Dear all,
Attached an overview of the global classification and nomenclature landscape in healthcare from GS1, for your information without any comments from my part ;)
Hear you soon
Mit freundlichen Grüßen / Viele Grüße / Best Regards
Frank Mildner
DEUTSCHE TELEKOM AG
T-Labs (Research & Innovation)
Dipl.-Ing. Frank Mildner
Deutsche-Telekom-Allee 7, 64295 Darmstadt
+4961515834747 (Tel.)
+496151899838 (Fax)
E-Mail: frank.mildner(a)telekom.de
www.telekom.com<http://www.telekom.com/>
Erleben, was verbindet.
Die gesetzlichen Pflichtangaben finden Sie unter: www.telekom.com/pflichtangaben<http://www.telekom.com/pflichtangaben>
Grosse Veränderungen fangen klein an - Ressourcen schonen und nicht jede E-Mail drucken.
Von: dg-idot-bounces(a)kantarainitiative.org [mailto:dg-idot-bounces@kantarainitiative.org] Im Auftrag von Friese, Ingo
Gesendet: Freitag, 7. August 2015 10:33
An: dg-idot(a)kantarainitiative.org
Betreff: Re: [DG-IDoT] IDoT TeleCon
I hope you are all doing well. I'd like to remind you that our next IDoT-call is coming up today.
Today I want to give an update and discuss with you the Liaison request of IEEE P2413 (IoT Architecture WG)!
I'm looking forward to talking to you!
Best regards
Ingo
Date and Time
* Friday, August 7th, at 7am PT (time chart)<http://www.timeanddate.com/worldclock/fixedtime.html?msg=IDoT+Conf+Call&iso…>
* Voice: Skype: +99051000000481 or US +1-805-309-2350<tel:%2B1-805-309-2350> / Alternate Toll +1 (714) 551-9842<tel:%2B1%20%28714%29%20551-9842> (international dial-in lines<http://kantarainitiative.org/confluence/x/KYC_/>), room code 613-2898#
* (Turbobridge call options<https://www.turbobridge.com/join.html>)
Hey y¹all,
Hope everyone is doing well. Just wanted to bounce a question which I¹m
consistently getting asked around Identity, IoT perspective. Is there any
industry standard in place or in works which can be used as a common
standard across multiple identities. What I mean by this is that humans have
SSN as an identity while a thermostat may have serial number while a network
device may have a Mac ID as their identity. So, while individually they all
have their own identity standard, when in the IoT world, all these entities
start interacting with each other, how do we translate one identity into
another or how will one identity interact with another identity in a
standards way?
Thanks
Ranjan
Ranjan Jain
ARCHITECT.IT
Information Technology
ranjain(a)cisco.com
Phone: +1 408 853 4396
Mobile: +1 408 627 9538
Cisco Systems, Inc.
400 East Tasman Drive
San Jose
California
95134
United States
Cisco.com <http://www.cisco.com/>
Think before you print.
This email may contain confidential and privileged material for the sole use
of the intended recipient. Any review, use, distribution or disclosure by
others is strictly prohibited. If you are not the intended recipient (or
authorized to receive for the recipient), please contact the sender by reply
email and delete all copies of this message.
Dear All,
Unfortunately I have to cancel our Conf Call this week!
Hope to hear you Friday the 24th of July!
Best Ingo
Dear all,
I’d like to invite you to our biweekly IDoT call.
Date and Time
Date: Friday
Time: 07:00 PT | 10:00 ET | 16:00 CEST
*
Dial-in Details
Skype: +99051000000481
US Dial-In: +1-805-309-2350
Alternate Toll +1 (714) 551-9842
International Numbers: http://kantarainitiative.org/confluence/x/KYC_/
Conference ID: 613-2898
The following commands may be used participants during the conference call:+
*0 Plays menu of Keypad Commands
*3 Promote to Host (if non-host)
*5 Raise your hand
*6 Mute yourself (toggle on/off)
*# Private roll call of participants
\ Mute music-on-hold (toggle on/off)
TurboPhone (beta): https://www.turbobridge.com/join.html
Works with Internet Explorer on Windows only
SIP Access (using IP phone or soft phone)
sip:bridge@turbobridge.com
SIP URL details: https://www.turbobridge.com/help/Index.html?context=180
Dear IDoT DG member,
I'd like to start a new activity within our group. Here is my suggestion:
Inspired by the document "Security Guidance for Early Adopters of the Internet of Things (IoT)" of CSA (Cloud Security Alliance) I'd like to see a similar document for "Identity Management in IoT", maybe not that detailed but in the same style.
How to proceed:
We all are from different companies with experiences from different industry sectors. All you have to do is to post your piece of recommendation or topic to the list or directly to our website.
I gave an example by describing "Identifier vs. Addresses" (very often people asked me ...when we give every device in the world an IPv6 address all our problems are solved, right?....so I had to explain that just to have addresses is not enough)
See below this mail or under this link:
http://kantarainitiative.org/confluence/display/IDoT/Concepts+of+Identity+w…
So, I'd like to encourage you to send few sentences about what you have experienced. Step by step we compile a whole document, a kind of "How to", "best practice"....somethings that is helpful and is interesting to read.
Background:
We started this group by looking for white spots in terms of identity. Here we have a paper and slide set givinga first overview.
Then we had a look at discovery. But since we are a group with many different members this topic was not of interest for a significant number of members.
On the other hand I'm not sure if it needs the 102nd architecture for IoT to develop. This is in many cases a theoretical work. I'd like to see a nice paper that is not that big, explaining the basics of identity in the IoT. Developer or other interested parties should take advantage of the paper and it should be kind of fun to read it.
Hope you join me in this activity.
Possible other topics could be:
- Keep data processing local (privacy, roundtrip times)
- Real time conditions (if needed) (authorization, authentication have to be fast)
- Devices and relationships
- Identities of different protocols
- Smart authentication
- Keep track of former transactions (block chain)
- Proof of knowledge
- .......etc
My example:
##################################
Addresses are not Identifier
There is a fundamental difference between addresses and identifier of devices. Addresses determine the communication endpoint within a certain system. For example in the Internet Protocol an IP address is needed to establish a socket, a connection between devices. Identifiers can be understood as a dedicated, publicly known attribute or name for an identity, a person or a device. Typically, identifiers are valid within a specific domain.
In the classic Web we have a Domain Name Service (DNS) mapping human readable Uniform Resource Identifier (URI) to IP-addresses. A browser for example resolves a website URI www.telekom.com<http://www.telekom.com> first. The actual connection between the browser and the Web server is then established by using the returned IP-address.
There are several advantages in separating addresses and identifier. An IoT system or any kind of communication software could use addresses directly in theory but software updates become necessary if network interfaces or sensors break and need to be replaced.
A mapping between identifier and addresses allows also a layer of indirection. This enables configurations like many identifiers pointing to one address. The address is only resolved when a certain condition is fulfilled.
####################################################
Kind regards
Ingo Friese
Deutsche Telekom AG
T-Labs (Research & Innovation)
Dipl.-Ing. Ingo Friese
Winterfeldtstr. 21, 10781 Berlin
+4930835358148 (Phone)
+49391580216849 (Fax)
E-Mail: ingo.friese(a)telekom.de
www.telekom.com<http://www.telekom.com/>
Life is for sharing.
You can find the obligatory information on www.telekom.com/compulsory-statement<http://www.telekom.com/compulsory-statement>
Big changes start small - conserve resources by not printing every e-mail.