summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc2636.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc2636.txt')
-rw-r--r--doc/rfc/rfc2636.txt1627
1 files changed, 1627 insertions, 0 deletions
diff --git a/doc/rfc/rfc2636.txt b/doc/rfc/rfc2636.txt
new file mode 100644
index 0000000..ed7cfd6
--- /dev/null
+++ b/doc/rfc/rfc2636.txt
@@ -0,0 +1,1627 @@
+
+
+
+
+
+
+Network Working Group R. Gellens
+Request for Comments: 2636 Qualcomm
+Obsoletes: 2604 July 1999
+Category: Informational
+
+
+ Wireless Device Configuration (OTASP/OTAPA) via ACAP
+
+Status of this Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (1999). All Rights Reserved.
+
+Abstract
+
+ Wireless carriers today are faced with creating more efficient
+ distribution channels, increasing customer satisfaction, while also
+ improving margin and profitability. Industry trends are pushing the
+ sale of handsets further into the retail channel. The cost and
+ effort of provisioning handsets, activating users, and updating
+ handset parameters can be greatly reduced by using over-the-air
+ activation mechanisms. A comprehensive and extensible means for
+ over-the-air provisioning and handset parameter updating is required.
+
+ One approach is to purchase EIA/TIA/IS-683A (Over-the-air Service
+ Provisioning of Mobile Stations in Spread Spectrum Systems)
+ equipment. The cost of this has led carriers to seek alternative
+ solutions. A very viable means for providing over-the-air (OTA)
+ provisioning is to leverage the rollout of IS-707 data services
+ equipment, which most carriers are in the process of deploying. This
+ paper presents an approach to OTA provisioning that utilizes the
+ deployment of IS-707 to deliver OTA provisioning and parameter
+ upgrading.
+
+ IS-707 data services makes available several methods of providing
+ over-the-air provisioning and parameter updating. A well thought-out
+ approach utilizing Internet-based open standard mechanisms can
+ provide an extensible platform for further carrier service offerings,
+ enhanced interoperability among back-end services, and vendor
+ independence.
+
+ This paper describes a viable and attractive means to provide
+ OTASP/OTAPA via IS-707, using the ACAP [ACAP] protocol.
+
+
+
+Gellens Informational [Page 1]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+Table of Contents
+
+ 1. Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
+ 2. Feature Descriptions . . . . . . . . . . . . . . . . . . . 6
+ 2.1. OTASP Feature Description . . . . . . . . . . . . . . . 6
+ 2.2. OTAPA Feature Description . . . . . . . . . . . . . . . 6
+ 3. Operation . . . . . . . . . . . . . . . . . . . . . . . . . 7
+ 3.1. Initial Provisioning Activity . . . . . . . . . . . . . 7
+ 3.2. OTASP for Authorized Users . . . . . . . . . . . . . . . 8
+ 3.3. OTAPA Activity . . . . . . . . . . . . . . . . . . . . 8
+ 4. Requirements . . . . . . . . . . . . . . . . . . . . . . . . 9
+ 4.1. General Requirements . . . . . . . . . . . . . . . . . 9
+ 4.2. OTASP Requirements . . . . . . . . . . . . . . . . . . . 9
+ 4.3. OTAPA Requirements . . . . . . . . . . . . . . . . . . 10
+ 4.4. Provisioning Server Requirements . . . . . . . . . . . . 10
+ 4.5. Security Requirements . . . . . . . . . . . . . . . . . 11
+ 5. Architecture . . . . . . . . . . . . . . . . . . . . . . . . 11
+ 5.1. ACAP over TCP/IP . . . . . . . . . . . . . . . . . . . 11
+ 5.1.1. Mobile Authentication and A-Key Generation . . . . . 12
+ 5.1.2. Mobile Identification . . . . . . . . . . . . . . . 12
+ 5.1.3. ACAP Server . . . . . . . . . . . . . . . . . . . . 12
+ 5.1.4. Overview of ACAP Structure . . . . . . . . . . . . 13
+ 5.1.5. Data Organization and Capabilities . . . . . . . . . 13
+ 5.1.5.1. Structure . . . . . . . . . . . . . . . . . . . 14
+ 5.1.5.2. Conventions . . . . . . . . . . . . . . . . . . 15
+ 5.1.5.3. Dataset . . . . . . . . . . . . . . . . . . . . 15
+ 5.1.5.4. Entries and Attributes . . . . . . . . . . . . . 15
+ 5.1.5.5. NAM Records . . . . . . . . . . . . . . . . . . 16
+ 5.1.5.6. Server Roaming Lists . . . . . . . . . . . . . . 17
+ 5.1.5.7. Requested-Data Record . . . . . . . . . . . . . 18
+ 5.1.5.8. Sample Server Entry . . . . . . . . . . . . . . 18
+ 5.1.6. Administrative Client . . . . . . . . . . . . . . . 19
+ 5.1.7. Mobile Client . . . . . . . . . . . . . . . . . . . 20
+ 5.2. WAP with ACAP . . . . . . . . . . . . . . . . . . . . . 22
+ 5.3. Network-Resident vs. Configuration Data . . . . . . . . 23
+ 5.4. Intellectual Property Issues . . . . . . . . . . . . . 23
+ 6. Handset Protocol Suites . . . . . . . . . . . . . . . . . . 23
+ 6.1. ACAP over TCP/IP . . . . . . . . . . . . . . . . . . . 23
+ 7. IS-683A Compatibility . . . . . . . . . . . . . . . . . . . 24
+ 7.1. OTASP Operations . . . . . . . . . . . . . . . . . . . 24
+ 7.2. OTASP Call Flow . . . . . . . . . . . . . . . . . . . . 24
+ 7.3. OTAPA Operations . . . . . . . . . . . . . . . . . . . 24
+ 7.4. OTAPA Call Flow . . . . . . . . . . . . . . . . . . . . 25
+ 8. Alternative Methods . . . . . . . . . . . . . . . . . . . . 25
+ 8.1. IS-683A over TCP/IP . . . . . . . . . . . . . . . . . . 25
+ 8.1.1. OTAF Server . . . . . . . . . . . . . . . . . . . . 25
+ 8.1.2. Interface Application . . . . . . . . . . . . . . . 26
+ 8.1.3. Protocol Handset Suite . . . . . . . . . . . . . . 26
+
+
+
+Gellens Informational [Page 2]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+ 8.2. Browser-Based Forms . . . . . . . . . . . . . . . . . . 26
+ 9. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . 27
+ 10. References . . . . . . . . . . . . . . . . . . . . . . . . 28
+ 11. Security Considerations . . . . . . . . . . . . . . . . . 28
+ 12. Acknowledgments . . . . . . . . . . . . . . . . . . . . . 28
+ 13. Author's Address . . . . . . . . . . . . . . . . . . . . 28
+ 14. Full Copyright Statement . . . . . . . . . . . . . . . . . 29
+
+1. Terms
+
+ Application Configuration Access Protocol (ACAP) -- An Internet
+ protocol (RFC-2244) that provides remote storage and access of
+ configuration and preference information.
+
+ Activation -- A process in which a mobile station and network become
+ programmed so that a mobile station becomes operable and can be used
+ for cellular service once authorized by the service provider.
+
+ Authentication -- A procedure used to validate a mobile station's
+ identity.
+
+ Authentication Center -- An entity that manages the authentication
+ information related to the mobile station.
+
+ Authentication Key (A-key) -- A secret 64-bit pattern stored in the
+ mobile station. It is used to generate and update the mobile
+ station's shared secret data. The A-key is used in the
+ authentication process.
+
+ Authorization -- An action by a service provider to make cellular
+ service available to a subscriber.
+
+ Call -- A temporary communication between telecommunications users
+ for the purpose of exchanging information. A call includes the
+ sequence of events that allocates and assigns resources and signaling
+ channels required to establish a communications connection.
+
+ Cellular Service Provider -- A licensee of the responsible government
+ agency (in the U.S. a licensee of the Federal Communications
+ Commission) authorized to provide Cellular Radiotelephone Service.
+
+ Challenge/Response Authentication Mechanism using Message Digest 5
+ (CRAM-MD5) -- An authentication mechanism which is easy to implement,
+ and provides reasonable security against various attacks, including
+ replay. Supported in a variety of Internet protocols. Specified as
+ baseline mechanism in ACAP. CRAM-MD5 is published as RFC 2195.
+
+
+
+
+
+Gellens Informational [Page 3]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+ Code Division Multiple Access -- A technique for spread-spectrum
+ multiple-access digital communications that creates channels through
+ the use of unique code sequences.
+
+ Customer Service Center -- An entity of a service provider that
+ provides user support and assistance to subscribers.
+
+ Customer Service Representative -- A person that operates from a
+ customer service center and provides user support and assistance to
+ subscribers.
+
+ Diffie-Hellman Algorithm -- A public-key cryptography algorithm for
+ exchanging secret keys. Uses the equation , where k is the secret
+ key. The equation is executed by each party of the session based on
+ the exchange of independently generated public values.
+
+ Digits -- Digits consist of the decimal integers 0,1,2,3,4,5,6,7,8,
+ and 9.
+
+ Dual-mode Mobile Station -- A mobile station capable of both analog
+ and digital operation.
+
+ Electronic Serial Number (ESN) -- A 32-bit number assigned by the
+ mobile station manufacturer used to identify a mobile station. The
+ ESN is unique for each legitimate mobile station.
+
+ Home Location Registry (HLR) -- The location register or database to
+ which a MIN is assigned for record purposes such as subscriber
+ information.
+
+ Message Digest 5 (MD5) -- A one-way cryptographic hash function.
+ Widely deployed in Internet protocols. Published as RFC 1321.
+
+ Mobile Identification Number (MIN) -- The 10-digit number that
+ represents a mobile station's directory number.
+
+ Mobile Station (MS) -- A station, fixed or mobile, which serves as
+ the end user's wireless communications link with the base station.
+ Mobile stations include portable units (e.g., hand-held personal
+ units) and units installed in vehicles.
+
+ Mobile Switching Center (MSC) -- A configuration of equipment that
+ provides cellular radiotelephone service.
+
+ Mobile Terminal Authorizing System (MTAS) -- A control system that
+ provides the capability to load the CDMA network HLR with mobile
+ station profile information.
+
+
+
+
+Gellens Informational [Page 4]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+ Number Assignment Module (NAM) -- The mobile station's electronic
+ memory module where the MIN and other subscriber-specific parameters
+ are stored. Mobile stations that have multi-NAM features offer users
+ the option of using their units in several different markets by
+ registering with a local number in each location.
+
+ Over-the-air Service Provisioning Function (OTAF) -- A configuration
+ of network equipment that controls OTASP functionality and messaging
+ protocol.
+
+ Over-the-air Parameter Administration (OTAPA) -- Network initiated
+ OTASP process of provisioning mobile station operational parameters
+ over the air interface.
+
+ Over-the-air Service Provisioning (OTASP) -- A process of
+ provisioning mobile station operational parameters over the air
+ interface.
+
+ Quick-Net-Connect (QNC) -- An IS-707 data service capability that
+ utilizes the Async Data Service Option number but bypasses the modem
+ connection for a direct connection to an IP-based internet.
+
+ Roamer -- A mobile station operating in a cellular system or network
+ other than the one from which service was subscribed.
+
+ Simple Authentication and Security Layer (SASL) -- An Internet
+ protocol (RFC-2222) that provides a framework for negotiating
+ authentication and encryption mechanisms.
+
+ Service Provider -- A company, organization, business, etc. which
+ sells, administers, maintains, and charges for the service. The
+ service provider may or may not be the provider of the network.
+
+ Shared Secret Data (SSD) -- A 128-bit pattern stored in the mobile
+ station (in semi-permanent memory) and known by the network. The A-
+ key is used to generate the SSD at the network and in the mobile
+ station for comparison.
+
+ Wireless Application Protocol (WAP) -- A set of network and
+ application protocols including a datagram protocol (WDP), Transport
+ Layer Security (WTLS), Transaction Protocol (WTP), Session Protocol
+ (WSP), and Application Environment (WAE), which use carrier-based
+ gateways to enable wireless devices to access Web resources. See
+ <http://www.wapforum.org> for specifications and details.
+
+
+
+
+
+
+
+Gellens Informational [Page 5]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+2. Feature Descriptions
+
+2.1. OTASP Feature Description
+
+ The Over the Air Service Provisioning (OTASP) feature allows a
+ potential wireless service subscriber to activate new wireless
+ services, and allows an existing wireless subscriber to make
+ services changes without the intervention of a third party. OTASP
+ includes the following:
+
+ * A way to establish a user profile.
+
+ * "Over-The-Air" programming of a Number Assignment Module (NAM),
+ IMSI and Roaming Lists, including Data option parameters, and
+ optionally, service provider or manufacturer specific parameters
+
+ (e.g., lock code, call timer).
+
+ * An Authentication Key (A-key) Generation procedure.
+
+ * A-key storage
+
+2.2. OTAPA Feature Description
+
+ The Over-the-Air Parameter Administration (OTAPA) feature allows
+ wireless service providers to update a NAM, IMSI, and Roaming List
+ information in the mobile station remotely without the intervention
+ of a third party. This capability increases flexibility and reduces
+ costs for carriers involved with mass changes that affect every
+ handset, such as area-code splits.
+
+ OTAPA includes the following:
+
+ * Update a user's Number Assignment Module (NAM)
+
+ * Update Data option parameters
+
+ * Update service provider or manufacturer specific parameters (e.g.,
+ Server address(es), lock code, call timer).
+
+ * Update roaming lists
+
+
+
+
+
+
+
+
+
+
+Gellens Informational [Page 6]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+3. Operation
+
+3.1. Initial Provisioning Activity
+
+ A new subscriber needs to give the intended service provider
+ sufficient information (e.g., name, address, etc.) to prove credit-
+ worthiness and establish a record within the service provider's
+ billing system. In addition, the ESN of the mobile station needs to
+ be given to the provider. This may occur in three ways:
+
+ Voice scenario -- A customer care representative collects credit
+ information during a voice conversation. This call is made from a
+ different phone (e.g., wired service) or is initiated using the IS-
+ 683A OTASP dialing scheme (i.e., *228xx).
+
+ Once the user has been authorized, the customer care representative
+ creates a record in the CDMA network HLR, thus allowing use of the
+ CDMA network. In addition, a limited-time N-digit password is
+ created which is tied to the ESN. The choice of N (how many digits)
+ is up to the carrier (as a trade-off between security and user
+ inconvenience). All required provisioning information (including
+ the limited-time password) is loaded into the provisioning server.
+
+ The user is then told to hang up and call a special number, of the
+ form *228 XX <N-digit password> SEND (the XX code is the same as
+ used in the initial voice call). This causes the mobile station to
+ initiate a provisioning session.
+
+ The mobile station and the provisioning server authenticate, and all
+ required provisioning information is downloaded into the mobile
+ station. The user receives some form of notification once the
+ activity is complete. This notification can be an audible tone or a
+ text message on the mobile station display. (The form and content of
+ this notification can be part of the provisioning data downloaded by
+ the mobile station.) Once this initial provisioning activity is
+ complete the user has a fully authorized mobile station ready for
+ use.
+
+ Forms scenario -- An interactive user interface is presented via a
+ browser on the mobile station. The subscriber fills in the
+ requested information. (Note that entering non-numeric data presents
+ some user interface challenges on many mobile devices.)
+
+ A back-end server validates the information, and if possible, the
+ customer is authorized, a limited-time password is generated, HLR
+ and provisioning server records are created and the actual OTASP
+ operation begins. Otherwise, a voice call is made to a customer
+ care representative.
+
+
+
+Gellens Informational [Page 7]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+ Desktop scenario -- The subscriber uses a desktop (or in-store
+ kiosk) web browser to contact the carrier, and enters the usual
+ personal information.
+
+ The carrier's server validates the information, and if possible, the
+ customer is authorized, a limited-time password is generated, HLR
+ and provisioning server records are created, and the subscriber is
+ told to dial a special number on the handset. Once this code is
+ entered, the actual OTASP operation begins. Otherwise, the user is
+ asked to make a voice call to a customer care representative.
+
+3.2. OTASP for Authorized Users
+
+ Users already authorized for use of the CDMA network can also
+ initiate provisioning activity. This could happen after being
+ directed to do so by a Customer Care representative, either from a
+ phone conversation or via mail notification. This type of OTASP
+ activity is needed in cases where the carrier desires to upgrade
+ CDMA parameters in the mobile stations or in cases where mobile
+ station troubleshooting is needed.
+
+ This type of OTASP occurs in similar fashion to the initial OTASP
+ activity. The mobile station downloads the new provisioning
+ information in the same way.
+
+3.3 OTAPA Activity
+
+ Typical OTAPA capability involves upgrading a large number of mobile
+ stations. OTAPA activity needs to be performed in a manner that
+ does not impose on revenue bearing CDMA network activity. OTAPA
+ operations are initiated at the customer care center. This can be
+ accomplished by queuing a notification to the mobile station (via
+ 1-way SMS or special caller-ID) after the provisioning server has
+ the updated configuration data. OTAPA activity will not occur until
+ the mobile station has acquired CDMA service on the carrier's
+ network and the notification has reached the mobile station.
+
+ Alternatively, OTAPA can be handled by including a recheck interval
+ in the set of data used to provision the mobile station. When using
+ a low-overhead protocol, such as ACAP [ACAP], it is reasonable to
+ have a mobile station check in periodically to see if anything has
+ changed. The time of day and/or day of week that such rechecks
+ should occur could be included in the provisioning data.
+
+ OTAPA activity can be terminated at any time due to user call
+ activity.
+
+
+
+
+
+Gellens Informational [Page 8]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+4. Requirements
+
+4.1. General Requirements
+
+ IS-683A OTASP operations occur between a mobile station and an
+ over-the-air service provisioning function (OTAF) using IS-95A
+ traffic channel data burst messages. OTASP/OTAPA via data services
+ require that the CDMA carrier have an IS-707 data services capable
+ network. The IS-707 service must be either Packet Data Service
+ (IS-707.5) or Quick-Net-Connect (QNC).
+
+ The mobile station must support:
+
+ * IS-707 Data Service capability
+
+ * Packet/QNC RLP protocol
+
+ * PPP protocol to peer to the IS-707 IWF
+
+ * IP protocol to provide the network layer for routing to the
+ provisioning server
+
+ * A transport layer for end-to-end communication (such as TCP)
+
+ * Authentication and optionally encryption
+
+ * Application software to handle the provisioning protocol and
+ memory access.
+
+ * Domain Name System (DNS) query capabilities sufficient to obtain
+ the (IP) address of the provisioning server (or the provisioning
+ server's address could be provided during PPP negotiation).
+
+ Lastly, the ability must exist for the mobile to make a data call
+ (optionally) a voice call without a MIN.
+
+4.2. OTASP Requirements
+
+ The OTASP function requires the mobile station to originate an IS-
+ 707 data call and (optionally) a voice call using a completely
+ unprovisioned mobile station. The CDMA network must support this
+ capability.
+
+ OTASP via data services uses a provisioning server that contains the
+ parameter information for mobile stations. The authorizing agent
+ (or software) at the customer care center must be able to add user
+ and mobile station information into both the CDMA network HLR and
+
+
+
+
+Gellens Informational [Page 9]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+ the provisioning server during the initial authorizing process. The
+ provisioning server must be capable of servicing a mobile as soon as
+ its record is created.
+
+4.3. OTAPA Requirements
+
+ IS-683A OTAPA is performed by a mobile-terminated call that
+ downloads parameters to the mobile station. OTAPA calls occur
+ without user interaction.
+
+ In order to perform OTAPA via data services the network needs to
+ direct the mobile station to initiate a special-purpose data call.
+ Several existing methods can be used to implement this capability,
+ for example, a mobile-terminated one-way SMS message. The SMS
+ message content can contain any information required by the mobile
+ station. The mobile station would need a simple parser of SMS
+ messages in order to know when to originate an OTAPA call, as
+ opposed to normal SMS message processing. The OTAPA call would be
+ performed in similar fashion to a registration call. More
+ specifically, the user would not be informed of the call activity.
+
+ There are alternative means that can be employed to initiate OTAPA
+ activity; for example, a mobile-terminated voice call with caller-ID
+ using a specialized telephone number. Another alternative is for
+ mobile stations to periodically check in with the provisioning
+ server to check for updated information. ACAP, for example, is
+ designed for such a model. The recheck interval, as well as the
+ time of day and/or day of week that such checks should be used, can
+ be part of the provisioning data sent to the mobile stations.
+
+4.4. Provisioning Server Requirements
+
+ IS-683A utilizes an over-the-air service provisioning function
+ (OTAF) to perform the network-side provisioning activity.
+ OTASP/OTAPA via data services replaces the OTAF with a provisioning
+ server. The provisioning server resides on an IP network within the
+ controlled confines of the carrier. The provisioning server must
+ perform all the service provisioning and parameter administration
+ functions that the OTAF provides. The provisioning server must also
+ have an interface to the carrier's Mobile Terminal Authorizing
+ System (MTAS). This interface serves to synchronize the
+ provisioning server with the information in the MTAS. The specific
+ requirements of this interface depend on the capabilities and
+ interfaces of the carrier's customer care center system(s). The
+ provisioning server must be capable of receiving dynamic updates
+ from the MTAS and have the provisioning information immediately
+
+
+
+
+
+Gellens Informational [Page 10]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+ available for downloading into the chosen mobile station. A
+ standard ACAP server provides an excellent means to meet these
+ requirements.
+
+ The provisioning server must be capable of performing an
+ authentication procedure with the mobile station. This
+ authentication mechanism must be capable of authenticating both the
+ mobile station and the provisioning server.
+
+4.5. Security Requirements
+
+ OTASP requires that an authentication procedure be performed to
+ validate the mobile station to the provisioning server, while OTAPA
+ requires a mechanism where the mobile validates the server.
+
+ The provisioning server must be capable of either:
+
+ * OTAF A-key generation using a Diffie-Hellman mechanism
+
+ Or:
+
+ * Receiving A-keys from the carrier network.
+
+ Since data OTASP/OTAPA operates over IP within the carrier's
+ network, end-to-end encryption between the mobile station and the
+ provisioning server should be considered as a future enhancement.
+ End-to-end encryption protects against attacks from within a
+ carrier's network, and safeguards the provisioning data (for
+ example, roaming lists).
+
+5. Architecture
+
+5.1. ACAP over TCP/IP
+
+ Figure 1 shows a provisioning server in the carrier's intranet which
+ supports the Application Configuration Access Protocol (ACAP, RFC
+ 2244). An administrative client in the customer care domain updates
+ this server using ACAP. Handsets are provisioned and configured
+ using a small ACAP client.
+
+ [Figure 1 -- see PostScript version]
+
+ ACAP is an open Internet protocol designed to solve the problem of
+ client access to configuration and related data. Among its primary
+ goals are protocol simplicity, support for thin clients, and ease of
+ operation over limited bandwidth. ACAP provides a high degree of
+ extensibility, especially in authentication mechanisms, specialized
+ attribute handling, and data management.
+
+
+
+Gellens Informational [Page 11]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+5.1.1. Mobile Authentication and A-Key Generation
+
+ The mobile client authenticates with the ACAP server prior to
+ performing any activities. Authentication uses the mobile's ESN and
+ a shared secret. Provisioned mobiles derive the shared secret from
+ the A-Key; unprovisioned mobiles use a limited-time password as the
+ secret.
+
+ The limited-time password is provided to the user by the Customer
+ Care representative during the initial call (as instructions to dial
+ a specific number). This code is N digits long. The carrier
+ selects the number of digits, as a trade-off between security and
+ user convenience.
+
+ The baseline ACAP authentication mechanism uses the shared secret
+ plus a random challenge from the server as input to a one-way
+ cryptographic hash function (specifically, keyed-MD5). This is
+ analogous to the existing IS-683A authentication mechanism which
+ uses a random challenge and the CAVE algorithm.
+
+ An A-Key is generated using a Diffie-Hellman exchange, as is done in
+ IS-683A.
+
+5.1.2. Mobile Identification
+
+ Provisioning records are identified using the ESN and the current
+ NAM in use.
+
+5.1.3. ACAP Server
+
+ As a standard ACAP server, the provisioning server includes
+ configurable datasets and dataset inheritance for the management of
+ the data stores.
+
+ The administrative client can use the same simple ACAP protocol to
+ load and modify the ACAP server as the mobile stations uses for
+ provisioning. While any implementation-specific mechanisms
+ available from the server vendor could instead be used for this
+ purpose, the ability to use ACAP can greatly simplify the
+ administrative client, as well as make it independent of the server.
+
+ ACAP includes an authentication framework (Simple Authentication and
+ Security Layer, SASL, RFC 2222)[SASL]. SASL allows any standard or
+ custom authentication and encryption mechanism to be used. One of
+ the most important features of SASL is that it is designed for a
+ world in which what is "good enough" security today isn't good
+ enough tomorrow. As the threat model changes, SASL allows higher-
+ strength mechanisms to be easily added while supporting already
+
+
+
+Gellens Informational [Page 12]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+ deployed clients and servers. SASL is achieving widespread
+ deployment in a number of Internet protocols.
+
+ Strongpoints: Since the ACAP protocol was designed for precisely
+ this type of provisioning activity, its adoption can greatly reduce
+ the cost, time to market, and support required for the provisioning
+ server. Additionally, the ACAP protocol provides an open standard
+ method for mobile stations and other systems to access the
+ provisioning server. Commercial ACAP servers are being developed by
+ numerous companies. The ACAP client code is very small and simple,
+ and thus can be incorporated into virtually any mobile device at
+ minimal cost. As an open standard, the ACAP protocol has benefited
+ from years of review and experience.
+
+5.1.4. Overview of ACAP Structure
+
+ ACAP organizes data by datasets. The structure of a dataset is
+ defined by the dataset class. Generally, ACAP servers do not have
+ knowledge of dataset classes. This allows the dataset to be
+ expanded without modifying the server in any way. A dataset is an
+ instantiation of the dataset class, which is a logical definition of
+ what is in a dataset, and how it is used.
+
+ Datasets contain entries. Entries contain attributes and values.
+ Attributes and values are actually metadata, such as name, length,
+ and value. Any entry can also be a dataset (datasets are
+ hierarchical).
+
+ For example, consider the ACAP addressbook dataset class, designed
+ to hold names, email addresses, phone numbers, and related
+ information for a person's contacts. A given user may have one or
+ more addressbook datasets. Each entry holds information about one
+ person or entity. Attributes in the entry hold specific items of
+ information, such as the given name, surname, various email
+ addresses, phone numbers, and so forth. If an entry is a list of
+ people (such as a mailing list or specific group of people), it is a
+ subdataset, containing its own entries. Some clients may look at
+ only a subset of the attributes. For example, a mobile handset ACAP
+ client may download only the alias (nickname), name, primary phone
+ number and email address of each entry, while a desktop client may
+ access all attributes.
+
+5.1.5. Data Organization and Capabilities
+
+ ACAP provides custom hierarchical datasets. Server data can be
+ organized to fit the needs of the applications using the dataset.
+
+
+
+
+
+Gellens Informational [Page 13]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+ In OTASP/OTAPA over ACAP, data on the server is organized to both
+ take advantage of ACAP capabilities and to use items that are
+ identical to IS-683A, allowing for reuse of IS-683A handset engines.
+
+ ACAP servers also support data inheritance. All data items which
+ are physically in the inherited dataset and not in the inheriting
+ dataset logically also exist in the inheriting dataset. This is
+ recursive, as the inherited dataset can itself inherit from another
+ dataset. This powerful concept allows potentially large groups of
+ mobile stations to inherit items from a single common entity. For
+ example, preferred roaming lists can be stored in datasets based on
+ geographic areas, and automatically inherited by an individual
+ mobile station in that area. The roaming lists could be further
+ subdivided, for example based on tiers of free NVRAM in the mobile.
+ The mobile client need not be aware of this; it happens entirely on
+ the server.
+
+ ACAP uses trees to provide the data hierarchy. These data trees can
+ be viewed as similar to the directory/file structure used with all
+ common operating systems. The built-in inheritance mechanism,
+ together with the hierarchical structure, makes it extremely easy to
+ update general data without disturbing specific data.
+
+ Datasets exist within the user, group, and host hierarchies. The
+ user hierarchy holds datasets which belong to individual users. The
+ group hierarchy holds datasets which belong to groups (for example,
+ the "Region." groups in section 5.1.6.3 Server Roaming Lists). The
+ host hierarchy holds datasets which are for specific machines or
+ systems.
+
+ In addition to providing customizable data trees, ACAP also provides
+ several standard datasets for all clients. There is a capabilities
+ dataset that contains information on custom functionality and
+ enhanced features available to a specific client or at the site
+ generally. This allows a server to advertise any protocol
+ extensions, specialized attribute handling, or other enhanced
+ functionality it supports. A client that needs to use these
+ features can thus easily determine what is available before trying
+ to use them.
+
+5.1.5.1. Structure
+
+ We divide the data accessed by the client into provisioning items,
+ group items, and client state items. Provisioning data contains NAM
+ items and requested-data items. Group items (such as preferred
+ roaming lists), are not specific to any mobile device. Group items
+ physically exist in their own datasets, but through inheritance
+ logically appear in client datasets.
+
+
+
+Gellens Informational [Page 14]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+ The mobile stations always read data from provisioning entries and
+ write data to client state entries. This structure makes both
+ mobile clients and server configuration easy and simple, while
+ allowing for extensive custom and diagnostic capabilities.
+
+5.1.5.2. Conventions
+
+ "" This signifies the empty string (used here for ACAP entries).
+
+ ~ This is shorthand for "user/<userid>". It is part of the ACAP
+ protocol.
+
+5.1.5.3. Dataset
+
+ Provisioning information is located in the "OTAP" dataset class.
+ (The full specification of this dataset will be published in a
+ subsequent document.) The prefix "Provision." is used for items that
+ are to be downloaded to the mobile, and the prefix "Client." is used
+ for items which the client stores on the server.
+
+ Provisioning data within the OTAP dataset is organized as a series
+ of items, each of which is stored in its own entry. The entry name
+ is the item name, and the "OTAP.VALUE" attribute contains the item
+ value. This structure permits change notification on a per-item
+ basis.
+
+ We chose the "Provision" and "Client" names to simplify various
+ operations. For example, the mobile client can easily download all
+ changed provisioning items by performing a search which returns the
+ "OTAP.VALUE" attribute of all entries whose name begins with
+ "Provision" and whose modtime is greater than the last time the
+ client retrieved data. An administrative client can easily generate
+ a report of all clients which have not received the most recent
+ update by searching for all entries named "Client" whose
+ "OTAP.modtime" attribute is less than the desired value.
+
+ A partial list of items follows.
+
+5.1.5.4. Entries and Attributes
+
+ dataset.inherit
+
+ This is a standard ACAP attribute that identifies the location of
+ inherited data. It exists in the "" entry (the entry with the empty
+ name) within each dataset.
+
+
+
+
+
+
+Gellens Informational [Page 15]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+5.1.5.5. NAM Records
+
+ The OTAP dataset class contains an entry for each provisioned
+ mobile. The standard location for provisioning records is:
+
+ /OTAP/USER/<esn>/<nam>/
+
+ This tree format allows multiple NAMs per ESN. The specific entries
+ contain data in IS-683A parameter block types.
+
+ For example, the CDMA NAM would be stored in an entry called:
+
+ /OTAP/USER/<esn>/<nam>/Provision.CDMA-NAM/
+
+ The entries below show how NAM records would be organized on the
+ ACAP server:
+
+ CDMA/Analog NAM
+
+ Entry-Path: /OTAP/USER/<esn>/<nam>/Provision.CDMA-AMPS-NAM/
+
+ OTAP.Value: {17} xx xx xx ... xx
+
+ The CDMA/Analog NAM entry from IS-683A (section 4.5.2.1)
+ consists of at least 129 information bits, depending on the
+ number of SID NID list entries. This is stored as 17 (or more)
+ octets of binary data (padding is used to ensure an integral
+ number of octets).
+
+ Mobile Directory Number
+
+ Entry-Path: /OTAP/USER/<esn>/<nam>/Provision.MOBILE-DN/
+
+ OTAP.Value: {10} nnnnnnnnnn
+
+ The Mobile Directory Number from IS-683A contains BCD-encoded
+ digits representing the phone number. This is stored as a
+ string of 10 or more ASCII digits, e.g., "6195551212".
+
+ CDMA NAM
+
+ Entry-Path: /OTAP/USER/<esn>/<nam>/ Provision.CDMA-NAM/
+
+ OTAP.Value: {13} xx xx xx ... xx
+
+
+
+
+
+
+
+Gellens Informational [Page 16]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+ The CDMA-NAM entry from IS-683A (section 4.5.2.3) consists of at
+ least 100 information bits, depending on the number of SID-NID
+ list entries. This is stored as 13 (or more) octets of binary
+ data (padding is used to ensure an integral number of octets).
+
+ IMSI_T
+
+ Entry-Path: /OTAP/USER/<esn>/<nam>/ Provision.IMSI_T/
+
+ OTAP.Value: {7} xx xx xx xx xx xx xx
+
+ The IMSI_T entry from IS-683A (section 4.5.2.4) consists of 55
+ bits of information in five fields. This is stored left-
+ justified in 7 octets of binary data.
+
+5.1.5.6. Server Roaming Lists
+
+ The ACAP Server will have an entry for each different roaming list
+ configuration for a carrier. The example below assumes that the
+ desired differentiation for the roaming list is geographic, with
+ subdivisions for tiers of mobile free NVRAM It shows that for each
+ region there exists a set of roaming lists per free NVRAM range.
+ Note that a carrier can easily implement different or further
+ differentiation (e.g., by phone vendor or product type) by simply
+ changing the dataset tree and assigned the appropriate value to the
+ "dataset.inherit" attribute in the provisioning records.
+
+ /OTAP/GROUP/region.NorthEast/free-nv.128-512/
+ preferred.roaming.list/OTAP.Value
+ /OTAP/GROUP/region.NorthEast/free-nv.512-1024/
+ preferred.roaming.list/OTAP.Value
+ /OTAP/GROUP/region.SouthEast/free-nv.128-512/
+ preferred.roaming.list/OTAP.Value
+ /OTAP/GROUP/region.SouthEast/free-nv.512-1024/
+ preferred.roaming.list/OTAP.Value
+ /OTAP/GROUP/region.NorthWest/free-nv.128-512/
+ preferred.roaming.list/OTAP.Value
+ /OTAP/GROUP/region.NorthWest/free-nv.512-1024/
+ preferred.roaming.list/OTAP.Value
+ /OTAP/GROUP/region.SouthWest/free-nv.128-512/
+ preferred.roaming.list/OTAP.Value
+ /OTAP/GROUP/region.SouthWest/free-nv.512-1024/
+ preferred.roaming.list/OTAP.Value
+
+
+
+
+
+
+
+
+Gellens Informational [Page 17]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+5.1.5.7. Requested-Data Record
+
+ Inside the OTAP dataset is an entry with the name
+ "Provision.Requested-Data", which contains one attribute called
+ "OTAP.Requested-Data". This attribute is multi-valued. It is
+ either NIL or contains a list of strings. Each string is the name
+ of one element of data that the server requests the client to
+ supply.
+
+ After authenticating, the ACAP client issues a SEARCH command to
+ retrieve the values of the "OTAP.Requested-Data" attribute of the
+ "Provision.Requested-Data" entry. The client processes the returned
+ values (if any) by issuing a STORE command to set one or more
+ attributes in the "Client" entry. The value of each attribute is
+ either the corresponding mobile value (which may be an empty string
+ if the item has no value), or the special value "[N/A]" if the item
+ does not exist or is unknown on the mobile.
+
+ This mechanism is quite general, and can be used in the normal OTASP
+ case to modify the mobile's dataset as appropriate for the condition
+ of the mobile. For example, the inheritance could be set based on
+ the amount of NVRAM available, to cause one set of preferred roaming
+ list data or another to be used. This mechanism can also be used in
+ other situations, such as to retrieve a complete set of mobile
+ configuration parameters for diagnostic reasons.
+
+5.1.5.8. Sample Server Entry
+
+ The entry below is an excerpt of a sample ACAP server dataset entry
+ for a single mobile station, with an ESN of FB9876E and using NAM 1:
+
+ /OTAP/USER/FB9876E/1/
+
+ entry = ""
+ dataset.inherit = "/OTAP/GROUP/region.NorthEast/
+ free-nv.128-512/preferred.roaming.list/
+ OTAP.Value/"
+
+ entry = "Provision.Requested-Data"
+ OTAP.Requested-Data = ("Phone-Make" "Phone-Model" "SW-Rev"
+ "Free-NVRAM")
+
+ entry = "Client"
+ OTAP.Phone-Make = "Qualcomm"
+ OTAP.Phone-Model = "pdQ1900"
+ OTAP.SW-Rev = "001.030.0908"
+ OTAP.Free-NVRAM = "65536"
+ OTAP.Last-Modtime = "199812181703"
+
+
+
+Gellens Informational [Page 18]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+ entry = "Provision.Mobile-DN"
+ OTAP.Value = {10} 619 555 1234
+
+ entry = "Provision.CDMA-NAM"
+ OTAP.Value = {13} xx xx xx xx xx xx xx xx xx xx xx
+ xx xx
+
+ This dataset shows not only provisioning data which was downloaded
+ into the mobile station, but also the items of client data requested
+ by the server (the Requested-Data attribute) and the values of those
+ items (the "Client" entry). It also indicates that the mobile
+ client successfully stored the values associated with the modtime
+ "199812181703". In addition, it shows that this client inherits
+ data (i.e., roaming lists) from the "NorthEast" region.
+
+5.1.6. Administrative Client
+
+ The administrative client loads initial provisioning information
+ into the server, including specifying the roaming list to inherit.
+ The administrative client also updates provisioning server records
+ as needed, and retrieves data for reports (such as a list of clients
+ which have not yet been updated).
+
+ Data is loaded into provisioning records by using the ACAP STORE
+ command. The administrative client authenticates to the ACAP server
+ using credentials that permit access to datasets for mobiles.
+
+ When a new mobile is authorized for service, the administrative
+ client creates the dataset by storing into it values that are
+ specific for the device. It also sets the "dataset.inherit"
+ attribute so that values which are not tied to the specific mobile
+ are inherited as appropriate.
+
+ * Updates to user records
+
+ Existing user records may need updating from time to time. For
+ example, a user may change service plans or purchase an
+ additional or replacement mobile device, or the carrier may
+ need to modify some aspect of provisioned data.
+
+ * Perusal and editing of provisioning records
+
+ The administrative client can provide general browse and edit
+ capability for user records.
+
+
+
+
+
+
+
+Gellens Informational [Page 19]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+ * Report generation
+
+ The administrative client can extract data from the ACAP server
+ in order to generate reports. For example, after OTAPA
+ activity, a carrier may wish to identify those mobiles which
+ have not yet been updated.
+
+ * Queuing of OTAPA sessions
+
+ Depending on the OTAPA update procedures chosen (e.g., SMS,
+ CLID, periodic recheck), the administrative client may be
+ involved in initiating the activity. This may or may not use
+ an interface to the provisioning server.
+
+5.1.7. Mobile Client
+
+ The ACAP mobile client is implemented as a state machine that
+ performs the equivalent of IS-683A provisioning parameter
+ information exchange and non-volatile memory storage. The ACAP
+ Client state machine diagram (Figure 2) and descriptions are below.
+
+ [Figure 2 -- see PostScript version]
+
+ * Establish Transport Layer/Authenticate
+
+ Authentication and/or encryption can occur at the application
+ layer and/or at the network/transport layer.
+
+ Basic ACAP authentication occurs in the application layer
+ (i.e., within the ACAP session), and in its baseline form uses
+ the CRAM-MD5[CRAM-MD5] mechanism. If desired, other mechanisms
+ can be used which provide more protection and encryption. This
+ occurs after the transport layer is established, as shown in
+ the client state machine diagram above
+
+ Figure 3 shows the CRAM-MD5 authentication mechanism for an
+ unprovisioned mobile. In the case of provisioned mobiles, the
+ shared secret is derived from the A-Key, instead of the
+ limited-time N-digit code used for unprovisioned devices.
+
+ Use of basic ACAP authentication is preferred for initial
+ implementations of data-OTASP because it is simple, easy to
+ implement, and all procedures and methods are in place.
+ Stronger SASL mechanisms and/or IPSec can be rolled out in the
+ future without disrupting the deployed base.
+
+ [Figure 3 -- see PostScript version]
+
+
+
+
+Gellens Informational [Page 20]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+ * Requested-data SEARCH
+
+ The mobile ACAP client issues a search command asking the
+ server to return the attribute "OTAP.Requested-Data" in the
+ entry "Requested-Data".
+
+ * Receive requested-data values
+
+ The server instructs the client to store attributes by
+ returning one or more values of requested-data in response to
+ the Requested-Data SEARCH.
+
+ For example, the attribute "OTAP.Requested-Data" in the entry
+ "Requested-Data" might contain four values: "phone-make",
+ "phone-model", "SW-Rev", and "Free-NVRAM".
+
+ * STORE attribute list
+
+ If the response to the requested-data SEARCH returns any
+ values, the client issues a STORE command. Each attribute in
+ the STORE command corresponds to one item of requested-data.
+ If the client does not recognize an item, it stores the string
+ "[n/a]".
+
+ Continuing with our example, the client uses this STORE command
+ to write four attributes into the "Client" entry. Each
+ attribute name is identical to one value of the
+ OTAP.Requested-Data" attribute (with the prefix "OTAP." added).
+ Each attribute value is determined by the respective mobile
+ value.
+
+ In our example, this STORE command sets the following
+ attributes and values:
+
+ - "OTAP.Phone-Make" = "Qualcomm
+ - "OTAP.Phone-Model" = "pdQ1900
+ - "OTAP.SW-Rev" = "001.030.0908"
+ - "OTAP.Free-NVRAM" = "65536"
+
+ * Provisioning data SEARCH
+
+ The mobile ACAP client issues a search command to retrieve any
+ items of provisioning data that have changed since it last
+ checked in (which in the initial session retrieves all
+ provisioning data).
+
+
+
+
+
+
+Gellens Informational [Page 21]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+ This SEARCH command asks the server to return the "OTAP.Value"
+ attribute of any entries whose name starts with "provision."
+ (case-insensitive) and whose modtime is greater than the
+ supplied value (which is zero for an unprovisioned mobile).
+
+ * Receive provisioning data and modtime
+
+ The server returns the provisioning items, each as one entry
+ name and one attribute value. The server response to the
+ SEARCH command includes the modtime of the latest entry
+ returned.
+
+ * Save values
+
+ The mobile writes the returned values into NVRAM.
+
+ * STORE modtime
+
+ The ACAP client stores the returned modtime on the server as an
+ acknowledgement that the data was received and NVRAM updated.
+
+ * LOGOUT
+
+ The client issues the LOGOUT command.
+
+ * Close transport layer
+
+ The client closes the TCP connection.
+
+ * End call
+
+ The data call is terminated.
+
+5.2. WAP with ACAP
+
+ An advantage of the ACAP solution is that is can easily coexist with
+ a WAP-based mechanism, giving carriers more options.
+
+ A carrier can deploy handsets into its service area which use WAP-
+ based provisioning, if desired, alongside those which use ACAP
+ provisioning. All that is required is that the WAP server contain a
+ small ACAP client (or an interface to an ACAP server).
+
+ Figure 4 shows how mobile stations can be configured using a WAP
+ browser. By using an ACAP server for provisioning, carriers are
+ free to simultaneously deploy mobile stations that use either WAP or
+ ACAP, as desired. In either case, the ACAP server is the source for
+ provisioning data.
+
+
+
+Gellens Informational [Page 22]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+ [Figure 4 -- see PostScript version]
+
+5.3. Network-Resident vs. Configuration Data
+
+ It is useful to recognize that wireless devices access two different
+ types of carrier-provided data: network-resident and configuration.
+ Network-resident data exists primarily within the carrier's network.
+ Examples include account status, billing detail, service plan
+ options, etc. While mobiles may access this information for user
+ display, it resides in the network. Configuration data, in
+ contrast, affects the operation of the handset, is usually not shown
+ to the user, and must persist in the device.
+
+ For network-resident data access, the obvious choice is the web.
+ The data is highly interactive and time-variant, making web browsers
+ a reasonable solution. Any appropriate web browser can be used.
+ There are many good reasons for having a web browser in a wireless
+ device which contains a display and is capable of user interaction.
+
+ For configuration data, the best solution is to use ACAP. ACAP is
+ optimized for the job, can be implemented quickly, requires a very
+ small amount of memory, and does not depend on a display or any user
+ interaction capability.
+
+ Trying to use the same access method for both types of data
+ unnecessarily complicates the solution, leading to increased design,
+ development, and debug time and expense. It makes it more difficult
+ to offer low-cost devices. Since the two types of data
+ fundamentally differ, it is good engineering practice to select
+ optimal code and protocols for each.
+
+5.4. Intellectual Property Issues
+
+ There are no known intellectual property issues with the ACAP
+ solution. The ACAP specification was developed within the IETF, and
+ no ownership, patent, or other IP claims have been asserted.
+ Multiple independent vendors are developing ACAP clients and
+ servers, in addition to the existing usage in deployed products.
+
+6. Handset Protocol Suites
+
+6.1. ACAP over TCP/IP
+
+ Figure 5 depicts the mobile station protocol suite for the ACAP over
+ TCP/IP solution. The mobile station is capable of supporting both
+ IS-683A OTASP and OTASP over ACAP.
+
+ [Figure 5 -- see PostScript version]
+
+
+
+Gellens Informational [Page 23]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+7. IS-683A Compatibility
+
+7.1. OTASP Operations
+
+ To maximize compatibility and allow for reuse of IS-683A handset
+ code, the data formats used in OTASP over ACAP are identical to
+ those used in IS-683A. Section 5.1.5 Data Organization and
+ Capabilities discusses this in more detail.
+
+ OTASP via IS-683A requires custom design and development for the
+ specific CDMA infrastructure used by a carrier. This can greatly
+ limit the data management capabilities and significantly reduces the
+ extensibility of the solution. Conversely, OTASP over data can be
+ implemented on a generic IP network using an Internet standards-
+ based capability that provides extensible provisioning activities
+ for carriers.
+
+ OTASP over data uses a traffic channel whereas IS-683A OTASP runs
+ over the limited-bandwidth signaling channel.
+
+ IS-683A OTASP operations are inherently simultaneous voice and data.
+ This allows the customer care representative to extract information
+ from the mobile station while conversing with the user. OTASP over
+ data services is a data-only solution (at least for now). This
+ makes OTASP operations slightly more sequential and potentially
+ problematic. Simultaneous voice and data will alleviate this issue.
+
+7.2 OTASP Call Flow
+
+ The call flow diagram (Figure 6) depicts the message sequence and
+ operations for a typical IS-683A OTASP (provisioning) call. Any
+ data-OTASP solution must perform all the functions of the IS-683A
+ OTASP call. The proposed solution meets these requirements.
+
+ [Figure 6 -- see PostScript version]
+
+7.3. OTAPA Operations
+
+ Data-OTAPA requires the ability to instruct mobiles to originate a
+ data call to the provisioning server. Several viable approaches are
+ discussed in sections 3.3 OTAPA Activity and 4.3 OTAPA
+ Requirements.
+
+ OTAPA over data has the potential to require far less channel
+ resources to download new information to mobile stations. The ACAP
+ server inherently only communicates changes to the clients, thus
+ only changed information needs to be downloaded to the mobile
+ stations using OTAPA over data via ACAP.
+
+
+
+Gellens Informational [Page 24]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+7.4. OTAPA Call Flow
+
+ The call flow diagram (Figure 7) depicts the message sequence for a
+ typical IS-683A OTAPA operation. Any data-OTAPA solution must
+ perform all the functions of the IS-683A OTAPA call. The proposed
+ solution meets these requirements.
+
+ [Figure 7 -- see PostScript version]
+
+8. Alternative Methods
+
+8.1. IS-683A over TCP/IP
+
+ One alternative is to port IS-683A to TCP, remaining as close as
+ possible to the IS-683A protocol exchange.
+
+ Figure 8 depicts the architecture and communications backbone to
+ support OTASP/OTAPA via IS-707 data services with a provisioning
+ server based on the IS-683A OTAF function.
+
+ [Figure 8 -- see PostScript version]
+
+8.1.1. OTAF Server
+
+ This provisioning server is modeled after the IS-683A OTAF. The
+ OTAF server performs the specific operations and messaging of IS-
+ 683A OTAF. This includes A-key reauthentication procedures.
+
+ Strongpoints:
+
+ (1) OTAF and mobile station behavior mirrors IS-683A (reduced
+ duplicate software in mobile station). Nearly all procedures fully
+ defined.
+
+ Drawbacks:
+
+ (1) The OTAF server would need to be custom-designed and built.
+
+ (2) No inherent data manipulation capabilities in the OTAF server.
+ All required or desired data management activities would have to be
+ built from scratch.
+
+ (3) Interface application would require a non-standard interface
+ (and therefore proprietary) to OTAF server.
+
+ (4) End-to-end encryption scheme still needed for full security.
+
+
+
+
+
+Gellens Informational [Page 25]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+8.1.2. Interface Application
+
+ This function loads all required provisioning-related information
+ from the CDMA network information system to the OTAF server. This
+ includes the queuing of provisioning transactions and data.
+
+
+8.1.3. Protocol Handset Suite
+
+ Figure 9 depicts the mobile station protocol suite for the IS-683A
+ over TCP/IP solution. The OTASP client is capable of supporting
+ both IS-683A OTASP activities or OTASP activities over the data
+ transport.
+
+ [Figure 9 -- see PostScript version]
+
+8.2. Browser-Based Forms
+
+ Another alternative is to use forms embedded in web pages.
+
+ Encapsulating the provisioning data into custom tags embedded in a
+ web form is an idea that at first seems attractive. There are a lot
+ of advantages in having a browser in the handset, web servers are
+ very widely deployed, and everyone is familiar on some level with
+ the web.
+
+ However, a meta-protocol for this would need to be designed, and a
+ fully detailed specification produced. This solution requires
+ custom software on the provider side to handle the meta-protocol.
+ It additionally requires handset vendors to add custom software in
+ the handset browser to handle this protocol.
+
+ This solution would require a provisioning-capable browser in every
+ phone. While it may be desirable to have a browser, the decision to
+ require it needs to be considered carefully, especially in light of
+ the memory requirements it would impose on all devices.
+
+ This solution would complicate the handset browser, by requiring it
+ to handle provisioning as well as browsing. As provisioning and
+ browsing are functionally dissimilar, this code is not a natural fit
+ within the browser. Implementing this solution would require a
+ significant increase in development and debug resources, and thus
+ negatively impact time-to-market and cost.
+
+ Also because the web is functionally dissimilar, a high level of
+ carrier-side customization would be needed, leading to reduced
+ vendor choice and increased deployment costs.
+
+
+
+
+Gellens Informational [Page 26]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+ This approach would layer custom data on top of a standard protocol.
+ This would require design work, and would not have much time for
+ open review before deployment, greatly increasing the risk. By
+ contrast, ACAP has had years of open review and refinement.
+
+ This approach also limits the extensibility of the solution. ACAP,
+ conversely, is very extensible. Because ACAP is such a simple
+ protocol, it can be added to a wide variety of applications at low
+ cost. This allows increasing numbers of applications on the mobile
+ device to share information with servers as well as desktop
+ applications.
+
+9. Conclusion
+
+ ACAP provides a high degree of extensibility, especially in
+ authentication mechanisms, custom attribute handling, and data
+ management. By using an Internet standard protocol,
+ interoperability and integration with a variety of equipment is
+ possible, and carriers are not locked into any vendor. It is also
+ easier to add new levels of service and capabilities, especially
+ integration with future subscriber devices and applications (e.g.,
+ email).
+
+ Since an ACAP client is so small, it can be incorporated into
+ virtually any device, even low-end ones without displays, and can be
+ added without sacrificing other features. The simplicity of the
+ client and protocol directly translate to shorter development cycles
+ and faster time-to-market.
+
+ Because the ACAP protocol was designed for precisely this type of
+ provisioning activity, its adoption can greatly reduce the cost,
+ time to market, and support required for the provisioning server as
+ well as the handsets. As an open standard, the ACAP protocol has
+ benefited from years of review and experience.
+
+ Another advantage of the ACAP solution is that is can easily coexist
+ with a WAP-based mechanism, giving carriers more options and
+ reducing the minimal requirement burden on mobile devices.
+
+ A carrier can deploy handsets into its service area which use WAP-
+ based provisioning, if desired, alongside those which use ACAP
+ provisioning. By using an ACAP server for provisioning, carriers
+ are free to simultaneously deploy mobile stations that use either
+ WAP or ACAP, as desired.
+
+ The lack of intellectual-property issues further adds to ACAP's
+ appeal.
+
+
+
+
+Gellens Informational [Page 27]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+10. References
+
+ [ACAP] Newman, C. and J. Myers, "ACAP -- Application
+ Configuration Access Protocol", RFC 2244, November 1997.
+
+ [CRAM-MD5] Klensin, J., Catoe, R. and P. Krumviede, "IMAP/POP
+ AUTHorize Extension for Simple Challenge/Response", RFC
+ 2195, September 1997.
+
+ [SASL] Myers, J., "Simple Authentication and Security Layer
+ (SASL)", RFC 2222, October 1997.
+
+11. Security Considerations
+
+ Security is discussed in many sections of this document. In
+ particular, the need and methods to guard against unauthorized
+ updating of handsets, usurpation of newly-created accounts,
+ compromise of handset security values, and disclosure of carrier
+ proprietary data and handset parameters is covered.
+
+12. Acknowledgments
+
+ Jim Willkie and Marc Phillips contributed greatly to this document.
+ Their help is very much appreciated.
+
+13. Author's Address
+
+ Randall Gellens
+ QUALCOMM Incorporated
+ 6455 Lusk Boulevard
+ San Diego, CA 92121-2779
+
+ Phone: +1 619 651 5115
+ EMail: randy@qualcomm.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Gellens Informational [Page 28]
+
+RFC 2636 OTASP/OTAPA via ACAP July 1999
+
+
+14. Full Copyright Statement
+
+ Copyright (C) The Internet Society (1999). All Rights Reserved.
+
+ This document and translations of it may be copied and furnished to
+ others, and derivative works that comment on or otherwise explain it
+ or assist in its implementation may be prepared, copied, published
+ and distributed, in whole or in part, without restriction of any
+ kind, provided that the above copyright notice and this paragraph are
+ included on all such copies and derivative works. However, this
+ document itself may not be modified in any way, such as by removing
+ the copyright notice or references to the Internet Society or other
+ Internet organizations, except as needed for the purpose of
+ developing Internet standards in which case the procedures for
+ copyrights defined in the Internet Standards process must be
+ followed, or as required to translate it into languages other than
+ English.
+
+ The limited permissions granted above are perpetual and will not be
+ revoked by the Internet Society or its successors or assigns.
+
+ This document and the information contained herein is provided on an
+ "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
+ TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
+ BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
+ HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
+ MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Gellens Informational [Page 29]
+