Files
ietf-draft-analyzer/data/reports/idea-overlap.md
Christian Nennemann e7527ad68e Fix remaining critical, high, and medium issues from 4-perspective review
Critical fixes:
- Fix rating clamp range 1-10 → 1-5 (actual scale)
- Add `ietf ideas convergence` command (SequenceMatcher at 0.75 threshold)
- Fix "628 cross-org ideas" → 130 (verified from current DB) across 8 files

Security fixes:
- Sanitize FTS5 query input (strip special chars + boolean operators)
- Add rate limiting (10 req/min/IP) on Claude-calling endpoints
- Change <path:name> → <string:name> on draft routes

Codebase fixes:
- Add Database context manager (__enter__/__exit__)
- Wire false_positive filtering into queries (exclude by default in web UI)
- Fix Post 3 arithmetic ("~300" → "~409" distinct proposals)

Content & licensing:
- Add MIT LICENSE file
- Add IPR/FRAND notes (BCP 79, RFC 8179) to Posts 03 and 07
- Qualify "4:1 safety ratio" with monthly variation in 6 remaining files
- Add "Data as of March 2026" freeze-date headers to all 10 blog posts
- Hedge causal language in Post 04

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-08 12:47:47 +01:00

76 lines
7.8 KiB
Markdown

# Cross-Organization Idea Overlap
*Generated 2026-03-08 11:42 UTC — 419 ideas from 434 drafts*
**130** ideas appear across 2+ organizations, out of 361 unique idea clusters.
## Top Convergence Points
Ideas where the most organizations independently converge:
| # | Idea | Orgs | Drafts | Organizations |
|--:|------|-----:|-------:|---------------|
| 1 | Fully Adaptive Routing Ethernet for AI Scale-Up Networks | 14 | 1 | Baidu, Biren Technology, Broadcom, Centec, China Mobile, Cloudnine Information Technologies, Enflame Technology, Huawei, Hygon, Metanet Networking Technology, Moore Threads, Resnics Technology, Ruijie Networks, Tencent |
| 2 | AI Agent Protocol Framework | 7 | 3 | ANP Open Source Community, China Mobile, China Telecom, China Unicom, Cisco, Five9, Huawei |
| 3 | Natural Language Protocol for Agent Communication | 7 | 1 | Fordham University, IBM, Marist University, Purdue University, Service Now, University of Illinois at Urbana-Champaign, eBay Inc. |
| 4 | LISP-based geospatial intelligence network | 6 | 1 | Ariga.io, Cisco, Nexar Inc., Oterra.ai, Universitat Politecnica de Catalunya, lispers.net |
| 5 | External trace ID for NETCONF configuration attribution | 5 | 1 | China Telecom, Everything OPS, Huawei, Swisscom, Telefonica |
| 6 | Encrypted payload mechanism for SUIT manifests | 5 | 1 | Arm Limited, Linaro, SECOM CO., LTD., Siemens, Vigil Security, LLC |
| 7 | Distributed AI Service Deployment Architecture | 5 | 1 | DONG-EUI University, Daejeon University, ETRI, Huawei, National Institute of Information and Communications Technology |
| 8 | AI-Driven Network Operations with Digital Twin | 5 | 1 | China Mobile, China Unicom, Daejeon University, Huawei, Telefonica |
| 9 | Deterministic Network Scaling Requirements | 5 | 1 | CAICT, China Mobile, InterDigital, Telefonica, ZTE Corporation |
| 10 | Network Management Agent (NMA) for Autonomous L4 Networks | 5 | 1 | CAICT, China Mobile, Cisco, Huawei, ZTE Corporation |
| 11 | Agent Network Protocol | 5 | 1 | ANP Open Source Community, China Mobile, China Telecom, China Unicom, Huawei |
| 12 | AC/TE YANG Models for Edge AI Placement | 4 | 3 | China Telecom, Futurewei, Huawei, Telefonica |
| 13 | EAP Authentication Method using EDHOC | 4 | 2 | Ericsson, Inria, University of Murcia, University of Oviedo |
| 14 | Specialized AI Model Generation for Intent-Based Networking | 4 | 1 | CNR-ISTI, Huawei, SIRIUS Technology, University of Cagliari |
| 15 | Cross-Domain Authorization Information Sharing for Multi-Agent Systems | 4 | 1 | Amazon, Cisco, Ory Corp, Inc., Skyfire, Inc. |
| 16 | Time-Scoped Dynamic UCMP Policy via YANG Models | 4 | 1 | China Telecom, Futurewei, Huawei, Telefonica |
| 17 | Cloud-Initiated Time-Bounded Network Policy Activation | 4 | 1 | China Telecom, Futurewei, Huawei, Telefonica |
| 18 | Multi-Model YANG Composition for Dynamic Policies | 4 | 1 | China Telecom, Futurewei, Huawei, Telefonica |
| 19 | Agentic AI for Autonomous Network Management | 4 | 1 | DONG-EUI University, Daejeon University, Everything OPS, Huawei |
| 20 | EST over CoAP with OSCORE and EDHOC | 4 | 1 | Ericsson, Inria, Nexus, RISE |
| 21 | Constrained BRSKI with CBOR Vouchers | 4 | 1 | Amazon, IoTconsultancy.nl, Sandelman Software Works, vanderstok consultancy |
| 22 | RPL enrollment priority control mechanism | 4 | 1 | Cisco, Huawei, Sandelman Software Works, University of Warsaw |
| 23 | Hybrid ECDHE-MLKEM Key Agreement | 4 | 1 | Amazon, Cloudflare, PQShield, University of Waterloo |
| 24 | Extended Key Update with Fresh DH Exchange | 4 | 1 | Münster Univ. of Applied Sciences, Nokia, Siemens, Zscaler |
| 25 | LISP-Based Unified Control Plane for AI Infrastructure Scaling | 4 | 1 | Cisco, DataraAI, Google, MIPS |
| 26 | Cryptographically Verifiable Actor Chain | 4 | 1 | Aryaka, JPMorgan Chase & Co, Oracle, Telefonica |
| 27 | High-Assurance Data-Plane Policy Enforcement | 4 | 1 | Aryaka, JPMorgan Chase & Co, Oracle, Telefonica |
| 28 | Transitive Attestation Profile for WIMSE | 4 | 1 | Aryaka, JPMorgan Chase & Co, Oracle, Telefonica |
| 29 | Identity Portability Binding via Proof of Residency | 4 | 1 | Aryaka, JPMorgan Chase & Co, Oracle, Telefonica |
| 30 | Agent Name Service (ANS) | 4 | 1 | Amazon, Cisco, DistributedApps.ai, Intuit |
## Most Overlapping Organization Pairs
| Org A | Org B | Shared Ideas | Examples |
|-------|-------|-------------:|----------|
| China Mobile | Huawei | 8 | Fully Adaptive Routing Ethernet for AI Scale-Up Networks; AI Agent Protocol Framework; AI-Driven Network Operations with Digital Twin +5 |
| China Telecom | Huawei | 8 | AI Agent Protocol Framework; External trace ID for NETCONF configuration attribution; Agent Network Protocol +5 |
| China Unicom | Huawei | 8 | AI Agent Protocol Framework; AI-Driven Network Operations with Digital Twin; Agent Network Protocol +5 |
| Huawei | Telefonica | 7 | External trace ID for NETCONF configuration attribution; AI-Driven Network Operations with Digital Twin; AC/TE YANG Models for Edge AI Placement +4 |
| Tsinghua University | Zhongguancun Laboratory | 7 | LLM-Assisted Network Management Framework; AI Agent Metadata Format; Capability-based Agent Discovery Mechanism +4 |
| Cisco | Huawei | 5 | AI Agent Protocol Framework; Network Management Agent (NMA) for Autonomous L4 Networks; RPL enrollment priority control mechanism +2 |
| China Telecom | Telefonica | 5 | External trace ID for NETCONF configuration attribution; AC/TE YANG Models for Edge AI Placement; Time-Scoped Dynamic UCMP Policy via YANG Models +2 |
| China Mobile | ZTE Corporation | 5 | Deterministic Network Scaling Requirements; Network Management Agent (NMA) for Autonomous L4 Networks; Multicast for LLM Inference Synchronization +2 |
| Futurewei | Huawei | 5 | AC/TE YANG Models for Edge AI Placement; Time-Scoped Dynamic UCMP Policy via YANG Models; Cloud-Initiated Time-Bounded Network Policy Activation +2 |
| Pengcheng Laboratory | Tsinghua Shenzhen International Graduate School & Pengcheng Laboratory | 5 | Decentralized LLM Inference Coordination Framework; Intelligence Delivery Network (IDN); In-Network Inference Protocol (INIP) +2 |
| China Telecom | Futurewei | 4 | AC/TE YANG Models for Edge AI Placement; Time-Scoped Dynamic UCMP Policy via YANG Models; Cloud-Initiated Time-Bounded Network Policy Activation +1 |
| Futurewei | Telefonica | 4 | AC/TE YANG Models for Edge AI Placement; Time-Scoped Dynamic UCMP Policy via YANG Models; Cloud-Initiated Time-Bounded Network Policy Activation +1 |
| Ericsson | Inria | 4 | EAP Authentication Method using EDHOC; EST over CoAP with OSCORE and EDHOC; Zero-touch device enrollment via EDHOC extension +1 |
| Aryaka | JPMorgan Chase & Co | 4 | Cryptographically Verifiable Actor Chain; High-Assurance Data-Plane Policy Enforcement; Transitive Attestation Profile for WIMSE +1 |
| Aryaka | Oracle | 4 | Cryptographically Verifiable Actor Chain; High-Assurance Data-Plane Policy Enforcement; Transitive Attestation Profile for WIMSE +1 |
| Aryaka | Telefonica | 4 | Cryptographically Verifiable Actor Chain; High-Assurance Data-Plane Policy Enforcement; Transitive Attestation Profile for WIMSE +1 |
| JPMorgan Chase & Co | Oracle | 4 | Cryptographically Verifiable Actor Chain; High-Assurance Data-Plane Policy Enforcement; Transitive Attestation Profile for WIMSE +1 |
| JPMorgan Chase & Co | Telefonica | 4 | Cryptographically Verifiable Actor Chain; High-Assurance Data-Plane Policy Enforcement; Transitive Attestation Profile for WIMSE +1 |
| Oracle | Telefonica | 4 | Cryptographically Verifiable Actor Chain; High-Assurance Data-Plane Policy Enforcement; Transitive Attestation Profile for WIMSE +1 |
| Bitwave | Five9 | 4 | Human-in-the-Loop Confirmation Protocol; Normalized API for AI Agents Calling Tools (N-ACT); Agent-to-Tool Protocol +1 |
## Cross-Org Ideas by Type
- **protocol**: 37
- **architecture**: 34
- **mechanism**: 31
- **extension**: 23
- **requirement**: 19
- **pattern**: 17
- **framework**: 2