Bootstrapping Server Function
   HOME
*





Bootstrapping Server Function
A Bootstrapping Server Function (BSF) is an intermediary element in Cellular networks which provides application-independent functions for mutual authentication of user equipment and servers unknown to each other and for 'bootstrapping' the exchange of secret session keys afterwards. This allows the use of additional services like Mobile TV and PKI, which need authentication and secured communication. GBA/GAA Setup The setup and function to deploy a generic security relation as described is called Generic Bootstrapping Architecture (GBA) or Generic Authentication Architecture (GAA). In short, it consists of the following elements. * user equipment (UE), e. g. a mobile cellular telephone; needs access to a specific service * application server (NAF: Network Application Function), e. g. for mobile TV; provides the service * BSF (Bootstrapping Server Function); arranges security relation between UE and NAF * mobile network operator's Home Subscriber Server (HSS); hosts user profi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


BSF Positioning Between UE, NAF And HSS
BSF may refer to: Organisations * Ballerup-Skovlunde Fodbold, a Danish football club * British Skin Foundation, a UK charity raising money for skin disease and skin cancer research * Bibliothèques Sans Frontières, an international non profit * Bible Study Fellowship, an international Christian organisation * United States – Israel Binational Science Foundation * Biosciences Federation, a UK life science organisation * Border Security Force, Indian government paramilitary force * Brandy Station Foundation, an organization devoted to preserving a battle site in Virginia, United States * British Softball Federation, the National Governing Body of softball within the UK * Bund Schweizerischer Frauenvereine, Swiss national federation of women's organizations Science * Basilar skull fracture, a head injury * Biosand filter, water filtration technique * Black Soldier Fly, a larva used in permaculture Computing * Bean Scripting Framework, software to integrate the Java programmi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cellular Network
A cellular network or mobile network is a communication network where the link to and from end nodes is wireless. The network is distributed over land areas called "cells", each served by at least one fixed-location transceiver (typically three cell sites or base transceiver stations). These base stations provide the cell with the network coverage which can be used for transmission of voice, data, and other types of content. A cell typically uses a different set of frequencies from neighboring cells, to avoid interference and provide guaranteed service quality within each cell. When joined together, these cells provide radio coverage over a wide geographic area. This enables numerous portable transceivers (e.g., mobile phones, tablets and laptops equipped with mobile broadband modems, pagers, etc.) to communicate with each other and with fixed transceivers and telephones anywhere in the network, via base stations, even if some of the transceivers are moving through more ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit. Methods Authentication is relevant to multiple fields. In art, antiques, and anthropology, a common problem is verifying that a given artifact was produced by a certain person or in a certain place or period of history. In computer science, verifying a user's identity is often required to allow access to confidential data or systems. Authentication can be considered to be of three types: The first type of authe ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Mobile TV
Mobile television is television watched on a small handheld or mobile device. It includes service delivered via mobile phone networks, received free-to-air via terrestrial television stations, or via satellite broadcast. Regular broadcast standards or special mobile TV transmission formats can be used. Additional features include downloading TV programs and podcasts from the Internet and storing programming for later viewing. According to the ''Harvard Business Review'', the growing adoption of smartphones allowed users to watch as much mobile video in three days of the 2010 Winter Olympics as they watched throughout the entire 2008 Summer Olympics, a five-fold increase. However, except in South Korea, consumer acceptance of broadcast mobile TV has been limited due to lack of compatible devices. Early mobile TV receivers were based on old analog television systems. They were the earliest televisions that could be placed in a coat pocket. The first was the Panasonic IC TV MODEL ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Public Key Infrastructure
A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred. In cryptography, a PKI is an arrangement that ''binds'' public keys with respective identities of entities (like people and organizations). The binding is established through a process of registration and issuance of certificates at and by a certificate authority (CA). Depending on the assurance level of the binding, this may be carried out by an aut ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Generic Bootstrapping Architecture
Generic Bootstrapping Architecture (GBA) is a technology that enables the authentication of a user. This authentication is possible if the user owns a valid identity on an HLR (Home Location Register) or on an HSS (Home Subscriber Server). GBA is standardized at the 3GPP (http://www.3gpp.org/ftp/Specs/html-info/33220.htm). The user authentication is instantiated by a shared secret, one in the smartcard, for example a SIM card inside the mobile phone and the other is on the HLR/HSS. GBA authenticates by making a network component challenge the smartcard and verify that the answer is the one predicted by the HLR/HSS. Instead of asking the service provider to trust the BSF and relying on it for every authentication request, the BSF establishes a shared secret between the simcard card and the service provider. This shared secret is limited in time and for a specific domain. Strong points This solution has some strong points of certificate and shared secrets without having some ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Generic Authentication Architecture
Generic Authentication Architecture (GAA) is a standard made by 3GPP defined iTR 33.919 Taken from the document: "This Technical Report aims to give an overview of the different mechanisms that mobile applications can rely upon for authentication between server and client (i.e. the UE). Additionally it provides guidelines related to the use of GAA and to the choice of authentication mechanism in a given situation and for a given application". Related standards are Generic Bootstrapping Architecture Generic Bootstrapping Architecture (GBA) is a technology that enables the authentication of a user. This authentication is possible if the user owns a valid identity on an HLR (Home Location Register) or on an HSS (Home Subscriber Server). GBA is s ... (GBA) and Support for Subscriber Certificates (SSC). External links 3GPP Mobile telecommunications standards 3GPP standards ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Bootstrapping
In general, bootstrapping usually refers to a self-starting process that is supposed to continue or grow without external input. Etymology Tall boots may have a tab, loop or handle at the top known as a bootstrap, allowing one to use fingers or a boot hook tool to help pulling the boots on. The saying "to " was already in use during the 19th century as an example of an impossible task. The idiom dates at least to 1834, when it appeared in the ''Workingman's Advocate'': "It is conjectured that Mr. Murphee will now be enabled to hand himself over the Cumberland river or a barn yard fence by the straps of his boots."Jan FreemanBootstraps and Baron Munchausen ''Boston.com'', January 27, 2009 In 1860 it appeared in a comment on philosophy of mind: "The attempt of the mind to analyze itself san effort analogous to one who would lift himself by his own bootstraps." Bootstrap as a metaphor, meaning to better oneself by one's own unaided efforts, was in use in 1922. This metaphor s ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]