SIPPING E. Burger Internet-Draft SnowShore Networks, Inc. Expires: August 2, 2004 M. Dolly AT&T Labs February 2, 2004 Keypad Stimulus Protocol (KPML) draft-ietf-sipping-kpml-02 Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http:// www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on August 2, 2004. Copyright Notice Copyright (C) The Internet Society (2004). All Rights Reserved. Abstract The Key Press Stimulus Protocol uses the SIP SUBSCRIBE/NOTIFY mechanism and Keypad Markup Language (KPML) to provide instructions to SIP User Agents for the reporting of user key presses. Conventions used in this document RFC2119 [1] provides the interpretations for the key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" found in this document. In the narrative discussion, the "user device" is a User Agent that Burger & Dolly Expires August 2, 2004 [Page 1] Internet-Draft KPML February 2004 will report stimulus. it could be, for example, a SIP phone, edge media processor, or media gateway. An "application" is a User Agent requesting the user device to report stimulus. The "user" is an entity that stimulates the user device. In English, the user device is a phone, the application is an application server or proxy server, and the user presses keys to generate stimulus. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4 2. Key Press Stimulus Protocol . . . . . . . . . . . . . . . . 5 2.1 Model . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2 Monitoring Leg . . . . . . . . . . . . . . . . . . . . . . . 7 2.3 Operation . . . . . . . . . . . . . . . . . . . . . . . . . 7 3. Protocol Machinery . . . . . . . . . . . . . . . . . . . . . 8 3.1 Event Package Name . . . . . . . . . . . . . . . . . . . . . 9 3.2 Event Package Parameters . . . . . . . . . . . . . . . . . . 9 3.3 SUBSCRIBE Bodies . . . . . . . . . . . . . . . . . . . . . . 10 3.4 Subscription Duration . . . . . . . . . . . . . . . . . . . 10 3.5 NOTIFY Bodies . . . . . . . . . . . . . . . . . . . . . . . 10 3.6 Notifier Processing of SUBSCRIBE Requests . . . . . . . . . 10 3.7 Notifier Generation of NOTIFY Requests . . . . . . . . . . . 12 3.7.1 SIP Protocol-Generated . . . . . . . . . . . . . . . . . . . 12 3.7.2 Match . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.7.3 Inter-Digit Timeout No Match . . . . . . . . . . . . . . . . 12 3.7.4 Dialog Terminated . . . . . . . . . . . . . . . . . . . . . 13 3.7.5 No Call Leg . . . . . . . . . . . . . . . . . . . . . . . . 14 3.7.6 Bad Document . . . . . . . . . . . . . . . . . . . . . . . . 14 3.7.7 One-Shot vs. Persistent Requests . . . . . . . . . . . . . . 14 3.8 Subscriber Processing of NOTIFY Requests . . . . . . . . . . 15 3.8.1 No KPML Body . . . . . . . . . . . . . . . . . . . . . . . . 15 3.8.2 KPML Body . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.9 Handling of Forked Requests . . . . . . . . . . . . . . . . 15 3.10 Rate of Notifications . . . . . . . . . . . . . . . . . . . 15 3.11 State Agents . . . . . . . . . . . . . . . . . . . . . . . . 16 4. Message Format - KPML . . . . . . . . . . . . . . . . . . . 16 4.1 KPML Request . . . . . . . . . . . . . . . . . . . . . . . . 16 4.1.1 Pattern Matching . . . . . . . . . . . . . . . . . . . . . . 18 4.1.2 Digit Suppression . . . . . . . . . . . . . . . . . . . . . 20 4.1.3 One-Shot and Persistent Triggers . . . . . . . . . . . . . . 22 4.1.4 Multiple Patterns . . . . . . . . . . . . . . . . . . . . . 22 4.1.5 Monitoring Direction . . . . . . . . . . . . . . . . . . . . 22 4.1.6 Multiple, Simultaneous Subscriptions . . . . . . . . . . . . 23 4.2 KPML Reports . . . . . . . . . . . . . . . . . . . . . . . . 23 4.2.1 Pattern Match Reports . . . . . . . . . . . . . . . . . . . 24 4.2.2 KPML No Match Reports . . . . . . . . . . . . . . . . . . . 24 5. DRegex Syntax . . . . . . . . . . . . . . . . . . . . . . . 25 6. Formal Syntax . . . . . . . . . . . . . . . . . . . . . . . 26 Burger & Dolly Expires August 2, 2004 [Page 2] Internet-Draft KPML February 2004 7. Enumeration of KPML Status Codes . . . . . . . . . . . . . . 27 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . 28 8.1 MIME Media Type application/kpml+xml . . . . . . . . . . . . 28 8.2 URN Sub-Namespace Registration for urn:ietf:xml:ns:kpml . . 29 8.3 KPML Schema Registration . . . . . . . . . . . . . . . . . . 29 9. Security Considerations . . . . . . . . . . . . . . . . . . 29 10. Examples . . . . . . . . . . . . . . . . . . . . . . . . . . 30 10.1 Monitoring for Octothorpe . . . . . . . . . . . . . . . . . 30 10.2 Dial String Collection . . . . . . . . . . . . . . . . . . . 30 10.3 Interactive Digit Collection . . . . . . . . . . . . . . . . 31 11. Call Flow Example . . . . . . . . . . . . . . . . . . . . . 32 11.1 INVITE-Initiated Dialog . . . . . . . . . . . . . . . . . . 32 11.2 Third-Party Subscription . . . . . . . . . . . . . . . . . . 37 11.3 Remote-End Monitoring . . . . . . . . . . . . . . . . . . . 38 Normative References . . . . . . . . . . . . . . . . . . . . 38 Informative References . . . . . . . . . . . . . . . . . . . 38 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . 39 A. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 40 B. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 40 Intellectual Property and Copyright Statements . . . . . . . 41 Burger & Dolly Expires August 2, 2004 [Page 3] Internet-Draft KPML February 2004 1. Introduction This document describes the Key Press Stimulus Protocol. The Key Press Stimulus Protocol exchanges messages using the SUBSCIBE and NOTIFY methods of SIP [2] with message bodies formed from the Keypad Markup Language, KPML. KPML is a markup [7] that enables "dumb phones" to report user key-press events. Colloquially, this mechanism provides for "digit reporting" or "DTMF reporting." A goal of KPML is to fit in an extremely small memory and processing footprint. Note KPML has a corresponding lack of functionality. For those applications that require more functionality, please refer to VoiceXML [8] and MSCML [9]. We strongly discourage the use of non-validating XML parsers, as one can expect problems with future versions of KPML. The name of the markup, KPML, reflects its legacy support role. The public switched telephony network (PSTN) accomplished end-to-end signaling by transporting Dual-Tone, Multi-Frequency (DTMF) tones in the bearer channel. This is in-band signaling. From the point of view of an application being signaled, what is important is the fact the stimulus occurred, not the tones used to transport the stimulus. For example, an application may ask the caller to press the "1" key. What the application cares about is the key press, not that there were two cosine waves of 697 Hz and 1209 Hz transmitted. A SIP-signaled [3] network transports end-to-end signaling with RFC2833 [10] packets. In RFC2833, the signaling application inserts RFC2833 named signal packets as well as or instead of generating tones in the media path. The receiving application gets the signal information, which is what it wanted in the first place. RFC2833 correlates the time the end user pressed a digit with the user's media. However, out-of-band signaling methods, as are appropriate for user device to application signaling, do not need millisecond accuracy. On the other hand, they do need reliability, which RFC2833 does not provide. An interested application could request notifications of every key press. However, many of the use cases for such signaling has the application interested in only one or a few keystrokes. Thus we need a mechanism for specifying to the user device what stimulus the application would like notification of. Burger & Dolly Expires August 2, 2004 [Page 4] Internet-Draft KPML February 2004 2. Key Press Stimulus Protocol 2.1 Model There are two usage models for the protocol. Functionally, they are both equivalent. However, it is useful to understand the use cases. The first model is that of a SIP User Agent (UA) that directly interacts, on a given dialog, with the end device. Figure 1 shows a two-party SIP dialog. In this scenario, the SIP UA requests the End Point to report on key press events that would normally emanate from End Point port B. This could represent, for example, a toll by-pass scenario where the End Point is an ingress gateway and the SIP UA is an egress gateway. In this case, the requesting User Agent requests digit notification on the same dialog established for the call, between SIP ports A and X. +-------+ SIP +-----+ | A--------------------X | | End | | SIP | | Point | RTP | UA | | B--------------------Y | +-------+ +-----+ Figure 1: Endpoint Model The second model is that of a third-party application that is interested in entered key presses. Figure 2 shows an established two-party SIP dialog between the End Point and the SIP UA. The requesting application addresses the particular media stream by referencing the established dialog identifier referring to the dialog between SIP ports A and X. Burger & Dolly Expires August 2, 2004 [Page 5] Internet-Draft KPML February 2004 +-------------+ | Requesting | /---| Application | / +-------------+ / SIP / (SUBSCRIBE/NOTIFY) / / +---M---+ SIP (INVITE) +-----+ | A--------------------X | | End | | SIP | | Point | RTP | UA | | B--------------------Y | +-------+ +-----+ Figure 2: Third-Party Model The third model is that of a media proxy. A media proxy is a media relay in the terminology of RFC1889 [11]. However, in addition to the RTP forwarding capability of a RFC1889 media relay, the media proxy can also do light media processing, such as tone detection, tone transcoding (tones to RFC2833 [10], and so on. The Requesting Application uses dialog identifiers to identify the stream to monitor. The default is to monitor the media entering the End Point. For example, if the Requesting Application in Figure 3 uses the dialog represented by SIP ports V-C, then the media coming from SIP UAa RTP port W gets monitored. Likewise, the dialog represented by A-X directs the End Point to monitor the media coming from SIP UAb RTP Port Y. Burger & Dolly Expires August 2, 2004 [Page 6] Internet-Draft KPML February 2004 +-------------+ | Requesting | /---| Application | / +-------------+ / SIP / (SUBSCRIBE/NOTIFY) / / +-----+ SIP +---M---+ SIP +-----+ | V--------------------C A--------------------X | | SIP | | End | | SIP | | UAa | RTP | Point | RTP | UAb | | W--------------------D B--------------------Y | +-----+ +-------+ +-----+ Figure 3: Media Proxy Model 2.2 Monitoring Leg The default leg to monitor is the leg represented by the local tag of the SIP dialog at the monitoring End Point. A requesting application MAY request monitoring of the leg represented by the remote tag of the SIP dialog at the monitoring End Point. Not all End Point devices are able to monitor the remote media stream. However, the End Point MUST be able to report on local (End Point-generated) key press events. If the requesting application wishes to monitor both legs at a given End Point, the application will establish two subscriptions, one for each leg. Section 4.1.5 describes how to specify to the End Point which leg of the dialog to monitor. 2.3 Operation The key press stimulus protocol uses explicit subscription requests and notification requests, using the semantics of SUBSCRIBE/NOTIFY [2]. Following the semantics of SUBSCRIBE, if the user device receives a second subscription on the same dialog, the user device MUST terminate the existing KPML request (if any) and replace it with the new request. An application may register multiple digit patterns in a single KPML Burger & Dolly Expires August 2, 2004 [Page 7] Internet-Draft KPML February 2004 request. If the user device supports multiple, simultaneous KPML requests, the application registers the separate requests either in a new SUBSCRIBE-initiated dialog or on an existing SUBSCRIBE-initiated dialog with a new event id tag. If the user device does not support multiple, simultaneous KPML requests, it responds with an error response code. See Section 4.1.6 for more information. A KPML request can be persistent or one-shot. Persistent requests are active until either the dialog terminates, including normal subscription expiration, the client replaces them, the client deletes them by sending a null document on the dialog, or the client deletes the subscription by sending a SUBCRIBE with an expires of zero (0). Standard SUBSCRIBE processing dictates the end point sends a NOTIFY response if it receives a SUBSCRIBE with an expires of zero. One-shot requests terminate themselves once a match occurs. The "persist" KPML element specifies whether the subscription remains registered for the duration specified in the SUBSCRIBE message or if it automatically terminates after a pattern matches. KPML requests route to the user device using standard SIP request routing. A KPML request identifies the leg in question in one of two ways. The first method is to send the request on an existing, INVITE-initiated dialog. The second method is to explicitly identify the call leg by its dialog identifiers. Response messages are KPML documents (messages). If the user device matched a digit map, the response indicates the digits detected and whether the user device suppressed digits. If the user device had an error, such as a timeout, it will indicate that instead. 3. Protocol Machinery The Key Press Stimulus Protocol uses the SIP [3]SUBSCRIBE/NOTIFY [2] mechanism. The registration of a digit map is simply setting a digit event notification filter. When the device detects the digits, it sends an event notification to the application. The following sub-sections are the formal specification of the KPML SIP-specific event notification package. Burger & Dolly Expires August 2, 2004 [Page 8] Internet-Draft KPML February 2004 3.1 Event Package Name The name for the Key Press Stimulus Protocol package is "kpml". 3.2 Event Package Parameters The "leg" parameter identifies the call leg being monitored. If the "leg" parameter is not present, the SUBSCRIBE MUST be on an established INVITE-initiated SIP dialog. In this case, the leg the end device monitors is the call leg associated with the established dialog. If there is no corresponding dialog or call leg, the end device will send a 481 result code in a KPML notification. NOTE: The SUBSCRIBE may succeed, resulting in a SIP 200 OK. However, the "current state" will be the KPML 481 result, and the subscription state will be "terminated." SIP identifies call legs by their dialog identifier. The dialog identifier is the remote-tag, local-tag, and Call-ID entities. To identify a specific dialog, all three of these parameters MUST be present. Usually, the local-tag is the To: entity with the To tag, the remote-tag is the From: entity including tag, and the call-id matches the Call-ID. Although semantically different, the important entities are the To: and From: tags. Note there may be ambiguity in specifying only the SIP dialog to monitor. The dialog may specify multiple SDP streams that could carry key press events. For example, a dialog may have multiple audio streams. Wherever possible, the End Point MAY apply local policy to disambiguate which stream or streams to monitor. In order to have an extensible mechanism for identifying streams, the mechanism for specifying streams is as an element content to the tag. The only content defined today is the tag. For most situations, such as a monaural point-to-point call with a single codec, the stream to monitor is obvious. In such situations the Application need not specify which stream to monitor. The BNF for these parameters is as follows. The definitions of callid, token, EQUAL, SWS, and DQUOTE are from RFC3261 [3]. call-id = "call-id" EQUAL DQUOTE callid DQUOTE from-tag = "from-tag" EQUAL token to-tag = "to-tag" EQUAL token The call-id parameter is a quoted string. This is because the BNF for word (which is used by callid) allows for characters not allowed Burger & Dolly Expires August 2, 2004 [Page 9] Internet-Draft KPML February 2004 within token. One usually just copies these elements from the Call-Id, to, and from fields of the SIP INVITE. One can use any method of determining the dialog identifier. One method available, particularly for third-party applications, is the SIP Dialog Package [12]. 3.3 SUBSCRIBE Bodies Key press filtering requests use KPML, as described in Section 4.1. The MIME type for KPML is application/kpml+xml. Because of the potentially sensitive nature of the information reported by KPML, subscribers SHOULD use sips: and SHOULD consider the use of S/MIME on the content. Subscribers MUST be prepared for the notifier to insist on authentication at a minimum and encryption as a likelihood. 3.4 Subscription Duration The subscription lifetime should be longer than the expected call time. The default subscription lifetime (Expires value) MUST be 7200 seconds. This two-hour subscription time is entirely arbitrary. Please contact the editor if you have a better suggestion, and why. Subscribers MUST be able to handle the end device returning an Expires value smaller than the requested value. Per RFC3265 [2], the subscription duration is the value returned by the end device in the 200 OK response Expires entity. 3.5 NOTIFY Bodies The key press notification uses KPML, as described in Section 4.2. The MIME type for KPML is application/kpml+xml. The default MIME type for the kpml event package is application/kpml+xml. If the requestor is not using a secure transport protocol such as TLS (e.g., by using a sips: URI), the end device SHOULD use S/MIME to protect the user information in responses. 3.6 Notifier Processing of SUBSCRIBE Requests The user information transported by KPML is potentially sensitive. For example, it could include calling card or credit card numbers. Thus the first action of the end device (notifier) SHOULD be to authenticate the requesting party. Burger & Dolly Expires August 2, 2004 [Page 10] Internet-Draft KPML February 2004 End devices MUST support digest authentication at a minimum. End devices MUST support the sips: scheme and TLS. Upon authenticating the requesting party, the end device determines if the requesting party has authorization to monitor the user's key presses. Determining authorization policies and procedures is beyond the scope of this specification. NOTE: While it would be good to require both authorization and user notification for KPML, some uses, such as lawful intercept pen registers, have very strict authorization requirements yet have a requirement of no user notification. Conversely, pre-paid applications running on a private network may have no authorization requirements and already have implicit user acceptance of key press monitoring. Thus we cannot give any guidelines here. After authorizing the request (RECOMMENDED), the end device checks to see if the request is to terminate a subscription. If the request will terminate the subscription, the end device does the appropriate processing, including the procedures described in Section 3.7.4. If the request has no KPML body, than any KPML document running on that dialog, and addressed by the event id, if present, immediately terminates. This is a mechanism for unloading a KPML document while keeping the SUBSCRIBE-initiated dialog active. This can be important for secure sessions that have high costs for session establishment, such as TLS. The end device follows the procedures described in Section 3.7.1. If the SUBSCRIBE request arrived on an INVITE-initiated dialog, and there is no "leg" parameter to the kpml subscription, then the KPML document acts upon the call legs created by the INVITE-initiated dialog. If the SUBSCRIBE request has a "leg" parameter to the kpml subscription, then the KPML document acts upon the call leg referred to by the "leg" parameter. If appropriate, the end device SHOULD validate the requestor has authorization to monitor a given leg. If the SUBSCRIBE request has a "leg" parameter to the kpml subscription, but the referenced leg does not exist, the end device follows the procedures in Section 3.7.5 Note the end device MUST issue a 200 OK before issuing the NOTIFY, as the SUBSCRIBE itself is well-formed. If the request has a KPML body, the end device parses the KPML document. The end device SHOULD validate the XML document against Burger & Dolly Expires August 2, 2004 [Page 11] Internet-Draft KPML February 2004 the schema presented in Section 6. If the document is not valid, the end device performs the procedures described in Section 3.7.6. If there is a loaded KPML document on the dialog (and given event id, if present), the end device unloads the document. If the KPML document is valid, and the end device is capable of performing the monitoring, the end device performs the filtering specified by the KPML document. See Section 4 for the specification of KPML. 3.7 Notifier Generation of NOTIFY Requests 3.7.1 SIP Protocol-Generated The end device (notifier in SUBSCRIBE/NOTIFY parlance) generates NOTIFY requests based on the requirements of RFC3265 [2]. Specifically, unless a SUBSCRIBE request is not valid, all SUBSCRIBE requests will result in an immediate NOTIFY. The KPML payload distinguishes between a NOTIFY that RFC3265 mandates and a NOTIFY informing of key presses. If there are no digits quarantined at the time of the SUBSCRIBE (see Section 4.1 below) or the quarantined digits do not match the new KPML document, then the immediate NOTIFY MUST NOT contain a KPML body. If end device has digits quarantined that result in a digit match using the new KPML document, then the NOTIFY MUST return the appropriate KPML document. 3.7.2 Match During the subscription lifetime, the end device may detect a key press stimulus that triggers a KPML event. In this case, the end device (notifier) MUST return the appropriate KPML document. 3.7.3 Inter-Digit Timeout No Match Once a user starts to enter digits, it is highly likely they will enter all of the digits of interest within a specific time period. There is a temporal locality of reference for key presses. It is possible for users to accidentally press a key, however. Moreover, users may start pressing a key and then be lost as to what to do next. For applications to handle this situation, KPML allows applications to request notification if the user starts to enter digits but then stops before a digit map matches. Once the end point detects a key press that matches the first character of a digit map, the end point starts the interdigit timer specified in the tag. Every subsequent key press detected restarts the interdigit timer. If the interdigit timer expires, the Burger & Dolly Expires August 2, 2004 [Page 12] Internet-Draft KPML February 2004 end point generates a KPML report with the KPML status code 423, Timer Expired. The report also includes the digits collected up to the time the timer expired. This could be the null string. After sending the NOTIFY, the end point will resume quarantining additional detected digits. Applications may have different requirements for the interdigit timer. For example, applications targeted to user populations that tend to key in information slowly may require longer interdigit timers. The specification of the interdigit timer is in milliseconds. The default value is 4000, for 4 seconds. A value of zero indicates disabling the interdigit timer. The End Device MUST round up the requested interdigit timer to the nearest time increment it is capable of detecting. 3.7.4 Dialog Terminated It is possible for a dialog to terminate during key press collection. The cases enumerated here are explicit SUBSCRIPTION termination, automatic SUBSCRIPTION termination, and underlying (INVITE-initiated) dialog termination. If a SUBSCRIBE request has an expires of zero (explicit SUBSCRIBE termination), includes a KPML request, and there are quarantined digits, then the end device attempts to process the quarantined digits against the document. If there is a match, the end device generates the appropriate KPML report with the KPML status code of 200. The SIP NOTIFY body terminates the subscription by setting the subscription state to "terminated" and a reason of "timeout". If the subscription was on a SUBSCRIBE-initiated dialog, and there are no more active event id's associated with the dialog, then the end point MUST consider the dialog terminated. If the subscription was on an INVITE-initiated dialog, then the end point MAY release KPML-specific resources related to the dialog, but it MUST NOT alter the state of the INVITE-initiated dialog. If the requesting party issues a SUBSCRIBE with an expires of zero and no KPML body or the expires timer on the SUBSCRIBE-initiated dialog fires at the end device (notifier), then the end device issues a KPML report with the KPML status code 487, Subscription Expired. The report also includes the digits collected up to the time the expires timer expired or when the subscription with expires equal to zero was processed. This could be the null string. Also, note that the digits in this case cannot match a digit map. If they did, the end device would have generated a KPML match report if they did. Again, per the mechanisms of RFC3265 [2], the end device will terminate the SIP SUBSCRIBE dialog. The end device does this via the Burger & Dolly Expires August 2, 2004 [Page 13] Internet-Draft KPML February 2004 SIP NOTIFY body transporting the final report described in the preceding paragraph. In particular, the subscription state will be "terminated" and a reason of "timeout". If the subscription was on a SUBSCRIBE-initiated dialog, then the end point MUST consider the dialog terminated. If the subscription was on an INVITE-initiated dialog, then the end point MAY release KPML-specific resources related to the dialog, but it MUST NOT alter the state of the INVITE-initiated dialog. 3.7.5 No Call Leg If a SUBSCRIBE request references a dialog that is not present at the endpoint, usually by specifying a dialog identifier through the leg parameter to the kpml event package, the end point generates a KPML report with the KPML status code 481, Dialog Not Found. The end device terminates the subscription by setting the subscription state to "terminated". If the subscription was on a SUBSCRIBE-initiated dialog, and there are no more active event id's associated with the dialog, then the end point MUST consider the dialog terminated. If the subscription was on an INVITE-initiated dialog, then the end point MAY release KPML-specific resources related to the dialog, but it MUST NOT alter the state of the INVITE-initiated dialog. IMPORTANT: The end device can invoke this procedure if the dialog underlying a subscription terminates. For example, a SUBSCRIBE-initiated dialog subscribes to the state of a different dialog (call) via the leg kpml parameter. That different call may terminate before the SUBSCRIBE-initiated dialog terminates. In this case, the end device MUST terminate the SUBSCRIBE-initiated dialog. This ensures reauthorization (if necessary) for attaching to subsequent call legs. 3.7.6 Bad Document If the KPML document is not valid, the end device generates a KPML report with the KPML status code 501, Bad Document. The end device terminates the subscription by setting the subscription state to "terminated". If the subscription was on a SUBSCRIBE-initiated dialog, and there are no more active event id's associated with the dialog, then the end point MUST consider the dialog terminated. If the subscription was on an INVITE-initiated dialog, then the end point MAY release KPML-specific resources related to the dialog, but it MUST NOT alter the state of the INVITE-initiated dialog. 3.7.7 One-Shot vs. Persistent Requests A one-shot kpml subscription is one that the KPML document does not mark as persistent. If the end device detects a key press stimulus Burger & Dolly Expires August 2, 2004 [Page 14] Internet-Draft KPML February 2004 that triggers a one-shot KPML event, then the end device (notifier) MUST set the "Subscription-State" in the NOTIFY message to "terminated". At this point the end device MUST consider the subscription destroyed. The end device MUST quarantine digits per the controls specified in Section 4.1. For persistent kpml subscriptions, the KPML document remains active for the lifetime of the subscription. 3.8 Subscriber Processing of NOTIFY Requests 3.8.1 No KPML Body If there is no KPML body, it means the SUBSCRIBE was successful. This establishes the dialog if there are no quarantined digits to report. 3.8.2 KPML Body If there is a KPML document, and the KPML status code is 200, then a match occurred. If there is a KPML document, and the KPML status code is 4xx, then an error occurred with digit collection. The most likely cause is a timeout condition. If there is a KPML document, and the KPML status code is 5xx, then an error occurred with the subscription. See Section 7 for more on the meaning of error codes. The subscriber MUST be mindful of the subscription state. The end device may terminate the subscription at any time. 3.9 Handling of Forked Requests The SUBSCRIBE behavior described in Section 3.6 ensures that it is only possible to have a subscription where there is an active (e.g., voice) dialog. Thus the case of multiple subscription installation cannot occur. 3.10 Rate of Notifications The end device MUST NOT generate messages faster than one message every 40 milliseconds. This is the minimum time period for MF digit spills. Even 30 millisecond DTMF, as one sometimes finds in Japan, has a 20 millisecond off-time, resulting in a 50 millisecond interdigit time. This document strongly RECOMMENDS AGAINST using KPML for digit-by-digit messaging, such as would be the case if the Burger & Dolly Expires August 2, 2004 [Page 15] Internet-Draft KPML February 2004 only is "x". Because there is no meaningful metric for throttling requests. In addition, the end device MUST reliably deliver notifications. Thus the end device SHOULD send NOTIFY messages over a congestion-controlled transport, such as TCP or SCTP. End devices MUST at a minimum implement SIP over TCP. 3.11 State Agents Not applicable. 4. Message Format - KPML The Key Press Stimulus Protocol exchanges KPML messages. There are two, mutually exclusive elements to KPML: the request and response. 4.1 KPML Request A KPML request document (message) contains a entity containing a tag with a series of tags. The element specifies a digit pattern for the device to report on. Section 5 describes the DRegex, or digit regular expression, language. Some devices can buffer entered digits. Subsequent KPML requests first apply their patterns against the buffered digits. Some applications use modal interfaces where the first few key presses determine what the following digits mean. For a novice user, the application may play a prompt describing what mode the application is in. However, "power users" often barge through the prompt. The protocol provides a tag in the element. The default is not to flush digits. Flushing digits means the user device flushes any buffered digits. This has the effect of ignoring digits entered before the KPML request. To flush digits, the KPML includes yes. The End Device MUST be able to receive no. This directive is effectively a no-op. Other string values for may be defined in the future. If the End Device receives a string it does not understand, it MUST treat the string as a no-op. If the user presses a key not matched by the tags, the user device MUST discard the key press from consideration against the Burger & Dolly Expires August 2, 2004 [Page 16] Internet-Draft KPML February 2004 current or future KPML messages. However, as described above, once there is a match, the user device quarantines any key presses the user entered subsequent to the match. NOTE: This behavior allows for applications to only receive digits that interest them. For example, a pre-paid application only wishes to monitor for a long pound. If the user enters other digits, presumably for other systems, the pre-paid applicationd does not want notification of those digits. This feature is fundamentally different than the behavior of every system receiving every digit that TDM-based equipment provides. The end device MAY support an inter-digit timeout value. This is the amount of time the end device will wait for user input before returning a timeout error result on a partially matched pattern. The application can specify the inter-digit timeout as an integer number of milliseconds by using the interdigittimer attribute to the tag. The default is 4000 milliseconds. If the end device does not support the specification of an inter-digit timeout, the end device MUST silently ignore the specification. If the end device supports the specification of an inter-digit timeout, but not to the granularity specified by the value presented, the end device MUST round up the requested value to the closest value it can support. KPML messages are independent. Thus it is not possible for the current document to know if a following document will enable barging or want the digits flushed. Therefore, the user device MUST quarantine all digits detected between the time of the report and the interpretation of the next script, if any. If the next script indicates a buffer flush, then the interpreter MUST flush all collected digits from consideration from KPML documents received on that dialog with the given event id. If the next script does not indicate flushing the quarantine digits, then the interpreter MUST apply the collected digits (if possible) against the digit maps presented by the script's tags. If there is a match, the interpreter MUST follow the procedures in Section 3.7.2 If there is no match, the interpreter MUST flush all of the collected digits. Unless there is a suppress indicator in the digit map, it is not possible to know if the signaled digits are for local KPML processing or for other recipients of the media stream. Thus, in the absence of a digit suppression indicator, the user device transmits the digits to the far end in real time, using either RFC2833, generating the appropriate tones, or both. The section Digit Suppression (Section 4.1.2) describes the operation of the suppress indicator. Burger & Dolly Expires August 2, 2004 [Page 17] Internet-Draft KPML February 2004 4.1.1 Pattern Matching 4.1.1.1 Inter-Digit Timing The pattern matching logic works as follows. KPML endpoints MUST follow the logic presented in this section so that multiple implementations will perform deterministically on the same KPML document given the same key press input. The pattern match algorithm matches the longest regular expression. This is the same mode as H.248.1 [13] and not the mode presented by MGCP [14]. The pattern match algorithm choice has an impact on determining when a pattern matches. Consider the following KPML document. 0 011 Figure 5: Greedy Matching In Figure 5, if we were to match on the first found pattern, the string "011" would never match. This happens because the "0" rule would match first. While this behavior is what most applications desire, it does come at a cost. Consider the following KPML document snippet. x{7} x{10} Figure 6: Timeout Matching Figure 6 is a typical NANP dial plan. From an application perspective, users expect a seven digit number to respond quickly, not waiting the typical inter-digit critical timer (usually four seconds). From a user's perspective, they do not want the system to cut off their ten digit number at seven digits because they did not enter the number fast enough. Burger & Dolly Expires August 2, 2004 [Page 18] Internet-Draft KPML February 2004 One approach to this problem is to have an explicit dial string terminator. Typically, it is the pound key (#). Now, consider the following snippet. x{7}# x{10}# Figure 7: Timeout Matching with Enter The problem with the approach in Figure 7 is that the digit collector will still look for a digit after the "#" in the seven-digit case. Worse yet, the "#" will appear in the returned dial string. The approach used in KPML is to have an explicit "Enter Key", as shown in the following snippet. xxxxxxx xxxxxxxxxx Figure 8: Timeout Matching with Enter Key In Figure 8 the enterkey parameter to the tag specifies a string that terminates a pattern. In this situation, if the user enters seven digits followed by the "#" key, the pattern matches (or fails) immediately. KPML indicates a terminated nomatch with a KPML status code 402. To address the various key press collection scenarios, we define three timers. The timers are the critical timer (criticaltimer), the inter-digit timer (interdigittimer), and the extra digit timer (extradigittimer). The critical timer is the time to wait for another digit if the collected digits can match a pattern. The extra timer is the time to wait after the longest match has occurred (presumably for the return key). The inter-digit timer inter-digit timer is the time to wait between digits in all other cases. Note there is no start timer, as that concept does not apply in the KPML context. All of these timers are parameters to the tag. 4.1.1.2 Intra-Digit Timing Some patterns look for long duration key presses. For example, some applications look for long "#" or long "*". Burger & Dolly Expires August 2, 2004 [Page 19] Internet-Draft KPML February 2004 KPML uses the "L" modifier to characters to indicate long key presses. The following KPML document looks for long pound. L# The request can specify what constitutes "long" by setting the long attribute to the . This attribute is an integer representing the number of milliseconds. If the user presses a key for longer than longtimer milliseconds, the Long modifier is true. NOTE: It is a local matter at the end device to consider multiple presses of the same key during the longtimer period to be equivalent to the Long version of that key. This is to support end devices that do not generate continuous key press tones. 4.1.2 Digit Suppression Under basic operation, a KPML endpoint will transmit in-band tones (RFC2833 [10] or actual tone) in parallel with digit reporting. NOTE: If KPML did not have this behavior, then a user device executing KPML could easily break called applications. For example, take a personal assistant that uses "*9" for attention. If the user presses the "*" key, KPML will hold the digit, looking for the "9". What if the user just enters a "*" key, possibly because they accessed an IVR system that looks for "*"? In this case, the "*" would get held by the user device, because it is looking for the "*9" pattern. The user would probably press the "*" key again, hoping that the called IVR system just did not hear the key press. At that point, the user device would send both "*" entries, as "**" does not match "*9". However, that would not have the effect the user intended when they pressed "*". On the other hand, there are situations where passing through tones in-band is not desirable. Such situations include call centers that use in-band tone spills to effect a transfer. For those situations, KPML adds a digit suppression tag, "pre", to the tag. There MUST NOT be more than one
 in any given



Burger & Dolly           Expires August 2, 2004                [Page 20]

Internet-Draft                    KPML                     February 2004


   .

   If there is only a single  and a single , the
   suppression processing is straightforward.  The end-point passes
   digits until the stream matches the regular expression pre.  At that
   point, the endpoint will continue collecting digits, but will
   suppress the generation or pass-through of any in-band digits.

   If the endpoint suppressed digits, it MUST indicate this by including
   the attribute "suppressed" with a value of "yes" in the digit report.

   Clearly, if the end device is processing the KPML document against
   quarantined digits, it is too late to suppress digits, as the end
   device has long sent the digits.  This is a situation where there is
   a 
 specification, but the "suppressed" attribute is not "yes" in
   the digit report.

   A KPML endpoint MAY perform digit suppression.  If it is not capable
   of digit suppression, it ignores the digit suppression attribute and
   will never send a suppressed indication in the digit report.  In this
   case, it will match concatenated patterns of pre+value.

   At some point in time, the endpoint will collect enough digits to the
   point it hits a 
 pattern.  The interdigittimer attribute
   indicates how long to wait once the user enters digits before
   reporting a time-out error.  If the interdigittimer expires, the
   endpoint MUST issue a time-out report, transmit the suppressed digits
   on the media stream, and stop suppressing digit transmission.

   Once the end device detects a match and it sends a NOTIFY request to
   report the digit string, the end device MUST stop digit suppression.
   Clearly, if subsequent digits match another 
 expression, then
   the end device MUST start digit suppression.

   After digit suppression begins, it may become clear that a match will
   not occur.  For example, take the expression " 
*8xxx[2-9]xxxxxx".  At the point the endpoint receives
   "*8", it will stop forwarding digits.  Let us say that the next three
   digits are "408".  If the next digit is a zero or one, the pattern
   will not match.

      NOTE: It is critically important for the endpoint to have a
      sensible inter-digit timer.  This is because an errant dot (".")
      may suppress digit sending forever.  See Section 4.1 for setting
      the inter-digit timer.

   Applications should be very careful to indicate suppression only when
   they are fairly sure the user will enter a digit string that will



Burger & Dolly           Expires August 2, 2004                [Page 21]

Internet-Draft                    KPML                     February 2004


   match the regular expression.  In addition, applications should deal
   with situations such as no-match or time-out.  This is because the
   endpoint will hold digits, which will have obvious user interface
   issues in the case of a failure.

4.1.3 One-Shot and Persistent Triggers

   The KPML document specifies if the patterns are to be persistent by
   setting the persistent attribute to the  tag to "true".
   Otherwise, the request will be a one-shot subscription.  If the end
   device does not support persistent subscriptions, it returns a KPML
   document with the KPML result code set to 531.  If there are digits
   in the quarantine buffer and the digits match an expression in the
   KPML document, the end device prepares the appropriate KPML document.

4.1.4 Multiple Patterns

   Some end devices may support multiple regular expressions in a given
   pattern request.  In this situation, the application may wish to know
   which pattern triggered the event.

   KPML provides a "tag" attribute to the  tag.  The "tag" is an
   opaque string that the end device sends back in the notification
   report upon a match in the digit map.  In the case of multiple
   matches, the end device MUST chose the longest match in the KPML
   document.  If multiple matches match the same length, the end device
   MUST chose the first expression listed in the subscription KPML
   document based on KPML document order.

   If the end device does not support multiple regular expressions in a
   pattern request, the end device MUST return a KPML document with the
   KPML result code set to 532.

4.1.5 Monitoring Direction

   By default, the end device monitors key presses emanating from the
   device.  Given a dialog identifier of Call-ID, local-tag, and
   remote-tag, the end device monitors the key presses associated with
   the local-tag.

   In the media proxy case, and potentially other cases, there is a need
   to monitor the key presses arriving from the remote user agent.  The
   optional  element to the >request> tag specifies which stream
   to monitor.  The only legal value is "reverse", which means to
   monitor the stream associated with the remote-tag.  The end point
   MUST ignore other values.
      NOTE:  The reason this is a tag is so individual stream selection,
      if needed can be addressed in a backwards-compatible way.



Burger & Dolly           Expires August 2, 2004                [Page 22]

Internet-Draft                    KPML                     February 2004


4.1.6 Multiple, Simultaneous Subscriptions

   Some end devices may support multiple key press event notification
   subscriptions at the same time.  In this situation, the end device
   honors each subscription individually and independently.

   A SIP user agent may request multiple subscriptions on the same
   SUBSCRIBE dialog, using the id parameter to the kpml event request.

   One or more SIP user agents may request independent subscriptions on
   different SIP dialogs.  In the body of the SUBSCRIBE is a leg
   parameter that indicates which leg to monitor.  Section 3.2 describes
   the dialog addressing mechanism in detail.

   If the end device does not support multiple, simultaneous
   subscriptions, the end device MUST return a KPML document with the
   KPML result code set to 533 on the dialog that requested the second
   subscription.  The end device MUST NOT modify the state of the first
   subscription on the account of the second subscription attempt.

4.2 KPML Reports

   When the user enters key press(es) that match a  tag, the end
   device will issue a report.

   After reporting, the interpreter terminates the KPML session unless
   the subscription has a persistence indicator.  If the subscription
   does not have a persistence indicator, the end device MUST set the
   state of the subscription to "terminated" in the NOTIFY report.

   If the subscription does not have a persistence indicator, to collect
   more digits the requestor must issue a new request.

      NOTE: This highlights the "one shot" nature of KPML, reflecting
      the balance of features and ease of implementing an interpreter.
      If your goal is to build an IVR session, we strongly suggest you
      investigate more appropriate technologies such as VoiceXML [8] or
      MSCML [9].

   KPML reports have two mandatory attributes, code and text.  These
   attributes describe the state of the KPML interpreter on the end
   device.  Note the KPML code is not necessarily related to the SIP
   result code.  An important example of this is where a legal SIP
   subscription request gets a normal SIP 200 OK followed by a NOTIFY,
   but there is something wrong with the KPML request.  In this case,
   the NOTIFY would include the KPML failure code in the KPML report.
   Note that from a SIP perspective, the SUBSCRIBE and NOTIFY were
   successful.  Also, if the KPML failure is not recoverable, the end



Burger & Dolly           Expires August 2, 2004                [Page 23]

Internet-Draft                    KPML                     February 2004


   device will most likely set the Subscription-Sate to terminated.
   This lets the SIP machinery know the subscription is no longer
   active.

4.2.1 Pattern Match Reports

   If a pattern matches, the end device will emit a KPML report.  Since
   this is a success report, the code is "200" and the text is "OK".

   The KPML report includes the actual digits matched in the digit
   attribute.  The digit string uses the conventional characters '*' and
   '#' for star and octothorpe respectively.  The KPML report also
   includes the tag attribute if the regex that matched the digits had a
   tag attribute.

   If the subscription requested digit suppression (Section 4.1.2) and
   the end device suppressed digits, the suppressed attribute indicates
   "true".  The default value of suppressed is "false".

      NOTE: KPML does not include a timestamp.  There are a number of
      reasons for this.  First, what timestamp would in include?  Would
      it be the time of the first detected key press?  The time the
      interpreter collected the entire string?  A range?  Second, if the
      RTP timestamp is a datum of interest, why not simply get RTP in
      the first place?  That all said, if it is really compelling to
      have the timestamp in the response, it could be an attribute to
      the  tag.

4.2.2 KPML No Match Reports

   There are a few circumstances in which the end device will emit a no
   match report.  They are an immediate NOTIFY in response to SUBSCRIBE
   request (no digits detected yet), a request for service not supported
   by end device, or a failure of a digit map to match a string
   (timeout).

4.2.2.1 Immediate NOTIFY

   The NOTIFY in response to a SUBSCRIBE request has no KPML if there
   are no matching quarantined digits.  An example of this is in Figure
   10.

   If there are quarantined digits in the SUBSCRIBE request that match a
   pattern, then the NOTIFY message in response to the SUBSCRIBE request
   MUST include the appropriate KPML document.






Burger & Dolly           Expires August 2, 2004                [Page 24]

Internet-Draft                    KPML                     February 2004


   NOTIFY sip:application@example.com SIP/2.0
   Via: SIP/2.0/UDP proxy.example.com
   Max-Forwards: 70
   To: 
   From: 
   Call-Id: 439hu409h4h09903fj0ioij
   Subscription-State: active; expires=7200
   CSeq: 49851 NOTIFY
   Event: kpml

                  Figure 10: Immediate NOTIFY Example


5. DRegex Syntax

   The Digit REGular EXpression (DRegex) syntax follows the Unix egrep
   and Java Regular Expression syntax.

   White space is removed before parsing DRegex.  This enables sensible
   pretty printing in XML without affecting the meaning of the DRegex
   string.

   The following rules describe the use of DRegex in KPML.

   +---------------------------------+---------------------------------+
   | Entity                          | Matches                         |
   +---------------------------------+---------------------------------+
   | digit                           | digit 0-9 and A-D               |
   | [digit selector]                | Any digit in selector           |
   | [^digit selector]               | Any digit NOT in selector       |
   | [digit-range]                   | Any digit in range              |
   | x                               | Any digit 0-9                   |
   | .                               | Zero or more repetitions of     |
   |                                 | previous pattern                |
   | |                               | Alternation                     |
   | {m}                             | m repetitions of previous       |
   |                                 | pattern                         |
   | {m,}                            | m or more repetitions of        |
   |                                 | previous pattern                |
   | {,n}                            | At most n (including zero)      |
   |                                 | repetitions of previous pattern |
   | {m,n}                           | at least m and at most n        |
   |                                 | repetitions of previous pattern |
   | Ldigit                          | Match the digit if it is "long" |
   +---------------------------------+---------------------------------+






Burger & Dolly           Expires August 2, 2004                [Page 25]

Internet-Draft                    KPML                     February 2004


        +------------+-----------------------------------------+
        | Example    | Description                             |
        +------------+-----------------------------------------+
        | 1          | Matches the digit 1                     |
        | [179]      | Matches 1, 7, or 9                      |
        | [^01]      | Matches 2, 3, 4, 5, 6, 7, 8, 9          |
        | [2-9]      | Matches 2, 3, 4, 5, 6, 7, 8, 9          |
        | x          | Any single digit                        |
        | 2|3        | Matches 2 or 3; same as [23]            |
        | 00|011     | Matches the string 00 or 011            |
        | 0.         | Zero or more occurrences of 0           |
        | [2-9].     | Zero or more occurrences of 2-9         |
        | 011x{7,15} | 011 followed by seven to fifteen digits |
        | L*         | Long star                               |
        +------------+-----------------------------------------+


6. Formal Syntax

   The following syntax in Figure 11 uses the XML Schema [4].

   
   
   
    
     
      IETF Keypad Markup Language
     
     
      
       
        
         
          
           
            
             
             
              
               
                
               
               
              
             
            
            
            
            
            
            
            
           
          
          
         
        
       
       
        
         
         
         
         
         
        
       
      
      
     
    
   

                     Figure 11: XML Schema for KPML


7. Enumeration of KPML Status Codes

   KPML failure codes broadly follow their SIP counterparts.  Codes that
   start with a 2 indicate success.  Codes that start with a 4 indicate
   failure.  Codes that start with a 5 indicate a server failure,
   usually a failure to interpret the document or to support a requested
   feature.



Burger & Dolly           Expires August 2, 2004                [Page 27]

Internet-Draft                    KPML                     February 2004


   KPML clients MUST be able to handle arbitrary status codes by
   examining the first digit only.

   Any text can be in a KPML report document.  KPML clients MUST NOT
   interpret the text field.

   +------+---------------------------------------------------------+
   | Code | Text                                                    |
   +------+---------------------------------------------------------+
   | 200  | Success                                                 |
   | 402  | User Terminated Without Match                           |
   | 423  | Timer Expired                                           |
   | 481  | Dialog (call leg) Not Found                             |
   | 487  | Subscription Expired                                    |
   | 501  | Bad Document                                            |
   | 531  | Persistent Subscriptions Not Supported                  |
   | 532  | Multiple or Alternate Regular Expressions Not Supported |
   | 533  | Multiple Subscriptions on a Call Leg Not Supported      |
   +------+---------------------------------------------------------+

                      Table 3: KPML Failure Codes


8. IANA Considerations

8.1 MIME Media Type application/kpml+xml

   MIME media type name: application
   MIME subtype name: kpml+xml
   Required parameters: none
   Optional parameters: charset

      charset This parameter has identical semantics to the charset
         parameter of the "application/xml" media type as specified in
         XML Media Types [5].

   Encoding considerations: See RFC3023 [5].

   Interoperability considerations: See RFC2023 [5] and this document.

   Published specification: This document.

   Applications which use this media type: Session-oriented applications
   that have primitive user interfaces.

   Intended usage: COMMON





Burger & Dolly           Expires August 2, 2004                [Page 28]

Internet-Draft                    KPML                     February 2004


8.2 URN Sub-Namespace Registration for urn:ietf:xml:ns:kpml

   URI: urn:ietf:params:xml:ns:kpml

   Registrant Contact: Eric Burger 

   XML:

   
   
   
     
       
       Key Press Markup Language
     
     
       

Namespace for Key Press Markup Language

urn:ietf:params:xml:ns:kpml

RFCXXXX.

8.3 KPML Schema Registration Please register the XML Schema for KPML as referenced in Section 6. 9. Security Considerations As an XML markup, all of the security considerations of RFC3023 [5] and RFC3406 [6] apply. Pay particular attention to the robustness requirements of parsing XML. Key press information is potentially sensitive. Hijacking sessions allow unauthorized entities access to this sensitive information. Therefore, signaling SHOULD be secure, e.g., use of TLS and sips: SHOULD be used. Moreover, the information itself is sensitive. Thus if TLS is not used, S/MIME or other appropriate mechanism SHOULD be used. End devices implementing this specification MUST implement TLS and SHOULD implement S/MIME at a minimum. Burger & Dolly Expires August 2, 2004 [Page 29] Internet-Draft KPML February 2004 10. Examples This section is informative in nature. If there is a discrepancy between this section and the normative sections above, the normative sections take precedence. 10.1 Monitoring for Octothorpe A common need for pre-paid and personal assistant applications is to monitor a conversation for a signal indicating a change in user focus from the party they called through the application to the application itself. For example, if you call a party using a pre-paid calling card and the party you call redirects you to voice mail, digits you press are for the voice mail system. However, many applications have a special key sequence, such as the octothorpe (#, or pound sign) or *9 that terminate the called party leg and shift the user's focus to the application. Figure 13 shows the KPML for long octothorpe. Note that the href is really on one line, but divided for clarity. L# Figure 13: Long Octothorpe Example The regex value L indicates the following digit needs to be a long-duration key press. 10.2 Dial String Collection In this example, the user device collects a dial string. The application uses KPML to quickly determine when the user enters a target number. In addition, KPML indicates what type of number the user entered. Burger & Dolly Expires August 2, 2004 [Page 30] Internet-Draft KPML February 2004 0 00 7[x][x][x] 9xxxxxxx 9401xxxxxxx 9xxxxxxxxxx 91xxxxxxxxxx 011x. Figure 14: Dial String KPML Example Code Note the use of the "tag" attribute to indicate which regex matched the dialed string. The interesting case here is if the user entered "94015551212". This string matches both the "9401xxxxxxx" and "9xxxxxxxxxx" regular expressions. By following the rules described in Section 4.1.4, the KPML interpreter will pick the "9401xxxxxxx" string, as it occurs first in document order (both expressions match the same length). Figure 15 shows the response. Figure 15: Dial String KPML Response 10.3 Interactive Digit Collection This is an example where one would probably be better off using a full scripting language such as VoiceXML [8] or MSCML [9] or a device control language such as H.248.1 [13]. In this example, an application requests the user device to send the Burger & Dolly Expires August 2, 2004 [Page 31] Internet-Draft KPML February 2004 user's signaling directly to the platform in HTTP, rather than monitoring the entire RTP stream. Figure 16 shows a voice mail menu, where presumably the application played a "Press K to keep the message, R to replay the message, and D to delete the message" prompt. In addition, the application does not want the user to be able to barge the prompt. yes 5 7 3 Figure 16: IVR KPML Example Code NOTE: This usage of KPML is clearly inferior to using a device control protocol like H.248.1. From the application's point of view, it has to do the low-level prompt-collect logic. Granted, it is relatively easy to change the key mappings for a given menu. However, often more of the call flow than a given menu mapping gets changed. Thus there would be little value in such a mapping to KPML. We STRONGLY suggest using a real scripting language such as VoiceXML or MSCML for this purpose. 11. Call Flow Example 11.1 INVITE-Initiated Dialog This section describes a successful subscription and notification from an Application with an End Device ("User A") in an INVITE-Initiated dialog. Note the Application can be a Record-Route Proxy, a B2BUA, or another end device. Burger & Dolly Expires August 2, 2004 [Page 32] Internet-Draft KPML February 2004 User A Application | | | INVITE F1 | |--------------->| | 100 TRYING F2 | |<---------------| | 180 F3 | |<---------------| | 200 OK F4 | |<---------------| | ACK F5 | |--------------->| | Media Session | |<==============>| | SUBSCRIBE F6 | Application Subscribes to "***" from User A |<---------------| | 200 OK F7 | |--------------->| | NOTIFY F8 | Immediate Notify indicating monitoring |--------------->| | 200 OK F9 | |<---------------| | . | | : | | NOTIFY F10 | |--------------->| Notification of detection of "***" | 200 OK F11 | |<---------------| | | Connection setup between User A and an Application subscribing to a DTMF event of "***" at User A. F1 INVITE User A --> Application INVITE sip:UserB@subB.example.com SIP/2.0 Via: SIP/2.0/UDP client.subA.example.com:5060;branch=z9hG4bK74 Max-Forwards: 70 From: ;tag=1234567 To: Call-ID: 12345601@subA.example.com CSeq: 1 INVITE Contact: Route: Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, SUBCRIBE, NOTIFY Allow-Events: kpml Supported: replaces Burger & Dolly Expires August 2, 2004 [Page 33] Internet-Draft KPML February 2004 Content-Type: application/sdp Content-Length: ... v=0 o=UserA 2890844526 2890844526 IN IP4 client.subA.example.com s=Session SDP c=IN IP4 client.subA.example.com t=3034423619 0 m=audio 49170 RTP/AVP 0 a=rtpmap:0 PCMU/8000 F2 100 Trying Application --> User A SIP/2.0 100 Trying Via: SIP/2.0/UDP client.subA.example.com:5060;branch=z9hG4bK74 ;received=192.168.12.22 From: ;tag=1234567 To: Call-ID: 12345601@subA.example.com CSeq: 1 INVITE Content-Length: 0 F3 180 Ringing Application --> User A SIP/2.0 180 Ringing Via: SIP/2.0/UDP client.subA.example.com:5060;branch=z9hG4bK74 ;received=192.168.12.22 Record-Route: From: ;tag=1234567 To: ;tag=567890 Call-ID: 12345601@subA.example.com CSeq: 1 INVITE Contact: Content Length: 0 F4 200 OK Application --> User A SIP/2.0 200 OK Via: SIP/2.0/UDP client.subA.example.com:5060;branch=z9hG4bK74 ;received=192.168.12.22 Record-Route: From: ;tag=1234567 To: ;tag=567890 Call-ID: 12345601@subA.example.com CSeq: 1 INVITE Burger & Dolly Expires August 2, 2004 [Page 34] Internet-Draft KPML February 2004 Contact: Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, SUBSCRIBE, NOTIFY Supported: replaces Content-Type: application/sdp Content-Length: ... v=0 o=UserB 2890844527 2890844527 IN IP4 client.subB.example.com s=Session SDP c=IN IP4 client.subB.example.com t=3034423619 0 m=audio 3456 RTP/AVP 0 a=rtpmap:0 PCMU/8000 F5 ACK User A --> Application ACK sip:UserB@subB.example.com SIP/2.0 Via: SIP/2.0/UDP client.subA.example.com:5060;branch=z9hG4bK74 Max-Forwards: 70 Route: From: ;tag=1234567 To: ;tag=567890 Call-ID: 12345601@subA.example.com CSeq: 1 ACK Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY Supported: replaces Content-Length: 0 F6 SUBSCRIBE Application --> User A SUBSCRIBE sip:UserA@subA.example.com SIP/2.0 Max-Forwards: 70 From: ;tag=567890 To: ;tag=1234567 Call-ID: 12345601@subA.example.com CSeq: 1 SUBSCRIBE Contact: Event: kpml Expires: 7200 Accept: application/kpml+xml Content-Type: application/kmpl+xml Content-Length: ... Burger & Dolly Expires August 2, 2004 [Page 35] Internet-Draft KPML February 2004 F7 200 OK User A --> Application SIP/2.0 200 OK To: ;tag=1234567 From: ;tag=567890 Call-ID: 12345601@subA.example.com CSeq: 1 SUBSCRIBE Contact: Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, SUBSCRIBE, NOTIFY Supported: replaces Content-Length: 0 F8 NOTIFY User A --> Application NOTIFY sip:UserB@subB.example.com SIP/2.0 Max-Forwards: 70 From: ;tag=1234567 To: ;tag=567890 Call-ID: 12345601@subA.example.com CSeq: 2 NOTIFY Subscription-State: active;expires=3600 Content-Type: application/kpml+xml Content-Length: ... Event: kpml F9 200 OK Application --> User A SIP/2.0 200 OK From: ;tag=1234567 To: ;tag=567890 Burger & Dolly Expires August 2, 2004 [Page 36] Internet-Draft KPML February 2004 Call-ID: 12345601@subA.example.com CSeq: 2 NOTIFY Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, SUBSCRIBE, NOTIFY Supported: replaces Content-Type: application/sdp Content-Length: 0 F10 NOTIFY User A --> Application NOTIFY sip:UserB@subB.example.com SIP/2.0 Max-Forwards: 70 From: ;tag=1234567 To: ;tag=567890 Call-ID: 12345601@subA.example.com CSeq: 3 NOTIFY Subscription-State: active;expires=3125 Content-Type: application/kpml+xml Content-Length: ... Event: kpml F11 200 OK Application --> User A SIP/2.0 200 OK From: ;tag=1234567 To: Call-ID: 12345601@subA.com JVD: CSeq: 3 NOTIFY Contact: Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, SUBSCRIBE, NOTIFY Supported: replaces Content-Type: application/sdp Content-Length: 0 11.2 Third-Party Subscription Coming soon! Burger & Dolly Expires August 2, 2004 [Page 37] Internet-Draft KPML February 2004 11.3 Remote-End Monitoring Coming soon! Normative References [1] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [2] Roach, A., "Session Initiation Protocol (SIP)-Specific Event Notification", RFC 3265, June 2002. [3] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M. and E. Schooler, "SIP: Session Initiation Protocol", RFC 3261, June 2002. [4] Thompson, H., Beech, D., Maloney, M. and N. Mendelsohn, "XML Schema Part 1: Structures", W3C REC REC-xmlschema-1-20010502, May 2001. [5] Murata, M., St. Laurent, S. and D. Kohn, "XML Media Types", RFC 3023, January 2001. [6] Daigle, L., van Gulik, D., Iannella, R. and P. Faltstrom, "Uniform Resource Names (URN) Namespace Definition Mechanisms", BCP 66, RFC 3406, October 2002. Informative References [7] Bray, T., Paoli, J., Sperberg-McQueen, C. and E. Maler, "Extensible Markup Language (XML) 1.0 (Second Edition)", W3C REC REC-xml-20001006, October 2000. [8] World Wide Web Consortium, "Voice Extensible Markup Language (VoiceXML) Version 2.0", W3C Working Draft , April 2002, . [9] Burger, E., Van Dyke, J. and A. Spitzer, "Media Server Control Markup Language (MSCML) and Protocol", draft-vandyke-mscml-02 (work in progress), June 2003. [10] Schulzrinne, H. and S. Petrack, "RTP Payload for DTMF Digits, Telephony Tones and Telephony Signals", RFC 2833, May 2000. [11] Schulzrinne, H., Casner, S., Frederick, R. and V. Jacobson, "RTP: A Transport Protocol for Real-Time Applications", RFC 1889, January 1996. Burger & Dolly Expires August 2, 2004 [Page 38] Internet-Draft KPML February 2004 [12] Rosenberg, J. and H. Schulzrinne, "An INVITE Inititiated Dialog Event Package for the Session Initiation Protocol (SIP", draft-ietf-sipping-dialog-package-02 (work in progress), June 2003. [13] Groves, C., Pantaleo, M., Anderson, T. and T. Taylor, "Gateway Control Protocol Version 1", RFC 3525, June 2003. [14] Andreasen, F. and B. Foster, "Media Gateway Control Protocol (MGCP) Version 1.0", RFC 3435, January 2003. [15] Handley, M. and V. Jacobson, "SDP: Session Description Protocol", RFC 2327, April 1998. [16] Fielding, R., Gettys, J., Mogul, J., Nielsen, H., Masinter, L., Leach, P. and T. Berners-Lee, "Hypertext Transfer Protocol -- HTTP/1.1", RFC 2616, June 1999. [17] Olson, S., Camarillo, G. and A. Roach, "Support for IPv6 in Session Description Protocol (SDP)", RFC 3266, June 2002. [18] Hunt, A. and S. McGlashan, "Speech Recognition Grammar Specification Version 1.0", W3C CR CR-speech-grammar-20020626, June 2002. [19] Burger (Ed.), E., Van Dyke, J. and A. Spitzer, "Basic Network Media Services with SIP", draft-burger-sipping-netann-07 (work in progress), September 2003. Authors' Addresses Eric Burger SnowShore Networks, Inc. 285 Billerica Rd. Chelmsford, MA 01824-4120 USA EMail: e.burger@ieee.org Martin Dolly AT&T Labs EMail: mdolly@att.com Burger & Dolly Expires August 2, 2004 [Page 39] Internet-Draft KPML February 2004 Appendix A. Contributors Jeff Van Dyke worked enough hours and wrote enough text to be considered an author under the old rules. Robert Fairlie-Cuninghame, Cullen Jennings, Jonathan Rosenberg, and I were the members of the Application Stimulus Signaling Design Team. All members of the team contributed to this work. In addition, Jonathan Rosenberg postulated DML in his "A Framework for Stimulus Signaling in SIP Using Markup" draft. This version of KPML has significant influence from MSCML, the SnowShore Media Server Control Markup Language. Jeff Van Dyke and Andy Spitzer were the primary contributors to that effort. That said, any errors, misinterpretation, or fouls in this document are my own. Appendix B. Acknowledgements Hal Purdy and Eric Cheung of AT&T Laboratories helped immensely through many conversations and challenges. Steve Fisher of AT&T Laboratories suggested the digit suppression syntax. Terence Lobo of SnowShore Networks made it all work. Burger & Dolly Expires August 2, 2004 [Page 40] Internet-Draft KPML February 2004 Intellectual Property Statement The IETF takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; neither does it represent that it has made any effort to identify any such rights. Information on the IETF's procedures with respect to rights in standards-track and standards-related documentation can be found in BCP-11. Copies of claims of rights made available for publication and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementors or users of this specification can be obtained from the IETF Secretariat. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights which may cover technology that may be required to practice this standard. Please address the information to the IETF Executive Director. Full Copyright Statement Copyright (C) The Internet Society (2004). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assignees. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION Burger & Dolly Expires August 2, 2004 [Page 41] Internet-Draft KPML February 2004 HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Acknowledgment Funding for the RFC Editor function is currently provided by the Internet Society. Burger & Dolly Expires August 2, 2004 [Page 42]