CDG IOTA/HCM Stage-3

CDG IOTA/HCM Stage-3

1 3GPP2 C.S0040 2 Version 1.0 3 Date: July 18, 2003 4 5 6 IP Based Over-the-Air 7 Handset Configuration Management (IOTA-HCM) 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 COPYRIGHT 3GPP2 and its Organizational Partners claim copyright in this document and individual Organizational Partners may copyright and issue documents or standards publications in individual Organizational Partner's name based on this document. Requests for reproduction of this document should be directed to the 3GPP2 Secretariat at [email protected]. Requests to reproduce individual Organizational Partner's documents should be directed to that Organizational Partner. See www.3gpp2.org for more information. 23 24 3GPP2 C.S0040 1 No text. 2 ii 3GPP2 C.S0040 CONTENTS 1 2 FOREWORD................................................................................................................ vii 3 NOTES ....................................................................................................................... viii 4 REFERENCES..............................................................................................................ix 5 1. Introduction ......................................................................................................11 6 1.1. Scope ................................................................................................................11 7 1.2. Definitions.........................................................................................................11 8 2. General Requirements .......................................................................................17 9 2.1 Operations ........................................................................................................17 10 2.2 Protocol Requirements.......................................................................................18 11 2.3 Architecture ......................................................................................................18 12 2.3.1 Trusted Provisioning Server (TPS) ......................................................................18 13 2.3.2 Communication with the Mobile Station............................................................19 14 2.3.2.1 Provisioning Transaction Agent........................................................................19 15 2.3.2.2 Provisioning Service Agent...............................................................................20 16 2.3.2.3 Bootstrap Service Agent...................................................................................20 17 2.3.3 Security Mechanisms .........................................................................................20 18 2.3.3.1 The Trusted Provisioning Domain (TPD).......................................................20 19 2.3.3.2 Subscriber Parameter Administration Security Mechanism (SPASM)............20 20 2.3.3.3 Service Programming Lock (SPL)..................................................................20 21 2.3.3.4 Bootstrap Security.......................................................................................20 22 2.3.3.5 NAI Authentication for cdma2000 Mobile Stations .......................................21 23 2.3.3.6 Session Security ..........................................................................................21 24 3. Provisioning ......................................................................................................22 25 3.1 The Provisioning Processes................................................................................22 26 3.1.1 Initiation ...........................................................................................................22 27 3.1.2 Mobile Station Rendezvous................................................................................22 28 3.1.3 Provisioning Message Exchanges.......................................................................22 29 3.1.4 Bootstrap Mechanism........................................................................................22 30 3.1.5 Provisioning Activation (PA) Code ......................................................................23 31 3.2 Provisioning Content .........................................................................................23 32 3.2.1 Overall Approach...............................................................................................23 33 3.2.2 Major Elements of MMC ....................................................................................23 34 3.3 XML specifications of MMC................................................................................23 35 3.3.1 MMC DTD .........................................................................................................23 36 3.3.2 MMC DTD Elements..........................................................................................24 37 3.3.2.1 The ‘mmc’ Element ......................................................................................24 38 3.3.2.2 The ‘status’ Element....................................................................................25 39 3.3.2.3 The ‘detail’ Element.....................................................................................25 40 3.3.2.4 The ‘method’ Element...................................................................................26 41 3.4 MIME Types and HTTP Headers ........................................................................28 42 3.4.1 MIME Types ......................................................................................................28 43 3.4.2 Accept Headers for Supported MIME Content Types ..........................................29 44 3.4.3 Including IOTA Version in the HTTP Headers.....................................................29 45 3.5 Example IOTA Commands.................................................................................29 46 3.5.1 Opening a Session.............................................................................................29 47 3.5.1.1 Request (Server to Client) ............................................................................29 48 3.5.1.2 Response (Client to Server) ..........................................................................30 49 3.5.2 OTASP and OTAPA Tunneling............................................................................30 50 3.5.2.1 Request (Server to Client) ............................................................................30 51 3.5.2.2 Response (Client to Server) ..........................................................................31 52 3.5.3 Arbitrary Binary Object Download .....................................................................31 53 3.5.3.1 Request (Server to Client) ............................................................................31 54 3.5.3.2 Response (Client to Server) ..........................................................................32 55 3.5.4 Disconnect ........................................................................................................33 iii 3GPP2 C.S0040 CONTENTS 1 3.5.4.1 Request (Server to Client) ............................................................................33 2 3.5.4.2 Response (Client to Server) ..........................................................................33 3 3.6 Use of HTTP and WSP Methods ........................................................................33 4 3.7 The Provisioning Multipart ................................................................................34 5 3.7.1 Example of Provisioning Multipart.....................................................................34 6 3.7.2 The Provisioning Multipart Response.................................................................35 7 4. Encoding Based on WBXML ..............................................................................37 8 5. IOTA Objects .....................................................................................................40 9 6. OTASP and OTAPA Tunneling............................................................................40 10 7. IOTA Bootstrap Message....................................................................................40 11 8. IOTA Error Codes ..............................................................................................41 12 9. IOTA Trigger Message ........................................................................................42 13 10. Handling User Interrupts during IOTA Sessions ................................................42 14 Appendix A. IOTA-HCM Message Flows..................................................................43 15 A.1 Bootstrapping Message Flow Examples..............................................................43 16 A.1.1 Voice-Call Assisted Bootstrapping of Un-programmed Mobile Station (Default IMSI) – 17 Mobile Station is Pre-loaded into HLR................................................................43 18 A.1.2 Voice-call Assisted Bootstrapping of Un-programmed Mobile Station (Default IMSI) – 19 Mobile Station is Not Pre-loaded into HLR .........................................................46 20 A.1.3 Automated Bootstrapping After Power-up ..........................................................49 21 A.1.4 Mobile Station Initiated Session – No Voice Call.................................................52 22 A.1.5 Network Initiated Session – No Voice Call ..........................................................53 23 A.2 Provisioning Message Flow Examples ................................................................54

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    68 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us