An Approach Based on Network ID Systems to Concerns Prof. Shoichiro Asano

advertisement
An Approach Based on Network ID Systems to
Prepare for Global Environmental/Health
Concerns
Prof. Shoichiro Asano
National Institute of Informatics
Susumu Yoneda, Ph.D
Softbank Telecom Corp.
ITU ICT & Climate Change Symposium
June 18, 2008
Motivations and Objectives(1)
• Climate change and/or pandemic are global
life threatening environmental/health
concerns.
– Not only our lives but also future generation
lives
• There will be many different
technical/medical solutions.
• To verify the effectiveness of technologies
and solutions for reducing those concerns is
important.
– Effective solutions should be promoted and
expanded.
• ICT can play an important role to verify the
effectiveness of technologies and solutions.
• A region(/area) could adopt different
technologies and solutions.
Motivations and Objectives(2)
• To identify and separate problem areas from other
healthy areas is required.
– A problem area: The
not be effective in
– A healthy area: The
be effective in the
adopted technologies and solutions may
the area.
adopted technologies and solutions may
area.
• Monitored data are timely collected via network and
analyzed by experts.
– A large number of monitoring devices are required.
• A network system based on device ID that would
deliver the device information and its monitored data
and attributes to scientists, decision makers and
users who can make a good use of the data.
• An international institute to coordinate
those activities and analyses, and to promote
Action Flows of Environmental and Health Improvemen
Environmental
& Health
Improvements
Confirmation
By Monitor
Monitor
Areas
Increase Healthy
Area, and Reduce
Problem Area
Identify
Healthy
Problem Areas
Propose
Solutions
&
Incentives
Information Flow for Network ID Systems to Prepare
for Climate Change / Pandemic Concerns
Central Analyzing
center
People
(Network
User)
Public Network
Sensor
device
Regional
Analyzing
Center
Functions of ID provider and Information Provider
Regional
Analyzing Center
Central
Analyzing Center
Monitored
Informatio
n
Value
Monito
r
Regional Analyzing
Center
Increased
Informatio
n
Value
ID
Network
User/People
Monitored
Information
Value
Monitor
Standardization requirements of such ID
network
• standardized interfaces between ID
network and devices (physical and
logical layers)
• standardized procedure to identify,
verify and exchange device ID,
attributions and collected data, and
• standardized process to maintain
accuracy of collected data.
ID related activities in ITU-T
• JCA-NID
– http://www.itu.int/ITU-T/jca/nid/index.html
– ID terminal, public network & services
• JCA-IdM/ IdM-GSI
– http://www.itu.int/ITU-T/jca/idm/index.html
– Entity, Identity Provider & Relying Party
A Composed Architecture Model
Transaction
&
Service
Service
Relying
Party
(11)
Terminal
Entity
(10)
Identity
Provider
(11)
Public
Network
The terminal/end user equipment accesses to the public network via
the User Network Interface UNI (10).
Then, it contacts a necessary service via the reference point (11).
The service will provide additional information back to the termina
user.
A New Approach of the Architecture
Transaction
&
Service
Service
Terminal
Entity
Identity Provide &
Resource/Service Routing
(10)
Public
Network
ID Network
Relying
Party
(11)
Relationship between IdM and NID
Various
ID Systems
IdM
NID
Management by
Trusted providers of
Trusted attributes of
Entity
Network aspects of
Applications or
Services of
RFID and
Sensor systems
Compensate each other:
Management & Network Aspect
ID Network
(International Institute to coordinate,
evaluate and analyze data)
RFID
USN
Reference
NID Reference Architecture
JCA -NID High
Level Ref.Architecture
ID-Terminal equipment (1)
Var. Functions in
the Terminal
Reade (3)rR -ID
TAG
(2)
(public) Network
preferableNGN (7)
Writer(4) W -ID
e.g. service(8)
ID
Network
attachment (5)
Others
(6)
(11)
O -ID
(10)
TAG -Interface(13)
Could be:
Infrared
RF
Optiical
Galvanic
etc.
Network
Reference Point /
Interface (UNI)
Terminal equipment (9)
Network
Reference Point /
Interface (UNI)
(12)
e.g.remote Inquire
General IdM Architectural Model
•
•
•
Entity - a User or a
Requestor, who seeks Service
from a Relying Party, and
provides a claimed Identity
to that Party.
Relying Party (RP) - Needs
to have this Identity
authenticated before
providing the Service.
Queries Entity for the name
of the Identity Provider for
the claimed Identity.
Queries Identity Provider
for validation of the
claimed Identity (and for
the attributes of that
Identity).
Identity Provider (IdP) Authenticates the claimed
Identity, and may return
attributes of the Identity
to the RP. Uses trust
Relying
Party
Entity
Identity
Provider
Request
Request
Resource or
Resource
Service
or Service
Request IdP
Identity Provider
Request
Resource or Service
•
Identity
Identity Response
IdM Query-response mechanisms should be
“well-structured”, with syntaxes and
profiles that are known or potentially
obtainable by each of the parties
involved
Download