ETSI EG 202 067-2002 Universal Communications Identifier (UCI) System Framework (V1 1 1)《通用通信标识符(UCI) 系统框架(版本1 1 1)》.pdf
《ETSI EG 202 067-2002 Universal Communications Identifier (UCI) System Framework (V1 1 1)《通用通信标识符(UCI) 系统框架(版本1 1 1)》.pdf》由会员分享,可在线阅读,更多相关《ETSI EG 202 067-2002 Universal Communications Identifier (UCI) System Framework (V1 1 1)《通用通信标识符(UCI) 系统框架(版本1 1 1)》.pdf(135页珍藏版)》请在麦多课文档分享上搜索。
1、ETSI EG 202 067 1.1.1 (2002-09) ETSI Guide U n ive rsal Com m u n cat ions I dent if er (U C i); System framework 2 ETSI EG 202 067 VI .I .I (2002-09) Reference DEG/HF-00025 Keywords addressing, UCI ETSI 650 Route des Lucioles F-O6921 Sophia Antipolis Cedex - FRANCE Tel.:+33492944200 Fax:+3349365471
2、6 Siret No 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-prfecture de Grasse (06) No 7803/88 Important notice Individual copies of the present document can be downloaded from: http:lwmv.etsi .arq The present document may be made available in more than one electronic v
3、ersion or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI
4、 Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at ha p:/pa rta I. etsi I a rgltbistat uslstatus .as p If you find errors in the present docum
5、ent, send your comment to: Cori vriaht Notifica tion No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. O European Telecommunications Standards Institute 2002. All rights reserved. DECTTM, PLUGTESTSTM
6、and UMTSTMare Trade Marks of ETSI registered for the benefit of its Members. TIPHONTM and the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partner
7、s. ETSI 3 ETSI EG 202 067 VI . 1 . 1 (2002-09) Contents Intellectual Property Rights 7 Foreword . 7 Introduction 7 1 2 3 3.1 3.2 4 5 6 6.1 6.2 6.3 6.4 6.5 7 7.1 7.2 7.3 7.4 8 9 9.1 9.2 9.3 Scope 9 References 10 Definitions and abbreviations . 10 Definitions . . 10 Abbreviations . 11 Void 11 The Univ
8、ersal Communications Identifier (UCI) . 12 UCI functional entities . 12 UCI system overview . 12 The Personal User Agent (PUA) . . 13 The Service Agent (SA) . 14 Relationships between principal UCI entities . 14 Other entities . . 15 System capabilities related to user input/output . 16 System capab
9、ilities (internal/automated) . . 22 Service capabilities relating to UCI security . . 26 System capabilities relating to the UCI . . 29 Capabilities for UCI-based communications systems 16 UCI Technical Requirements . 31 UCI system dialogues, services and processes . 35 System dialogues . . 35 Suppo
10、rt services . 36 Kev txocesses . 37 dI 9.3.1 Terminal/User registration and authentication . . 37 9.3.2 Basic UCI communication Set-up . 38 9.3.3 PUA and terminal profile management . . 40 Communication using UCIs . 40 10 10.1 PUA to PUA communication - basic . 40 10.2 41 10.3 UCI communication with
11、 non-UCI users . 42 11 UCI Privacy Protection 43 11.1 Background . 43 11.2 UCI-based privacy control . . 43 12 UCI Data 44 12.1 Stored Data . 44 12.1.1 Terminal Data . 46 12.1.2 PUA Data . . 47 12.1.3 SA Data . 49 12.1.4 Service Data . . 50 12.1.5 User provided UCI Data . 51 12.2 Acquisition of netw
12、ork, service and application data . 51 12.3 PUA rules . 52 13 UCI security framework . 52 13.1 Security objectives definition 52 13.1.1 General security objectives 53 PUA to PUA communication - linked PUAS ETSI 4 ETSI EG 202 067 VI .I .I (2002-09) 13.1.2 13.1.3 13.1.4 13.1.5 13.2 13.2.1 13.2.2 13.2.
13、3 13.2.4 13.3 13.3.1 13.3.2 13.3.3 13.3.4 13.3.5 13.3.6 13.3.7 13.4 13.5 13.6 13.6.1 13.6.2 13.6.3 13.6.4 13.6.5 13.6.6 13.7 13.8 13.9 Users objectives 53 Service and network providers obj 53 Manufacturers objectives . .54 UCI system security objectives . .54 A model for UCI security analysis . .54
14、Communication subjects 55 Information flow paths. 55 Functions and services . 55 Boundaries . 55 Forms of attack 56 E ave sdropping . 56 . 56 . 56 Unauthorized access . 56 . 56 Threats to UCI system Countermeasures Intrusion detection systems . Location specific service binding . UCI system security
15、 features Security mechanisms Threats after application of countermeasures. 14 Administrative issues . 60 15 Key standards activities. .6 1 Annex A (informative): A. 1 Introduction 62 A.2 Mobile worker scenario . .62 A.2.1 Key UCI capabilities illustrated by this scenario . A.2.2 Scenario descriptio
16、n . A.2.3 Discussion A.2.3.1 Step 1 - Inco A.2.3.2 Step 2 - Incoming email whilst Francois is out of the office A.2.3.3 A.3 Home scenario 69 UCI scenarios . 62 . s is in the office Step 3 - Responding to Duboiss original email A.3.1 Key UCI capabilities illustrated by this scenario 69 A.3.2 Scenario
17、 description . 69 A.3.3 Discussion 71 A.3.3.1 Step 1 - Jenny makes outgoing call. 71 A.3.3.2 73 A.3.3.3 . .74 A.3.3.4 75 A.3.3.5 76 A.4 Tennis club scenario . 78 A.4.1 78 A.4.2 Scenario description . 78 A.4.3 Discussion . .79 A.4.3.1 Step 1 - Configuration Management . 79 A.4.3.2 Step 2 - Club membe
18、rship enquiry . 81 Step 2 - Mike updates his profile Step 3 - Mike searches for old school friend Step 4 - Old school friend returns call Step 5 - Old school friend roams onto Key UCI capabilities illustrated by this scenario . A.4.3.3 A.4.3.4 Step 3 - Response to club membership enquiry Step 4 - Fu
19、rther club membership enquiry 83 85 ETSI 5 ETSI EG 202 067 VI . 1 . 1 (2002-09) A.4.3.5 A.4.3.6 A.5 A.5.1 Key UCI capabilities illustrated by this scenario . A.5.2 Scenario description . A.5.3 Discussion A.5.3.1 guration management . A.5.3.2 Step 2 - Inbound Engineering Club Communication A.5.3.3 A.
20、6 Corporate Scenario . 98 A.6.1 Key UCI capabilities illustrated by this scenario . 98 A.6.2 Scenario description . 98 A.6.3 Discussion . 99 s wife . 99 A.6.3.1 A.6.3.2 Step 2 - Incoming voice call from Albert . 101 A.6.3.3 Step 3 - Incoming voice call from conference organizer 102 A.6.3.4 Step 4 -
21、Automatic update of user profile . 105 A.6.3.5 Step 5 - Do NOT Disturb . 106 A.6.3.6 Step 6 - Email redirected ed as FAX 107 PUA acting as a personal assistant scenario . 109 A.7.1 Key UCI capabilities illustrated by this scenario 109 A.7.2 Scenario description . 109 A.7.3 Discussion . 110 A.7.3.1 S
22、tep 1 - Scheduling a multiparty CO 110 A.7.3.2 113 A.7.3.3 Step 3 - email of proposal . 115 Annex B (informative): User Requirements for communications systems using UCIs . 116 B . 1.1 Origin of the user requirements . 116 B . 1.3 System re-engineering . 116 B . 1.4 Dependencies and con . 116 B.2 Ge
23、neric requirements . 116 B.3 Human factors requirements 121 Annex C (informative): Standards Bodies related to UCI Technical Requirements . 124 C.l Personal User Agent Technical Requirements . 125 C.2 Service Agent . 126 Step 5 . Communication for the Club Treasurer Step 6 . Non-PUA User makes Tenni
24、s Club cal 87 . 89 Multiple role scenario . 91 Step 3 - Outbound Engineering Club Communication . . A.7 Step 2 - Conference call in action . B . 1 Notes relating to the user requirements 116 B . 1.2 Assumptions concerning the Universal Communications Identifier 116 C.3 C.4 Terminals and end-user app
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSIEG2020672002UNIVERSALCOMMUNICATIONSIDENTIFIERUCISYSTEMFRAMEWORKV111 通用 通信 标识符 UCI 系统 框架 版本 111 PDF

链接地址:http://www.mydoc123.com/p-727598.html