http://www.w3.org/ns/prov#value | - The method of claim 1, wherein the input network interface is further adapted to receive a call accept message, the call accept message including an unencrypted identification of the second call controller, and including encrypted information about the path to be used by the given call.
|