A Unified Approach to Combat Counterfeiting: Use of the Digital Object Architecture and ITU-T Recommendation X.1255 Robert E. Kahn President & CEO CNRI,

Slides:



Advertisements
Similar presentations
OMV Ontology Metadata Vocabulary April 10, 2008 Peter Haase.
Advertisements

doi> Digital Object Identifier: overview
Digital Object Architcture An open approach to Information Management on the Net Bibliotheca Alexandrina Dr. Robert E. Kahn Corporation for National Research.
The Next Generation Grid Kostas Tserpes, NTUA Beijing, 22 of June 2005.
Geneva, Switzerland, 17 October 2011 ITU Workshop on Service Delivery Platforms (SDP) for Telecommunication Ecosystems: from todays realities to requirements.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
Network Virtualization and Service Awareness Properties of FNs
Joint Information Systems Committee Digital Library Services BL/JISC Workshop Rachel Bruce JISC Programme Director The Digital Library and its Services,
THE CORE PROJECT Jose Jimenez (project manager). What is the Core platform?
Health Ingenuity Exchange (HingX) Best Practices for User Groups and Resource Registration.
Presented By Manjeet Singh Marketing Information Systems.
Sponsored by the U.S. Department of Defense © 2005 by Carnegie Mellon University 1 Pittsburgh, PA Dennis Smith, David Carney and Ed Morris DEAS.
UDDI, Discovery and Web Services Registries. Introduction To facilitate e-commerce, companies needed a way to locate one another and exchange information.
Overview of OASIS SOA Reference Architecture Foundation (SOA-RAF)
Ch. 7. Architecture Standardization for WoT
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
© 2005 Prentice Hall7-1 Stumpf and Teague Object-Oriented Systems Analysis and Design with UML.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
Chapter 2: IS Building Blocks Objectives
Geneva, Switzerland, November 2014 Digital Object Architecture-based Product Quality Safety Information Traceability System in Infant Formula Industry:
Geneva, Switzerland, 4 December 2014 ITU-T Study Group 17 activities in the context of digital financial services and inclusion: Security and Identity.
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
1 Data Strategy Overview Keith Wilson Session 15.
Introduction to UDDI From: OASIS, Introduction to UDDI: Important Features and Functional Concepts.
CNRI Handle System and its Applications
Resolving Unique and Persistent Identifiers for Digital Objects Why Worry About Identifiers? Individuals and organizations, including governments and businesses,
Bina Nusantara 2 C H A P T E R INFORMATION SYSTEM BUILDING BLOCKS.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
DATA FOUNDATION TERMINOLOGY WG 4 th Plenary Update THE PLUM GOALS This model together with the derived terminology can be used Across communities and stakeholders.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Piero Attanasio mEDRA: the European DOI agency The DOI as a tool for interoperability between private and public sector Athens, 14 January.
WSIS Forum 2011 May 19, 2011 Presentation by Robert E. Kahn
Digital Object Architecture
App-ID Use Cases, Syntax and Attributes SEC App-ID_Use_Cases,_Syntax_and_Attributes Group Name: Architecture Source: Darold Hemphill, iconectiv,
Reflections on the Digital Object Architecture by Robert E. Kahn, CNRI A presentation at a Symposium on Trusted Repositories in Rome, Italy on November.
The Data Grid: Towards an Architecture for the Distributed Management and Analysis of Large Scientific Dataset Caitlin Minteer & Kelly Clynes.
OOI CI LCA REVIEW August 2010 Ocean Observatories Initiative OOI Cyberinfrastructure Architecture Overview Michael Meisinger Life Cycle Architecture Review.
Managing Digital Objects on the Net by Robert E. Kahn Corporation for National Research Initiatives Reston, Virginia National Online 2001 New York City.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Lecture 5: User Accounts & Directory Service Instructor: Dr. Najla Al-Nabhan
National Statistical Offices/NSO’s/ Capabilities to Collect ICT Indicators Yasin Mossa Central Statistical Authority of Ethiopia Geneva, 9 Sept.2003.
Alternative Architecture for Information in Digital Libraries Onno W. Purbo
CSE 102 Introduction to Computer Engineering What is Computer Engineering?
Exploring ‘Workspaces’ Tom Visser, SARA compute and networking services, Amsterdam Garching Workshop 21 st September 2010.
6. Protocol Standardization for IoT 1.  TCP/IP  HTML and HTTP  The difference between the Internet and the World Wide Web The Internet is the term.
Jini Architecture Introduction System Overview An Example.
Issues in Ontology-based Information integration By Zhan Cui, Dean Jones and Paul O’Brien.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Object storage and object interoperability
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Semantic Data Extraction for B2B Integration Syntactic-to-Semantic Middleware Bruno Silva 1, Jorge Cardoso 2 1 2
Data Services Task Team WGISS-22 meeting Annapolis, the US, September 12th 2006 Shinobu Kawahito, JAXA/RESTEC.
Digital Object Architecture (DOA) Information session
Digital Object Architecture Tutorial
Dr. Ir. Yeffry Handoko Putra
ETSI Software Reconfiguration Overview
Issues need harmonization
The Components of Information Systems
An assessment framework for Intrusion Prevention System (IPS)
Corporation for National Research Initiatives
C2CAMP (A Working Title)
The Components of Information Systems
Health Ingenuity Exchange - HingX
Grid Services B.Ramamurthy 12/28/2018 B.Ramamurthy.
The Anatomy and The Physiology of the Grid
Martin Euchner, Advisor, ITU-T Study Group 17
Information System Building Blocks
Presentation transcript:

A Unified Approach to Combat Counterfeiting: Use of the Digital Object Architecture and ITU-T Recommendation X.1255 Robert E. Kahn President & CEO CNRI, USA ITU Workshop Preventing Counterfeit & Substandard ICT Devices Geneva, Switzerland November 17 – 18, 2014

Overview of the Talk Some Terminology & Basic Concepts What are Devices and other things Internet Resources -- Examples Managing the Supply Chain Obtaining relevant Information about Devices The Digital Object Architecture ITU-T Recommendation X.1255 DONA Foundation Conclusions

Some Terminology & Basic Concepts Devices and other Physical Things Entities: such as computers, networks, services and applications Digital Entities (same as Digital Objects) Unique Persistent Identifiers State Information Resolution of Identifiers Interoperability

What are Devices & Other Physical Things Things DevicesNon-Devices ICT Devices Non ICT Devices Devices are able to do something that is determined in part by embedded software and other information Non-Devices may also be useful but they may just sit there otherwise

Internet Resources -- Examples ICT Devices -- although not all may be active in the Internet at any time Networks People (represented as digital entities) Software Detectable Measurable Internet constructs – Such as network flows, virtual gatherings

Managing the Supply Chain From fabricating components for sale to manufacturers To Manufacturing the ICT device To distributing or disseminating it to Stores and other outlets To managing inventory To providing devices to end customers To refurbishing devices for sale or repurposing

Obtaining Relevant Information about Devices (and other things) Identifiers play a critical role here; many ways of conveying them To understand a device’s provenance and other related information, first obtain the device’s unique persistent identifier Resolve the ID to state information – Short description of the Device (usually generic) – Components or other ingredients (again generic) – Relevant details about software that makes the device operate – Where the particular device is in the supply chain If a generic device is available in a few places, list them Each instance of a generic device is assumed to have a unique identifier. – Perhaps other information (such as price) Enable additional device-related information to be accessible (with appropriate access controls, as appropriate) The resolution process should really make use of a standard means of resolving identifiers, but a few well known methods would be acceptable Ideally, obtaining the additional information should also make use of a standard means of accessing it as well.

Digital Object (DO) Architecture Enables infrastructure to manage information in a network environment Provides a machine independent data model for DOs; each DO must have an associated unique persistent identifier – called its handle Handles have a defined identifier structure, of the form prefix/suffix that is consistent with existing identifier systems Supports resolution of identifiers via the Handle System – a global resolution mechanism Provides a repository component to store DOs (accessible by their identifiers) and a searchable registry component to store metadata about DOs.

Digital Object Architecture (continued) Current implementations of all three components exist and are available in the Internet at no cost with public licenses Each Repository contains a Registry of its DOs and each Registry uses a Repository to store its metadata records; these are now being combined Repositories support an interface that uses only identifiers so it is interoperable with all such other Repositories in the Internet; and a Repository may itself be structured as a DO Security is provided by an integrated Public Key Infrastructure Type Registries are a subset of registry technology being developed to enable user communities to develop their own semantics for use in structuring DOs

ICT Devices as Information Systems ICT devices may interact with other Information systems Small changes in the interfaces to those other systems can dramatically affect its performance. Information provided from those other systems may be critical to the accurate performance of the device. The integrity of such a device thus depends on the integrity and performance of such other systems, as well as the information embedded in the device itself, and, indeed, many parts of the whole ecosystem that support it. And the ability of an ICT device as an information resource to validate the software and information it gets from those systems.

ITU-T Recommendation X.1255 A framework for interoperability - based on the Digital Object Architecture Adopted via the TAP process in Sept Developed in ITU-T, SG17 to address issues in discovery of Identity Management information But applicable more widely to interoperability of heterogeneous information systems

DONA Foundation Created to provide administrative oversight of the Handle System, and to further the global development of pilot projects making use of the digital object architecture, an important component of which is the Global Handle Registry (GHR) Established in January, 2014 as a non-profit organization in Geneva, Switzerland A technical body whose Board of Directors must exhibit diverse geographical and multi-stakeholder representation. Enables multiple organizations to be responsible for collaborative administrative of the GHR, once authorized as Multi-Primary Administrators (MPAs) by DONA Local records in the GHR are created and administered locally Initially, four MPAs have been designated Plan to add four more per year for the next two years and then take stock.

Conclusions Any approach for detecting counterfeit ICT devices will likely be applicable, at least in part, to other devices and things. Prevention requires attention of many parties at each step in the overall supply chain Reliable access to information about the devices, as well as information embedded in such devices is critical: ability to dynamically resolve identifiers and interpret results is key Detecting counterfeit devices requires learning about the nature and provenance of software that enables these devices to operate The Digital Object Architecture and X.1255 are enablers to progress The DONA Foundation overall administration of the Global Handle Registry enables widespread use of the technology Thus enabling a more dynamic and useable approach to detecting counterfeit devices and, hopefully, enabling those in a position to do so, to prevent them from getting into the marketplace