260 likes | 381 Views
The Problem of User Identification. Mike Pluke Castle Consulting Ltd. ETSI Specialist Task Force STF 157 Leader. When?. Started work 10 th January 2000 ETSI Guide to HF by end of July 2000 HF approval (?) September 2000. Who?. Mike Pluke, Castle Consulting Ltd. – STF Leader
E N D
The Problem of User Identification Mike PlukeCastle Consulting Ltd. ETSI Specialist Task Force STF 157 Leader
When? Started work 10th January 2000 ETSI Guide to HF by end of July 2000 HF approval (?) September 2000 Who? Mike Pluke, Castle Consulting Ltd. – STF Leader Pedro Concejero, Telefónica I+D Derek Pollard, Parity Resources Ltd. STF157
Today’s Complexities Which of these is Mike Miles?
What’s Wrong? • If all you know is an email address you can’t phone someone • If their phone number has changed you’ve lost contact • If you can’t get in contact now it’s too late • No number/old number/no answer = a lost call • Lost calls=lost revenue and customer dissatisfaction
People Not Terminals “People are outsiders in the current communications revolution. Computer hosts, pager terminals and telephones are addressable entities throughout the Internet and telephony systems.” Extract from “The Mobile People Architecture” from Stanford University
Current Ways to Manage IDs When making a communication • New contacts Directories: telephone directories, directory services, PeopleSearch, AnyWho, … • Existing contacts Address Books: GSM Phone, MS Outlook,… Managing incoming communications Usage strategies: diversion, selective call barring, … UPT – mapping number to terminals, …
High-level User Requirements • Resolving conflicting requirements of sender and receiver • Maintaining backward compatibility • Providing privacy • Trust – ensuring the sender and receiver are who they say they are
Key User Requirements • One Identifier per individual or role - a Universal Communications Identifier (UCI) • An integrated UCI search mechanism • Automatic capture of UCIs • Intelligent agents to manage complexity for the calling and called parties • Stability of the UCI – over time and over technologies
Surprise User Requirements Anonymity:An anonymous UCI can be created by anyone holding an authorised UCI Aliases:One or more alias UCIs can be created by anyone holding an authorised UCI People (or systems) receiving communications will be able to recognize that the UCI is anonymous or an alias
Personal Identifier Proposal The proposed UCI has two primary parts: A label: that gives the most user friendly description of the person/role A unique numeric string: that gives uniqueness, the ability to input it from the most basic terminal and compatibility with the most basic network
Personal Identifier Proposal An element is also being defined to enable anonymous and alias status to be transmitted
The Personal Identifier In Use • The formatting shown is not a proposal
Delivering Stability Currently:Each new service/terminal may mean a changed or additional number S = ServiceT=Terminal N=Number/Name Change ISP and get N5 N4 Etc. Etc. N5 Etc. Etc. N5 S2/T5 (Prepay GSM) N6 Buy prepay GSM and get N6
What next? • ETSI STF 157 will update and refine their user requirements • Civil Liberties and security issues will be further investigated – in conjunction with ETSI TC SEC • At the same time the potential solution(s) will be cross-checked against the requirements and against technologies
Finally • ETSI STF 157 is very keen to liaise with all groups with an interest in this area • We are also very happy to receive ideas from individuals within these groups:My email is:Mike.Pluke@castle-consult.com • Standards/industry groups need to be aware of the proposals- and then develop standards to enable implementation of a solution