1 / 22

Information Document 18-E

Information Document 18-E. ITU-T Study Group 2 May 2002 QUESTION: Q.1/2 SOURCE: TSB TITLE: UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI) (by Mike Pluke, ETSI) The purpose of this document is to provide background information on the Universal Communication Identifier code.

temira
Download Presentation

Information Document 18-E

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Document 18-E ITU-T Study Group 2 May 2002 QUESTION: Q.1/2 SOURCE: TSB TITLE: UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI) (by Mike Pluke, ETSI) The purpose of this document is to provide background information on the Universal Communication Identifier code.

  2. ETSIUniversal Communications Identifier (UCI) Mike Pluke Castle Consulting Ltd.Leader of ETSI Specialist Task Forces 180 & 200

  3. The Universal Communications Identifier(UCI) I will cover: • the rationale for an identifier such as the UCI; • the key drivers that have shaped the UCI and its support environment; • an explanation of the framework that supports UCI; • a brief comparison with other similar initiatives of interest to ITU-T SG2; • an overview of the development of the UCI within ETSI; • the ITU-T SG2 issues?

  4. Today’s identifier complexities Which of these is Mike Miles?

  5. Some important user requirements (I) You should be able to: • have a single communication identifier for every significant life role; • check the authenticity of the description of the people you communicate with (or see when they use aliases); • keep your identifier when adding services or changing suppliers; • have control over the release of your own information.

  6. Some important user requirements (II) A UCI: • should be associated with you (or your role) - not hardware, services, 3rd parties, or service suppliers; • should provide a meaningful description of you (in a way you wish to be described); • can be added to communications networks and services with the very minimum amount of re-engineering.

  7. Nothing currently fits the specification • Current identifiers were judged against the user requirements developed by ETSI Specialist Task Force STF157 • None of today’s identifiers (e.g. phone numbers, email addresses, IM addresses) meet these requirements • Other identifier proposals (e.g. IETF URNs) also fail to meet the requirements • It was concluded that a new identifier would be needed

  8. Support for a new identifier • A new identification scheme with new capabilities needs a new support environment • The new support environment should not mean large changes to existing systems • The identifier support environment must be considered as an overlay to existing communications systems

  9. Existing support environment • Support for communications largely comes from the networks, protocols and applications associated with individual communication types (e.g. telephony networks, SMTP mail protocols) • Users can control their telephone communications using supplementary services • Users can control their email communications using mail redirection and filtering in email clients • Instant messaging systems allow control by manual selection of availability settings and with “buddy lists” • The types of controls and the range of different control mechanisms are as varied as the different types of communication • Users cannot cope well with such a range of controls

  10. The UCI support environment The UCI support environment allows the control of communications based upon at least the following: • the identity (UCI) of people attempting to communicate with the user; • the date and time when communication is attempted; • the urgency of the communication; • whether the originator of a communication has a work or a personal status; • the user’s preferences for how they wish to be reached (which services and which terminals).

  11. The UCI • Is a 3-part data structure • A unique role identifier (unroid) – numeric – E.164- essential to establish communication • A persona element (persel) – not unique – alphanumeric description of UCI owner- most useful for the end-user • A status element (statel) – multiple status indications giving key details about the UCI and its owner – helps the user decide the most appropriate way to communicate • Only the unroid is required in all “signalling” flows

  12. UCI elements • The Personal User Agent (PUA) – this acts on the user’s behalf in controlling communication set-up • The PUA contains the user’s preferences and rules • The PUA only talks to its owner, other PUAs and SAs • The Service Agent (SA) – this is the interface to existing networks and services • The SA only talks to PUAs and its own network/service • Terminals, identification mechanisms, etc.

  13. Relationship between UCI elements

  14. Simplified UCI operation = registration association

  15. Simplified UCI operation X X ü ü

  16. Simplified UCI operation Jane selects Dan’s UCI and sends it

  17. Simplified UCI operation

  18. Initiatives similar to UCI (I) - UPT • Like UCI, UPT does: • have a single identifier for a range of services; • assume a common interface for controlling a range of services, • but, UPT does not: • have any concept of identifying the true name of the UPT subscriber; • allow the authenticity of any association between a personal name and a UPT identifier to be verified; • integrate non-telephony services such as email very effectively.

  19. Initiatives similar to UCI (II) - ENUM • Like UCI, ENUM does: • have a single E.164 number associated with a range of services; • have a global scope. • but ENUM does not • have any concept of identifying the true name of the ENUM subscriber; • allow the authenticity of any association between a personal name and an ENUM identifier to be verified; • allow individual communications identifiers to be hidden (as the NAPTR record is public) – a spammer’s charter!; • provide inherent protection from distributed denial of service (DDoS) attacks (as the NAPTR record is public). • Intercommunication in UCI is strictly controlled between Users, their PUAs and SAs – this should help eliminate threats such as DDoS

  20. UCI work in ETSI • STF157: Looked at user requirements, the definition of a UCI, and a first look at a UCI architecture; • STF180: Is defining the UCI architecture in more detail, is specifying usage scenarios and is examining security issues from the end-user’s perspective • STF199: Is looking at implementation issues across communications platforms and security from the service provider perspective • STF200: Is looking at the usability issues of end-user control of their communications environment

  21. Issues for ITU-T SG2 • Allocation of identifiers – in particular the globally unique E.164 “unroid” element of the UCI • Service aspects of UCI – it is multi-service, it is global • …

  22. Thank you Contact: Mike.Pluke@castle-consult.com

More Related