Retail activation of devices operable in wireless networks, such as, but not limited to, those operating in conformity with the Institute for Electronic and Electrical Engineers (IEEE) 802.16 (WiMAX) standard, is made possible by pushing parameters from WiMAX networks to the WiMAX devices (e.g., but not limited to, notebook or mobile stations (MS)) via a special provisioning session between WiMAX networks and WiMAX devices, which use the OMA DM protocol (referred to herein as an ‘OMA DM session’ as seen in
Because parameters vary from one NSP to another, the WiMAX device software/firmware cannot provide a trusted proof that a WiMAX activation was indeed performed by a certain NSP on that WiMAX device. Providing such a proof means the WiMAX device is able to produce some information it could not have, unless it was actually activated, which can be verified by a NSP. Such a proof is useful for business reasons, such as audits or dispute resolution (for example in activation revenue share between a device manufacturer and NSP).
The WiMAX standard defines over the air provisioning using an OMA DM (a certain standard protocol from the Open Mobile Alliance) session where WiMAX device's provisioning information is sent over the RF by WiMAX carrier (NSP)'s provisioning server into the WiMAX device. It is important to note that some parts of the provisioning information are tightly coupled together (example: user-name and password), and must be applied together to maintain consistency on the WiMAX device.
However, the OMA DM provisioning server (according to the OMA DM standard) sends each parameter and receives ACKnowledge for it, separately. Overcoming this problem is simple: To prevent applying partial information, most devices, and in particular WiMAX devices, apply the provisioning information only at the end of a successful DM session. The above implementation creates the following potential problem: a failure in the connectivity (RF, IP or otherwise) occurring during the OTA provisioning session where device has not applied the information, but has already ACK'ed what was pushed by OMA DM server till the disconnect, leads the network's OMA DM provisioning server to believe that certain information is already provisioned on the device while it is actually lost. This in turn means the OMA DM provisioning server will not push that provisioning information again, resulting in failure to provision the device automatically, since OMA OM server and client cannot recover in this case without some external trigger, such as user reset.
Thus, there is an important need for techniques for generating proof of wireless network activation and safely handling a disconnect during a network provisioning session.
The subject matter regarded as the invention is particularly pointed out and distinctly claimed in the concluding portion of the specification. The invention, however, both as to organization and method of operation, together with objects, features, and advantages thereof, may best be understood by reference to the following detailed description when read with the accompanying drawings in which:
It will be appreciated that for simplicity and clarity of illustration, elements illustrated in the figures have not necessarily been drawn to scale. For example, the dimensions of some of the elements are exaggerated relative to other elements for clarity. Further, where considered appropriate, reference numerals have been repeated among the figures to indicate corresponding or analogous elements.
In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the present invention.
Some portions of the detailed description that follows are presented in terms of algorithms and symbolic representations of operations on data bits or binary digital signals within a computer memory. These algorithmic descriptions and representations may be the techniques used by those skilled in the data processing arts to convey the substance of their work to others skilled in the art. In some embodiments, such algorithms and data processing may include analog processing at baseband frequencies, intermediate-frequencies (IF), or radio-frequencies (RF) implemented at least in part in hardware, in software, or in a combination thereof, although the scope of the invention is not limited in this respect.
An algorithm is here, and generally, considered to be a self-consistent sequence of acts or operations leading to a desired result. These include physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers or the like. It should be understood, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities.
Unless specifically stated otherwise, as apparent from the following discussions, it is appreciated that throughout the specification discussions utilizing terms such as processing, computing, calculating, determining, or the like, refer to the action or processes of a computer or computing system, or similar electronic computing device, that manipulate or transform data represented as physical, such as electronic, quantities within the registers or memories of the computing system into other data similarly represented as physical quantities within the memories, registers or other such information storage, transmission or display devices of the computing system.
Embodiments of the present invention may include apparatuses for performing the operations herein. This apparatus may be specially constructed for the desired purposes, or it may comprise a general purpose computing device selectively activated or reconfigured by a program stored in the device. Such a program may be stored on a storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), electrically programmable read-only memories (EPROMs), electrically erasable and programmable read only memories (EEPROMs), flash memory, magnetic or optical cards, or any other type of media suitable for storing electronic instructions, and capable of being coupled to a system bus for a computing device.
The processes and displays presented herein are not inherently related to any particular computing device or other apparatus. Various general purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct a more specialized apparatus to perform the desired method. The desired structure for a variety of these systems will appear from the description below. In addition, embodiments of the present invention are not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the invention as described herein.
In the following description and claims, the terms coupled and connected, along with their derivatives, may be used. In particular embodiments, connected may be used to indicate that two or more elements are in direct physical or electrical contact with each other. Coupled may mean that two or more elements are in direct physical or electrical contact. However, coupled may also mean that two or more elements may not be in direct contact with each other, but yet may still cooperate or interact with each other.
Embodiments of the present invention provide using actual values inside the WiMAX OMA DM activation session itself, to produce a unique combination of values the WiMAX device would find very hard to put together (de-facto would not have otherwise been able to produce), unless it was actually activated. Thus, the WiMAX device will be able to prove it was activated by a certain network service provider (NSP). More specifically, embodiments of the present invention provide using those values from DM commands and manipulating the DM tree's parameters concerning the subscriber setup and the authentication setup. These commands within the session can be detected by the OMA DM tree path as follows (it is understood that this particular tree path is merely illustrative):
indicates data missing or illegible when filed
This is specified according to the WiMAX forum standard for the OMA DM session and parameters for over-the-air (OTA) provisioning which is depicted generally as 200 of
The following values may be taken from OMA DM session according to embodiments of the present invention:
DM server parameters, such as IP address;
The Session IDs of the DM session where provisioning the authentication parameters occurred; and
The Message IDs of the DM message(s) inside the DM session, containing the provisioning commands of the authentication parameters.
Further embodiments of the present invention provide safely handling a disconnect during a wireless network, such as WiMAX wireless network, provisioning session.
Mobile Station (MS)—The WiMAX device; Notebook, MID or otherwise with a WiMAX modem and WiMAX stack, including OMA DM client;
OMA DM provisioning server—The server on the WiMAX core network side, responsible for provisioning the WiMAX device;
(current) OMA DM tree—a database held on WiMAX device side that holds the active provisioning information. OMA DM server request modifications to this database during WiMAX provisioning, but changes are only applied at certain times by MS; and
(new) OMA DM tree—Embodiments of the present invention define a copy of the current OMA DM database. This copy is held on the WiMAX device side and holds the very latest provisioning information. This database is changed on the fly by the OMA DM server during OMA DM session.
In operation, embodiments of the present invention provide that whenever an OMA DM server establishes a session with Mobile Station (MS), the MS interacts with OMA OM server as per the WiMAX OTA specification and OMA DM standard. The changes made by OMA DM server to provisioning information are recorded by the MS (i.e. the MS keeps an updated copy of OMA DM tree, with all the new information pushed by OMA DM server).
The information is applied when the OMA DM session completes successfully. The MS replaces the current OMA DM tree with the new updated OMA DM tree. If the OMA DM session does not complete successfully, the new OMA DM tree copy is stored aside (e.g. in disk), but does not change the current OMA DM tree.
When a new OMA DM session is created, the OMA DM tree reflected to the OMA DM server is the new OMA DM tree (includes the modifications from last session which did not complete). The OMA DM server can continue modifying the new OMA DM tree. This process may be repeated depending on if the OMA session completes successfully or not.
While certain features of the invention have been illustrated and described herein, many modifications, substitutions, changes, and equivalents may occur to those skilled in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the invention.