Hello thanks for the question, I'm pasting a note that I wrote in a previous I-D:
(I'm not entering here into solution discussions!) Regards, pars 4. Name collisions With the traditional phone book, the querier can filter the returned results using some other information about the target user e.g. the street address, company, etc. A similar solution may be adopted. Along with a Turing test, the target host may return some information helping the querier make the right choice. If the target user is unlikely to be the right person, the querier can give up the query and avoid solving an unnecessary Turing test. On 9/26/07, Bill McQuillan <[EMAIL PROTECTED]> wrote: > > > On Tue, 2007-09-25, Pars Mutaf wrote: > > > On 9/25/07, Suresh Krishnan <[EMAIL PROTECTED]> wrote: > > Pars Mutaf wrote: > >> Model of operation > >> > >> 1. The querier user types the target user's "human name" (as if he were > >>consulting a phonebook), or a pseudoynm. > >> 2. The pairing request is forwarded to the target phone. > > > How? How do you locate the target phone? Isn't this the problem we are > > trying to solve? > > > > For example (I'm not saying that this THE solution): > > > You can have a relay agent where the human names map > > to MIPv6 home addresses of the target phones. > > This is the big problem. "Human names" are not unique enough! > > In a normal wire-line directory the name is associated with a fixed > location, usually an address but at least a city. This can be used as a > discriminator among possible name duplications by the querier. > > Cellphones do not provide the "relay agent" with such fixed, known > information to assist in discriminating among customers with the same > name. > Since cellphones are so mobile there even might only be a country > indication. > > Or were you intending that ALL phones of people with the same name be > contacted. Wouldn't this just put the burden on all of the target users to > determine the identity of the querier based on....what? > > And how would any one of the targets determine that she was the intended > victim? > > -- > Bill McQuillan <[EMAIL PROTECTED]> > > > _______________________________________________ > Ietf mailing list > Ietf@ietf.org > https://www1.ietf.org/mailman/listinfo/ietf >
_______________________________________________ Ietf mailing list Ietf@ietf.org https://www1.ietf.org/mailman/listinfo/ietf