Hello thanks for the question, I'm pasting a note that
I wrote in a previous I-D:

(I'm not entering here into solution discussions!)

Regards,
pars

4.  Name collisions

   With the traditional phone book, the querier can filter the returned
   results using some other information about the target user e.g. the
   street address, company, etc.  A similar solution may be adopted.
   Along with a Turing test, the target host may return some information
   helping the querier make the right choice.  If the target user is
   unlikely to be the right person, the querier can give up the query
   and avoid solving an unnecessary Turing test.





On 9/26/07, Bill McQuillan <[EMAIL PROTECTED]> wrote:
>
>
> On Tue, 2007-09-25, Pars Mutaf wrote:
>
> > On 9/25/07, Suresh Krishnan <[EMAIL PROTECTED]> wrote:
> > Pars Mutaf wrote:
> >> Model of operation
> >>
> >> 1. The querier user types the target user's "human name" (as if he were
> >>consulting a phonebook), or a pseudoynm.
> >> 2. The pairing request is forwarded to the target phone.
>
> > How? How do you locate the target phone? Isn't this the problem we are
> > trying to solve?
>
>
> > For example (I'm not saying that this THE solution):
>
> > You can have a relay agent where the human names map
> > to MIPv6 home addresses of the target phones.
>
> This is the big problem. "Human names" are not unique enough!
>
> In a normal wire-line directory the name is associated with a fixed
> location, usually an address but at least a city. This can be used as a
> discriminator among possible name duplications by the querier.
>
> Cellphones do not provide the "relay agent" with such fixed, known
> information to assist in discriminating among customers with the same
> name.
> Since cellphones are so mobile there even might only be a country
> indication.
>
> Or were you intending that ALL phones of people with the same name be
> contacted. Wouldn't this just put the burden on all of the target users to
> determine the identity of the querier based on....what?
>
> And how would any one of the targets determine that she was the intended
> victim?
>
> --
> Bill McQuillan <[EMAIL PROTECTED]>
>
>
> _______________________________________________
> Ietf mailing list
> Ietf@ietf.org
> https://www1.ietf.org/mailman/listinfo/ietf
>
_______________________________________________
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf

Reply via email to