Ietf atoca
This presentation is the property of its rightful owner.
Sponsored Links
1 / 6

IETF atoca PowerPoint PPT Presentation


  • 141 Views
  • Uploaded on
  • Presentation posted in: General

IETF atoca. Brian Rosen N eustar. Background. Lots and lots of L2 specific Authority to Citizen alert technology Most of it is aimed at least common denominator devices Very often, very limited definition of “Authority”

Download Presentation

IETF atoca

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Ietf atoca

IETF atoca

Brian Rosen

Neustar


Background

Background

  • Lots and lots of L2 specific Authority to Citizen alert technology

  • Most of it is aimed at least common denominator devices

  • Very often, very limited definition of “Authority”

    • Most are single authority, and to cope, each authority has its own system

  • Virtually all have no opt-out, very few have any form of opt-in


Ietf interest

IETF Interest

  • IETF emergency efforts started with Authority to Authority 9 years ago

  • Citizen to Authority work started 7 years ago

  • We’ve been talking about Authority to Citizen for at least 4 years, maybe longer


Atoca

atoca

  • “Authority TO Citizen Alerts” = atoca

  • BOF held, charter discussions have been held for over a year post BOF

  • We now have an agreed upon charter, but need IESG approval to create a work group


Characteristics

Characteristics

  • Any IP connected endpoint

  • Not L2 specific, hopefully able to use L2 available L2 mechanisms

  • Complementary to other L2 specific mechanisms (CMAS, EWS, …) – people will have lots of devices

  • Initial target is a limited set of Authorities (government)

  • atoca won’t discuss how they are appointed, but will describe the authentication and authorization MECHANISMS


Characteristics1

Characteristics

  • Explicit opt-in and opt-out mechanisms

    • Governments may proscribe controls on this for some kinds of messages

  • Initial design is small messages that can be rendered in a variety of ways by devices

    • May contains links to further information

  • Location based delivery, but not necessarily the location of the device

  • Use available tools, e.g. CAP

  • Security is a big deal to be faced


  • Login