Rec. ITU-T Y.4462 (01/2020) Requirements and functional architecture of open IoT identity correlation service
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
7 Requirements of open IoT identity correlation service
     7.1 Requirements for establishing identity mapping
     7.2 Requirements for deleting identity mapping
     7.3 Requirements for querying identity mapping
     7.4 Security requirements
8 Functional architecture of open IoT ICS
9 Reference points of open IoT ICS
10 Basic capabilities and common procedures of open IoT ICS
     10.1 Identity mapping
     10.2 Identity de-mapping
     10.3 Identity relationship inquiry
     10.4 Service provider authentication and access control
11 Security considerations
     11.1 Discovery mechanisms in identity information exchange
     11.2 Communication security
Appendix I  Use cases
     I.1 Use case 1: Smart refrigerator
     I.2 Use case 2: Smart lock
     I.3 Use case 3: Device based service charge sharing
     I.4 Use case 4: Promoting data package sharing between different services
Bibliography