US20110055411A1 - Generic bootstrapping protocol (gbp) - Google Patents

Generic bootstrapping protocol (gbp) Download PDF

Info

Publication number
US20110055411A1
US20110055411A1 US12/941,205 US94120510A US2011055411A1 US 20110055411 A1 US20110055411 A1 US 20110055411A1 US 94120510 A US94120510 A US 94120510A US 2011055411 A1 US2011055411 A1 US 2011055411A1
Authority
US
United States
Prior art keywords
bootstrapping server
protocol
wimax
bootstrap
provisioning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/941,205
Inventor
Pouya Taaghol
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US12/941,205 priority Critical patent/US20110055411A1/en
Publication of US20110055411A1 publication Critical patent/US20110055411A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4416Network booting; Remote initial program loading [RIPL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/04Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 

Definitions

  • the present disclosure relates generally to wireless communication systems, and more particularly, to methods and apparatus for providing a generic bootstrap protocol.
  • BWA broadband wireless access
  • 3GPP 3rd Generation Partnership Project
  • IEEE Institute for Electrical and Electronic Engineers
  • WiMAX Worldwide Interoperability for Microwave Access
  • Such devices may include notebooks, ultra mobile PCs (UMPCs), handheld mobile devices, and other consumer electronics such as MP3 players, digital cameras, etc.
  • UMPCs ultra mobile PCs
  • a mobile broadband service provider may desire to activate and enable subscriptions for these device types.
  • FIG. 1 is an exemplary block diagram illustrating a broadband wireless access (BWA) network architecture in accordance with various embodiments of the present invention.
  • BWA broadband wireless access
  • FIG. 2 is an exemplary flow diagram illustrating an over-the-air (OTA) bootstrapping and provisioning process in accordance with various embodiments of the present invention.
  • OTA over-the-air
  • FIG. 3 is an exemplary flow diagram illustrating a bootstrapping process in accordance with various embodiments of the present invention.
  • FIG. 4 is an exemplary flow diagram illustrating an integrated bootstrapping and subscription and signup process in accordance with various embodiments of the present invention.
  • FIG. 5 is an exemplary block diagram representation of an example processor based system that may be used to practice various embodiments of the present invention.
  • Illustrative embodiments of the invention include, but are not limited to, methods and apparatuses for providing a generic bootstrap protocol.
  • the phrase “in some embodiments” is used repeatedly. The phrase generally does not refer to the same embodiments; however, it may.
  • the terms “comprising,” “having,” and “including” are synonymous, unless the context dictates otherwise.
  • the phrase “A and/or B” means (A), (B), or (A and B).
  • the phrase “A/B” means (A), (B), or (A and B), similar to the phrase “A and/or B”.
  • the phrase “at least one of A, B and C” means (A), (B), (C), (A and B), (A and C), (B and C) or (A, B and C).
  • the phrase “(A) B” means (B) or (A and B), that is, A is optional.
  • WMANs wireless metropolitan area networks
  • WMAX networks wireless metropolitan area networks
  • WLANs wireless local area networks
  • WPANs wireless personal area networks
  • WWANs wireless wide area networks
  • Radio systems specifically included within the scope of the embodiments of the present invention include, but are not limited to, network interface cards (NICs), network adaptors, base stations, access points (APs), gateways, bridges, hubs and satellite radiotelephones.
  • NICs network interface cards
  • APs access points
  • gateways bridges
  • hubs hubs
  • satellite radiotelephones satellite systems
  • PCS personal communication systems
  • GPS global positioning systems
  • PDAs personal digital assistants
  • personal computing accessories and all existing and future arising systems which may be related in nature and to which the principles of the embodiments could be suitably applied.
  • a communication device e.g. a cell phone or a network interface card (NIC)
  • SP service provider
  • SPs operate network infrastructure and provide wireless access to subscribers.
  • provisioning a device is typically set up for accessing the SP's network, which is referred to as “provisioning.”
  • This conventional model is thus predicated on the SP's control of manufactured equipment which may be used in its wireless network(s) as well as provisioning these devices for the user at the point of sale (POS).
  • OTA over-the-air
  • a BWA compatible communication device Before a BWA compatible communication device connects to a provisioning server over an OTA link to get provisioned, it is often necessary for the communication device to be bootstrapped with initial information relating to the provisioning server (e.g., provisioning server Uniform Resource Identifier (URI), Internet Protocol (IP) address, security settings etc.) and credentials that may be used to connect to the provisioning server.
  • provisioning server Uniform Resource Identifier (URI), Internet Protocol (IP) address, security settings etc.
  • the information to be received by the BWA compatible device during the bootstrapping process may then be used to configure the device to receive service from the provisioning server during the provisioning process.
  • bootstrapping mechanisms are typically designed specifically for handsets (e.g., a cell phone), and may not be equally effective in bootstrapping other BWA compliant communication devices and operating systems.
  • a provisioning server sends an unsolicited bootstrap message to the communication devices on a user datagram protocol (UDP) port 2948.
  • UDP user datagram protocol
  • a conventional handset e.g., a cell phone
  • UDP user datagram protocol
  • the UDP port 2948 may not be a well known port for firewalls and host intrusion detection systems (HIDS) that may be operating on other communication devices, e.g., personal computers and laptops.
  • HIDS host intrusion detection systems
  • a provisioning client on the communication device may not have full control over these firewalls/HIDS.
  • the bootstrap message may be blocked by the firewall/HIDS of some of these other communication devices, thereby hindering the provisioning process.
  • some of the embodiments of the present invention employ a generic bootstrapping mechanism that would allow various device types (e.g., universal integrated circuit card (UICC), notebooks, personal computer (PC), ultra mobile PC (UMPC), or any other BWA compatible device) to receive a bootstrap message and would also allow provisioning protocol negotiation.
  • various device types e.g., universal integrated circuit card (UICC), notebooks, personal computer (PC), ultra mobile PC (UMPC), or any other BWA compatible device
  • UICC universal integrated circuit card
  • PC personal computer
  • UMPC ultra mobile PC
  • FIG. 1 is an exemplary block diagram illustrating a BWA network architecture 10 in accordance with various embodiments of the present invention.
  • the network 10 of FIG. 1 includes a service provider (SP) network having one or more radio access networks (RANs) 20 and a core network 25 .
  • SP service provider
  • RANs radio access networks
  • a mobile station (MS) 15 may access the core network 25 via a radio link with a base station (BS) (e.g. BS 40 , 42 , etc.) in the RAN 20 .
  • the MS 15 may, for example, be a subscriber station using protocols compatible with the IEEE 802.16 standards (e.g., IEEE 802.16-2005 Amendment) or WiMAX standards.
  • FIG. 1 generally depicts the MS 15 as a cellular phone, in various embodiments the MS 15 may be a notebook, an ultra mobile PC (UMPC), a handheld mobile device, an universal integrated circuit card (UICC), a personal digital assistant (PDA), a Customer Premise Equipment (CPE), or other consumer electronics such as MP3 players, digital cameras, etc.
  • UMPC ultra mobile PC
  • UDA personal digital assistant
  • CPE Customer Premise Equipment
  • ASN-GWs access service network gateways
  • ASN-GW 45 may act as an interface between the core network 25 and its RANs 20 .
  • ASN-GW 45 may be connected to a plurality of base stations 40 , 42 and may function as a type of BS controller and/or mobile switching center (MSC) to facilitate handover control and other functions for RAN 20 , although the embodiments are not so limited.
  • MSC mobile switching center
  • the core network 25 may further include a provisioning server 50 , a bootstrapping server 55 , and/or a subscription server 60 .
  • the provisioning server 50 may also act as a bootstrapping server, thereby eliminating the need of a separate bootstrapping server 55 .
  • the core network 25 may further include several other components, such as an authentication, authorization and accounting (AAA) server.
  • AAA authentication, authorization and accounting
  • FIG. 2 is an exemplary flow diagram illustrating a bootstrapping and an over-the-air (OTA) provisioning process in accordance with various embodiments of the present invention.
  • a non-provisioned device e.g., the MS 15
  • the network entry 115 may include several operations (not shown) known to those skilled in the art, e.g., authenticating the MS 15 .
  • the ASN-GW 45 of the BWA network may hot-line the MS 15 to the bootstrapping server 55 and/or the provisioning server 50 .
  • the MS 15 may be directed to, and be able to access the bootstrapping server 55 and/or the provisioning server 50 .
  • the MS 15 may exchange bootstrap information with the bootstrapping server 55 .
  • the MS 15 may optionally subscribe to, and sign up with, the SP through the subscription server 60 .
  • the MS 15 may then exchange provisioning information with the provisioning server 50 during a provisioning process 135 .
  • bootstrapping 125 may be performed concurrently with the subscription and signup process 130 , as will be discussed in further detail below.
  • FIG. 3 is an exemplary flow diagram illustrating a bootstrapping process in more details in accordance with various embodiments of the present invention.
  • the MS 15 may enter the BWA network 110 .
  • various other operations may be performed, including but not limited to, authenticating the MS 15 , determining whether the MS 15 has been provisioned earlier, etc.
  • the MS 15 may discover the bootstrapping server 55 .
  • Discovering the bootstrapping server 55 may include, but is not limited to, obtaining the bootstrapping server 55 address (e.g., IP address, URI, etc.) and obtaining other details about the server.
  • the discovery of the server may be achieved by using, for example, a Domain name system (DNS) Service Record (SRV).
  • DNS Domain name system
  • the discovery of the servers may also be achieved employing other techniques, for example, by using a vendor specific option (e.g., option 43 ) in Dynamic Host Configuration Protocol (DHCP).
  • DHCP Dynamic Host Configuration Protocol
  • the provisioning server 50 may also act as a bootstrapping server; in those cases, the provisioning server 50 may be discovered at 225 instead of discovering the bootstrapping server.
  • the MS 15 may send a bootstrap request to the bootstrapping server 55 at 230 .
  • the bootstrap request may include information such as the MS 15 identity (e.g., WiMAX—Media Access Control (MAC) address), one or more protocol(s) supported by MS 15 (e.g., OMA-DM, DSL Forum's Technical Report 069 protocol (TR069), native Extensible Markup Language (native XML), etc.), notification and polling capabilities supported by the MS 15 (e.g., Wireless Application Protocol-PUSH (WAP-PUSH), periodic-poll, checking at attachment-only, etc.), a type of the MS 15 (e.g. a notebook, a handheld mobile device, a PC, a PDA, a CPE, etc.), and/or an operating system (OS) of the MS 15 (e.g., Windows, Linux, etc.) and,
  • OS operating system
  • the bootstrap request may be transmitted using an appropriate protocol (e.g., Hyper Text Transfer Protocol (HTTP)) that is not blocked by any firewall/HIDS of the MS 15 (or any other firewall/HIDS between the MS 15 and the bootstrapping server 55 ).
  • HTTP Hyper Text Transfer Protocol
  • the MS 15 may utilize an HTTP header field (e.g., comment fields in the user agent of the header), a message body field, and/or other appropriate fields in the HTTP request to transmit some or all the bootstrap request information.
  • HTTP header field e.g., comment fields in the user agent of the header
  • message body field e.g., a message body field
  • the bootstrapping server 55 may select an appropriate provisioning protocol for provisioning the MS 15 .
  • the provisioning protocol selection may be based on some or all the information about the MS 15 received in the bootstrap request and/or a preference (or capabilities) of the SP.
  • the selection of the provisioning protocol may be based at least in part on one or more protocol(s) supported by the MS 15 (e.g. OMA-DM, TR069, native XML, etc.) and the protocol(s) supported by the SP's network 10 .
  • the bootstrapping server 55 may generate a bootstrap response.
  • the bootstrap response may include the selected provisioning protocol, a bootstrap message, and/or other network related information. Some or all the information included in the bootstrap response may be encrypted using, for example, a bootstrap encryption key (BEK).
  • BEK bootstrap encryption key
  • the bootstrap message may include, for example, various information about the provisioning server (e.g., provisioning server URI, IP address, security settings etc.), security parameters, and/or any other appropriate information for provisioning the MS 15 .
  • the bootstrap response may be sent using any appropriate protocol (e.g., HTTP) that is not blocked by any firewall/HIDS of the MS 15 (or any other firewall/HIDS between the bootstrapping server 55 and MS 15 ).
  • the bootstrap response is transmitted using the HTTP.
  • One or more appropriate fields e.g., the header field, message field, etc.
  • the HTTP bootstrap response may be utilized to transmit some or all the bootstrap response information.
  • the bootstrapping process 125 may be combined with (or embedded in) the subscription and signup process 130 .
  • FIG. 4 is an exemplary flow diagram illustrating an integrated bootstrapping and subscription and signup process in accordance with various embodiments of the present invention.
  • the MS 15 or the user of the MS 15 may select an SP via an appropriate connection manager and transmit the selection to the selected SP's network.
  • the MS 15 may select the SP of the network 10 of FIG. 1 .
  • the MS 15 may be authenticated and hot-lined by the SP's network.
  • a browser may be activated in the MS 15 and the MS 15 may be redirected to a subscription portal residing in the subscription server 60 of the selected SP.
  • the browser may provide the MS 15 or its user a choice of different types of subscriptions. For example, a lower priced subscription may allow the MS 15 or its user access to the SP's network for a specific period of time (say, 6 or 12 hours), whereas a higher priced subscription may allow access to the network for a longer period of time (say, a week, or a month, i.e., a weekly or a monthly subscription). As would be readily appreciated by someone skilled in the art, numerous other subscription types may be envisioned.
  • the MS 15 or its user selects an appropriate subscription using the activated browser, and the selection is transmitted to the subscription server 60 .
  • the MS 15 may also transmit (not shown in the figure) a bootstrap request to the subscription server 60 integrally or along with the transmission of the selection of the subscription at 320 .
  • the MS 15 may use the same browser connection to transmit the bootstrap request along with transmitting the selected subscription information.
  • the MS 15 user may be requested to input (not shown in the figure) a variety of information (e.g., an user name, address, credit card number, contact details etc.) in the browser, and the bootstrap request may be transmitted to the subscription server 60 while transmitting the variety of information.
  • a variety of information e.g., an user name, address, credit card number, contact details etc.
  • the subscription server 60 may pass (not shown in the figure) the bootstrap request to the bootstrapping server 55 .
  • the bootstrapping server 55 may select an appropriate provisioning protocol and generate (not shown in the figure) an appropriate bootstrap response, as discussed with respect to FIG. 3 .
  • the subscription portal may retrieve the bootstrap response generated by the bootstrapping server 55 .
  • the browser in the MS 15 may display a confirmation page, at 330 , to confirm and activate the selected subscription.
  • the subscription server 60 may transmit the bootstrap response to the MS 15 .
  • the subscription portal may transmit a subscription confirmation page to the MS 15 confirming the subscription (or a thank-you page thanking the user of the MS 15 for the subscription, or any other appropriate page), which the MS 15 may display in the browser; the subscription server 60 may use the same browser connection to transmit the bootstrap response along with transmitting the subscription confirmation page information (or the thank-you page information) to MS 15 .
  • provisioning server 50 may start the provisioning process, at 340 , using an appropriate provisioning protocol (e.g. OMA-DM, TR069, native XML) selected during the generation of the bootstrap response.
  • an appropriate provisioning protocol e.g. OMA-DM, TR069, native XML
  • the bootstrap request and/or the bootstrap response may be sent using any appropriate protocol (e.g., HTTP) that is not blocked by the MS 15 firewall/HIDS (or any firewall/HIDS between the MS 15 and the subscription server 60 /bootstrapping server 55 ).
  • the provisioning server 50 may also act as the bootstrapping server. In these embodiments, the provisioning server may perform both the bootstrapping and the provisioning processes.
  • FIG. 5 is an exemplary block diagram representation of an example processor based system 2000 that may be used to practice various embodiments of the present invention.
  • the processor system 2000 may be a desktop computer, a laptop computer, a handheld computer, a tablet computer, a PDA, a server, an Internet appliance, and/or any other type of computing device.
  • the processor system 2000 may be capable of functioning as the MS 15 , the provisioning server 50 , the bootstrapping server 55 , and/or the subscription server 60 .
  • the processor system 2000 illustrated in FIG. 5 includes a chipset 2010 , which includes a memory controller 2012 and an input/output (I/O) controller 2014 .
  • the chipset 2010 may provide memory and I/O management functions as well as a plurality of general purpose and/or special purpose registers, timers, etc. that are accessible or used by a processor 2020 .
  • the processor 2020 may be implemented using one or more processors, WLAN components, WMAN components, WWAN components, and/or other suitable processing components.
  • the processor 2020 may include a cache 2022 , which may be implemented using a first-level unified cache (L1), a second-level unified cache (L2), a third-level unified cache (L3), and/or any other suitable structures to store data.
  • L1 first-level unified cache
  • L2 second-level unified cache
  • L3 third-level unified cache
  • the memory controller 2012 may perform functions that enable the processor 2020 to access and communicate with a main memory 2030 including a volatile memory 2032 and a non-volatile memory 2034 via a bus 2040 .
  • the volatile memory 2032 may be implemented by synchronous dynamic random access memory (SDRAM), dynamic random access memory (DRAM), RAMBUS dynamic random access memory (RDRAM), and/or any other type of random access memory device.
  • the non-volatile memory 2034 may be implemented using flash memory, read only memory (ROM), electrically erasable programmable read only memory (EEPROM), and/or any other desired type of memory device.
  • the processor system 2000 may also include an interface circuit 2050 that is coupled to the bus 2040 .
  • the interface circuit 2050 may be implemented using any type of interface standard such as an Ethernet interface, a universal serial bus (USB), a third generation input/output interface (3GIO) interface, and/or any other suitable type of interface.
  • the interface circuit 2050 may be incorporated with the earlier describe generic bootstrap teachings.
  • some of the teachings may be implemented in other components, e.g. I/O controller 2014 .
  • One or more input devices 2060 may be connected to the interface circuit 2050 .
  • the input device(s) 2060 permit an individual to enter data and commands into the processor 2020 .
  • the input device(s) 2060 may be implemented by a keyboard, a mouse, a touch-sensitive display, a track pad, a track ball, an isopoint, and/or a voice recognition system.
  • One or more output devices 2070 may also be connected to the interface circuit 2050 .
  • the output device(s) 2070 may be implemented by display devices (e.g., a light emitting display (LED), a liquid crystal display (LCD), a cathode ray tube (CRT) display, a printer and/or speakers).
  • the interface circuit 2050 may include, among other things, a graphics driver card.
  • the processor system 2000 may also include one or more mass storage devices 2080 to store software and data.
  • mass storage device(s) 2080 include floppy disks and drives, hard disk drives, compact disks and drives, and digital versatile disks (DVD) and drives.
  • the interface circuit 2050 may also include a communication device such as a modem or a network interface card to facilitate exchange of data with external computers via a network.
  • the communication link between the processor system 2000 and the network may be any type of network connection such as an Ethernet connection, a digital subscriber line (DSL), a telephone line, a cellular telephone system, a coaxial cable, etc.
  • the processor system 2000 may be coupled to an antenna structure (not shown in the figure) to provide access to other devices of a network.
  • the antenna structure may include one or more directional antennas, which radiate or receive primarily in one direction (e.g., for 120 degrees), cooperatively coupled to one another to provide substantially omnidirectional coverage; or one or more omnidirectional antennas, which radiate or receive equally well in all directions.
  • the antenna structure may include one or more directional and/or omnidirectional antennas, including, e.g., a dipole antenna, a monopole antenna, a patch antenna, a loop antenna, a microstrip antenna or any other type of antennas suitable for OTA transmission/reception of RF signals.
  • Access to the input device(s) 2060 , the output device(s) 2070 , the mass storage device(s) 2080 and/or the network may be controlled by the I/O controller 2014 .
  • the I/O controller 2014 may perform functions that enable the processor 2020 to communicate with the input device(s) 2060 , the output device(s) 2070 , the mass storage device(s) 2080 and/or the network via the bus 2040 and the interface circuit 2050 .
  • FIG. 5 While the components shown in FIG. 5 are depicted as separate blocks within the processor system 2000 , the functions performed by some of these blocks may be integrated within a single semiconductor circuit or may be implemented using two or more separate integrated circuits.
  • the memory controller 2012 and the I/O controller 2014 are depicted as separate blocks within the chipset 2010 , the memory controller 2012 and the I/O controller 2014 may be integrated within a single semiconductor circuit.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Embodiments of methods and apparatus for discovering a bootstrapping server by a mobile station, and bootstrapping the mobile station are disclosed. In some embodiments, a mobile station discovers a remotely disposed bootstrapping server; transmits wirelessly a bootstrap request to the bootstrapping server; and receive wirelessly a bootstrap response from the bootstrapping server in response to the transmitted bootstrap request. Additional variants and embodiments are also disclosed.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • The present application claims priority to U.S. patent application Ser. No. 12/036,947 filed Feb. 25, 2008 entitled, “GENERIC BOOTSTRAPPING PROTOCOL (GBP),” which claims priority to U.S. Provisional Patent Application No. 60/949,192 filed Jul. 11, 2007 entitled, “GENERIC BOOTSTRAPPING PROTOCOL (GBP).”
  • TECHNICAL FIELD
  • The present disclosure relates generally to wireless communication systems, and more particularly, to methods and apparatus for providing a generic bootstrap protocol.
  • BACKGROUND
  • There is ongoing interest in developing and deploying mobile networks which may facilitate transfer of information at broadband rates. These networks are colloquially referred to herein as broadband wireless access (BWA) networks and may include networks operating in conformance with one or more protocols specified by the 3rd Generation Partnership Project (3GPP) and its derivatives or the Institute for Electrical and Electronic Engineers (IEEE) 802.16 standards (e.g., IEEE 802.16-2005 Amendment), although the embodiments discussed herein are not necessarily so limited. IEEE 802.16 compatible BWA networks are sometimes referred to as WiMAX networks, an acronym that stands for Worldwide Interoperability for Microwave Access, which is a certification mark for products that pass conformity and interoperability tests for the IEEE 802.16 standards.
  • It is predicted that many different device types may be enabled by mobile broadband wireless technologies. Such devices may include notebooks, ultra mobile PCs (UMPCs), handheld mobile devices, and other consumer electronics such as MP3 players, digital cameras, etc. A mobile broadband service provider may desire to activate and enable subscriptions for these device types.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Embodiments of the invention will be described by way of exemplary embodiments, but not limitations, illustrated in the accompanying drawings in which like references denote similar elements, and in which:
  • FIG. 1 is an exemplary block diagram illustrating a broadband wireless access (BWA) network architecture in accordance with various embodiments of the present invention.
  • FIG. 2 is an exemplary flow diagram illustrating an over-the-air (OTA) bootstrapping and provisioning process in accordance with various embodiments of the present invention.
  • FIG. 3 is an exemplary flow diagram illustrating a bootstrapping process in accordance with various embodiments of the present invention.
  • FIG. 4 is an exemplary flow diagram illustrating an integrated bootstrapping and subscription and signup process in accordance with various embodiments of the present invention.
  • FIG. 5 is an exemplary block diagram representation of an example processor based system that may be used to practice various embodiments of the present invention.
  • DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS
  • Illustrative embodiments of the invention include, but are not limited to, methods and apparatuses for providing a generic bootstrap protocol.
  • Various aspects of the illustrative embodiments will be described using terms commonly employed by those skilled in the art to convey the substance of their work to others skilled in the art. However, it will be apparent to those skilled in the art that alternate embodiments may be practiced with only some of the described aspects. For purposes of explanation, specific numbers, materials, and configurations are set forth in order to provide a thorough understanding of the illustrative embodiments. However, it will be apparent to one skilled in the art that alternate embodiments may be practiced without the specific details. In other instances, well-known features are omitted or simplified in order not to obscure the illustrative embodiments.
  • Further, various operations will be described as multiple discrete operations, in turn, in a manner that is most helpful in understanding the illustrative embodiments; however, the order of description should not be construed as to imply that these operations are necessarily order dependent. In particular, these operations need not be performed in the order of presentation.
  • The phrase “in some embodiments” is used repeatedly. The phrase generally does not refer to the same embodiments; however, it may. The terms “comprising,” “having,” and “including” are synonymous, unless the context dictates otherwise. The phrase “A and/or B” means (A), (B), or (A and B). The phrase “A/B” means (A), (B), or (A and B), similar to the phrase “A and/or B”. The phrase “at least one of A, B and C” means (A), (B), (C), (A and B), (A and C), (B and C) or (A, B and C). The phrase “(A) B” means (B) or (A and B), that is, A is optional.
  • Although specific embodiments have been illustrated and described herein, it will be appreciated by those of ordinary skill in the art that a wide variety of alternate and/or equivalent implementations may be substituted for the specific embodiments shown and described, without departing from the scope of the embodiments of the invention. This application is intended to cover any adaptations or variations of the embodiments discussed herein. Therefore, it is manifestly intended that the embodiments of the invention be limited only by the claims and the equivalents thereof.
  • While example embodiments may be described herein in relation to broadband wireless access for wireless metropolitan area networks (WMANs) such as WiMAX networks, embodiments of the invention are not limited thereto and can be applied to other types of wireless networks where similar advantages may be obtained. Such networks include, but are not limited to, wireless local area networks (WLANs), wireless personal area networks (WPANs) and/or wireless wide area networks (WWANs) such as cellular networks and the like.
  • The following embodiments may be used in a variety of applications including transmitters and receivers of a mobile wireless radio system. Radio systems specifically included within the scope of the embodiments of the present invention include, but are not limited to, network interface cards (NICs), network adaptors, base stations, access points (APs), gateways, bridges, hubs and satellite radiotelephones. Further, the radio systems within the scope of embodiments of the invention may include satellite systems, personal communication systems (PCS), two-way radio systems, global positioning systems (GPS), two-way pagers, personal computers (PCs) and related peripherals, personal digital assistants (PDAs), personal computing accessories and all existing and future arising systems which may be related in nature and to which the principles of the embodiments could be suitably applied.
  • In conventional cellular communication models, a communication device (e.g. a cell phone or a network interface card (NIC)) is typically manufactured for a specific service provider (SP), which in turn sells the device to end users. SPs operate network infrastructure and provide wireless access to subscribers. At the time of sale, a device is typically set up for accessing the SP's network, which is referred to as “provisioning.” This conventional model is thus predicated on the SP's control of manufactured equipment which may be used in its wireless network(s) as well as provisioning these devices for the user at the point of sale (POS).
  • However, in anticipation of many different types of equipment, such as those mentioned previously, being used in BWA networks (such as WiMAX networks), an SP is less likely to have complete control over the manufacture of all devices which may potentially be used in its BWA network. Furthermore, since this wide variety of devices may be made available by many different vendors, a POS provisioning approach may not be adequate. Accordingly, a dynamic over-the-air (OTA) provisioning approach may be used to enable these devices to communicate over a SP's BWA network.
  • Before a BWA compatible communication device connects to a provisioning server over an OTA link to get provisioned, it is often necessary for the communication device to be bootstrapped with initial information relating to the provisioning server (e.g., provisioning server Uniform Resource Identifier (URI), Internet Protocol (IP) address, security settings etc.) and credentials that may be used to connect to the provisioning server. The information to be received by the BWA compatible device during the bootstrapping process may then be used to configure the device to receive service from the provisioning server during the provisioning process.
  • In conventional BWA communication models, bootstrapping mechanisms are typically designed specifically for handsets (e.g., a cell phone), and may not be equally effective in bootstrapping other BWA compliant communication devices and operating systems. For example, in the Open Mobile Alliance—Device Management (OMA-DM) protocol (e.g., OMA-DM version 1.2), a provisioning server sends an unsolicited bootstrap message to the communication devices on a user datagram protocol (UDP) port 2948. A conventional handset (e.g., a cell phone) may be able to receive such an unsolicited bootstrap message on its UDP port 2948. However, the UDP port 2948 may not be a well known port for firewalls and host intrusion detection systems (HIDS) that may be operating on other communication devices, e.g., personal computers and laptops. Furthermore, a provisioning client on the communication device may not have full control over these firewalls/HIDS. As a result, the bootstrap message may be blocked by the firewall/HIDS of some of these other communication devices, thereby hindering the provisioning process.
  • Accordingly, some of the embodiments of the present invention employ a generic bootstrapping mechanism that would allow various device types (e.g., universal integrated circuit card (UICC), notebooks, personal computer (PC), ultra mobile PC (UMPC), or any other BWA compatible device) to receive a bootstrap message and would also allow provisioning protocol negotiation.
  • FIG. 1 is an exemplary block diagram illustrating a BWA network architecture 10 in accordance with various embodiments of the present invention. The network 10 of FIG. 1 includes a service provider (SP) network having one or more radio access networks (RANs) 20 and a core network 25.
  • A mobile station (MS) 15 may access the core network 25 via a radio link with a base station (BS) (e.g. BS 40, 42, etc.) in the RAN 20. The MS 15 may, for example, be a subscriber station using protocols compatible with the IEEE 802.16 standards (e.g., IEEE 802.16-2005 Amendment) or WiMAX standards. While FIG. 1 generally depicts the MS 15 as a cellular phone, in various embodiments the MS 15 may be a notebook, an ultra mobile PC (UMPC), a handheld mobile device, an universal integrated circuit card (UICC), a personal digital assistant (PDA), a Customer Premise Equipment (CPE), or other consumer electronics such as MP3 players, digital cameras, etc.
  • In some embodiments, communication with the MS 15 via RAN 20 may be facilitated via one or more access service network gateways (ASN-GWs) 45, although the embodiments are not limited to this specific type of network implementation. ASN-GW 45 (or other similar type of network node) may act as an interface between the core network 25 and its RANs 20. Thus, ASN-GW 45 may be connected to a plurality of base stations 40, 42 and may function as a type of BS controller and/or mobile switching center (MSC) to facilitate handover control and other functions for RAN 20, although the embodiments are not so limited.
  • The core network 25 may further include a provisioning server 50, a bootstrapping server 55, and/or a subscription server 60. In some embodiments, the provisioning server 50 may also act as a bootstrapping server, thereby eliminating the need of a separate bootstrapping server 55. Although not shown, the core network 25 may further include several other components, such as an authentication, authorization and accounting (AAA) server.
  • FIG. 2 is an exemplary flow diagram illustrating a bootstrapping and an over-the-air (OTA) provisioning process in accordance with various embodiments of the present invention. Referring to FIGS. 1 and 2, a non-provisioned device (e.g., the MS 15) may enter an SP's BWA network 110 at 115. The network entry 115 may include several operations (not shown) known to those skilled in the art, e.g., authenticating the MS 15. At 120, the ASN-GW 45 of the BWA network may hot-line the MS 15 to the bootstrapping server 55 and/or the provisioning server 50. Through the hot-lining process 120, the MS 15 may be directed to, and be able to access the bootstrapping server 55 and/or the provisioning server 50. At 125, the MS 15 may exchange bootstrap information with the bootstrapping server 55. At 130, the MS 15 may optionally subscribe to, and sign up with, the SP through the subscription server 60. The MS 15 may then exchange provisioning information with the provisioning server 50 during a provisioning process 135.
  • In some embodiments, bootstrapping 125 may be performed concurrently with the subscription and signup process 130, as will be discussed in further detail below.
  • FIG. 3 is an exemplary flow diagram illustrating a bootstrapping process in more details in accordance with various embodiments of the present invention. Referring to FIGS. 1-3, at 115, the MS 15 may enter the BWA network 110. At 220, various other operations may be performed, including but not limited to, authenticating the MS 15, determining whether the MS 15 has been provisioned earlier, etc.
  • At 225, the MS 15 may discover the bootstrapping server 55. Discovering the bootstrapping server 55 may include, but is not limited to, obtaining the bootstrapping server 55 address (e.g., IP address, URI, etc.) and obtaining other details about the server. The discovery of the server may be achieved by using, for example, a Domain name system (DNS) Service Record (SRV). The discovery of the servers may also be achieved employing other techniques, for example, by using a vendor specific option (e.g., option 43) in Dynamic Host Configuration Protocol (DHCP). Using a DNS SRV or a vendor specific option in DHCP is well known to those skilled in the art, and hence, will not be discussed in further detail. In some embodiments, the provisioning server 50 may also act as a bootstrapping server; in those cases, the provisioning server 50 may be discovered at 225 instead of discovering the bootstrapping server.
  • Once the MS 15 is aware (as a result of the discovery at 225) of the bootstrapping server 55 address and other details, the MS 15 may send a bootstrap request to the bootstrapping server 55 at 230. In some embodiments, the bootstrap request may include information such as the MS 15 identity (e.g., WiMAX—Media Access Control (MAC) address), one or more protocol(s) supported by MS 15 (e.g., OMA-DM, DSL Forum's Technical Report 069 protocol (TR069), native Extensible Markup Language (native XML), etc.), notification and polling capabilities supported by the MS 15 (e.g., Wireless Application Protocol-PUSH (WAP-PUSH), periodic-poll, checking at attachment-only, etc.), a type of the MS 15 (e.g. a notebook, a handheld mobile device, a PC, a PDA, a CPE, etc.), and/or an operating system (OS) of the MS 15 (e.g., Windows, Linux, etc.) and, optionally, its associated version.
  • In some embodiments, the bootstrap request may be transmitted using an appropriate protocol (e.g., Hyper Text Transfer Protocol (HTTP)) that is not blocked by any firewall/HIDS of the MS 15 (or any other firewall/HIDS between the MS 15 and the bootstrapping server 55).
  • When the bootstrap request is transmitted using HTTP, the MS 15 may utilize an HTTP header field (e.g., comment fields in the user agent of the header), a message body field, and/or other appropriate fields in the HTTP request to transmit some or all the bootstrap request information.
  • Once the bootstrapping server 55 receives such a request, the bootstrapping server 55 may select an appropriate provisioning protocol for provisioning the MS 15. The provisioning protocol selection may be based on some or all the information about the MS 15 received in the bootstrap request and/or a preference (or capabilities) of the SP. For example, in some embodiments, the selection of the provisioning protocol may be based at least in part on one or more protocol(s) supported by the MS 15 (e.g. OMA-DM, TR069, native XML, etc.) and the protocol(s) supported by the SP's network 10.
  • At 235, the bootstrapping server 55 may generate a bootstrap response. The bootstrap response may include the selected provisioning protocol, a bootstrap message, and/or other network related information. Some or all the information included in the bootstrap response may be encrypted using, for example, a bootstrap encryption key (BEK). The bootstrap message may include, for example, various information about the provisioning server (e.g., provisioning server URI, IP address, security settings etc.), security parameters, and/or any other appropriate information for provisioning the MS 15.
  • In some embodiments, the bootstrap response may be sent using any appropriate protocol (e.g., HTTP) that is not blocked by any firewall/HIDS of the MS 15 (or any other firewall/HIDS between the bootstrapping server 55 and MS 15). In some embodiments, the bootstrap response is transmitted using the HTTP. One or more appropriate fields (e.g., the header field, message field, etc.) of the HTTP bootstrap response may be utilized to transmit some or all the bootstrap response information.
  • In some embodiments, the bootstrapping process 125 (see FIG. 2) may be combined with (or embedded in) the subscription and signup process 130. FIG. 4 is an exemplary flow diagram illustrating an integrated bootstrapping and subscription and signup process in accordance with various embodiments of the present invention. Referring to FIGS. 1 and 4, at 305, the MS 15 or the user of the MS 15 may select an SP via an appropriate connection manager and transmit the selection to the selected SP's network. For example, the MS 15 may select the SP of the network 10 of FIG. 1. At 310, the MS 15 may be authenticated and hot-lined by the SP's network.
  • At 315, a browser may be activated in the MS 15 and the MS 15 may be redirected to a subscription portal residing in the subscription server 60 of the selected SP. In some embodiments, the browser may provide the MS 15 or its user a choice of different types of subscriptions. For example, a lower priced subscription may allow the MS 15 or its user access to the SP's network for a specific period of time (say, 6 or 12 hours), whereas a higher priced subscription may allow access to the network for a longer period of time (say, a week, or a month, i.e., a weekly or a monthly subscription). As would be readily appreciated by someone skilled in the art, numerous other subscription types may be envisioned. At 320, the MS 15 or its user selects an appropriate subscription using the activated browser, and the selection is transmitted to the subscription server 60.
  • In some embodiments, the MS 15 may also transmit (not shown in the figure) a bootstrap request to the subscription server 60 integrally or along with the transmission of the selection of the subscription at 320. The MS 15 may use the same browser connection to transmit the bootstrap request along with transmitting the selected subscription information. In some embodiments, during the subscription process, the MS 15 user may be requested to input (not shown in the figure) a variety of information (e.g., an user name, address, credit card number, contact details etc.) in the browser, and the bootstrap request may be transmitted to the subscription server 60 while transmitting the variety of information.
  • The subscription server 60 may pass (not shown in the figure) the bootstrap request to the bootstrapping server 55. In response to receiving the bootstrap request, the bootstrapping server 55 may select an appropriate provisioning protocol and generate (not shown in the figure) an appropriate bootstrap response, as discussed with respect to FIG. 3.
  • At 325, the subscription portal may retrieve the bootstrap response generated by the bootstrapping server 55. In the meantime, the browser in the MS 15 may display a confirmation page, at 330, to confirm and activate the selected subscription. Once the MS 15 or its user confirms the activation of the subscription, the subscription server 60 may transmit the bootstrap response to the MS 15. In some embodiments, the subscription portal may transmit a subscription confirmation page to the MS 15 confirming the subscription (or a thank-you page thanking the user of the MS 15 for the subscription, or any other appropriate page), which the MS 15 may display in the browser; the subscription server 60 may use the same browser connection to transmit the bootstrap response along with transmitting the subscription confirmation page information (or the thank-you page information) to MS 15.
  • Once the MS 15 receives the bootstrap response, provisioning server 50 may start the provisioning process, at 340, using an appropriate provisioning protocol (e.g. OMA-DM, TR069, native XML) selected during the generation of the bootstrap response. As discussed earlier, the bootstrap request and/or the bootstrap response may be sent using any appropriate protocol (e.g., HTTP) that is not blocked by the MS 15 firewall/HIDS (or any firewall/HIDS between the MS 15 and the subscription server 60/bootstrapping server 55).
  • In some embodiments, the provisioning server 50 may also act as the bootstrapping server. In these embodiments, the provisioning server may perform both the bootstrapping and the provisioning processes.
  • FIG. 5 is an exemplary block diagram representation of an example processor based system 2000 that may be used to practice various embodiments of the present invention. The processor system 2000 may be a desktop computer, a laptop computer, a handheld computer, a tablet computer, a PDA, a server, an Internet appliance, and/or any other type of computing device. In some embodiments, the processor system 2000 may be capable of functioning as the MS 15, the provisioning server 50, the bootstrapping server 55, and/or the subscription server 60.
  • The processor system 2000 illustrated in FIG. 5 includes a chipset 2010, which includes a memory controller 2012 and an input/output (I/O) controller 2014. The chipset 2010 may provide memory and I/O management functions as well as a plurality of general purpose and/or special purpose registers, timers, etc. that are accessible or used by a processor 2020. The processor 2020 may be implemented using one or more processors, WLAN components, WMAN components, WWAN components, and/or other suitable processing components. The processor 2020 may include a cache 2022, which may be implemented using a first-level unified cache (L1), a second-level unified cache (L2), a third-level unified cache (L3), and/or any other suitable structures to store data.
  • The memory controller 2012 may perform functions that enable the processor 2020 to access and communicate with a main memory 2030 including a volatile memory 2032 and a non-volatile memory 2034 via a bus 2040. The volatile memory 2032 may be implemented by synchronous dynamic random access memory (SDRAM), dynamic random access memory (DRAM), RAMBUS dynamic random access memory (RDRAM), and/or any other type of random access memory device. The non-volatile memory 2034 may be implemented using flash memory, read only memory (ROM), electrically erasable programmable read only memory (EEPROM), and/or any other desired type of memory device.
  • The processor system 2000 may also include an interface circuit 2050 that is coupled to the bus 2040. The interface circuit 2050 may be implemented using any type of interface standard such as an Ethernet interface, a universal serial bus (USB), a third generation input/output interface (3GIO) interface, and/or any other suitable type of interface. In various embodiments, the interface circuit 2050 may be incorporated with the earlier describe generic bootstrap teachings. In various embodiments, some of the teachings may be implemented in other components, e.g. I/O controller 2014.
  • One or more input devices 2060 may be connected to the interface circuit 2050. The input device(s) 2060 permit an individual to enter data and commands into the processor 2020. For example, the input device(s) 2060 may be implemented by a keyboard, a mouse, a touch-sensitive display, a track pad, a track ball, an isopoint, and/or a voice recognition system.
  • One or more output devices 2070 may also be connected to the interface circuit 2050. For example, the output device(s) 2070 may be implemented by display devices (e.g., a light emitting display (LED), a liquid crystal display (LCD), a cathode ray tube (CRT) display, a printer and/or speakers). The interface circuit 2050 may include, among other things, a graphics driver card.
  • The processor system 2000 may also include one or more mass storage devices 2080 to store software and data. Examples of such mass storage device(s) 2080 include floppy disks and drives, hard disk drives, compact disks and drives, and digital versatile disks (DVD) and drives.
  • The interface circuit 2050 may also include a communication device such as a modem or a network interface card to facilitate exchange of data with external computers via a network. The communication link between the processor system 2000 and the network may be any type of network connection such as an Ethernet connection, a digital subscriber line (DSL), a telephone line, a cellular telephone system, a coaxial cable, etc.
  • In some embodiments, the processor system 2000 may be coupled to an antenna structure (not shown in the figure) to provide access to other devices of a network. In some embodiments, the antenna structure may include one or more directional antennas, which radiate or receive primarily in one direction (e.g., for 120 degrees), cooperatively coupled to one another to provide substantially omnidirectional coverage; or one or more omnidirectional antennas, which radiate or receive equally well in all directions. In some embodiments, the antenna structure may include one or more directional and/or omnidirectional antennas, including, e.g., a dipole antenna, a monopole antenna, a patch antenna, a loop antenna, a microstrip antenna or any other type of antennas suitable for OTA transmission/reception of RF signals.
  • Access to the input device(s) 2060, the output device(s) 2070, the mass storage device(s) 2080 and/or the network may be controlled by the I/O controller 2014. In particular, the I/O controller 2014 may perform functions that enable the processor 2020 to communicate with the input device(s) 2060, the output device(s) 2070, the mass storage device(s) 2080 and/or the network via the bus 2040 and the interface circuit 2050.
  • While the components shown in FIG. 5 are depicted as separate blocks within the processor system 2000, the functions performed by some of these blocks may be integrated within a single semiconductor circuit or may be implemented using two or more separate integrated circuits. For example, although the memory controller 2012 and the I/O controller 2014 are depicted as separate blocks within the chipset 2010, the memory controller 2012 and the I/O controller 2014 may be integrated within a single semiconductor circuit.
  • Although certain example methods, apparatus, and articles of manufacture have been described herein, the scope of coverage of this disclosure is not limited thereto. On the contrary, this disclosure covers all methods, apparatus, and articles of manufacture fairly falling within the scope of the appended claims either literally or under the doctrine of equivalents. For example, although the above discloses example systems including, among other components, software or firmware executed on hardware, it should be noted that such systems are merely illustrative and should not be considered as limiting. In particular, it is contemplated that any or all of the disclosed hardware, software, and/or firmware components could be embodied exclusively in hardware, exclusively in software, exclusively in firmware or in some combination of hardware, software, and/or firmware.

Claims (17)

What is claimed is:
1. A Worldwide Interoperability for Microwave Access (WiMAX) initial bootstrap procedure comprising:
using a Domain Name System (DNS) Service Record (SRV) to discover wirelessly, by a device operating in a WiMAX network, a remotely disposed bootstrapping server; and
conducting a provisioning over-the-air (OTA) protocol negotiation with the bootstrapping server using Hyper Text Transfer Protocol (HTTP).
2. The WiMAX initial bootstrap procedure of claim 1, wherein:
wirelessly discovering the bootstrapping server comprises obtaining an Internet Protocol (IP) address for the bootstrapping server using Dynamic Host Configuration Protocol (DHCP).
3. The WiMAX initial bootstrap procedure of claim 2, wherein:
conducting the provisioning OTA protocol negotiation comprises providing information regarding protocols supported by the device to the bootstrapping server using HTTP.
4. The WiMAX initial bootstrap procedure of claim 3, wherein:
conducting the provisioning OTA protocol negotiation comprises receiving an HTTP response from the bootstrapping server.
5. The WiMAX initial bootstrap procedure of claim 4, wherein:
receiving the HTTP response comprises receiving bootstrap information stored on the bootstrapping server, wherein the bootstrap information includes information regarding a selected protocol that is supported by both the device and the bootstrapping server.
6. The WiMAX initial bootstrap procedure of claim 4, wherein:
receiving the HTTP response comprises receiving from the bootstrapping server information regarding another server that can deliver bootstrap information, wherein the bootstrap information includes information regarding a selected protocol that is supported by both the device and the bootstrapping server.
7. A WiMAX initial bootstrap procedure comprising:
receiving at a bootstrapping server a DNS SRV record from a device operating in a WiMAX network, the DNS SRV record sent by the device in order to wirelessly discover the bootstrapping server; and
conducting a provisioning OTA protocol negotiation with the device using HTTP in response to the receipt of the DNS SRV record.
8. The WiMAX initial bootstrap procedure of claim 7, wherein:
conducting the provisioning OTA protocol negotiation comprises receiving at the bootstrapping server information sent using HTTP regarding protocols supported by the device.
9. The WiMAX initial bootstrap procedure of claim 8, wherein:
conducting the provisioning OTA protocol negotiation comprises transmitting, by the bootstrapping server, an HTTP response to the device.
10. The WiMAX initial bootstrap procedure of claim 9, wherein:
transmitting the HTTP response comprises transmitting bootstrap information stored on the bootstrapping server, wherein the bootstrap information includes information regarding a selected protocol that is supported by both the device and the bootstrapping server.
11. The WiMAX initial bootstrap procedure of claim 9, wherein:
transmitting the HTTP response comprises transmitting from the bootstrapping server information regarding another server that can deliver bootstrap information, wherein the bootstrap information includes information regarding a selected protocol that is supported by both the device and the bootstrapping server.
12. A provisioning process for a device in a Worldwide Interoperability for Microwave Access (WiMAX) network, the provisioning process comprising:
successfully executing a WiMAX initial bootstrap procedure, the WiMAX initial bootstrap procedure comprising:
using a Domain Name System (DNS) Service Record (SRV) record to discover wirelessly, by a device operating in a WiMAX network, a remotely disposed bootstrapping server;
conducting a provisioning over-the-air (OTA) protocol negotiation with the bootstrapping server using Hyper Text Transfer Protocol (HTTP);
establishing a communications link with the bootstrapping server; and
engaging in an OTA provisioning process specific to a protocol identified during the provisioning OTA protocol negotiation.
13. The WiMAX initial bootstrap procedure of claim 12, wherein:
wirelessly discovering the bootstrapping server comprises obtaining an Internet Protocol (IP) address for the bootstrapping server using Dynamic Host Configuration Protocol (DHCP).
14. The WiMAX initial bootstrap procedure of claim 13, wherein:
conducting the provisioning OTA protocol negotiation comprises providing information regarding protocols supported by the device to the bootstrapping server using HTTP.
15. The WiMAX initial bootstrap procedure of claim 14, wherein:
conducting the provisioning OTA protocol negotiation comprises receiving an HTTP response from the bootstrapping server.
16. The WiMAX initial bootstrap procedure of claim 15, wherein:
receiving the HTTP response comprises receiving bootstrap information stored on the bootstrapping server, wherein the bootstrap information includes information regarding a selected protocol that is supported by both the device and the bootstrapping server.
17. The WiMAX initial bootstrap procedure of claim 15, wherein:
receiving the HTTP response comprises receiving from the bootstrapping server information regarding another server that can deliver bootstrap information, wherein the bootstrap information includes information regarding a selected protocol that is supported by both the device and the bootstrapping server.
US12/941,205 2007-07-11 2010-11-08 Generic bootstrapping protocol (gbp) Abandoned US20110055411A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/941,205 US20110055411A1 (en) 2007-07-11 2010-11-08 Generic bootstrapping protocol (gbp)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US94919207P 2007-07-11 2007-07-11
US12/036,947 US7840687B2 (en) 2007-07-11 2008-02-25 Generic bootstrapping protocol (GBP)
US12/941,205 US20110055411A1 (en) 2007-07-11 2010-11-08 Generic bootstrapping protocol (gbp)

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/036,947 Continuation US7840687B2 (en) 2007-07-11 2008-02-25 Generic bootstrapping protocol (GBP)

Publications (1)

Publication Number Publication Date
US20110055411A1 true US20110055411A1 (en) 2011-03-03

Family

ID=40254050

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/036,947 Expired - Fee Related US7840687B2 (en) 2007-07-11 2008-02-25 Generic bootstrapping protocol (GBP)
US12/941,205 Abandoned US20110055411A1 (en) 2007-07-11 2010-11-08 Generic bootstrapping protocol (gbp)

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US12/036,947 Expired - Fee Related US7840687B2 (en) 2007-07-11 2008-02-25 Generic bootstrapping protocol (GBP)

Country Status (1)

Country Link
US (2) US7840687B2 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070276905A1 (en) * 2006-05-03 2007-11-29 Comcast Cable Holdings, Llc Method of provisioning network elements
WO2012139463A1 (en) * 2011-04-15 2012-10-18 华为终端有限公司 Terminal device initialization method and device
WO2013013040A3 (en) * 2011-07-21 2013-05-02 Intel Corporation Secure on-line sign-up and provisioning for wi-fi hotspots using a device-management protocol
US8909225B2 (en) * 2012-09-05 2014-12-09 Verizon Patent And Licensing Inc. Multicarrier wireless service selection
US9084081B2 (en) 2011-06-30 2015-07-14 Intel Corporation Mobile device and method for automatic connectivity, data offloading and roaming between networks
US9307408B2 (en) 2012-12-27 2016-04-05 Intel Corporation Secure on-line signup and provisioning of wireless devices
US20160226913A1 (en) * 2015-02-04 2016-08-04 Kapil Sood Technologies for scalable security architecture of virtualized networks
US9479595B2 (en) 2013-02-05 2016-10-25 Intel IP Corporation Online signup provisioning techniques for hotspot connections
US9578008B2 (en) * 2015-05-11 2017-02-21 Intel Corporation Technologies for secure bootstrapping of virtual network functions

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7885640B2 (en) * 2007-01-11 2011-02-08 Nokia Corporation Authentication in communication networks
US8156318B2 (en) * 2008-06-04 2012-04-10 Intel Corporation Storing a device management encryption key in a network interface controller
WO2010073087A1 (en) * 2008-12-22 2010-07-01 Nokia Corporation Device management session trigger
CN101883355B (en) * 2009-05-06 2015-06-03 中兴通讯股份有限公司 Collocation method and system of terminal parameter and terminal management device
CN101951595A (en) * 2010-08-23 2011-01-19 中兴通讯股份有限公司 Method and system for processing OTA (Over-The-Air) Bootstrap
US20120072552A1 (en) * 2010-09-20 2012-03-22 Eran Friedlander Enabling Server Support of Client Specific Behavior
CN103262590A (en) * 2010-12-30 2013-08-21 Skc&C株式会社 System and method for provisioning over the air of confidential information on mobile communicative devices with non-UICC secure elements
US8843125B2 (en) * 2010-12-30 2014-09-23 Sk C&C System and method for managing mobile wallet and its related credentials
EP2790420B1 (en) * 2013-04-09 2018-12-19 Sony Corporation Flexible device management bootstrap
US9467334B2 (en) 2013-06-07 2016-10-11 Apple Inc. Configuring computing devices using a bootstrap configuration
US10833926B2 (en) * 2017-11-17 2020-11-10 T-Mobile Usa, Inc. Touchless secure bootstrapping of IoT devices
US10911954B2 (en) * 2018-03-01 2021-02-02 The Boeing Company Dynamic data package access for mobile device
US10819676B1 (en) * 2019-05-22 2020-10-27 Verizon Patent And Licensing Inc. System and method of acquiring network-centric information for customer premises equipment (CPE) management
US11411829B1 (en) * 2019-09-26 2022-08-09 Juniper Networks, Inc. Provisioning managed network nodes and/or managing network nodes
US10764732B1 (en) 2019-09-30 2020-09-01 At&T Intellectual Property I, L.P. Methods, systems, and devices for providing subscription services for a communication device using an operational profile
US10856121B1 (en) 2019-10-22 2020-12-01 At&T Intellectual Property I, L.P. Methods, systems, and devices for providing subscription services to a communication device that shares an operational profile with another communication device
US11159927B2 (en) * 2019-11-04 2021-10-26 At&T Intellectual Property I, L.P. Methods, systems, and devices for establishing an active subscription for services of a mobile network
US10834574B1 (en) 2019-11-04 2020-11-10 At&T Intellectual Property I, L.P. Methods, systems, and devices for obtaining a profile enabling establishment of an active subscription for services of a mobile network
US11381658B2 (en) 2019-11-08 2022-07-05 At&T Intellectual Property I, L.P. Managing devices through use of blocks of operational profiles
EP3870261B1 (en) 2019-12-13 2024-01-31 Biora Therapeutics, Inc. Ingestible device for delivery of therapeutic agent to the gastrointestinal tract

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060034256A1 (en) * 2004-08-13 2006-02-16 Nokia Corporation System and method for service discovery during connection setup in a wireless environment
US20060187858A1 (en) * 2004-11-05 2006-08-24 Taniuchi Kenichi Network discovery mechanisms
US20070036143A1 (en) * 2004-08-13 2007-02-15 Alt Wade R Method and system for providing voice over IP managed services utilizing a centralized data store
US20070097956A1 (en) * 2005-10-31 2007-05-03 Anton Okmianski Device service activation for voice over internet protocol service
US20070150560A1 (en) * 2002-04-17 2007-06-28 Broadcom Corporation Wireless human interface device host interface supporting both bios and os interface operations
US7277934B2 (en) * 2002-05-01 2007-10-02 Dell Products L.P. System and method for configuring a platform event trap destination address
US20070249381A1 (en) * 2006-04-21 2007-10-25 Sonim Technologies, Inc. Apparatus and method for conversational-style push-to-talk
US20070283149A1 (en) * 2006-05-30 2007-12-06 Nokia Corporation Home address auto-configuration during use of a mobile protocol authentication option protocol
US20080046583A1 (en) * 2006-08-15 2008-02-21 Bindu Rao Device Management System For Mobile Devices That Supports Multiple-Point Transport
US20080108321A1 (en) * 2006-11-08 2008-05-08 Pouya Taaghol Over-the-air (OTA) device provisioning in broadband wireless networks
US20080144590A1 (en) * 2006-12-14 2008-06-19 Nokia Corporation Enabling settings provisioning process in WIMAX networks
US20080162647A1 (en) * 2006-12-29 2008-07-03 Ebay Inc. Video mail through peer to peer network
US20080178277A1 (en) * 2007-01-19 2008-07-24 Toshiba America Research, Inc. Bootstrapping Kerberos from EAP (BKE)
US20080293403A1 (en) * 2007-05-22 2008-11-27 Colin Shong Chin Quon Mobile communication service bridging
US20080310425A1 (en) * 2007-06-15 2008-12-18 Badri Nath System and method for automatic detection and reporting of the mapping between device identity and network address in wireless networks
US20090083861A1 (en) * 2007-09-24 2009-03-26 Bridgewater Systems Corp. Systems and Methods for Server Load Balancing Using Authentication, Authorization, and Accounting Protocols
US20090172187A1 (en) * 2007-12-31 2009-07-02 Eetay Natan Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks
US7581249B2 (en) * 2003-11-14 2009-08-25 Enterasys Networks, Inc. Distributed intrusion response system
US20100287363A1 (en) * 2006-02-24 2010-11-11 Oniteo Ab Method and system for secure software provisioning

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070150560A1 (en) * 2002-04-17 2007-06-28 Broadcom Corporation Wireless human interface device host interface supporting both bios and os interface operations
US7277934B2 (en) * 2002-05-01 2007-10-02 Dell Products L.P. System and method for configuring a platform event trap destination address
US7581249B2 (en) * 2003-11-14 2009-08-25 Enterasys Networks, Inc. Distributed intrusion response system
US20070036143A1 (en) * 2004-08-13 2007-02-15 Alt Wade R Method and system for providing voice over IP managed services utilizing a centralized data store
US20060034256A1 (en) * 2004-08-13 2006-02-16 Nokia Corporation System and method for service discovery during connection setup in a wireless environment
US20060187858A1 (en) * 2004-11-05 2006-08-24 Taniuchi Kenichi Network discovery mechanisms
US20070097956A1 (en) * 2005-10-31 2007-05-03 Anton Okmianski Device service activation for voice over internet protocol service
US20100287363A1 (en) * 2006-02-24 2010-11-11 Oniteo Ab Method and system for secure software provisioning
US20070249381A1 (en) * 2006-04-21 2007-10-25 Sonim Technologies, Inc. Apparatus and method for conversational-style push-to-talk
US20070283149A1 (en) * 2006-05-30 2007-12-06 Nokia Corporation Home address auto-configuration during use of a mobile protocol authentication option protocol
US20080046583A1 (en) * 2006-08-15 2008-02-21 Bindu Rao Device Management System For Mobile Devices That Supports Multiple-Point Transport
US20080108321A1 (en) * 2006-11-08 2008-05-08 Pouya Taaghol Over-the-air (OTA) device provisioning in broadband wireless networks
US20080144590A1 (en) * 2006-12-14 2008-06-19 Nokia Corporation Enabling settings provisioning process in WIMAX networks
US20080162647A1 (en) * 2006-12-29 2008-07-03 Ebay Inc. Video mail through peer to peer network
US20080178277A1 (en) * 2007-01-19 2008-07-24 Toshiba America Research, Inc. Bootstrapping Kerberos from EAP (BKE)
US20080293403A1 (en) * 2007-05-22 2008-11-27 Colin Shong Chin Quon Mobile communication service bridging
US20080310425A1 (en) * 2007-06-15 2008-12-18 Badri Nath System and method for automatic detection and reporting of the mapping between device identity and network address in wireless networks
US20090083861A1 (en) * 2007-09-24 2009-03-26 Bridgewater Systems Corp. Systems and Methods for Server Load Balancing Using Authentication, Authorization, and Accounting Protocols
US20090172187A1 (en) * 2007-12-31 2009-07-02 Eetay Natan Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9602342B2 (en) 2006-05-03 2017-03-21 Comcast Cable Communications, Llc Method of provisioning network elements
US8612556B2 (en) * 2006-05-03 2013-12-17 Comcast Cable Holdings, Llc Method of provisioning network elements
US20070276905A1 (en) * 2006-05-03 2007-11-29 Comcast Cable Holdings, Llc Method of provisioning network elements
US10129080B2 (en) 2006-05-03 2018-11-13 Comcast Cable Communications, Llc Method of provisioning network elements
WO2012139463A1 (en) * 2011-04-15 2012-10-18 华为终端有限公司 Terminal device initialization method and device
US9084081B2 (en) 2011-06-30 2015-07-14 Intel Corporation Mobile device and method for automatic connectivity, data offloading and roaming between networks
US10349263B2 (en) 2011-06-30 2019-07-09 Intel Corporation Mobile device and method for automatic connectivity, data offloading and roaming between networks
US9906940B2 (en) 2011-06-30 2018-02-27 Intel Corporation Mobile device and method for automatic connectivity, data offloading and roaming between networks
WO2013013040A3 (en) * 2011-07-21 2013-05-02 Intel Corporation Secure on-line sign-up and provisioning for wi-fi hotspots using a device-management protocol
US10341328B2 (en) 2011-07-21 2019-07-02 Intel Corporation Secure on-line sign-up and provisioning for Wi-Fi hotspots using a device-management protocol
US9571482B2 (en) 2011-07-21 2017-02-14 Intel Corporation Secure on-line sign-up and provisioning for Wi-Fi hotspots using a device management protocol
US8909225B2 (en) * 2012-09-05 2014-12-09 Verizon Patent And Licensing Inc. Multicarrier wireless service selection
US9307408B2 (en) 2012-12-27 2016-04-05 Intel Corporation Secure on-line signup and provisioning of wireless devices
US9992671B2 (en) 2012-12-27 2018-06-05 Intel Corporation On-line signup server for provisioning of certificate credentials to wireless devices
US9635555B2 (en) 2012-12-27 2017-04-25 Intel Corporation On-line signup and provisioning of certificate credentials for wireless devices
US9479595B2 (en) 2013-02-05 2016-10-25 Intel IP Corporation Online signup provisioning techniques for hotspot connections
US10313449B2 (en) 2013-02-05 2019-06-04 Intel IP Corporation Online signup provisioning techniques for hotspot connections
US9560078B2 (en) * 2015-02-04 2017-01-31 Intel Corporation Technologies for scalable security architecture of virtualized networks
US20160226913A1 (en) * 2015-02-04 2016-08-04 Kapil Sood Technologies for scalable security architecture of virtualized networks
US10397280B2 (en) 2015-02-04 2019-08-27 Intel Corporation Technologies for scalable security architecture of virtualized networks
US11533341B2 (en) 2015-02-04 2022-12-20 Intel Corporation Technologies for scalable security architecture of virtualized networks
US9578008B2 (en) * 2015-05-11 2017-02-21 Intel Corporation Technologies for secure bootstrapping of virtual network functions
US9864859B2 (en) 2015-05-11 2018-01-09 Intel Corporation Technologies for secure bootstrapping of virtual network functions
US10380346B2 (en) * 2015-05-11 2019-08-13 Intel Corporation Technologies for secure bootstrapping of virtual network functions
US20200210589A1 (en) * 2015-05-11 2020-07-02 Intel Corporation Technologies for secure bootstrapping of virtual network functions
US10977372B2 (en) * 2015-05-11 2021-04-13 Intel Corporation Technologies for secure bootstrapping of virtual network functions

Also Published As

Publication number Publication date
US20090019167A1 (en) 2009-01-15
US7840687B2 (en) 2010-11-23

Similar Documents

Publication Publication Date Title
US7840687B2 (en) Generic bootstrapping protocol (GBP)
EP2460381B1 (en) Virtual network service provider for mobile virtual network operator activation
US7756509B2 (en) Methods and apparatus for providing an access profile system associated with a broadband wireless access network
EP3008966B1 (en) Configuring wireless accessory devices
CN116232667A (en) Method for edge computing service and electronic device thereof
US11282056B2 (en) Method, servers and system for downloading an updated profile
EP2612515B1 (en) Roaming between networks employing different authentication protocols
US9906996B2 (en) Facilitation of wireless network session continuity
US8321351B2 (en) Device management in a wireless network
US20140057598A1 (en) Automatic access to network nodes
WO2008040120A1 (en) Method and apparatus for sharing cellular account subscription among multiple devices
US20120022968A1 (en) Using a first network to control access to a second network
US9319407B1 (en) Authentication extension to untrusted devices on an untrusted network
US11570620B2 (en) Network profile anti-spoofing on wireless gateways
US10750363B2 (en) Methods and apparatuses for conditional WiFi roaming
US9154949B1 (en) Authenticated delivery of premium communication services to untrusted devices over an untrusted network
US8312517B2 (en) User-entered credentials for a mobile station in a wireless network

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION