Contact us

MeshID

MeshID Individual Identification on MeshUps

 

MeshID Individual Identification on MeshUps - by CONSEN SCE
Abstract:

MeshID (SemanticMesh) for working, learning, trading & living on effective trusted MeshUp is a basic-simple trusted upperware to enhance the identity, authority, privacy and casting management of individual net users (personsgroups).

MeshID is a multidisciplinary (bottom-up) approach of ICT for Effective AmI and Trusted Networks of merged  contents in dynamic service architectures and computing infrastructures. MeshID is based on ULICA Unique Local Identification and Public And Private Information (PAPI) standard as OpenID, MicroFormat applied to Mashups (merging on web) but extended to MeshUp technologies merged contents, applications, bio-implants, devices,
licenses, countries regulations, protocols, standards, nets (Broadband, Broadcast, Satellite, Wireless, Mobile for creating and supplying new Information Services to the Society.

1.-Background
The actual problems and lacks of Internet identification, authorization, characterization, distributed personal
and public data, coordination and syncronization of mobile applications, public rights of citizens to information, trust and security, micro-implants, private rights to contents, and other negative factors to allow a effective and afective computing ambient intelligent.
1.1 Protecting Privacy
Privacy can be described as the power to control what others can come to know about you and to determine the entry rules for your own private space.
As technological possibilities to collect, store, analyze and distribute information about virtually every aspect of an individual’s life have become almost unlimited, this power risks being greatly diminished. Especially in today’s public communication networks, that include not only fixed telephone networks but also mobile networks and the Internet, personal information can be transferred with great ease and even largely invisibly. An intrusion in your home will in most cases entail a risk and an effort for the perpetrator and leave traces such as a broken window or lock. Gaining access to your PC or mobile communicator once it’s connected to the Internet, is fairly easy and at little risk for anyone with a motive and can remain largely undetected unless you are a computer expert..
1.2 Promoting eInclusion
To promote eInclusion as a core horizontal building block in the establishment of the Information Society to ensure equal access and participation for all in Europe. To develop intelligent systems that empower persons
with disabilities and ageing citizens to play a full role in society and to increase their autonomy. Research on advanced interfaces, low cost sensors and possibly robotics to be integrated in assistive devices, and information modelling and web semantics to improve web usability for digitally disadvantaged persons.
Development and demonstration of intelligent housing for persons with special needs to be addressed in an integrated approach. Networking of research teams, in the domain of assistive technologies to strengthen the
research effort on the quality of life of users with physical, sensory or cognitive impairments as well as in the
domain of design-for-all for mainstream products and services exploring, for example, cognitive demands and
new multimodal platforms..
1.3 Fighting the Spam
MeshID is becoming increasingly unsuitable for serious business use is the problem of "SPAM": Everyone who
seeks to harness the potential of the internet for the exchange of information, discussion of experiences, and
establishing business cooperation needs to disclose their internet contact information, i.e. their email address, and this will result in receiving a lot of unsolicited bulk email (SPAM). This problem comes from wrong economic incentives: Untrustworthy businesses which don't care about ruining their reputation (because they don't have much of a reputation in the first place) find it very inexpensive to send SPAM emails to many recipient, causing great economic costs for the recipient. (The costs are great regardless of what strategy is used for dealing with this annoying problem.
1.4 Thrusting on the net
As more and more of our daily activities involve some form of usage of electronic communication networks,
the level of security of these networks against various types of intrusion or disruption has become a major concern. At stake are not only significant economic and financial interests but also public confidence in using
communications networks for important transactions or for the exchange of sensitive information. If an acceptable level of security cannot be guaranteed, the information society will be unlikely to develop its full potential..

2. Objectives
The objectives of the MeshID is to respons the request of the net users needs:
● Unique profile to update in order to define and control the access to our Private and Public Information, our interface preferences and our foreground special needs (i.e. email)
● Syndicate All profiles and Label our contributions with our local rich media content and unique author signature
(independent on the MeshUp)
● Unique Sign-on to locate, identify, authenticate, authorize and characterize the user
● Unique switch-off/on to dis/connect on holidays/travelling/working, to define our security and family channels and risk messaging preferences, everywhere from an unique personal device (mobile)

MeshID applications can be for:
1.- Locating users, citizens, communities, SIG’s, companies and organizations on Internet and Open
networks (mobile alert messaging).
2.- Identification of the user: who is who on a trusted communication and information mesh environment.
3.- Characterization of individuals: Accessibility preferences, special handicapped devices, software,
interfaces and foregrounds (information for all).
4.- Authorization of the access: Roles, Right and Privileges access and use on the info-areas and personal
and private information and data

The MeshID methodology pursuit:
1.- Users trusting that their personal profiles are protected and oneself easily manageable
2.- Users confident in email SPAM protection
3.- Happy users knowing that they have control over their data with access control and
preferences
4.- Constituencies with confidence in their information system
5.- Users, communities and constituencies with up-to-date profiles and the authority of contents
6.- Quality and efficiency of the information and communication networks When individuals and users wish to have the behaviour of devices or services personalized to their own requirements a user MeshID simple profile will be required, providing automatically the affective and effective interface and foreground, in the way to
allow the constant dream of: Information (trust and security) for All users (independent of the age and health) everywhere (meshing broadband, satellite and wireless nets) from any devices (micro-implants, intelligent textiles, devices, computers and domestic appliances) for any application for working, learning, trading and living.
ULICA is a unique, simple, accessible, updateable user’s data profile stored locally and used globally, for defining the foreground, characteristics and preferences of user accessibility and rights of the user personal and private information.

3. Practical Case

Personal security and information services (defined on unique local profile) of mobile SMS-GRPS travelling or on hollidays, alert messages in determinated risks situation, industrial accidents and free access to family but not to work communications. We seek a coordinator and Competences to define scientific and technological SoA; ETPs, ongoing Projects, Industries to create a EU mainstream and Critical Mass and partners to cooperate in a sustainable, social responsible exploitation of results.

Ferran Cabrer i Vilagut
Barcelona, 2007-01-15

 

CONSEN Euro-Group

Jaume Fabra 12, 08004 Barcelona