Title: User Identification Solutions in Converging Networks
1User Identification Solutions in Converging
Networks
- Mike Pluke
- ETSI STF 157 - User Identification in Converging
Networks
2Todays Complexities
Which of these is Mike Miles?
3Communicating Today
4Communicating Today
5Communicating Today
6Communicating Today
7Whats Wrong?
- The caller has to guess the most successful way
to communicate - Most callers dont know all the user identifiers
- Terminals linked to communication type
- User identifier schemes linked to communication
type - Some user identifiers linked to terminals
- Some user identifiers portable telephony
- Some user identifiers linked to provider email
- Terminals/user identifiers linked to users roles
8Current Partial Solutions
- UPT
- Personal Numbering schemes
- Fax via email
- Email via phone
- Etc.
9Problems with Current Solutions
- Many solutions lock users to 1 provider
- Proprietary solutions are incompatible
- Most solutions rely on fixes applied to legacy
systems - Most solutions are unfriendly to the caller
and/or called party - There is probably no fully comprehensive global
solution
10High-level User Requirements
- A unified way of setting up a communication
- Reduce the complexity for the calling party
- Make it easy for the called party to manage their
communications - Give more options to the called and calling
parties
11Human Communication Needs
Modern communications systems can create new
communication needs
BUT
Basic communication needs have changed very
little since the dawn of man
12Historic Communications Needs
People have always needed to contact
13Tomorrow
People will still need to contact
Individuals, roles, groups and places
14People Not Terminals
People are outsiders in the current
communications revolution. Computer hosts, pager
terminals and telephones are addressable entities
throughout the Internet and telephony
systems. Extract from The Mobile People
Architecture from Stanford University
15Whats Needed?
- One user identifier per individual or role
- An integrated user identifier search mechanism
- Automatic capture of user identifiers
- Intelligent agents to manage complexity for the
calling and called parties
16The User Identifier In Use
- This format is not a proposal
- The format should be user friendly
- The User Identifier must be unique
17How It Might Be?
18How It Might Be?
19How It Might Be?
20How It Might Be?
21How It Might Be?
22How It Might Be?
23How It Might Be?
24Why IP could help?
- Integrated search mechanisms will not work
effectively if a connection must be established
to do each search - Search results will define the destination uri
- Communication can start immediately the search
results/uri is returned
25What next?
- ETSI STF 157 will continue to work on refining
the user requirements for User Identification
solutions - At the same time potential solutions will be
investigated to validate the practicability of
the requirements
26What next?
- ETSI STF 157 is very keen to liaise with all
groups with an interest in this area - We are also very happy to receive ideas from
individuals within these groups - My email is
- Mike.Pluke_at_castle-consult.com