Siêu thị PDFTải ngay đi em, trời tối mất

Thư viện tri thức trực tuyến

Kho tài liệu với 50,000+ tài liệu học thuật

© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Understanding WAP Wireless Applications, Devices, and Services phần 6 docx
MIỄN PHÍ
Số trang
31
Kích thước
214.2 KB
Định dạng
PDF
Lượt xem
1823

Understanding WAP Wireless Applications, Devices, and Services phần 6 docx

Nội dung xem thử

Mô tả chi tiết

Page 134

(not to be mixed up with the multipart sent between the push initiator and the push proxy gateway). If the content

indicated by a service indication, for example, a WML deck, is placed as the first entity in a multipart conveyed to the

mobile client and the service indication is placed as the second entity, then the WML deck will be cached before the

service indication is presented. So when the user chooses to load the indicated service, the content is readily available in

the cache, which will improve the user experience. But remember, given what was said in Section 6.4.6.2, a priori

knowledge of the client's capabilities is recommended if this approach should be used. If a thin client is addressed, it is

usually better to only send the service indication.

Service indication also provides some additional features to improve its usability. These include deletion and

replacement of previously submitted service indications, resolving race conditions, and the possibility to specify the level

of user-intrusiveness (controls when the service indication should be presented to the user if the client is busy when it is

received). It is also possible to specify when a service indication expires and thereby should be automatically deleted.

6.4.8 Service loading

Service loading [7] is also an XML-based content type, and just like service indication, is used to instruct the mobile

client to load content indicated by a URL into a clean user agent context. The difference is that no message can be

presented to the user, and the indicated service will be loaded without any user intervention at all. Hence, the user will

experience the indicated service as if it were pushed and executed or rendered directly. It is also possible to use the

content type to instruct the client to preemptively place the content indicated by the URL in the cache.

This is directly contrary to what was said in Section 6.4.6.2, and the content type should therefore be used very

carefully. The content type is first and foremost intended to be used in services that require some kind of user

interactivity where the user would find it odd if he or she had to confirm every push.

The push initiator management functions discussed in Section 6.4.4.2 included the possibility of controlling what

content types different push initiators should be allowed to include in a push submission. Since service loading is a

content type that can be misused, it is thus a splendid example of a content type of which it should be possible to restrict

the use.

Page 135

6.5 Security aspects

Security is an extensive topic, and in-depth knowledge is often required to understand its implications. As this chapter is

about push, this section is limited to introducing some basic security aspects to be considered when delivering content

using push. A detailed discussion of security issues in WAP can be found in Chapter 7. However, while the focus is on

push, much of the reasoning also applies to pull. Since the push framework defines delivery mechanisms to be used both

on the Internet and in the wireless domain, security considerations need to be addressed in both cases.

6.5.1 Internet security

A range of security protocols to be used on the Internet is already widely available, allowing push initiators and push

proxy gateways to communicate in a safe manner. The secure socket layer (SSL) is the most frequently used security

protocol on top of the transport control protocol/Internet protocol (TCP/IP), especially in conjunction with HTTP (often

referred to as HTTPS). It provides mechanisms for authenticating both servers and clients, encryption to ensure data

confidentiality, and message authentication codes to ensure data integrity. If transport protocols other than HTTP will be

accommodated by the push access protocol in the future, protocols like secure/multipurpose Internet mail extensions

(S/MIME) or Internet protocol secure (IPsec) may be other qualified candidates.

The features provided by protocols like SSL might in some cases be superfluous. For example, if the WAP gateway is

only connected to a corporate intranet, there might not be a need for a security protocol, or the means provided by HTTP

itself (for example, HTTP basic authentication, a simple user/password mechanism) might suffice.

6.5.2 WAP security

In WAP, the WTLS [8] protocol provides the same functions as listed for SSL. As a matter of fact, WTLS is derived

from the transport layer security (TLS) protocol, which in turn is based on SSL version 3.0. WTLS is optimized with

respect to the number and size of the messages sent over the air, and it can also run on top of an unreliable transport

protocol.

Page 136

6.5.3 End-to-end security

So then, are there no hindrances to establishing an adequate security relationship between a push initiator and a mobile

client? Well, that depends on the situation, and especially on which type of service is to be implemented. While, for

instance, SSL may be used on the Internet and WTLS in the wireless domain, to provide sufficient security in each

specific case, the push proxy gateway needs to be able to translate between these protocols and possibly also perform

various transformations on the content. In doing so, the security chain between the push initiator and the mobile client is

broken.

The lower part of Figure 6.6 attempts to illustrate that end-to-end security can only be accomplished when the mobile

client communicates with a WAP server. The WAP Forum has considerably improved end-to-end security in the WAP

1.2 specifications released in November 1999.

An end-to-end solution is most often the only viable one when services like banking and e-commerce are brought

about. However, transitive trust (also known as delegated trust or hop-by-hop security) is an acceptable solution for most

other services.

6.5.4 Transitive trust

Transitive trust can be established if the push proxy gateway, or rather the push proxy gateway operator, can be

considered trusted by the user

Figure 6.6 Security.

Tải ngay đi em, còn do dự, trời tối mất!