ietf
[Top] [All Lists]

Re: IETF solution for pairing cellular hosts

2007-09-26 02:43:37
Hello thanks for the question, I'm pasting a note that
I wrote in a previous I-D:

(I'm not entering here into solution discussions!)

Regards,
pars

4.  Name collisions

   With the traditional phone book, the querier can filter the returned
   results using some other information about the target user e.g. the
   street address, company, etc.  A similar solution may be adopted.
   Along with a Turing test, the target host may return some information
   helping the querier make the right choice.  If the target user is
   unlikely to be the right person, the querier can give up the query
   and avoid solving an unnecessary Turing test.





On 9/26/07, Bill McQuillan <McQuilWP(_at_)pobox(_dot_)com> wrote:


On Tue, 2007-09-25, Pars Mutaf wrote:

On 9/25/07, Suresh Krishnan <suresh(_dot_)krishnan(_at_)ericsson(_dot_)com> 
wrote:
Pars Mutaf wrote:
Model of operation

1. The querier user types the target user's "human name" (as if he were
consulting a phonebook), or a pseudoynm.
2. The pairing request is forwarded to the target phone.

How? How do you locate the target phone? Isn't this the problem we are
trying to solve?


For example (I'm not saying that this THE solution):

You can have a relay agent where the human names map
to MIPv6 home addresses of the target phones.

This is the big problem. "Human names" are not unique enough!

In a normal wire-line directory the name is associated with a fixed
location, usually an address but at least a city. This can be used as a
discriminator among possible name duplications by the querier.

Cellphones do not provide the "relay agent" with such fixed, known
information to assist in discriminating among customers with the same
name.
Since cellphones are so mobile there even might only be a country
indication.

Or were you intending that ALL phones of people with the same name be
contacted. Wouldn't this just put the burden on all of the target users to
determine the identity of the querier based on....what?

And how would any one of the targets determine that she was the intended
victim?

--
Bill McQuillan <McQuilWP(_at_)pobox(_dot_)com>


_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/ietf

_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/ietf