Pipeline Publishing, Volume 4, Issue 1
This Month's Issue:
Come Together:
Fixed-Mobile Convergence
download article in pdf format
last page next page

Finding Your Identity: Fixed-Mobile Convergence and ID Management

back to cover
article page | 1 | 2 | 3 |

their privacy, multimedia preferences, permissions and identity; the freedom to control their availability, location, presence and call-handling; and the freedom to control opt-ins, opt-outs, notifications and memberships, be they contacts, buddies or groups.

Privacy management is essential to promoting user confidence when adopting privacy-sensitive services such as advertising, Location-Based Services (LBS), and personalized broadband services. In a public opinion poll by Forrester Research, 43 percent of respondents felt that LBS would threaten their privacy. In some jurisdictions such as the US, there are even regulations requiring that LBS demonstrate compliance, the FCC Customer Proprietary Network Information (CPNI) rules for instance.

Clearly, FMC brings with it significant benefits, chief among them the ability to supply communication services ubiquitously while supporting nomadic and mobile capabilities.

.
The core of personalized service delivery will be the ability to collect, analyze, and use information about subscribers and their preferences. Unfortunately, the Internet experience demonstrated that personal data is a valuable asset that can be used incorrectly or fraudulently, and therefore subscribers are reluctant to give it away for reasons ranging from simple inconvenience (i.e. unsolicited ad messages or spam) to real threats such as identity theft. Thus the GUP, HLR, HSS constructs require augmentation to both
.
The role of GUP and HSS standards

Numerous industry initiatives like Microsoft Passport and Liberty Alliance were started to address the issue of user profile data management. A telecom-based initiative 3GPP Generic User Profile (GUP) aims to aggregate user profile information relevant to network operators. The HSS (Home Subscriber Server), or User Profile Server Function (UPSF), is the master user database that supports the IMS network entities actually handling the calls/sessions. Similar to the GSM Home Location Register (HLR), the HSS contains subscription-related information (including the IMPU, IMPI, IMSI, and MSISDN), performs authentication and authorization of the user, and can provide information about the physical location of user.

While HLRs enabled the mobility of services outside the home network, services are generally restricted to a fair degree within visited networks. HSS improved on this by enabling most home services to be available in visited networks. However, a shortcoming of GUP, HLR, and HSS is that they do not provide accommodation for user preferences, privacy, or context sensitive services.

securely and permissively handle subscriber identity management aspects.

Policy Management for FMC Networks

Consistent and predictable Quality of Service (QoS) levels will also form a crucial part of the end-user experience across access technologies. It will therefore be important to regulate and guarantee QoS levels on a per-service and per-subscriber basis. In particular, given the varying nature of next-generation media services, the ‘best effort’ delivery of services will almost guarantee inferior service levels irrespective of the access technology used, resulting in dissatisfied subscribers. It will therefore be important to both regulate bandwidth in a manner that allows carriers to mitigate costly capacity build-outs for low-value traffic, and to provide a means to optimize the generation and delivery of content and services in a manner that meets the contextual requirements (e.g. fixed vs. wireless) as well as the preferences of the subscriber as stored in a subscriber repository.

article page | 1 | 2 | 3 |

last page back to top of page next page
 

© 2006, All information contained herein is the sole property of Pipeline Publishing, LLC. Pipeline Publishing LLC reserves all rights and privileges regarding
the use of this information. Any unauthorized use, such as copying, modifying, or reprinting, will be prosecuted under the fullest extent under the governing law.