Ietf atoca
Download
1 / 6

IETF atoca - PowerPoint PPT Presentation


  • 170 Views
  • Uploaded on

IETF atoca. Brian Rosen N eustar. Background. Lots and lots of L2 specific Authority to Citizen alert technology Most of it is aimed at least common denominator devices Very often, very limited definition of “Authority”

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'IETF atoca' - uri


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Ietf atoca

IETF atoca

Brian Rosen

Neustar


Background
Background

  • Lots and lots of L2 specific Authority to Citizen alert technology

  • Most of it is aimed at least common denominator devices

  • Very often, very limited definition of “Authority”

    • Most are single authority, and to cope, each authority has its own system

  • Virtually all have no opt-out, very few have any form of opt-in


Ietf interest
IETF Interest

  • IETF emergency efforts started with Authority to Authority 9 years ago

  • Citizen to Authority work started 7 years ago

  • We’ve been talking about Authority to Citizen for at least 4 years, maybe longer


Atoca
atoca

  • “Authority TO Citizen Alerts” = atoca

  • BOF held, charter discussions have been held for over a year post BOF

  • We now have an agreed upon charter, but need IESG approval to create a work group


Characteristics
Characteristics

  • Any IP connected endpoint

  • Not L2 specific, hopefully able to use L2 available L2 mechanisms

  • Complementary to other L2 specific mechanisms (CMAS, EWS, …) – people will have lots of devices

  • Initial target is a limited set of Authorities (government)

  • atoca won’t discuss how they are appointed, but will describe the authentication and authorization MECHANISMS


Characteristics1
Characteristics

  • Explicit opt-in and opt-out mechanisms

    • Governments may proscribe controls on this for some kinds of messages

  • Initial design is small messages that can be rendered in a variety of ways by devices

    • May contains links to further information

  • Location based delivery, but not necessarily the location of the device

  • Use available tools, e.g. CAP

  • Security is a big deal to be faced


ad