[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

US20120220267A1 - Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks - Google Patents

Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks Download PDF

Info

Publication number
US20120220267A1
US20120220267A1 US13/468,123 US201213468123A US2012220267A1 US 20120220267 A1 US20120220267 A1 US 20120220267A1 US 201213468123 A US201213468123 A US 201213468123A US 2012220267 A1 US2012220267 A1 US 2012220267A1
Authority
US
United States
Prior art keywords
oma
packet
client
modem
packets
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/468,123
Inventor
Eetay Natan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US13/468,123 priority Critical patent/US20120220267A1/en
Publication of US20120220267A1 publication Critical patent/US20120220267A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/029Firewall traversal, e.g. tunnelling or, creating pinholes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/162Implementing security features at a particular protocol layer at the data link layer

Definitions

  • WiMAX (a.k.a. Worldwide Interoperability for Microwave Access) is a wireless digital communications system, also known as IEEE 802.16, that is intended for wireless “metropolitan area networks”. WiMAX can provide broadband wireless access (BWA) up to 30 miles (50 km) for fixed stations, and 3-10 miles (5-15 km) for mobile stations. In contrast, the WiFi/802.11 wireless local area network standard is limited in most cases to only 100-300 feet (30-100m). With WiMAX, WiFi-like data rates are easily supported, but the issue of interference is lessened. WiMAX operates on both licensed and non-licensed frequencies, providing a regulated environment and viable economic model for wireless carriers. WiMAX can be used for wireless networking in much the same way as the more common WiFi protocol.
  • WiMAX is a second-generation protocol that allows for more efficient bandwidth use, interference avoidance, and is intended to allow higher data rates over longer distances.
  • the IEEE 802.16 standard defines the technical features of the communications protocol.
  • OMA DM protocol is used to transport the provisioning information from a network server (the OMA DM server) into the client notebook.
  • the client in a WiMAX network must be running OMA DM client, and the OMA DM client configures the WiMAX connection parameters.
  • stage (a) is potentially blocked by a firewall and thus problematic.
  • stage (a) It is stage (a) that is potentially blocked by a firewall and thus problematic.
  • FIG. 1 illustrates system components and OMA DM communications according to an embodiment of the present invention
  • FIG. 2 shows a flow of the OMA DM initial packet according to an embodiment of the present invention.
  • the terms “plurality” and “a plurality” as used herein may include, for example, “multiple” or “two or more”.
  • the terms “plurality” or “a plurality” may be used throughout the specification to describe two or more components, devices, elements, units, parameters, or the like.
  • a plurality of stations may include two or more stations.
  • the present invention enhances the state of the WiMAX art enabling the WiMAX stack to provide provisioning and management support independent of Firewalls.
  • Client machines may use different types of personal firewall applications. These firewalls have different APIs (some may not have API) and GUIs for configuration by application (API) and user (GUI). These products usually request user approval for automatic configuration.
  • Firewalls may have different APIs depending on vendor, operating system (Linux, Windows) and API language (C, Java, etc) provided.
  • the OMA DM client support for WiMAX is therefore either dependant on manual/user configuration, of the firewall, or must support all existing APIs (which may not be enough) to provide a foolproof service for to be used by a service provider.
  • An embodiment of the present invention addresses the aforementioned firewall configuration problem in WiMAX device management.
  • Typical WiMAX access networks use OMA DM (a cellular management protocol—Open Mobile Alliance Device Management) for provisioning and initial setup of a WiMAX modem.
  • OMA DM is, in the WiMAX case, using IP/HTTPS as the transport protocol and is therefore subject to blocking by any personal firewall installed on the machine.
  • An embodiment of the present invention is a change proposed to the WiMAX modem's firmware and/or WiMAX modem drivers, which cancels the need to configure the client's firewall.
  • the WiMAX provisioning solution of the present invention is not dependant upon firewall configuration. Since there are many firewall products—it is hard to create a standard SW-based setup for firewalls. In addition to that, the security of the firewall itself might prevent software-based setup of the firewall.
  • an embodiment of the present invention provides that a certain OMA DM packet (referred to herein as Packet 0 ), which is an IP packet, is captured by the WiMAX modem, and routed via the IoCTL WiMAX driver interface, instead of the normal handling, which is to pass the packet into the OS's networking stack (Windows: NDIS).
  • Packet 0 OMA DM packet
  • the WiMAX modem the WiMAX modem
  • IoCTL WiMAX driver interface instead of the normal handling, which is to pass the packet into the OS's networking stack (Windows: NDIS).
  • FIG. 1 generally as 100 , is an illustration of the system components and OMA DM communications according to an embodiment of the present invention.
  • Operator's OMA DM 105 communicates OMA DM via operators base station 110 through WiMAX network 115 to wireless device 120 (such as, but not limited to Notebook computer with WiMAX capability).
  • notebook 120 may include WiMAX modem 125 , OS TCP stack 130 and OMA DM client 135 . Operation may progress as follows:
  • WiMAX Cat 3 Device 145 provides initial Network 150 entry at 160 ;
  • WiMAX Device 145 listens on Port 2948;
  • WiMAX device 145 provides full network entry 180 to Network 150 .
  • the OMA DM bootstrap/package0 packet is shown at 140 .
  • FIG. 2 is an illustration shown generally as 200 of the flow of OMA DM first provisioning packet for WiMAX shown as dotted line 240 .
  • the OMA DM server 205 initiates connection with the OMA DM client 230 by sending a UDP packet to the OMA DM client 230 inside the notebook 220 .
  • the two possible types of such packets in OMA DM may be referred to herein as “package 0” and “bootstrap” 235 .
  • the packet may be transferred over the WiMAX RF 215 via Operator's Base stations 210 into the WiMAX modem 244 , and through the OS's IP stack 245 delivered to the OMA DM client application 230 .
  • the new flow proposed by an embodiment of the present invention is depicted by the solid line 242 .
  • the WiMAX modem 244 monitors the incoming UDP packets and intercepts the OMA DM bootstrap/package 0 packets 235 . In addition to submitting these packets to the normal IP stack 245 , the WiMAX modem 244 also sends the information across the proprietary driver's IoCTL control interface 252 into the WiMAX control stack and from there to the OMA DM client application 230 .
  • Interception of the packets may be by port number (2948 is the standard port for OMA DM), or by pattern matching the data of the UDP packet, or by comparing the UDP source IP address to a pre-set IP address of the OMA DM server—which the OMA DM client can pre-set in the modem.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

An embodiment of the present invention provides a method, comprising enabling firewall bypass for open mobile alliance device management (OMA DM) server-initiated notifications in wireless networks by requiring that a certain OMA DM packet is captured by a modem associated with a OMA DM client and routed via a predetermined driver interface, wherein the OMA DM server initiates connection with the OMA DM client by sending a UDP packet to the OMA DM client inside a wireless device, and wherein the OMA DM packet is transferred over RF channel into a the modem, and through the wireless device OS's IP stack delivered to an application of the OMA DM client.

Description

    RELATED APPLICATION
  • The present application is a continuation of U.S. patent application Ser. No. 13/027,951, filed on Feb. 15, 2011, entitled “TECHNIQUES TO ENABLE FIREWALL BYPASS FOR OPEN MOBILE ALLIANCE DEVICE MANAGEMENT SERVER-INITIATED NOTIFICATIONS IN WIRELESS NETWORKS”, which is a continuation of U.S. patent application Ser. No. 11/967,325, filed on Dec. 31, 2007, entitled “TECHNIQUES TO ENABLE FIREWALL BYPASS FOR OPEN MOBILE ALLIANCE DEVICE MANAGEMENT SERVER-INITIATED NOTIFICATIONS IN WIRELESS NETWORKS”, which are hereby incorporated herein by reference in their entirety and for all purposes.
  • BACKGROUND
  • WiMAX (a.k.a. Worldwide Interoperability for Microwave Access) is a wireless digital communications system, also known as IEEE 802.16, that is intended for wireless “metropolitan area networks”. WiMAX can provide broadband wireless access (BWA) up to 30 miles (50 km) for fixed stations, and 3-10 miles (5-15 km) for mobile stations. In contrast, the WiFi/802.11 wireless local area network standard is limited in most cases to only 100-300 feet (30-100m). With WiMAX, WiFi-like data rates are easily supported, but the issue of interference is lessened. WiMAX operates on both licensed and non-licensed frequencies, providing a regulated environment and viable economic model for wireless carriers. WiMAX can be used for wireless networking in much the same way as the more common WiFi protocol.
  • WiMAX is a second-generation protocol that allows for more efficient bandwidth use, interference avoidance, and is intended to allow higher data rates over longer distances. The IEEE 802.16 standard defines the technical features of the communications protocol. In the communications protocol, during WiMAX attachment process, OMA DM protocol is used to transport the provisioning information from a network server (the OMA DM server) into the client notebook. The client in a WiMAX network must be running OMA DM client, and the OMA DM client configures the WiMAX connection parameters.
  • An OMA DM communication is initiated in two stages:
      • a) DM Server sends UDP alert to the client
      • b) DM Client opens HTTPS session to the server
  • It is stage (a) that is potentially blocked by a firewall and thus problematic. Thus, a strong need exists for techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in WiMAX networks.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The subject matter regarded as the invention is particularly pointed out and distinctly claimed in the concluding portion of the specification. The invention, however, both as to organization and method of operation, together with objects, features, and advantages thereof, may best be understood by reference to the following detailed description when read with the accompanying drawings in which:
  • FIG. 1 illustrates system components and OMA DM communications according to an embodiment of the present invention; and
  • FIG. 2 shows a flow of the OMA DM initial packet according to an embodiment of the present invention.
  • It will be appreciated that for simplicity and clarity of illustration, elements illustrated in the figures have not necessarily been drawn to scale. For example, the dimensions of some of the elements are exaggerated relative to other elements for clarity. Further, where considered appropriate, reference numerals have been repeated among the figures to indicate corresponding or analogous elements.
  • DETAILED DESCRIPTION
  • In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the invention. However, it will be understood by those skilled in the art that the preset invention may be practiced without these specific details. In other instances, well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the present invention.
  • In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the invention. However, it will be understood by those of ordinary skill in the art that the invention may be practiced without these specific details. In other instances, well-known methods, procedures, components, units and/or circuits have not been described in detail so as not to obscure the invention.
  • Although embodiments of the invention are not limited in this regard, discussions utilizing terms such as, for example, “processing,” “computing,” “calculating,” “determining,” “establishing”, “analyzing”, “checking”, or the like, may refer to operation(s) and/or process(es) of a computer, a computing platform, a computing system, or other electronic computing device, that manipulate and/or transform data represented as physical (e.g., electronic) quantities within the computer's registers and/or memories into other data similarly represented as physical quantities within the computer's registers and/or memories or other information storage medium that may store instructions to perform operations and/or processes.
  • Although embodiments of the invention are not limited in this regard, the terms “plurality” and “a plurality” as used herein may include, for example, “multiple” or “two or more”. The terms “plurality” or “a plurality” may be used throughout the specification to describe two or more components, devices, elements, units, parameters, or the like. For example, “a plurality of stations” may include two or more stations.
  • The present invention enhances the state of the WiMAX art enabling the WiMAX stack to provide provisioning and management support independent of Firewalls. Client machines may use different types of personal firewall applications. These firewalls have different APIs (some may not have API) and GUIs for configuration by application (API) and user (GUI). These products usually request user approval for automatic configuration. Firewalls may have different APIs depending on vendor, operating system (Linux, Windows) and API language (C, Java, etc) provided. The OMA DM client support for WiMAX is therefore either dependant on manual/user configuration, of the firewall, or must support all existing APIs (which may not be enough) to provide a foolproof service for to be used by a service provider.
  • An embodiment of the present invention addresses the aforementioned firewall configuration problem in WiMAX device management. Typical WiMAX access networks use OMA DM (a cellular management protocol—Open Mobile Alliance Device Management) for provisioning and initial setup of a WiMAX modem. OMA DM is, in the WiMAX case, using IP/HTTPS as the transport protocol and is therefore subject to blocking by any personal firewall installed on the machine.
  • An embodiment of the present invention is a change proposed to the WiMAX modem's firmware and/or WiMAX modem drivers, which cancels the need to configure the client's firewall. The WiMAX provisioning solution of the present invention is not dependant upon firewall configuration. Since there are many firewall products—it is hard to create a standard SW-based setup for firewalls. In addition to that, the security of the firewall itself might prevent software-based setup of the firewall.
  • Thus, an embodiment of the present invention provides that a certain OMA DM packet (referred to herein as Packet 0), which is an IP packet, is captured by the WiMAX modem, and routed via the IoCTL WiMAX driver interface, instead of the normal handling, which is to pass the packet into the OS's networking stack (Windows: NDIS).
  • Looking at FIG. 1, generally as 100, is an illustration of the system components and OMA DM communications according to an embodiment of the present invention. Operator's OMA DM 105 communicates OMA DM via operators base station 110 through WiMAX network 115 to wireless device 120 (such as, but not limited to Notebook computer with WiMAX capability). Notebook 120 may include WiMAX modem 125, OS TCP stack 130 and OMA DM client 135. Operation may progress as follows:
  • WiMAX Cat 3 Device 145 provides initial Network 150 entry at 160;
  • IP Address acquisition between WiMAX Device 145 and Network 150 at 162 with new device indication 164 to Provisional/OMA DM Server 155;
  • At 165 WiMAX Device 145 listens on Port 2948;
  • PUSH over IP from Provisional/OMA DM Server 155 to WiMAX Device 145 at 170 with Device provisioning at 175; and
  • At 180 WiMAX device 145 provides full network entry 180 to Network 150. The OMA DM bootstrap/package0 packet is shown at 140.
  • Turning now to FIG. 2 is an illustration shown generally as 200 of the flow of OMA DM first provisioning packet for WiMAX shown as dotted line 240. The OMA DM server 205 initiates connection with the OMA DM client 230 by sending a UDP packet to the OMA DM client 230 inside the notebook 220. The two possible types of such packets in OMA DM may be referred to herein as “package 0” and “bootstrap” 235. The packet may be transferred over the WiMAX RF 215 via Operator's Base stations 210 into the WiMAX modem 244, and through the OS's IP stack 245 delivered to the OMA DM client application 230.
  • The new flow proposed by an embodiment of the present invention is depicted by the solid line 242. The WiMAX modem 244 monitors the incoming UDP packets and intercepts the OMA DM bootstrap/package 0 packets 235. In addition to submitting these packets to the normal IP stack 245, the WiMAX modem 244 also sends the information across the proprietary driver's IoCTL control interface 252 into the WiMAX control stack and from there to the OMA DM client application 230.
  • Interception of the packets may be by port number (2948 is the standard port for OMA DM), or by pattern matching the data of the UDP packet, or by comparing the UDP source IP address to a pre-set IP address of the OMA DM server—which the OMA DM client can pre-set in the modem.
  • While certain features of the invention have been illustrated and described herein, many modifications, substitutions, changes, and equivalents may occur to those skilled in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the invention.

Claims (18)

1. A method, comprising:
sending by an open mobile alliance device management (OMA DM) server a UDP packet to an OMA DM client inside a wireless device to initiate connection;
capturing by a modem associated with the OMA DM client a certain OMA DM packet in the UDP packet; and
enabling firewall bypass by requiring that the certain OMA DM packet be routed via a predetermined driver interface and through an IP stack delivered to an application of said OMA DM client;
wherein said OMA DM packet is transferred over RF channel to said modem.
2. The method of claim 1, wherein said OMA DM packet is an IP packet.
3. The method of claim 1, wherein said predetermined driver interface is the IoCTL driver interface.
4. The method of claim 3, wherein said modem or its related drivers monitors incoming UDP packets and intercepts said OMA DM packets instead or in addition to submitting bootstrap/package 0 packets to a normal IP stack, said modem also sends the information across the proprietary driver's IOCTL control interface into a control stack and from there to said OMA DM client application.
5. The method of claim 4, wherein the interception of said packets is by port number or by pattern matching the data of the UDP packet or by comparing the UDP source IP address to a pre-set IP address of said OMA DM server which the OMA DM client pre-sets in the modem.
6. A system, comprising:
an open mobile alliance device management (OMA DM) server; and
a wireless client operable to communicate with said OMA DM server over a wireless network to enable firewall bypass by:
receiving from the OMA DM server a UDP packet to initiate connection;
capturing by a modem a certain OMA DM packet in the UDP packet;
routing the OMA DM packet via a predetermined driver interface and through an IP stack delivered to an application of the wireless client.
7. The system of claim 6, wherein said OMA DM packet is an IP packet.
8. The system of claim 6, wherein said predetermined driver interface is a IoCTL driver interface.
9. The system of claim 6, wherein said OMA DM server initiates connection with said OMA DM client by sending a UDP packet to the OMA DM client inside a wireless device.
10. The system of claim 9, wherein said OMA DM packet is transferred over RF into a modem and through said wireless device OS's IP stack delivered to an application of said OMA DM client.
11. The system of claim 10, wherein said modem monitors incoming UDP packets and intercepts said OMA DM packets and instead or in addition to submitting bootstrap/package 0 packets to a normal IP stack, said modem also sends the information across the proprietary driver's IoCTL control interface into the control stack and from there to said OMA DM client application.
12. The system of claim 11, wherein the interception of said packets is by port number or by pattern matching the data of the UDP packet or by comparing the UDP source IP address to a pre-set IP address of said OMA DM server which the OMA DM client pre-sets in the modem.
13. A apparatus, comprising:
a wireless device operable to communicate with a OMA DM server over a wireless network and capable of enabling firewall bypass by:
capturing by a modem a certain OMA DM packet in an UDP packet from the OMA DM server;
routing the OMA DM packet via a predetermined driver interface and through an IP stack delivered to an application of the wireless device.
14. The apparatus of claim 13, wherein said OMA DM packet is an IP packet.
15. The apparatus of claim 14, wherein said predetermined driver interface is the IoCTL driver interface.
16. The apparatus of claim 15, wherein said OMA DM server initiates connection with said wireless device by sending a UDP packet to the wireless device.
17. The apparatus of claim 16, wherein said OMA DM packet is transferred over RF into said modem, and through said wireless device OS's IP stack.
18. The apparatus of claim 17, wherein said modem monitors incoming UDP packets and intercepts said OMA DM packets and instead or in addition to submitting bootstrap/package 0 packets to a normal IP stack, said modem also sends the information across the proprietary driver's IOCTL control interface into the control stack and from there to said wireless client.
US13/468,123 2007-12-31 2012-05-10 Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks Abandoned US20120220267A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/468,123 US20120220267A1 (en) 2007-12-31 2012-05-10 Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/967,325 US20090172187A1 (en) 2007-12-31 2007-12-31 Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks
US13/027,951 US8204934B2 (en) 2007-12-31 2011-02-15 Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks
US13/468,123 US20120220267A1 (en) 2007-12-31 2012-05-10 Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/027,951 Continuation US8204934B2 (en) 2007-12-31 2011-02-15 Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks

Publications (1)

Publication Number Publication Date
US20120220267A1 true US20120220267A1 (en) 2012-08-30

Family

ID=40799947

Family Applications (3)

Application Number Title Priority Date Filing Date
US11/967,325 Abandoned US20090172187A1 (en) 2007-12-31 2007-12-31 Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks
US13/027,951 Expired - Fee Related US8204934B2 (en) 2007-12-31 2011-02-15 Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks
US13/468,123 Abandoned US20120220267A1 (en) 2007-12-31 2012-05-10 Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US11/967,325 Abandoned US20090172187A1 (en) 2007-12-31 2007-12-31 Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks
US13/027,951 Expired - Fee Related US8204934B2 (en) 2007-12-31 2011-02-15 Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks

Country Status (6)

Country Link
US (3) US20090172187A1 (en)
EP (1) EP2227877A4 (en)
JP (1) JP5196359B2 (en)
KR (1) KR101093838B1 (en)
CN (1) CN101911594B (en)
WO (1) WO2009088595A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107251593A (en) * 2015-04-10 2017-10-13 华为技术有限公司 Data package processing method and relevant device

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7840687B2 (en) * 2007-07-11 2010-11-23 Intel Corporation Generic bootstrapping protocol (GBP)
US20090172187A1 (en) * 2007-12-31 2009-07-02 Eetay Natan Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks
US8509096B2 (en) * 2009-08-06 2013-08-13 Intel Corporation Method and apparatus for activating a wireless communication device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8204934B2 (en) * 2007-12-31 2012-06-19 Intel Corporation Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5778174A (en) * 1996-12-10 1998-07-07 U S West, Inc. Method and system for providing secured access to a server connected to a private computer network
WO2000068824A1 (en) * 1999-05-10 2000-11-16 3Com Corporation Method and system for network management
US20050125532A1 (en) * 2000-05-26 2005-06-09 Gur Kimchi Traversing firewalls and nats
US6931128B2 (en) * 2001-01-16 2005-08-16 Microsoft Corporation Methods and systems for generating encryption keys using random bit generators
WO2002060149A2 (en) * 2001-01-26 2002-08-01 Placeware, Inc. A method and apparatus for automatically determining an appropriate transmission method in a network
US20040181611A1 (en) * 2003-03-14 2004-09-16 Viresh Ratnakar Multimedia streaming system for wireless handheld devices
US7529200B2 (en) * 2003-07-24 2009-05-05 3E Technologies International, Inc. Method and system for fast setup of group voice over IP communications
US7392512B2 (en) * 2003-09-08 2008-06-24 Microsoft Corporation System and method for automatic conversion from WAP client provisioning XML represented objects to OMA DM tree structure represented objects
KR100522138B1 (en) * 2003-12-31 2005-10-18 주식회사 잉카인터넷 Flexible network security system and method to permit trustful process
US7523155B2 (en) * 2004-03-18 2009-04-21 International Business Machines Corporation Method, system and program product for using open mobile alliance (OMA) alerts to send client commands/requests to an OMA DM server
US7421477B2 (en) * 2004-03-19 2008-09-02 Media Captioning Services Real-time media captioning subscription framework for mobile devices
KR100602600B1 (en) * 2004-11-19 2006-07-19 주식회사 네이블커뮤니케이션즈 A VoIP TRAFFIC PROCESSING SYSTEM
CN100489827C (en) * 2004-12-30 2009-05-20 诺基亚公司 Method, system and equipment for using configuration of equipment with multiple configurations by using access control information.
FI20050067A (en) * 2005-01-20 2006-07-21 Pekka Rehtijaervi Methods and devices controlled by push communications
US7886311B2 (en) * 2005-03-29 2011-02-08 Microsoft Corporation Synchronous RIL proxy
AU2006300872A1 (en) * 2005-10-14 2007-04-19 Nokia Corporation Declaring terminal provisioning with service guide
KR100913976B1 (en) 2007-06-28 2009-08-25 노키아 코포레이션 Use of configurations in device with multiple configurations

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8204934B2 (en) * 2007-12-31 2012-06-19 Intel Corporation Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107251593A (en) * 2015-04-10 2017-10-13 华为技术有限公司 Data package processing method and relevant device

Also Published As

Publication number Publication date
KR20100097760A (en) 2010-09-03
JP5196359B2 (en) 2013-05-15
US8204934B2 (en) 2012-06-19
CN101911594B (en) 2014-07-23
EP2227877A1 (en) 2010-09-15
CN101911594A (en) 2010-12-08
US20090172187A1 (en) 2009-07-02
KR101093838B1 (en) 2011-12-13
US20110138045A1 (en) 2011-06-09
WO2009088595A1 (en) 2009-07-16
EP2227877A4 (en) 2012-12-26
JP2011511505A (en) 2011-04-07

Similar Documents

Publication Publication Date Title
US10326737B2 (en) Mobile hotspot managed by access controller
US11750662B2 (en) Multi-access edge computing services security in mobile networks by parsing application programming interfaces
US8286002B2 (en) Method and apparatus for providing secure remote access to enterprise networks
US7903645B2 (en) Methods, apparatus and systems configured for heterogeneous secure associations in Wi-Fi PAN
US20080205339A1 (en) Auto-Provisioning of a Mobile Computing Device for Operation With A Wireless Network
US8204934B2 (en) Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks
US20110030055A1 (en) Detecting Spoofing in Wireless Digital Networks
US20240306256A1 (en) Techniques for binding operator-defined network service configurations to applications
US11979746B1 (en) Selective intelligent enforcement in mobile networks
CA3073340C (en) A method of controlling hotspot access on multi-band access point
US11943620B2 (en) Context-based security over interfaces in O-RAN environments in mobile networks
US11950144B2 (en) Context-based security over interfaces in NG-RAN environments in mobile networks
US20240129885A1 (en) Secure hybrid integrated private 5g deployment architecture
CN112689298B (en) LTE module remote control communication method and system suitable for IDU equipment
WO2023163843A1 (en) Context-based security over interfaces in ng-ran environments and o-ran environments in mobile networks

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION