hash
stringlengths
32
32
doc_id
stringlengths
7
13
section
stringlengths
3
121
content
stringlengths
0
2.2M
6a31982b4d19ea6dabe879936752334a
102 073-1
1 Scope
The present document studies the use of Autonomous Frequency Assignment (AFA) (also called automatic frequency assignment) for hub sectors as an equipment means to reduce or avoid the need for a-priori guard bands as recommended by the standards and regulatory groups. The present document gives guidlines for radio freq...
6a31982b4d19ea6dabe879936752334a
102 073-1
2 References
For the purposes of this Technical Report (TR) the following references apply: [1] ETSI TR 101 904: "Transmission and Multiplexing (TM); Time Division Duplex (TDD) in Point-to-Multipoint (P-MP) Fixed Wireless Access (FWA) systems; Characteristics and network applications". [2] ETSI TR 101 853: "Fixed Radio Systems; Poi...
6a31982b4d19ea6dabe879936752334a
102 073-1
3 Symbols and abbreviations
6a31982b4d19ea6dabe879936752334a
102 073-1
3.1 Symbols
For the purposes of the present document, the following symbols apply: dB decibel dBm decibel relative to 1mW GHz GigaHertz kbit/s kilobit per second ETSI ETSI TR 102 073-1 V1.1.1 (2002-08) 6 Mbit/s Megabit per second MHz MegaHertz
6a31982b4d19ea6dabe879936752334a
102 073-1
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply: AFA Autonomous Frequency Assignment ATPC Automatic Transmit Power Control CEPT Conférence Européenne des Postes et Télécommunications CS Central Station C/I Carrier to Interference ratio LIA Least Interference Algorithm LoS Line of Sight P-MP ...
6a31982b4d19ea6dabe879936752334a
102 073-1
4 General context and background
FWA systems can operate with TDD or FDD channel arrangements. Channel plans, such as CEPT T/R 13-02 [9] can easily be deployed, in either case. In addition to the terminal-to-hub interference associated with FDD, TDD systems have terminal-to-terminal and hub- to-hub interference couplings. The narrow beam widths of the...
6a31982b4d19ea6dabe879936752334a
102 073-1
5 Autonomous Frequency Assignment (AFA)
TDD's inherent ability to send and receive on the same frequency can be leveraged to provide an alternative to co-ordination and pre-assigned guard bands through autonomous frequency planning (AFA) schemes. Such techniques have been used successfully in DECT, PHS, and PACS systems. In these systems, base stations const...
6a31982b4d19ea6dabe879936752334a
102 073-1
5.1 Algorithm
One AFA algorithm under consideration is quasi-static autonomous frequency assignment (see clause 9.1 and [6]). QSAFA is a measurement-based (rather than prediction-based) approach to the frequency assignment problem and is used in PACS. Using hub-to-hub interference as a simple example, when a new hub sector is introd...
6a31982b4d19ea6dabe879936752334a
102 073-1
5.2 Usability and features
Autonomous Frequency Allocation (AFA) may provide an alternative to frequency coordination and pre-assigned guard bands in troublesome interference environments, and has potential advantages over the sole use of an a priori worst-case predictive plan. AFA responds to the actual interference within a real system at some...
6a31982b4d19ea6dabe879936752334a
102 073-1
6 TDD system
6a31982b4d19ea6dabe879936752334a
102 073-1
6.1 Initial frequency re-use plan
An initial frequency re-use plan that addresses all significant TDD intrasystem interference mechanisms CS-to-CS, TS-to-CS, and CS-to-TS are shown in figure C.1. It is based on eight TDD carriers and a fundamental N=16 cluster size (cluster pattern repeats). This plan, combined with the other simulation elements descri...
6a31982b4d19ea6dabe879936752334a
102 073-1
6.2 Addition of TSs
In each TDD sector, 32 randomly placed TSs have been added to the simulation, as shown in figure C.2. This type of placement is more realistic than assuming every sector has multiple TSs with worst-case alignments toward other CSs. After the initial placement of the 3 200 TSs, a winnowing process is performed. Only tho...
6a31982b4d19ea6dabe879936752334a
102 073-1
6.3 Building blockage
The (optional) ability to model building blockage between TDD CSs and TSs has been added to the simulation. This feature accounts for the fact that most TS antennas will be at a lower height than the CS antennas, and therefore building blockage is expected to occur on some paths between a TDD CS and a disassociated TDD...
6a31982b4d19ea6dabe879936752334a
102 073-1
7 Introduction of multiple FDD cells
The (optional) ability to overlay multiple FDD cells among the TDD cells has been added to the simulation. The FDD operator's basic system parameters, such as channel bandwidth, transmit (TX) power, receive system (RX) noise floor, antenna patterns, etc., are assumed to be the same as that of the TDD system (see annex ...
6a31982b4d19ea6dabe879936752334a
102 073-1
8 Simulated interference mechanisms
To summarize, the following interference mechanisms are simulated and addressed (directly or indirectly) by the QSAFA algorithm when all radios in a TDD sector "go silent" to measure the interference environment: • TDD Intrasystem: - CS-to-CS; - TS-to-CS; - CS-to-TS. • TDD/FDD Intersystem: - FDD-CS-to-TDD-CS; - TDD-CS-...
6a31982b4d19ea6dabe879936752334a
102 073-1
9.1 High level description
The QSAFA algorithm converges to a local minimum of interference by having each TDD sector, in turn, go silent (turn off) and measure interference vs. frequency across the spectrum of available TDD channels (plus some adjacent spectrum to directly measure interference from other operators - e.g. FDD in this instance). ...
6a31982b4d19ea6dabe879936752334a
102 073-1
9.2 Simulation implementation details
This clause describes implementation details of the simulation of the QSAFA algorithm and its application to the total interference environment produced by TDD CSs, TDD TSs, and FDD CSs.
6a31982b4d19ea6dabe879936752334a
102 073-1
9.2.1 Sequencing through TDD sectors
The simulation sequence followed in turning sectors off to measure interference is simply the order of the sector numbers shown in figure C.1. This area can be explored in the future to see if any other order has any advantage. Some other sequences have been briefly explored, but no significant advantage has been disco...
6a31982b4d19ea6dabe879936752334a
102 073-1
9.2.2 Representing interference in the simulation
All examples in the remainder of this clause use a hypothetical TDD Sector A that has gone silent in order to measure interference vs. frequency, so that QSAFA can choose the minimum-interference channel for sector A to use before it turns back on. The examples given for sector A apply, of course, to all of the succeed...
6a31982b4d19ea6dabe879936752334a
102 073-1
9.2.3 Real-World application to a TDD system
All of the measurement and post-processing steps described above could be performed in a real TDD system in the following manner. The QSAFA functionality could be apportioned into two pieces: a) Localized tasks performed at each sector CS: All of the computational steps for: i) Consolidation of the measurements into a ...
6a31982b4d19ea6dabe879936752334a
102 073-1
10.1 General comments
Simulations were run with and without QSAFA application ("before" and "after"), and with and without a single guard band, for four different diagonal 100-meter offsets between the FDD and TDD cell grids. In other words, the entire FDD grid is shifted relative to the TDD grid. All simulations start with the "Before QSAF...
6a31982b4d19ea6dabe879936752334a
102 073-1
10.2 No guard band, 100-meter offset
This clause provides a discussion of the simulation results for the case of no guard band - see figure C.6(a) for spectral relationships. All simulations start with the "Before QSAFA" frequency plan shown in figure C.7. The first scenario is the "NE" 100-meter offset. The "Before QSAFA" and "After QSAFA" frequency plan...
6a31982b4d19ea6dabe879936752334a
102 073-1
10.3 One guard band, 100-meter offset
A guard band equal to one channel bandwidth was then inserted between the operators' spectral blocks, (see figure C.6(b) for spectral relationships - and the above simulations were repeated. For brevity, only the "after QSAFA" results will be shown here. The "after QSAFA" results for the "NE", "SE", and "SW" simulation...
6a31982b4d19ea6dabe879936752334a
102 073-1
12 Conclusions
The C/I distributions in all scenarios have been improved by application of the QSAFA algorithm to the simulated interference environment, which is designed to inflict extremely stressful TDD-FDD CS-CS interference couplings in a 5 × 5 cell grid. The effectiveness of the algorithm in these simulations is borne out by t...
24110a282a1703adc398db4073d9aa55
102 071
1 Scope
The present document specifies the requirements which are necessary to be fulfilled by a telecommunications system in order to support a payment system in a mobile commerce environment.
24110a282a1703adc398db4073d9aa55
102 071
2 References
For the purposes of this Technical Report (TR), the following references apply: [1] ECBS ORG.9003: "ECBS Terminology". [2] ISO 7498-2: "Information processing systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture".
24110a282a1703adc398db4073d9aa55
102 071
3 Definitions and abbreviations
24110a282a1703adc398db4073d9aa55
102 071
3.1 Definitions
For the purposes of the present document, the following terms and definitions apply: customer trusted environment: architecture consisting of a network and a set of hardware and software used by a customer to perform a transaction JAVA: object oriented programming language developed by Sun Microsystems designed to be p...
24110a282a1703adc398db4073d9aa55
102 071
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply: CLI Calling Ring Identity EMV Eurocard Mastercard Visa GSM General System for Mobile communication OS Operating System OTA Over The Air PDA Personal Digital Assistant PED PIN Entry Device PIN Personal Identification Number SET Secure Electroni...
24110a282a1703adc398db4073d9aa55
102 071
4.1 Generic model
The model in figure 4.1.1 illustrates the interactions between a customer, their mobile device, and a payment application. The merchant may be a physical merchant, trading on the high street, or a virtual merchant, trading via the Internet. The issue for the payment provider is how to assure their customers that they a...
24110a282a1703adc398db4073d9aa55
102 071
4.1.1 Dialogue before payment
The first step in a mobile payment transaction is when the customer communicates using the mobile device. The customer connects with the expected party (e.g. a service or content provider, a merchant, a public or private institution, etc.). Here security services (e.g. privacy, integrity or authentication services) may...
24110a282a1703adc398db4073d9aa55
102 071
4.1.2 Payment dialogue
In the second step, the customer selects the goods/contents/service to be purchased. The customer and the expected party (e.g. a service or content provider, a merchant, a public or private institution, etc.) may agree on a contract related to the goods/contents/service to be purchased (mutual confirmation of goods to ...
24110a282a1703adc398db4073d9aa55
102 071
4.1.3 Processing after payment
In the final stage, the payment provider processes the payment within the financial institutions (i.e. merchant acquirer) as it is done today. ETSI ETSI TR 102 071 V1.2.1 (2002-10) 8
24110a282a1703adc398db4073d9aa55
102 071
4.2 Requirements of a payment system
24110a282a1703adc398db4073d9aa55
102 071
4.2.1 Confidentiality
24110a282a1703adc398db4073d9aa55
102 071
4.2.1.1 Definition
Confidentiality The property that information is not made available or disclosed to unauthorized individuals, entities or processes. See ECBS ORG.9003 [1], ISO 7498-2 [2].
24110a282a1703adc398db4073d9aa55
102 071
4.2.1.2 Requirements
The following information shall be confidential: • Payment card identification. • PINs. • Identity of user (and his contact information). NOTE: This list is not exhaustive, and may include the content, the shopping experience, delivery information. In certain cases the confidentially content may be required, for exampl...
24110a282a1703adc398db4073d9aa55
102 071
4.2.2 Authentication
24110a282a1703adc398db4073d9aa55
102 071
4.2.2.1 Definition
The term is used in different contexts: authentication: process used between a sender and a receiver to provide data origin verification, see [1]. data origin authentication: corroboration that the source of data received is as claimed, see [1]. NOTE 1: The source of data may be the user or a device. NOTE 2: The cardho...
24110a282a1703adc398db4073d9aa55
102 071
4.2.2.2 Requirements
In each transaction, it shall be possible to authenticate the user and the transmitted data. The degree of accuracy shall be as good as non-mobile transactions. The system shall provide proof of authentication for each transaction to the payment provider. NOTE: Authentication at the beginning of a session (e.g. at powe...
24110a282a1703adc398db4073d9aa55
102 071
4.2.3 Integrity
24110a282a1703adc398db4073d9aa55
102 071
4.2.3.1 Definition
The property of ensuring that information is not altered in any way, either by accident or with fraudulent intent, see [1]. NOTE: Any alteration shall be detectable on the receiver side.
24110a282a1703adc398db4073d9aa55
102 071
4.2.3.2 Requirements
The transmission system shall provide a mechanism for data integrity, and shall be able to demonstrate the integrity of each transaction and of stored data. Integrity requirements apply both to the information provided to the payment provider and to the information provided to the user. EXAMPLE: The amount of a transac...
24110a282a1703adc398db4073d9aa55
102 071
4.2.4 Non repudiation
24110a282a1703adc398db4073d9aa55
102 071
4.2.4.1 Definition
non-repudiation: a process that involves delivering data in such a way that the receiver can not deny receipt and the sender can not deny sending it, see [1]. non-repudiation of origin: the property that the originator of a message is not able to subsequently deny, with an accepted level of credibility (defined either ...
24110a282a1703adc398db4073d9aa55
102 071
4.2.4.2 Requirements
A transaction which has been properly authenticated, it shall be considered to be non-repudiable. The payment provider shall receive a report sufficient to demonstrate the non-repudiability of each transaction. EXAMPLE: A signature given by the payment device, indicating that the card was present and the PIN was entere...
24110a282a1703adc398db4073d9aa55
102 071
4.2.5 PIN entry
24110a282a1703adc398db4073d9aa55
102 071
4.2.5.1 Definition
Personal Identification Number (PIN): A code or password the customer possesses for verification of identity, see [1]. PIN Entry Device (PED): Any device into which the cardholder inputs the PIN. A PED may also be called a PIN pad, see [1].
24110a282a1703adc398db4073d9aa55
102 071
4.2.5.2 Requirements
It shall be possible for the user to modify his PIN. ETSI ETSI TR 102 071 V1.2.1 (2002-10) 10
24110a282a1703adc398db4073d9aa55
102 071
4.2.6 Secure mode indication
24110a282a1703adc398db4073d9aa55
102 071
4.2.6.1 Definition
An indication to the user that he is operating in a protected environment when entering sensitive data (e.g. PIN).
24110a282a1703adc398db4073d9aa55
102 071
4.2.6.2 Requirement
Payment applications shall provide an indication of security at the user interface. NOTE: Security requirement is that the mobile has to provide some form of secured access between payment application and display and keyboard, in order to prevent some possibility of frauds like capture of the PIN through the network or...
24110a282a1703adc398db4073d9aa55
102 071
5 Scenarios for a mobile payment system
24110a282a1703adc398db4073d9aa55
102 071
5.1 Dual SIM/dual slot
In this scenario, the mobile device is provided with two physical SIM cards: one identifying the customer to the telecommunications operator; the second as a payment card to the payment provider.
24110a282a1703adc398db4073d9aa55
102 071
5.1.1 Confidentiality in a dual SIM system
May be provided through the SIM/WIM chip (WTLS on the OTA link) and relevant SSL protocol between WAP Gateway and payment provider server or through a process at application level involving the payment card/chip.
24110a282a1703adc398db4073d9aa55
102 071
5.1.2 Authentication in a dual SIM system
Payment data signature is provided through the payment enabler card/chip, etc.
24110a282a1703adc398db4073d9aa55
102 071
5.2 Single SIM
In this scenario, the mobile device is provided with a single SIM card, which acts as a SIM for the telecommunications operator and as a payment card for the bank. SIM operating system will be in the near future a multi-application OS, e.g. JAVA 2.1 based. It has to be trusted by payment providers in concerns like secu...
24110a282a1703adc398db4073d9aa55
102 071
5.2.1 Confidentiality in a singleSIM system
May be provided through the SIM/WIM chip (WTLS on the OTA link) and relevant SSL protocol between WAP Gateway and payment provider server) or through a process at application layer involving the payment application in the SIM.
24110a282a1703adc398db4073d9aa55
102 071
5.2.2 Authentication in a single SIM system
Payment data signature is provided through the payment enabler application inside the SIM. ETSI ETSI TR 102 071 V1.2.1 (2002-10) 11
24110a282a1703adc398db4073d9aa55
102 071
5.3 Small payment/electronic wallet (proxy payment)
Two scenarios may be mentioned: • In first scenario, the mobile device is loaded with pre-authorized funds. At the time a transaction is made no link is made to a network. • In second scenario, a customer account, located somewhere in the network, is loaded with pre-authorized funds. At the time of the transaction, a l...
80fb3fbdb77d06e1c1672478d7beb4d6
102 070-2
1 Scope
The present document provides guidance in resolving the technical difficulties with the application of harmonized standards which are used to demonstrate compliance with the essential requirements for effective use of the radio frequency spectrum for combined equipment, which include a radio and/or a telecommunication ...
80fb3fbdb77d06e1c1672478d7beb4d6
102 070-2
2 References
For the purposes of this Technical Report (TR) the following references apply: [1] Directive 1999/5/EC of the European Parliament and of the Council of 9 March 1999 on radio equipment and telecommunications terminal equipment and the mutual recognition of their conformity. [2] Directive 73/23/EEC of 19 February 1973 on...
80fb3fbdb77d06e1c1672478d7beb4d6
102 070-2
3 Definitions and abbreviations
80fb3fbdb77d06e1c1672478d7beb4d6
102 070-2
3.1 Definitions
For the purposes of the present document, the following terms and definitions apply: combined equipment: any equipment made of two or more individual products or functions NOTE: At least one of the individual products or functions falls within the scope of the R&TTE Directive 1999/5/EC [1]. The result of this combinati...
80fb3fbdb77d06e1c1672478d7beb4d6
102 070-2
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply: EMC ElectroMagnetic Compatibility GPRS General Packet Radio Service GSM Global System for Mobile communications LAN Local Area Network PABX Private Automatic Branch eXchange PAN Personal Area Network PC Personal Computer PDA Personal Digital A...
80fb3fbdb77d06e1c1672478d7beb4d6
102 070-2
4 Products considered in the present document
4.1 Relationship between individual components of a combined equipment In all of the various scenarios at least one of the products or functions falls within the scope of article 3.2 of the R&TTE Directive 1999/5/EC [1], i.e. at least one of the products or functions is a radio. The integration of a radio into a non-ra...
80fb3fbdb77d06e1c1672478d7beb4d6
102 070-2
4.1.1 Scenario 1
Product A Product B Product A Product C Product B Product A Product B Product A is placed on the market in accordance with the relevant EU directive(s). Product B is placed on the market in accordance with the relevant EU directive(s). Product C is a new product constructed by combining Product A and B into a single en...
80fb3fbdb77d06e1c1672478d7beb4d6
102 070-2
4.1.2 Scenario 2
Product A Product B Figure 3 Product A is a product in its own right and is placed upon the EU market in accordance with the relevant directives. Product B is dependent upon product A and relies upon product A for control and possibly power. Product B is physically installed within product A according to the manufactur...
80fb3fbdb77d06e1c1672478d7beb4d6
102 070-2
4.1.3 Scenario 3
Product A Product B Figure 4 Product A is a product in its own right and is placed upon the EU market in accordance with the relevant directives. Product B is dependent upon product A and relies upon product A for control and possibly its power supply. Product B is physically connected by either cable or fibre to produ...
80fb3fbdb77d06e1c1672478d7beb4d6
102 070-2
4.1.4 Scenario 4
Product A Product B1 Product B2 Figure 5 This scenario is a combination of the previous two scenarios. Product B1 is physically installed within product A according to the manufacturer's instruction, e.g. plug and socket, hard wiring, whilst product B2 is physically connected by either cable or fibre to product A and m...
80fb3fbdb77d06e1c1672478d7beb4d6
102 070-2
4.1.5 Scenario 5
Product A Function B Figure 6 Product A was a product in its own right and was placed upon the EU market in accordance with the relevant directives. In this scenario an additional function, function B, is incorporated into product A during a design evolution and cannot be identified as a separate part of product A. How...
80fb3fbdb77d06e1c1672478d7beb4d6
102 070-2
4.1.6 Scenario 6
Product A Function B Figure 7 Function B is part of product A which was added during design. Product A cannot be operated without using function B.
80fb3fbdb77d06e1c1672478d7beb4d6
102 070-2
4.1.7 Scenario 7
Product A Product B Figure 8 Products A and B are products in their own right. However product A relies upon product B for its operation. Product B may work with other products. The link between product A and B may be either a physical link (e.g. cable) or non-physical (e.g. radio). 5 Application of harmonized standard...
80fb3fbdb77d06e1c1672478d7beb4d6
102 070-2
5.1 Functional dependencies
The following table takes the above scenarios, from clause 4.1, and places them into product combinations which are dependant upon whether the individual products/functions can operate independently of each other. The final column in the table indicates where guidance upon application of harmonized standards can be fou...
80fb3fbdb77d06e1c1672478d7beb4d6
102 070-2
6.7 Multi-radio equipment
The applicable requirements and limits for multi-radio equipment are those set out in the relevant harmonized radio product standards. It should be noted that in the majority of cases the levels for spurious emissions set out in harmonized standards for radio equipment are identical. When measuring spurious emissions i...
80fb3fbdb77d06e1c1672478d7beb4d6
102 070-2
6.7.1 The spurious emissions from each radio can be identified
Where the spurious emissions from each radio can be identified, then the spurious emissions from each radio are assessed to the relevant harmonized radio standard. It should be noted that assessment does not necessarily lead to testing.
80fb3fbdb77d06e1c1672478d7beb4d6
102 070-2
6.7.2 The spurious emissions from each radio cannot be identified
Where the spurious emissions from each radio cannot be identified, then the combined equipment is assessed to the spurious emission requirements contained in all of the relevant harmonized radio standards applicable to the radios contained within the combined product. Where the applicable harmonized radio standards con...
80fb3fbdb77d06e1c1672478d7beb4d6
102 070-2
7 Harmonized radio product standards
The relevant harmonized radio product standard for the specific radio service/product should be selected from the list of radio standards published in the EC official journal, under article 3.2 of the R&TTE Directive 1999/5/EC [1]. The radio product standard may be selected for a specific radio service and/or type of p...
7286580a67810ca5375b48d11790fdc8
102 125
1 Scope
The present document identifies common, basic tasks and goals of users of mobile telecommunication terminal devices and services. The set of basic, common functions, through which these goals are achieved, are described and analysed in the perspective of possible harmonization of User Interface (UI) elements on the mos...
7286580a67810ca5375b48d11790fdc8
102 125
2 References
For the purposes of this Technical Report (TR), the following references apply: [1] ETSI ETS 300 907: "Digital cellular telecommunications system (Phase 2+) (GSM); Man-Machine Interface (MMI) of the Mobile Station (MS) (GSM 02.30 version 5.7.1 Release 1996)". [2] eEurope 2005: "Informal meeting of Ministers for Telecom...
7286580a67810ca5375b48d11790fdc8
102 125
3 Definitions and abbreviations
7286580a67810ca5375b48d11790fdc8
102 125
3.1 Definitions
For the purposes of the present document, the following terms and definitions apply: design for all: design of products to be usable by all people, to the greatest extent possible, without the need for specialized adoption end user: See user. function: abstract concept of a particular piece of functionality in a device...
7286580a67810ca5375b48d11790fdc8
102 125
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply: CCBS Call Completion Busy Subscriber GPRS General Packet Radio Service GSM Global System for Mobile telecommunication ICT Information and Telecommunication Technologies ISDN Integrated Services Digital Network LIF Location Interoperability For...
7286580a67810ca5375b48d11790fdc8
102 125
4 Common user needs
In the early 1990s, public telephones still offered the only alternative access to telecommunications outside homes and work places. Today, individual, personal, mobile end user devices accessing a variety of voice and data services are widespread in Europe, while the number of public telephones is decreasing. Thereby,...
7286580a67810ca5375b48d11790fdc8
102 125
5 Reasons for harmonization of basic UI elements
During recent years, the number of telephone users and that of mobile telephone users have risen dramatically. In Europe, a large part of the population has the basic knowledge of how to use a communication device and service. On the other hand, the complexity of communication devices and the number of features impleme...
7286580a67810ca5375b48d11790fdc8
102 125
7 User interface elements with harmonization potential
We have identified a non-exhaustive list of areas and issues, where the harmonization of basic UI elements for mobile terminal devices and services may be beneficial to users, without a negative impact on either manufacturers or service providers. These are grouped into three main categories: 1) Basic elements and func...
7286580a67810ca5375b48d11790fdc8
102 125
7.1 Basic elements and functions
The areas below should be regarded as the most basic elements to access mobile ICT devices and services.
7286580a67810ca5375b48d11790fdc8
102 125
7.1.1 International access code
As the access code for the international call format has not been fully harmonized, it may be advantageous for the user to harmonize the input of this access code in communication devices in order to fully overcome this technical gap. One solution is a uniform input method for the "+"-sign which is used as internationa...
7286580a67810ca5375b48d11790fdc8
102 125
7.1.2 Emergency functionality and services
SOS functionality has been the subject for standardization, e.g. in GSM, where access to emergency calling without a valid user subscription is required by regulations. Also, the number to be dialled for emergency services, 112, has been partly harmonized in the GSM world (mostly in Europe and Australia). The user proc...
7286580a67810ca5375b48d11790fdc8
102 125
7.1.3 Symbols, icons and pictograms
For the user without disabilities, icons used in communication devices are mostly for illustration or provision of status related feedback. Exceptions to this rule are found for graphically displayed menus and functions in a number of devices. While it is impossible to foresee the functionality to be represented by sym...
7286580a67810ca5375b48d11790fdc8
102 125
7.1.4 Earcons
Earcons show properties very similar to icons and symbols. Due to the fact that their use is currently quite restricted it seems to be much easier to reach consensus on earcon harmonization. To user with limited or no eyesight, earcons are crucial for using telecommunication devices. For these users, harmonization of e...
7286580a67810ca5375b48d11790fdc8
102 125
7.1.5 Access to basic voice services
For a number of basic voice services, like "Call set-up to the voice mailbox" de facto-standards have evolved during recent years, e.g. most mobile phones accept a long press on "1" as a shortcut to access the mailbox. The effort to harmonize these functions should be minimal and a uniform interface would certainly be ...
7286580a67810ca5375b48d11790fdc8
102 125
7.1.6 Basic terminology
Different companies producing communication devices use different words for describing telephone functions and services to their users, both in the user interface of the device itself and in the user guide describing the functionality. While in some languages there seems to be a commonly accepted set of names for funct...
7286580a67810ca5375b48d11790fdc8
102 125
7.1.7 Text entry and retrieval
Efficient and intuitive text entry and retrieval are one of the basic, key requirements - and stumbling blocks - in the contemporary mobile devices. It would be beneficial to the end users and operators to see efficient, intuitive, and also common solutions to text entry. However, the technologies are continuously evol...
7286580a67810ca5375b48d11790fdc8
102 125
7.1.8 Assistive device interfaces
User interface harmonization for the young, elderly and disabled users are beneficial. The end users will get devices that support them better in their tasks, achieving their goals while the manufacturers can more readily satisfy regulatory obligations to provide access to all users. ETSI STF 181 has dealt with these i...
7286580a67810ca5375b48d11790fdc8
102 125
7.2 Configuration for service and application access
The areas below should be regarded as basic elements to access mobile ICT applications and services.
7286580a67810ca5375b48d11790fdc8
102 125
7.2.1 UIs of services and applications
A large number of applications, many of them being defined at the moment, might be subject to some form of standardization on the user interface level. Differences in using these features in different devices are very often just disturbing to the user. For many manufacturers, their style of controlling these applicatio...
7286580a67810ca5375b48d11790fdc8
102 125
7.2.2 Configuration procedures
Complex set-up procedures for network access, service logon and availability of WAP and GPRS or Bluetooth accessories interworking could be addressed by a harmonization effort. The problems caused by lower-level standards could be at least partly overcome by offering configuration support solutions that work with most ...
7286580a67810ca5375b48d11790fdc8
102 125
7.2.3 Service and application access, interworking and portability
User trust and reliability of terminals, applications and services working across networks is of paramount importance. During the past few months, an industry-wide initiative has been taken in the Open Mobile Forum, leading to the set-up of the Open Mobile Alliance, OMA. It is primary mission is to make the mobile inte...
7286580a67810ca5375b48d11790fdc8
102 125
7.2.4 Service and application terminology
While Bluetooth and SyncML as wireless data transmission technologies have been standardized, in order to allow the devices of many manufacturers to co-operate, the user interface for set-up Bluetooth connections has not been worked out on the same, fine level of details. Using a common terminology may ease the set-up ...