EG 201 940 : 1.1.1
Current
The latest, up-to-date edition.
HUMAN FACTORS (HF); USER IDENTIFICATION SOLUTIONS IN CONVERGING NETWORKS
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Background
4.1 The rationale behind this guide
4.2 The structure of the guide
4.3 Potential users of the present document
5 Generic (high level) requirements
5.1 Unifying the control of communications
5.2 Reducing the impact of network boundaries
5.3 Increasing the options available to the sender
5.4 Increasing the options available to the receiver
5.5 Dealing with communications conflicts between
sender and receiver
5.6 Maintaining backward compatibility
5.7 Providing privacy
5.8 User control of personal user agents
5.9 Trust
6 Communication control requirements
6.1 User as communications manager
6.2 User as sender
6.3 User as Receiver
7 Identifier requirements
7.1 Uniqueness
7.2 Memorability
7.3 Length
7.4 Stability
7.5 Terminal independence
7.6 Searchability
7.7 Robustness
7.8 Meaningfulness
7.9 Additional information
7.10 Authenticity
8 User identifiers in common use
8.1 Name and address
8.2 Telephone number
8.3 Email address (internet)
8.4 Implications arising from current identifiers
9 Rejected solutions
9.1 The directory-based multi-identifier solution
9.2 The meta-search solutions
9.3 Internet "Common Name" (CN)
9.4 Internet URN
9.5 Comparison of personal identifier solutions
10 The proposed solution
10.1 Characteristics of the identifier
10.2 Usage of the Universal Communications Identifier
10.3 Meeting user requirements
10.4 Comparison with rejected solutions
11 Implications of the proposed solution
11.1 Universal Communications Identifier allocation
and authentication
11.2 Information Records
11.3 Directories
11.4 User Interface
11.5 Identification
11.6 Verification
11.7 Efficiency of communications set-up
12 Benefits of the proposed solution
12.1 UCI owner
12.2 Person contacting UCI owner
12.3 Communications service/application suppliers
12.4 Terminal manufacturers
12.5 Providers of new functions
13 Migration
14 Required standards and agreements
14.1 UCI format
14.2 UCI resolution services
14.3 PUA intercommunication
14.4 Directories
Annex A (informative): Summary of user requirements
A.1 User requirements
Annex B (informative): Future scenarios
B.1 Future scenario 1 - Establishing contact
B.2 Future scenario 2 - Filtering and re-routing
B.3 Future scenario 3 - Anonymity
B.4 Future scenario 4 - Universal terminal
capability
B.5 Future scenario 5 - Security
B.6 Future scenario 6 - Privacy
Annex C (informative): The current environment
C.1 Identification schemes
C.2 Technical enhancements to basic schemes
C.3 Users' strategies for managing their
communications
C.4 Mobility M
C.5 Personal User Agents
C.6 Directories
C.7 Real-time Vs Store-and-Forward
C.8 Security/Privacy
C.9 Terminals not people
Annex D (informative): Emerging architectures
D.1 3GPP
D.2 TIPHON
D.3 ITU SG13
D.4 The Internet
D.5 Implications
Annex E (informative): Security
E.1 Security
Annex F (informative): Background information
Annex G (informative): Bibliography
History
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.