• Shopping Cart
    There are no items in your cart

EG 202 067 : 1.1.1

Current

Current

The latest, up-to-date edition.

UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI); SYSTEM FRAMEWORK

Available format(s)

Hardcopy , PDF

Language(s)

English

€46.74
Excluding VAT

Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
   3.1 Definitions
   3.2 Abbreviations
4 Void
5 The Universal Communications Identifier (UCI)
6 UCI functional entities
   6.1 UCI system overview
   6.2 The Personal User Agent (PUA)
   6.3 The Service Agent (SA)
   6.4 Relationships between principal UCI entities
   6.5 Other entities
7 Capabilities for UCI-based communications systems
   7.1 System capabilities related to user input/output
   7.2 System capabilities (internal/automated)
   7.3 Service capabilities relating to UCI security
   7.4 System capabilities relating to the UCI
8 UCI Technical Requirements
9 UCI system dialogues, services and processes
   9.1 System dialogues
   9.2 Support services
   9.3 Key processes
        9.3.1 Terminal/User registration and authentication
        9.3.2 Basic UCI communication set-up
        9.3.3 PUA and terminal profile management
10 Communication using UCIs
   10.1 PUA to PUA communication - basic
   10.2 PUA to PUA communication - linked PUAs
   10.3 UCI communication with non-UCI users
11 UCI Privacy Protection
   11.1 Background
   11.2 UCI-based privacy control
12 UCI Data
   12.1 Stored data
        12.1.1 Terminal Data
        12.1.2 PUA Data
        12.1.3 SA Data
        12.1.4 Service Data
        12.1.5 User provided UCI data
   12.2 Acquisition of network, service and application data
   12.3 PUA rules
13 UCI Security Framework
   13.1 Security Objectives Definition
        13.1.1 General security objectives
        13.1.2 Users' objectives
        13.1.3 Service and network providers' objectives
        13.1.4 Manufacturers' objectives
        13.1.5 UCI system security objectives
   13.2 A Model for UCI Security Analysis
        13.2.1 Communication subjects
        13.2.2 Information flow paths
        13.2.3 Functions and services
        13.2.4 Boundaries
   13.3 Forms of Attack
        13.3.1 Eavesdropping
        13.3.2 Masquerade
        13.3.3 Replay
        13.3.4 Modification of information
        13.3.5 Unauthorized access
        13.3.6 Stalking
        13.3.7 Denial of service attacks
   13.4 Threats to UCI System
   13.5 UCI System Security Requirements
   13.6 Countermeasures
        13.6.1 Identification and authentication
        13.6.2 Encryption
        13.6.3 Cryptographic integrity
        13.6.4 Protection from denial of service attacks
        13.6.5 Intrusion detection
        13.6.6 Location specific service binding
   13.7 UCI System Security Features
   13.8 Threats after application of countermeasures
   13.9 Security Mechanisms
14 Administrative issues
15 Key standards activities
Annex A (informative): UCI Scenarios
      A.1 Introduction
      A.2 Mobile Worker Scenario
          A.2.1 Key UCI capabilities illustrated by this scenario
          A.2.2 Scenario description
          A.2.3 Discussion
      A.3 Home Scenario
          A.3.1 Key UCI capabilities illustrated by this scenario
          A.3.2 Scenario description
          A.3.3 Discussion
      A.4 Tennis Club Scenario
          A.4.1 Key UCI capabilities illustrated by this scenario
          A.4.2 Scenario description
          A.4.3 Discussion
      A.5 Multiple Role Scenario
          A.5.1 Key UCI capabilities illustrated by this scenario
          A.5.2 Scenario description
          A.5.3 Discussion
      A.6 Corporate Scenario
          A.6.1 Key UCI capabilities illustrated by this scenario
          A.6.2 Scenario description
          A.6.3 Discussion
      A.7 PUA acting as a personal assistant scenario
          A.7.1 Key UCI capabilities illustrated by this scenario
          A.7.2 Scenario description
          A.7.3 Discussion
Annex B (informative): User Requirements for communications
        systems using UCIs
      B.1 Notes relating to the user requirements
          B.1.1 Origin of the user requirements
          B.1.2 Assumptions concerning the Universal
                Communications Identifier
          B.1.3 System re-engineering
          B.1.4 Dependencies and conflicts
      B.2 Generic requirements
      B.3 Human factors requirements
Annex C (informative): Standards Bodies related
        to UCI Technical Requirements
      C.1 Personal User Agent Technical Requirements
      C.2 Service Agent
      C.3 Terminals and end-user applications
      C.4 UCI and identification verifiers
Annex D (informative): Security Mechanisms
      D.1 Public, Private and Secret Keys
          D.1.1 Symmetric key advantages and disadvantages
          D.1.2 Asymmetric key advantages and disadvantages
          D.1.3 General encryption management problems
          D.1.4 Can encryption be perfect?
      D.2 Internet Key Exchange (IKE)
          D.2.1 Overview
          D.2.2 What IKE achieves
          D.2.3 IKE in UCI
      D.3 Digital Signature and Signature in General
          D.3.1 Digital signature and UCI
Annex E (informative): Security risk assessment
      E.1 Initial risk asses
      E.2 Final risk assessment
Annex F (informative): Comparison of the UCI approach with ENUM
      F.1 ENUM
      F.2 UCI
      F.3 Similarities between ENUM and UCI
      F.4 Differences between ENUM and UCI
      F.5 Summary
History

Delineates the system architecture and operations needed for a Universal Communications (UCI) implementation capitalizing on existing and emerging standards and also identifies and documents the standards that are available (or that will be available) to enable the UCI to be implemented.

Committee
HF
DocumentType
Standard
Pages
135
PublisherName
European Telecommunications Standards Institute
Status
Current

EG 202 325 : 1.1.1 HUMAN FACTORS (HF); USER PROFILE MANAGEMENT
EG 202 132 : 1.1.1 HUMAN FACTORS (HF); USER INTERFACES; GUIDELINES FOR GENERIC USER INTERFACE ELEMENTS FOR MOBILE TERMINALS AND SERVICES
TR 103 180 : 1.2.1 ACCESS AND TERMINALS (AT); STUDY ON EMERGENCY COMMUNICATIONS; ASPECTS RELATED TO FIXED LINE TERMINALS
TR 102 415 : 1.1.1 HUMAN FACTORS (HF); TELECARE SERVICES; ISSUES AND RECOMMENDATIONS FOR USER ASPECTS
EG 202 421 : 1.1.1 HUMAN FACTORS (HF); MULTICULTURAL AND LANGUAGE ASPECTS OF MULTIMEDIA COMMUNICATIONS
EG 202 301 : 1.1.1 UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI); USING UCI TO ENHANCE COMMUNICATIONS FOR DISABLED, YOUNG AND ELDERLY PEOPLE
TR 102 125 : 1.1.1 HUMAN FACTORS (HF); POTENTIAL HARMONIZED UI ELEMENTS FOR MOBILE TERMINALS AND SERVICES
TR 103 073 : 1.1.1 UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI); IMPROVING COMMUNICATIONS FOR DISABLED, YOUNG AND ELDERLY PEOPLE
EG 284 004 : 1.1.2 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); INCORPORATING UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI) SUPPORT INTO THE SPECIFICATION OF NEXT GENERATION NETWORKS (NGN)
SR 002 564 : 2.0.0 APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH
TR 102 410 : 1.1.1 EMERGENCY COMMUNICATIONS (EMTEL); BASIS OF REQUIREMENTS FOR COMMUNICATIONS BETWEEN INDIVIDUALS AND BETWEEN INDIVIDUALS AND AUTHORITIES WHILST EMERGENCIES ARE IN PROGRESS
TR 102 548 : 1.1.1 HUMAN FACTORS (HF); USER EXPERIENCE; 3G AND MOBILE BROADBAND INTEROPERABILITY PLUGTEST: APPROACH, SCENARIOS AND TEST SPECIFICATION; OUTCOMES, CONCLUSIONS AND RECOMMENDATIONS
EG 203 072 : 1.1.1 UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI); RESULTS OF A DETAILED STUDY INTO THE TECHNICAL AREAS FOR IDENTIFICATION HARMONIZATION; RECOMMENDATIONS ON THE UCI FOR NGN
TS 102 747 : 1.1.1 HUMAN FACTORS (HF); PERSONALIZATION AND USER PROFILE MANAGEMENT; ARCHITECTURAL FRAMEWORK
EG 202 249 : 1.1.1 UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI); GUIDELINES ON THE USABILITY OF UCI BASED SYSTEMS
EG 202 320 : 1.2.1 HUMAN FACTORS (HF); DUPLEX UNIVERSAL SPEECH AND TEXT (DUST) COMMUNICATIONS
TR 103 077 : 1.1.1 UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI); MAXIMIZING THE USABILITY OF UCI BASED SYSTEMS

EG 201 940 : 1.1.1 HUMAN FACTORS (HF); USER IDENTIFICATION SOLUTIONS IN CONVERGING NETWORKS

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.