Browse Prior Art Database

Short Term Requirements for Network Asserted Identity (RFC3324)

IP.com Disclosure Number: IPCOM000010293D
Original Publication Date: 2002-Nov-01
Included in the Prior Art Database: 2002-Nov-19
Document File: 12 page(s) / 22K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

M. Watson: AUTHOR

Abstract

A Network Asserted Identity is an identity initially derived by a Session Initiation Protocol (SIP) network intermediary as a result of an authentication process. This document describes short term requirements for the exchange of Network Asserted Identities within networks of securely interconnected trusted nodes and to User Agents securely connected to such networks.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 13% of the total text.

Network Working Group                                          M. Watson

Request for Comments: 3324                               Nortel Networks

Category: Informational                                    November 2002

         Short Term Requirements for Network Asserted Identity

Status of this Memo

   This memo provides information for the Internet community.  It does

   not specify an Internet standard of any kind.  Distribution of this

   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2002).  All Rights Reserved.

Abstract

   A Network Asserted Identity is an identity initially derived by a

   Session Initiation Protocol (SIP) network intermediary as a result of

   an authentication process.  This document describes short term

   requirements for the exchange of Network Asserted Identities within

   networks of securely interconnected trusted nodes and to User Agents

   securely connected to such networks.

   There is no requirement for identities asserted by a UA in a SIP

   message to be anything other than the user's desired alias.

Watson                       Informational                      [Page 1]

RFC 3324       Requirements for Network Asserted Identity  November 2002

Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  2

   2.  Definitions  . . . . . . . . . . . . . . . . . . . . . . . . .  3

   2.1 Identity . . . . . . . . . . . . . . . . . . . . . . . . . . .  3

   2.2 Network Asserted Identity  . . . . . . . . . . . . . . . . . .  3

   2.3 Trust Domains  . . . . . . . . . . . . . . . . . . . . . . . .  4

   2.4 Spec(T)  . . . . . . . . . . . . . . . . . . . . . . . . . . .  7

   3.  Generation of Networks Asserted Identity . . . . . . . . . . .  7

   4.  Transport of Network Asserted Identity . . . . . . . . . . . .  7

   4.1 Sending of Networks Asserted Identity within a Trust Domain  .  7

   4.2 Receiving of Network Asserted Identity within a Trust Domain .  7

   4.3 Sending of Network Asserted Identity to entities outside a

       Trust Domain . . . . . . . . . . . . . . . . . . . . . . . . .  7

   4.4 Receiving of Network Asserted Identity by a node outside the

       Trust Domain . . . . . . . . . . . . . . . . . . . . . . . . .  8

   5.  Parties with Network Asserted Identities . . . . . . . . . . .  8

   6.  Types of Network Asserted Identity . . . . . . . . . . . . . .  8

   7.  Privacy of Network Asserted Identity . . . . . . . . . . . . .  9

   8.  Security Considerations  . . . . . . . . . . . . . . . . . . .  9

   9.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 10

   10. Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . 10

       Normative References . . . . . . . . . . . . . . . . . . . . . 10

       Author's Address...