고급데이터베이스 Spring 2009 by leader6

VIEWS: 1 PAGES: 21

									통신공학 특강 2009 Spring                   NEC TECHNICAL JOURNAL Vol.3 No.4/2008
                                          Authors : Oleg neuwirt, Joao Da silva,
                                             Daniele Abbadessa, Florian Winkler




         Towards a New User Experience in IPTV:
      Convergence Services and Simpler E-commerce
                   on IMS-based IPTV




                            한국외국어대학교 컴퓨터 및 정보통신공학과
                            200930251 최화영(hychoe@dislab.hufs.ac.kr)




                          DISLab.
                           Contents
 Abstract
 Introduction
 Use Cases
       Shared User Experience
       Cross-Service E-Commerce
 Architecture
       ETSI-TISPAN IMS-based IPTV
       IPTV and Communication Services
       IMS and Identity Management
       Identity Management and IPTV
 Conclusion


2                                         Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
                            Abstract
 Motivation
     IPTV - important key service for telecommunication operators
     The more operators, the more dissolving differentiation


 Suggestions
     Enrichment of IPTV service - integrating telecommunication
     New business model - bringing Identity Management


 Services and Architecture
     Privacy aspects for IPTV service portfolios
     The architecture of the IMS-based prototype system



3                                         Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
                              Introduction
 Telco incumbents are embracing IPTV
     As a way to boost broadband adaption & generate new revenues.
     More operators deploy IPTV services
       The factors for differentiation are dissolving rapidly.

 Collaboration with 3rd Party Service Providers
     will also be crucial to create service differentiation

 How Identity Management(IdM) technologies can be conjugated
  with IPTV
     In order to support new collaborative business models
     Effectively address the privacy aspects raised by collaborations with 3rd
      Party Service Providers.

 IMS-based IPTV platform
     It provides a common control layer for the future NGN

4                                                  Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
            Use Cases




    1. Shared User Experience
    2. Cross-Service E-Commerce




5                       Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
               Shared User Experience(1)
 A new dimension in watching TV
     IPTV, multimedia communication services – voice & video.


 It will enable the user to share emotions
     Even if they’re in different locations, they use communication
      equipments with higher audio and video quality to communicate
      with.


 Integrated solution
     Must enable end users to use even complex functions like group
      communication with ease.
     Will stimulate the service usage and allow new tech. usage
      forms to evolve, potentially opening new business opportunities.

6                                          Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
               Shared User Experience(2)
 As telephony flat rates
     are widely adopted Telcos might not experience a big revenue
      increase from integrated communication services directly.


 Instead, the greater benefits will come from the
  “social connectivities”
     that these services create and therefore contribute to the
      customer churn reduction.


 Integrated communication services
     are complemented by allowing users to use messaging services
      – voice mail from the TV screen.


7                                           Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
            Cross Service E-Commerce(1)
 Focuses on stimulating Cross-service transactions
     through enhanced IPTV commercial advertisements while maintaining
      user privacy.
 Example based on the collaboration
     between the IPTV provider & an online DVD shop selling DVDs on the
      Internet.


                                           When an advertisement of a DVD
                                         is played out,
                                         the end user has the option to
                                         interact with the advertisement and
                                         eventually buy the advertised DVD
                                         online at the 3rd Party DVD shop.




           Fig.1 IPTV circle of trust.
8                                             Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
             Cross Service E-Commerce(2)
 Interaction with the advertisement the user is transferred to the
  Internet DVD shop anonymously.

 If the user concludes the order of the product,
     the shop requires a shipping address and billing details to complete the
      transaction, which it requests from the IdP.


 While business agreements provide the fundamentals for the
  exchange of user information,
     user can still restrict the amount of personal information returned to
      the 3rd Party.


 The 3rd Party uses the returned information and prefills it in the
  order form.
     In this way users do not have to input their data through the limited TV
      remote control, but only confirm the order.
9                                                Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
              Cross Service E-Commerce(3)
 This use case shows that
      Trying IPTV to Identity Management can drastically reduce the hurdle of
       triggering and completing e-commerce transactions,
      Since it reduces the whole process to a few clicks on the remote control.

 This encourages e-commerce transactions while respecting the
  user’s privacy and fulfilling the Service Providers’ requirements for
  user information access, authorization and charging.

 Revenue-sharing models
      Will ensure benefits for all the parties involved &
      Further strengthen the key role of the Telco IPTV provider in the overall
       value chain.

 Collaborations with 3rd Party Service Providers Are essential
      to address the growing demand for personalized services
      to enrich the Telcos’ service portfolio
10                                               Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
                 Architecture




     1.   ETSI-TISPAN IMS-based IPTV
     2.   IPTV and Communication Services
     3.   IMS and Identity Management
     4.   Identity Management and IPTV




11                            Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
     ETSI-TISPAN IMS-based IPTV(1)




        Fig.2 ETSI-TISPAN IMS-based IPTV architecture

12                                      Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
            ETSI-TISPAN IMS-based IPTV(2)
 ETSI-TISPAN IMS-based IPTV architecture
      It provides a basic framework for IPTV core technologies
      To be used between the network components and the user
       equipment(UE) – IPTV STB

 Being an IMS based System, it already supports
      User authentication & service composition.

 SIP Application Server(AS) – Voice mail AS
      Can be attached to the core system via the defined interfaces.

 This allows Telcos to customize their IMS based core infrastructure
  and differentiate themselves by offering unique services.

 The available services can be discovered by the UE through the
  Service Discovery Function(SDF).
13                                              Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
       IPTV and Communication Services(1)
 Additional application servers and functions were added
  to the system, which are explained below.

      Group communication functionality is provided by a Media
       Resource Function(MRF) that supports conferencing.

      A Call Forwarding AS monitors incoming calls targeted at users
       and has the capability of redirecting the calls to alternative
       destinations based on the user’s presence status and the
       associated redirection rule.

      The Voice Mail AS accepts redirected calls for a user and records
       the media stream, which can be downloaded later via HTTP for
       playback on the STB.



14                                          Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
        IPTV and Communication Services(2)
 The integration of IPTV & communication services
       Performed on the STB – allows for flexible user interface design.

 Approached the integration
       To permit display of graphical user
        interface objects on the screen in a
        non-disturbing way
       Chose the presence buddy list as a
         key triggering point for initiating
         multimedia communication sessions
         with other users.                              Fig.3 TV Screen UI areas.
       Ongoing communication sessions are displayed on the TV
        screen in a non-interactive way.

    Makes group communication management functions easy to use for end
     users, because of the intensive utilization of graphical objects on the TV
     screen.
15                                                 Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
          IMS and Identity Management(1)
 Identity Management(IdM) systems
      Address such problems by allowing users to authenticate once and be
       recognized at the various services they are subscribed to.
      Solution - OpenID, Cardspace, Liberty Alliance

 The main concern of IdM systems
      Keeping the user’s privacy.

 The multiple accounts owned by a user are managed by a trusted
  Identity Provider(IdP),
      that provides signed assertions to federated services.
      This assertions can contain the user’s identity and personal data from
       the user profile.

 Each service is given a unique identifier for the user, thus
  preventing service from tracing or linking the user’s activity.
16                                               Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
           IMS and Identity Management(2)
 OpenID - URL 형태로 된 하나의 ID 시스템
        OpenID 인증 프로세스가 적용된 모든 서비스에 별도의 가입 없이 로그인할 수 있는 프로세스
        초기 목적
         로그가 신원이 확인되지 않은 사용자들의 댓글로 인해 공격 받는 등의 문제를 해결
        인터넷 이용자들은 자신의 온라인 ID를 관리하기 위해 하나의 기업에 의존할 필요가 없음.
         어느 기업의 서비스이든 로그인 가능.
         ID와 패스워드를 분실 위험 없음.


 CardSpace
        서로 상이한 ID 시스템이 상호 연동하여 작동, 이용자들이 보다 친숙하게 디지털 ID를 이용
        Personal Card - 보통 웹사이트에서 입력하던 것과 동일한 정보를 제공
         해당 정보는 자신의 개인 PC에 암호화되어 저장되며 웹사이트나 서비스에 접속할 때마다 일일
         이 입력할 필요가 없음.
        Managed Card - 서비스 제공자에 의해 생성되어 발급
         대부분의 정보는 사업자의 사이트에 저장되지만 카드 이름과 발급일자, 만료 및 이용내역 등은
         사용자의 PC에 저장, 어떠한 정보도 MS로 전송되지 않음.
         사용자들은 CardSpace에서 웹사이트나 이용하고자 하는 서비스 제공자에게 정보를 제공하기
         전에 관련 정보를 검토할 수 있으며, 인증기관에서 해당 사이트의 신뢰성을 확인할 수 있는 정
         보를 얻을 수 있음.

17                                     Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
           IMS and Identity Management(3)
 We deployed a SAML 2.0 IdP and integrated it with IMS
      by utilizing the 3GPP GBA(Generic Bootstrapping Architecture).
      After a successful IMS authentication, the NAF notifies the IdP that it
       authenticated a user.

 The IdP creates a new Authentication Context and replies with a
  Session Token bound to that context,
      which is sent to the STB by NAF(Network Application Function).

 The STB stores the Session Token as a cookie,
      allowing it to assert the user’s identity to 3rd party services.

 This interaction is not specified in 3GPP standards
      but is mentioned as an “application specific protocol”
      We developed an extension to SAML 2.0 that allows a trusted 3rd party
       to register Authentication Context at the IdP.
18                                                  Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
            Identity Management and IPTV
 3rd party services – DVD shop
      Pseudonym can be used to query data from the user’s personal
       profile – address & billing options


 Interactions are executed over the STB’s Web Browser
      the IdP can interact with the user and request explicit
       authorization to provide the data being queried.


 The DVD shop obtains the required data from
      a trusted source & the user completes the transaction in a
       seamless and secure way
      without having to authenticate to 3rd parties or input his
       personal data.

19                                           Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
                            Conclusion
 IMS and an IMS-based IPTV system
      Has been utilized to build the prototype system


 How IPTV service differentiation could be achieved
      Integrating communication services, broaden the service
       portfolio
      Collaborations with 3rd Party Service Providers using Identity
       Management Technologies and IMS.


 Service differentiations will be crucial for
      The acceptance and success of IPTV deployments
      To avoid price erosion.


20                                           Database & Information Systems Lab.(http://dislab.hufs.ac.kr)
                           Abbreviations
    IdM(Identity Management)
    UE(User Equipment)
    STB(Set-Top-Box)
    AS(Application Server)
    SDF(Service Discovery Function)
    ETSI(European Telecommunication Standards Institute)
    TISPAN(Telecoms and Internet converged Services Protocols for Advanced
     Networks)
    MRF(Media Resource Function)
    IdP(Identity Provider)
    GBA(Generic Bootstrapping Architecture)
    NAF(Network Application Function)




21                                              Database & Information Systems Lab.(http://dislab.hufs.ac.kr)

								
To top