An Approach Based on Network ID Systems to Prepare for Global Environmental/Health Concerns Prof. Shoichiro Asano National Institute of Informatics Susumu Yoneda, Ph.D Softbank Telecom Corp. ITU ICT & Climate Change Symposium June 18, 2008 Motivations and Objectives(1) • Climate change and/or pandemic are global life threatening environmental/health concerns. – Not only our lives but also future generation lives • There will be many different technical/medical solutions. • To verify the effectiveness of technologies and solutions for reducing those concerns is important. – Effective solutions should be promoted and expanded. • ICT can play an important role to verify the effectiveness of technologies and solutions. • A region(/area) could adopt different technologies and solutions. Motivations and Objectives(2) • To identify and separate problem areas from other healthy areas is required. – A problem area: The not be effective in – A healthy area: The be effective in the adopted technologies and solutions may the area. adopted technologies and solutions may area. • Monitored data are timely collected via network and analyzed by experts. – A large number of monitoring devices are required. • A network system based on device ID that would deliver the device information and its monitored data and attributes to scientists, decision makers and users who can make a good use of the data. • An international institute to coordinate those activities and analyses, and to promote Action Flows of Environmental and Health Improvemen Environmental & Health Improvements Confirmation By Monitor Monitor Areas Increase Healthy Area, and Reduce Problem Area Identify Healthy Problem Areas Propose Solutions & Incentives Information Flow for Network ID Systems to Prepare for Climate Change / Pandemic Concerns Central Analyzing center People (Network User) Public Network Sensor device Regional Analyzing Center Functions of ID provider and Information Provider Regional Analyzing Center Central Analyzing Center Monitored Informatio n Value Monito r Regional Analyzing Center Increased Informatio n Value ID Network User/People Monitored Information Value Monitor Standardization requirements of such ID network • standardized interfaces between ID network and devices (physical and logical layers) • standardized procedure to identify, verify and exchange device ID, attributions and collected data, and • standardized process to maintain accuracy of collected data. ID related activities in ITU-T • JCA-NID – http://www.itu.int/ITU-T/jca/nid/index.html – ID terminal, public network & services • JCA-IdM/ IdM-GSI – http://www.itu.int/ITU-T/jca/idm/index.html – Entity, Identity Provider & Relying Party A Composed Architecture Model Transaction & Service Service Relying Party (11) Terminal Entity (10) Identity Provider (11) Public Network The terminal/end user equipment accesses to the public network via the User Network Interface UNI (10). Then, it contacts a necessary service via the reference point (11). The service will provide additional information back to the termina user. A New Approach of the Architecture Transaction & Service Service Terminal Entity Identity Provide & Resource/Service Routing (10) Public Network ID Network Relying Party (11) Relationship between IdM and NID Various ID Systems IdM NID Management by Trusted providers of Trusted attributes of Entity Network aspects of Applications or Services of RFID and Sensor systems Compensate each other: Management & Network Aspect ID Network (International Institute to coordinate, evaluate and analyze data) RFID USN Reference NID Reference Architecture JCA -NID High Level Ref.Architecture ID-Terminal equipment (1) Var. Functions in the Terminal Reade (3)rR -ID TAG (2) (public) Network preferableNGN (7) Writer(4) W -ID e.g. service(8) ID Network attachment (5) Others (6) (11) O -ID (10) TAG -Interface(13) Could be: Infrared RF Optiical Galvanic etc. Network Reference Point / Interface (UNI) Terminal equipment (9) Network Reference Point / Interface (UNI) (12) e.g.remote Inquire General IdM Architectural Model • • • Entity - a User or a Requestor, who seeks Service from a Relying Party, and provides a claimed Identity to that Party. Relying Party (RP) - Needs to have this Identity authenticated before providing the Service. Queries Entity for the name of the Identity Provider for the claimed Identity. Queries Identity Provider for validation of the claimed Identity (and for the attributes of that Identity). Identity Provider (IdP) Authenticates the claimed Identity, and may return attributes of the Identity to the RP. Uses trust Relying Party Entity Identity Provider Request Request Resource or Resource Service or Service Request IdP Identity Provider Request Resource or Service • Identity Identity Response IdM Query-response mechanisms should be “well-structured”, with syntaxes and profiles that are known or potentially obtainable by each of the parties involved