CONTENTS

 1     Scope
        1.1     General description
 2     References
 3     Definitions and terminology
 4     Basic considerations
        4.1     Evolution of UPT
                  4.1.1     UPT Service Set 1 – Restricted short-term UPT service scenario
                  4.1.2     UPT Service Set 2 – Basic UPT service scenario
                  4.1.3     UPT Service Set 3 – Enhanced UPT service scenario
        4.2     Summary of UPT features
                  4.2.1     Services provided
                  4.2.2     Networks involved
                  4.2.3     Essential UPT features
                  4.2.4     Optional UPT features
                  4.2.5     Numbering
                  4.2.6     Charging
                  4.2.7     Service profiles
                  4.2.8     Third party protection mechanisms
        4.3     UPT user perspective
                  4.3.1     Quality of Service
                  4.3.2     Human factors
 5     Definitions of UPT features
 6     UPT service provisions
        6.1     Subscription
        6.2     UPT identities
        6.3     Service aspects of numbering and dialling
                  6.3.1     UPT number structure
                  6.3.2     UPT access code
                  6.3.3     UPT number representation
                  6.3.4     UPT access number
        6.4     Charging aspects
                  6.4.1     User-perspective aspects
                  6.4.2     Operational aspects
        6.5     Security
                  6.5.1     Introduction
                  6.5.2     General objectives for security
                  6.5.3     Authentication
        6.6     UPT service profiles
                  6.6.1     Involved parties
                  6.6.2     Access procedure
                  6.6.3     Operations on the service profile
                  6.6.4     Structure of the UPT service profile
                  6.6.5     UPT service profile access
        6.7     Protection of third parties
                  6.7.1     General requirements
                  6.7.2     Specific privacy requirements
                  6.7.3     UPT mechanisms provided for third parties
 7     UPT functional procedures
        7.1     Elementary procedures
                  7.1.1     Access
                  7.1.2     Identification
                  7.1.3     Authentication
                  7.1.4     Global follow-on
                  7.1.5     OutCall follow-on
        7.2     Personal mobility procedures
                  7.2.1     InCall registration
                  7.2.2     InCall deregistration
                  7.2.3     OutCall registration
                  7.2.4     OutCall deregistration
                  7.2.5     AllCall registration
                  7.2.6     AllCall deregistration
                  7.2.7     Linked registration
                  7.2.8     Linked deregistration
        7.3     UPT call handling procedures
                  7.3.1     Outgoing UPT call
                  7.3.2     Alerting for incoming UPT calls
                  7.3.3     Answering of incoming UPT calls
                  7.3.4     UPT registered Outgoing call set up
        7.4     UPT service profile management procedures
                  7.4.1     UPT service profile interrogation
                  7.4.2     UPT service profile modification
                  7.4.3     Authentication code change
        7.5     Third party protection procedures
                  7.5.1     Reset of registrations for incoming UPT calls
                  7.5.2     Blocking of registrations for incoming UPT calls
                  7.5.3     Deblocking of registrations for incoming UPT calls
                  7.5.4     Blocking of incoming UPT calls
                  7.5.5     Deblocking of incoming UPT calls
                  7.5.6     Reset of registration for outgoing UPT calls
                  7.5.7     Suspension of registration for outgoing UPT calls
 8     Supplementary services
        8.1     Definition of supplementary services feature
        8.2     Procedures for the support of UPT supplementary services
                  8.2.1     Activate UPT supplementary services
                  8.2.2     Deactivate UPT supplementary services
 9     Operational provisions
        9.1     UPT user aspects of operational provisions
        9.2     UPT service provider aspects of operational provisions
Annex A - UPT user identity authentication
        A.1     Example realizations of UPT user identity authentication
        A.2     Example of UPT user identity authentication using a UPT device
        A.3     Example procedures for UPT access, authentication and Service Profile management