiving, at the terminating node, a trigger from thenetwork node via a second path independent of the first path, thetrigger indicating that the terminating node is no longer registered tothe network node; and re-registering, by the terminating node, with thenetwork node via the first path.
 39. The non-transitorycomputer-readable storage medium of claim 38, wherein execution of theprogram instructions by the one or more processors of the terminatingnode further causes the one or more processors to carry out the step of:receiving, at the terminating node, push content via the first path. 40.The non-transitory computer-readable storage medium of claim 39, whereinexecution of the program instructions by the one or more processors ofthe terminating node further causes the one or more processors to carryout the step of: sending, from the terminating node, a subscriptionrequest to the network node via the first path to subscribe to the pushservice of the originating node after re-registering with the networknode, such that the network node forwards the subscription request tothe originating node.
 41. The non-transitory computer-readable storagemedium of claim 38, wherein the network node is a session initiatedprotocol (SIP) proxy.
 42. The non-transitory computer-readable storagemedium of claim 38, wherein the trigger is received via one of a shortmessage service message, an enhanced messaging service message, amulti-media message service, and a wireless application protocol pushtrigger.
 43. The non-transitory computer-readable storage medium ofclaim 38, wherein the identifier of the terminating node that isindependent of the network address of the terminating node comprises oneof a mobile station integrated services digital network (MSISDN) codeand a global identifier of the terminating node.
 44. The non-transitorycomputer-readable storage medium of claim 38, wherein the trigger isnon-internet protocol (IP) based.