Re: IETF solution for pairing cellular hosts

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello thanks for the question, I'm pasting a note that
I wrote in a previous I-D:

(I'm not entering here into solution discussions!)

Regards,
pars
4.  Name collisions

With the traditional phone book, the querier can filter the returned
results using some other information about the target user e.g. the
street address, company, etc. A similar solution may be adopted.
Along with a Turing test, the target host may return some information
helping the querier make the right choice. If the target user is
unlikely to be the right person, the querier can give up the query
and avoid solving an unnecessary Turing test.




On 9/26/07, Bill McQuillan <McQuilWP@xxxxxxxxx> wrote:

On Tue, 2007-09-25, Pars Mutaf wrote:

> On 9/25/07, Suresh Krishnan <suresh.krishnan@xxxxxxxxxxxx> wrote:
> Pars Mutaf wrote:
>> Model of operation
>>
>> 1. The querier user types the target user's "human name" (as if he were
>>consulting a phonebook), or a pseudoynm.
>> 2. The pairing request is forwarded to the target phone.

> How? How do you locate the target phone? Isn't this the problem we are
> trying to solve?


> For example (I'm not saying that this THE solution):

> You can have a relay agent where the human names map
> to MIPv6 home addresses of the target phones.

This is the big problem. "Human names" are not unique enough!

In a normal wire-line directory the name is associated with a fixed
location, usually an address but at least a city. This can be used as a
discriminator among possible name duplications by the querier.

Cellphones do not provide the "relay agent" with such fixed, known
information to assist in discriminating among customers with the same name.
Since cellphones are so mobile there even might only be a country indication.

Or were you intending that ALL phones of people with the same name be
contacted. Wouldn't this just put the burden on all of the target users to
determine the identity of the querier based on....what?

And how would any one of the targets determine that she was the intended
victim?

--
Bill McQuillan <McQuilWP@xxxxxxxxx >


_______________________________________________
Ietf mailing list
Ietf@xxxxxxxx
https://www1.ietf.org/mailman/listinfo/ietf

_______________________________________________

Ietf@xxxxxxxx
https://www1.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]