• EG 202 067 : 1.1.1

    Current The latest, up-to-date edition.

    UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI); SYSTEM FRAMEWORK

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date: 

    Publisher:  European Telecommunications Standards Institute

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Intellectual Property Rights
    Foreword
    Introduction
    1 Scope
    2 References
    3 Definitions and abbreviations
       3.1 Definitions
       3.2 Abbreviations
    4 Void
    5 The Universal Communications Identifier (UCI)
    6 UCI functional entities
       6.1 UCI system overview
       6.2 The Personal User Agent (PUA)
       6.3 The Service Agent (SA)
       6.4 Relationships between principal UCI entities
       6.5 Other entities
    7 Capabilities for UCI-based communications systems
       7.1 System capabilities related to user input/output
       7.2 System capabilities (internal/automated)
       7.3 Service capabilities relating to UCI security
       7.4 System capabilities relating to the UCI
    8 UCI Technical Requirements
    9 UCI system dialogues, services and processes
       9.1 System dialogues
       9.2 Support services
       9.3 Key processes
            9.3.1 Terminal/User registration and authentication
            9.3.2 Basic UCI communication set-up
            9.3.3 PUA and terminal profile management
    10 Communication using UCIs
       10.1 PUA to PUA communication - basic
       10.2 PUA to PUA communication - linked PUAs
       10.3 UCI communication with non-UCI users
    11 UCI Privacy Protection
       11.1 Background
       11.2 UCI-based privacy control
    12 UCI Data
       12.1 Stored data
            12.1.1 Terminal Data
            12.1.2 PUA Data
            12.1.3 SA Data
            12.1.4 Service Data
            12.1.5 User provided UCI data
       12.2 Acquisition of network, service and application data
       12.3 PUA rules
    13 UCI Security Framework
       13.1 Security Objectives Definition
            13.1.1 General security objectives
            13.1.2 Users' objectives
            13.1.3 Service and network providers' objectives
            13.1.4 Manufacturers' objectives
            13.1.5 UCI system security objectives
       13.2 A Model for UCI Security Analysis
            13.2.1 Communication subjects
            13.2.2 Information flow paths
            13.2.3 Functions and services
            13.2.4 Boundaries
       13.3 Forms of Attack
            13.3.1 Eavesdropping
            13.3.2 Masquerade
            13.3.3 Replay
            13.3.4 Modification of information
            13.3.5 Unauthorized access
            13.3.6 Stalking
            13.3.7 Denial of service attacks
       13.4 Threats to UCI System
       13.5 UCI System Security Requirements
       13.6 Countermeasures
            13.6.1 Identification and authentication
            13.6.2 Encryption
            13.6.3 Cryptographic integrity
            13.6.4 Protection from denial of service attacks
            13.6.5 Intrusion detection
            13.6.6 Location specific service binding
       13.7 UCI System Security Features
       13.8 Threats after application of countermeasures
       13.9 Security Mechanisms
    14 Administrative issues
    15 Key standards activities
    Annex A (informative): UCI Scenarios
          A.1 Introduction
          A.2 Mobile Worker Scenario
              A.2.1 Key UCI capabilities illustrated by this scenario
              A.2.2 Scenario description
              A.2.3 Discussion
          A.3 Home Scenario
              A.3.1 Key UCI capabilities illustrated by this scenario
              A.3.2 Scenario description
              A.3.3 Discussion
          A.4 Tennis Club Scenario
              A.4.1 Key UCI capabilities illustrated by this scenario
              A.4.2 Scenario description
              A.4.3 Discussion
          A.5 Multiple Role Scenario
              A.5.1 Key UCI capabilities illustrated by this scenario
              A.5.2 Scenario description
              A.5.3 Discussion
          A.6 Corporate Scenario
              A.6.1 Key UCI capabilities illustrated by this scenario
              A.6.2 Scenario description
              A.6.3 Discussion
          A.7 PUA acting as a personal assistant scenario
              A.7.1 Key UCI capabilities illustrated by this scenario
              A.7.2 Scenario description
              A.7.3 Discussion
    Annex B (informative): User Requirements for communications
            systems using UCIs
          B.1 Notes relating to the user requirements
              B.1.1 Origin of the user requirements
              B.1.2 Assumptions concerning the Universal
                    Communications Identifier
              B.1.3 System re-engineering
              B.1.4 Dependencies and conflicts
          B.2 Generic requirements
          B.3 Human factors requirements
    Annex C (informative): Standards Bodies related
            to UCI Technical Requirements
          C.1 Personal User Agent Technical Requirements
          C.2 Service Agent
          C.3 Terminals and end-user applications
          C.4 UCI and identification verifiers
    Annex D (informative): Security Mechanisms
          D.1 Public, Private and Secret Keys
              D.1.1 Symmetric key advantages and disadvantages
              D.1.2 Asymmetric key advantages and disadvantages
              D.1.3 General encryption management problems
              D.1.4 Can encryption be perfect?
          D.2 Internet Key Exchange (IKE)
              D.2.1 Overview
              D.2.2 What IKE achieves
              D.2.3 IKE in UCI
          D.3 Digital Signature and Signature in General
              D.3.1 Digital signature and UCI
    Annex E (informative): Security risk assessment
          E.1 Initial risk asses
          E.2 Final risk assessment
    Annex F (informative): Comparison of the UCI approach with ENUM
          F.1 ENUM
          F.2 UCI
          F.3 Similarities between ENUM and UCI
          F.4 Differences between ENUM and UCI
          F.5 Summary
    History

    Abstract - (Show below) - (Hide below)

    Delineates the system architecture and operations needed for a Universal Communications (UCI) implementation capitalizing on existing and emerging standards and also identifies and documents the standards that are available (or that will be available) to enable the UCI to be implemented.

    General Product Information - (Show below) - (Hide below)

    Committee HF
    Document Type Standard
    Publisher European Telecommunications Standards Institute
    Status Current

    Standards Referenced By This Book - (Show below) - (Hide below)

    EG 202 325 : 1.1.1 HUMAN FACTORS (HF); USER PROFILE MANAGEMENT
    EG 202 132 : 1.1.1 HUMAN FACTORS (HF); USER INTERFACES; GUIDELINES FOR GENERIC USER INTERFACE ELEMENTS FOR MOBILE TERMINALS AND SERVICES
    TR 103 180 : 1.2.1 ACCESS AND TERMINALS (AT); STUDY ON EMERGENCY COMMUNICATIONS; ASPECTS RELATED TO FIXED LINE TERMINALS
    TR 102 415 : 1.1.1 HUMAN FACTORS (HF); TELECARE SERVICES; ISSUES AND RECOMMENDATIONS FOR USER ASPECTS
    EG 202 421 : 1.1.1 HUMAN FACTORS (HF); MULTICULTURAL AND LANGUAGE ASPECTS OF MULTIMEDIA COMMUNICATIONS
    EG 202 301 : 1.1.1 UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI); USING UCI TO ENHANCE COMMUNICATIONS FOR DISABLED, YOUNG AND ELDERLY PEOPLE
    TR 102 125 : 1.1.1 HUMAN FACTORS (HF); POTENTIAL HARMONIZED UI ELEMENTS FOR MOBILE TERMINALS AND SERVICES
    TR 103 073 : 1.1.1 UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI); IMPROVING COMMUNICATIONS FOR DISABLED, YOUNG AND ELDERLY PEOPLE
    EG 284 004 : 1.1.2 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); INCORPORATING UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI) SUPPORT INTO THE SPECIFICATION OF NEXT GENERATION NETWORKS (NGN)
    SR 002 564 : 2.0.0 APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH
    TR 102 410 : 1.1.1 EMERGENCY COMMUNICATIONS (EMTEL); BASIS OF REQUIREMENTS FOR COMMUNICATIONS BETWEEN INDIVIDUALS AND BETWEEN INDIVIDUALS AND AUTHORITIES WHILST EMERGENCIES ARE IN PROGRESS
    TR 102 548 : 1.1.1 HUMAN FACTORS (HF); USER EXPERIENCE; 3G AND MOBILE BROADBAND INTEROPERABILITY PLUGTEST: APPROACH, SCENARIOS AND TEST SPECIFICATION; OUTCOMES, CONCLUSIONS AND RECOMMENDATIONS
    EG 203 072 : 1.1.1 UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI); RESULTS OF A DETAILED STUDY INTO THE TECHNICAL AREAS FOR IDENTIFICATION HARMONIZATION; RECOMMENDATIONS ON THE UCI FOR NGN
    TS 102 747 : 1.1.1 HUMAN FACTORS (HF); PERSONALIZATION AND USER PROFILE MANAGEMENT; ARCHITECTURAL FRAMEWORK
    EG 202 249 : 1.1.1 UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI); GUIDELINES ON THE USABILITY OF UCI BASED SYSTEMS
    EG 202 320 : 1.2.1 HUMAN FACTORS (HF); DUPLEX UNIVERSAL SPEECH AND TEXT (DUST) COMMUNICATIONS
    TR 103 077 : 1.1.1 UNIVERSAL COMMUNICATIONS IDENTIFIER (UCI); MAXIMIZING THE USABILITY OF UCI BASED SYSTEMS

    Standards Referencing This Book - (Show below) - (Hide below)

    EG 201 940 : 1.1.1 HUMAN FACTORS (HF); USER IDENTIFICATION SOLUTIONS IN CONVERGING NETWORKS
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective