Mike Pluke1 Universal Communications Identifier (UCI) and the power of profiles Mike Pluke Castle Consulting Ltd. ETSI TC HF & STF265.

Slides:



Advertisements
Similar presentations
IM May 24, 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
Advertisements

VON Europe /19/00 SIP and the Future of VON Protocols SIP and the Future of VON Protocols: Presence and IM Jonathan Rosenberg.
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
STF 287 Multicultural Communication 1 Matching language and cultural requirements Specialist Task Force STF 287 User-oriented handling of multicultural.
Information Document 18-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI) (by Mike Pluke, ETSI)
Updating your profile. Why Fill out your profile? Taking a few moments to fill out your volunteer profile will enhance your overall experience with your.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
University of Baltimore Telecommunications Technology
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Women’s Leadership Group – An Introduction
Keeping Your Child Safe on the Internet
Vodacom Microsoft Hosted Lync
NHnetWORKS December 14,  Facebook is a global Social Networking website that is operated and privately owned by Facebook, Inc.  Users can add.
Twitter Presented by: Keystone Computer Concepts.
Cyber Bullying Everything you need to know. How is it different from normal bullying? By using technology like mobiles or the internet, this type of bullying.
Soft Skills for a Digital Workplace: Verbal Communication Unit C: Developing Professional Telephone Skills.
e-safety and cyber bullying
 2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 1, Introduction to e-Business and e-Commerce Outline 1.1Introduction: Transitioning to the Web.
1 Design for All Shaping the end-users’ Tel- eEurope ETSI’s involvement in laying the foundation for an all-inclusive eEurope Knut Nordby Chairman ETSI.
Page 1 of 29 Net-Scale Technologies, Inc. Network Based Personal Information and Messaging Services Urs Muller Beat Flepp
Fixed Mobile Convergence T Research Seminar on Telecommunications Business Johanna Heinonen.
ICT Curriculum Evening – an introduction to Wizkid.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Iceberg Preferences Manager Rahul Biswas and Bhaskar Raman ISRG Winter 2000 Retreat.
Database Design Concepts Info 1408 Lecture 2 An Introduction to Data Storage.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
Chapter 1, Introduction to e-Business and e-Commerce
June is an easy way to communicate. It costs nothing to send an , but it does require a connection to the Internet. You can.
August 15 click! 1 Basics Kitsap Regional Library.
Customer Service and Web Site Personalization Back to Table of Contents.
Basics Dayton Metro Library Place photo here August 10, 2015.
Techno Rays is prepared and geared toward developing and molding itself to being a leader and preferred IT Solution Provider in both government and private.
Liliana Rodas. Skype is a software application that allows users to make calls over the internet allowing you to connect with all different countries.
Tutorial Video basic skills basic skills Next page -->
Social effect: Facebook is a site available to anyone. Many people use it in order to contact friends and relatives from all around the world, and to meet.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
Methods of communication
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
STF 287 Multicultural Communication 1 Cultural inclusion in information and communications services Specialist Task Force STF 287 “User-oriented handling.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Chapter 4 – Slide 1 Effective Communication for Colleges, 10 th ed., by Brantley & Miller, 2005© Technology and Electronic Communication.
The Mobile Capabilities of the New CBGundaker.com & How to Share Your Personally Branded Agent URL.
569 Semantic Web. Dr. J. Lu University of windsor, Project Presentation Encrypted Web service application Encrypted Web Application Presented by:
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
User Identification Solutions in Converging Networks Mike Pluke ETSI Specialist Task Force STF 157 Leader of :
User Identification Solutions in Converging Networks Mike Pluke Castle Consulting Ltd. ETSI User Group ETSI Human Factors Representing:
Document IPW-10 User Identification Solutions in Converging Networks Mike Pluke Castle Consulting Ltd. ETSI Specialist Task Force STF 157 Leader of :
INTERNET SAFETY Thornell Road Library Let’s Discuss: Information Privacy Social Networking CyberbullyingNetiquette.
Keeping Children Safe Online. Where to report abuse? To report any abuse on social media or internet: CEOP will accept reports from parents, teachers.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
Michael Möhlenhof T-Mobil;Systemtechnology page:1 T-Mobil Germany From Voic to Unified Messaging Concepts Presentation at the VMA Conference.
Shuffle A Number For Every Occasion getshuffle.com.
How to set up an account- Non-Technical Aimee Lilley.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
User Identification Solutions in Converging Networks Mike Pluke ETSI STF “User Identification in Converging Networks”
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
BCS Level 1 Award In e-safety Lesson 4.. e-Safety - Lesson 4 2 Today you will learn to ….. Identify the risks of social networking; Use social networking.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
1 A Look at the Application Authorized users can access Communicator! NXT from any Internet-capable computer via the Web.
Different signs Laptop Device Today we will learn about – MEDIA AND COMMUNICATIONS English For Today Class –Nine Unit –Thirteen Lesson -One.
IP Telephony (VoIP).
M U P Personalization in any situation Automatic activation of
IDA CRM and Project Management
R E A D What is cyber bullying? Hall
How to Select and Use Privacy Settings
Personalization and User Profile Management for Public Internet Access Points (PIAPs) ETSI TC HF, STF PX on Extending e-Inclusion for Public Internet.
Presentation transcript:

Mike Pluke1 Universal Communications Identifier (UCI) and the power of profiles Mike Pluke Castle Consulting Ltd. ETSI TC HF & STF265

Mike Pluke2 UCI and the power of profiles  The background to UCI – “real world” and “virtual world” communication  What does the UCI look like?  How does UCI work?  How User Profiles give the UCI its power

Mike Pluke3 “Real world” communication  From the dawn of man until the telephone  People have evolved effective communication strategies  These strategies protect our:  time;  privacy;  safety.  We’ve learnt how to protect ourselves from the bad guys

Mike Pluke4 “Virtual world” communication  From the telephone, to the internet, to …  Most “real world” strategies don’t work  Most systems don’t help us to develop new strategies  Some systems really help the bad guys!  Inability to reliably identify the other person – is at the core of most of today’s difficulties

Mike Pluke5 Is masquerading a threat?  In the “real world” its usually obvious!  In the “virtual world” it can be impossible to detect

Mike Pluke6 Can anonymity be a threat?  Would you trust this anonymous character?  Is the person calling from this number to be trusted?  Who knows? Caller:

Mike Pluke7 Communications complexity  Communications devices (phones, PCs, PDAs) in many places – home, work, mobile  Several different services – , voice, fax, pager, instant messaging  Many identifiers convey little meaning e.g. phone numbers  Once an identifier is “in the wild”, privacy is compromised – other people control when and by whom you are contacted  Stored identifiers become redundant over time

Mike Pluke8 So which of these is Mike?

Mike Pluke9 What should we be identifying “People are outsiders in the current communications revolution. Computer hosts, pager terminals and telephones are addressable entities throughout the Internet and telephony systems.” Extract from “The Mobile People Architecture” from Stanford University What is needed is an identifier for a person (or a role) ETSI pursued this concept and developed a Universal Communications Identifier (UCI)

Mike Pluke10 What does the UCI look like?

Mike Pluke11 The UCI’s fundamental parts 1.A label: a user friendly description of the person/role 2.A unique numeric string: the UCI can be input from basic terminals and used in basic networks 3.An additional information field: not seen directly by the recipient but conveys information about the sender The ETSI Universal Communications Identifier (UCI) has three parts:

Mike Pluke12 It needs a system  A system to handle UCIs that does not depend on a particular technology platform  It includes a:  The Personal User Agent (PUA) that contains your preferences, acts on your behalf and negotiates with other PUAs  The Service Agent (SA) that acts as the interface between a PUA and a communications network or service.

Mike Pluke13 What the UCI delivers  The UCI owner’s name or business role  An “authentic” identity option  where the user-friendly label is certified as accurately describing the person/role  An “authentic date of birth” option  Stability – it never needs to change even when people add and change services  Allows the sender to communicate special requirements to the recipient

Mike Pluke14 It gives enhanced control of privacy  Giving your UCI to someone gives them the opportunity to contact you.  But you (via your PUA) choose whether to accept their proposed communication or …  Offer an alternative.  How you choose to handle communications varies according to who is trying to reach you.

Mike Pluke15 Let’s see it work

Mike Pluke16 Simplified UCI operation

Mike Pluke17 Simplified UCI operation X X

Mike Pluke18 Simplified UCI operation Jane selects Dan’s UCI and sends it

Mike Pluke19 Simplified UCI operation

Mike Pluke20 How User Profiles give power to UCI  The UCI relies on a User Profile to store  preferences for how you want to be reached  definitions of groups like “family”, “friends”, “colleagues”  details of all your communications terminals, applications and services  rules saying how you want your communication managed when you are – “At home”, “In car”, “In a meeting”, “In a plane”, etc.  etc.  Situation dependent profiles can be switched on by your smart home, smart car, smart devices ….  The PUA uses the User Profile to tell it how to manage communications in the way the user wants

Mike Pluke21 Where next?  UCI  People looking at how to implement UCI  ETSI TISPAN will be assessing how easily UCI can be included in their Next Generation Network plans  User Profiles  Work on User Profile Management started during the development of UCI  New work is being done in an ETSI Specialist Task Force (STF265)  Producing guidelines about how users can manage User Profiles related to their use of all their products and services

Mike Pluke22 Thank you! Web page: Mail List: To subscribe: For UCI contact: Mike Pluke Castle Consulting Ltd. Tel: For User Profiles: