1 / 6

IETF atoca

IETF atoca. Brian Rosen N eustar. Background. Lots and lots of L2 specific Authority to Citizen alert technology Most of it is aimed at least common denominator devices Very often, very limited definition of “Authority”

uri
Télécharger la présentation

IETF atoca

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IETF atoca Brian Rosen Neustar

  2. Background • Lots and lots of L2 specific Authority to Citizen alert technology • Most of it is aimed at least common denominator devices • Very often, very limited definition of “Authority” • Most are single authority, and to cope, each authority has its own system • Virtually all have no opt-out, very few have any form of opt-in

  3. IETF Interest • IETF emergency efforts started with Authority to Authority 9 years ago • Citizen to Authority work started 7 years ago • We’ve been talking about Authority to Citizen for at least 4 years, maybe longer

  4. atoca • “Authority TO Citizen Alerts” = atoca • BOF held, charter discussions have been held for over a year post BOF • We now have an agreed upon charter, but need IESG approval to create a work group

  5. Characteristics • Any IP connected endpoint • Not L2 specific, hopefully able to use L2 available L2 mechanisms • Complementary to other L2 specific mechanisms (CMAS, EWS, …) – people will have lots of devices • Initial target is a limited set of Authorities (government) • atoca won’t discuss how they are appointed, but will describe the authentication and authorization MECHANISMS

  6. Characteristics • Explicit opt-in and opt-out mechanisms • Governments may proscribe controls on this for some kinds of messages • Initial design is small messages that can be rendered in a variety of ways by devices • May contains links to further information • Location based delivery, but not necessarily the location of the device • Use available tools, e.g. CAP • Security is a big deal to be faced

More Related