Short message service security for zero touch deployments
First Claim
1. A method comprising:
- initializing a device with an integrated wireless wide area network (WWAN) interface such that the device attaches to a WWAN;
receiving, via the WWAN interface of the device, a data message that includes encrypted bootstrap configuration information;
obtaining a key stored in a phone book portion of a subscriber identification module (SIM) card of the WWAN interface;
decrypting the encrypted bootstrap configuration information using the key;
establishing communication with a remote server using the bootstrap configuration information and obtaining configuration data from the remote server; and
performing self-configuration of the device using the configuration data.
1 Assignment
0 Petitions
Accused Products
Abstract
Presented herein are techniques for enabling the zero touch deployment of devices having an integrated wireless wide area network (WWAN) interface. In one example, a method includes initializing a device with a WWAN interface such that the device attaches to a WWAN, receiving, via the WWAN interface of the device, a data message that includes encrypted bootstrap configuration information, obtaining a key stored in a subscriber identification module (SIM) card of the WWAN interface, decrypting the encrypted bootstrap configuration information using the key, establishing communication with a remote server using the bootstrap configuration information and obtaining configuration data from the remote server, and performing self-configuration of the device using the configuration data.
-
Citations
20 Claims
-
1. A method comprising:
-
initializing a device with an integrated wireless wide area network (WWAN) interface such that the device attaches to a WWAN; receiving, via the WWAN interface of the device, a data message that includes encrypted bootstrap configuration information; obtaining a key stored in a phone book portion of a subscriber identification module (SIM) card of the WWAN interface; decrypting the encrypted bootstrap configuration information using the key; establishing communication with a remote server using the bootstrap configuration information and obtaining configuration data from the remote server; and performing self-configuration of the device using the configuration data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A device comprising:
-
a wireless wide area network (WWAN) interface; a memory, and a processor coupled to the memory and configured to; initialize the device with the WWAN interface such that the device attaches to a WWAN; receive, via the WWAN interface, a data message that includes encrypted bootstrap configuration information; obtain a key stored in a phone book portion of a subscriber identification module (SIM) card of the WWAN interface; decrypt the encrypted bootstrap configuration information using the key; establish communication with a remote server using the bootstrap configuration information and obtain configuration data from the remote server; and perform self-configuration of the device using the configuration data. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. One or more non-transitory computer readable storage media encoded with software comprising computer executable instructions and when the software is executed operable to:
-
initialize a device with an integrated wireless wide area network (WWAN) interface such that the device attaches to a WWAN; receive, via the WWAN interface of the device, a data message that includes encrypted bootstrap configuration information; obtain a key stored in a phone book portion of a subscriber identification module (SIM) card of the WWAN interface; decrypt the encrypted bootstrap configuration information using the key; establish communication with a remote server using the bootstrap configuration information and obtain configuration data from the remote server; and perform self-configuration of the device using the configuration data. - View Dependent Claims (17, 18, 19, 20)
-
Specification