Device Management Implementation Guide for IoT Solutions

Size: px
Start display at page:

Download "Device Management Implementation Guide for IoT Solutions"

Transcription

1 Device Management Implementation Guide Device Management Implementation Guide for IoT Solutions Version 3.0

2 Author(s) Group Phone # Steve Hardin IoT Solutions (AT&T) +1 (404) sh3153@att.com Jordan Alexander IoT Solutions (AT&T) +1 (470) ja154p@att.com Alpana Hoffman Project Manager (Nokia) alpana.hoffman@nokia.com John Engquist Technical Point of Contact john.engquist@nokia.com (Nokia) Rano Sugandi Pre-Sales PM (Nokia) rano.sugandi@nokia.com Elvis Mena OEM Customer Team (Nokia) elvis.mena@nokia.com John Ramey OEM Customer Team (Nokia) John.ramey@nokia.com 2

3 Abstract This document is an implementation guide for technical approval of Embedded Wireless Radio Modules and Internet of Things (IoT) Host Devices. The guide describes what to consider when implementing OMA-DM or LwM2M into the Embedded Wireless Radio Module for AT&T. Please direct any questions to your IoT Solutions contact. IoT Host Device integrators are directed to review the Appendix A - Minimum Requirements to Implement ODIS/DHIR/Portfolio for IoT Host Devices using an Approved Module (AM) at the end of this document for a simplified guide for enabling and leveraging the ODIS/DHIR/Portfolio functionality embedded in an chosen radio module that supports ODIS/DHIR/Portfolio. This document contains trade secrets and proprietary information of AT&T. No use or disclosure of the information contained herein is permitted without prior written consent. Revision History Date Revision Description 7/9/ Withdrew v.16 of ODIS Implementation Guide 7/9/ Initial release of public version of Device Management Implementation guide 8/3/ Added CDR-DVM details for IoT bootstrap accounts. 4/26/ Section 1.5: Added address for delivery of.csv files. Added requirement for legacy devices manufactured in 2015 & /6/ Section 1.5: Added table showing sample data. Re-added host unique ID into the data set request. 7/29/ Added sections 3.4 and 3.5 5/22/ New format 8/22/ Changed Bootstrap Accounts into LWM2M Server Accounts and added Bootstrap Accounts for actual Bootstrap Servers. Added method for Registration Update Trigger over SMS. Added Nokia contacts. 3

4 Table of Contents 1. Introduction Architecture System Components Support Requirements for IoT Host Devices IoT Host Device Requirements General Support Requirements for Modules Embedded Wireless Radio Module Requirements Device Management Client Protocols OMA-DM or LwM2M OMA-DM Specifications LwM2M Specifications AT&T Subscriber Product Engineering Device Requirements OEM Specific DM Implementations ODIS/DHIR/Portfolio Requirements for IOT Modules General ODIS/DHIR/Portfolio Requirements for the Module Default ODIS/DHIR/Portfolio settings in DM client Default ODIS/DHIR/Portfolio Values for IoT Modules Firmware Update Over the Air (FOTA) Memory Allocation in the Module Host Device to Radio Module Interface Requirements for IOT Modules supporting OMA DM General OMA DM Requirements Dedicated APN for OMA DM DM Account Provisioning for IoT Modules Supporting OMA DM DM Account Parameters for IOT Modules Supporting OMA DM <CDR-DVM-3954> First DM Account Parameters for a Module <CDR-DVM-3955> Second DM Account Parameters for a Module Identity and Detail Nodes for IOT Modules Supporting OMA DM Embedded IOT Module SVN (IMEI SV) ODIS/DHIR Support by an IOT Module Utilizing OMA-DM Firmware Update Over the Air (FOTA) OMA-DM Firmware Update Management Object (FUMO) Support

5 Proprietary Update Memory Allocation in the Module Requirements for IOT Modules supporting LWM2M General LWM2M Requirements Dedicated APN for LWM2M UQS (UDP with Queue Mode and SMS) Transport and Binding Mode Support LWM2M Operations Data Formats Bootstrap Server Account Provisioning for IoT Modules Supporting LWM2M Bootstrap Prioritization Sequence for IOT Modules Supporting LWM2M <CDR-DVM-032> Support for OMA LWM2M Bootstrap Profile as specified in the OMA LWM2M specification <CDR-DVM-033> Support for OMA LWM2M Write of Bootstrap Profile Production Bootstrap Server Security Object Lab Bootstrap Server Security Object Production Server Security Object Parameters for an IOT Module supporting LWM2M Lab Server Security Object Parameters for an IOT Module supporting LWM2M Production Server Object Parameters for an IOT Module supporting LWM2M Lab Server Object Parameters for an IOT Module supporting LWM2M Device Details Object for IoT Modules Supporting LWM2M ODIS/DHIR/Portfolio Support by an IOT Module Utilizing LwM2M LWM2M Object: Portfolio LWM2M Server Object Short Server ID Disable Binding Registration Update Trigger Registration Update Trigger with SMS Access Control Object Object ID Object Instance ID

6 Access Control Owner LWM2M FOTA LWM2M Object: Firmware Update Device Management Testing for IOT Modules Nokia XDM Server Interoperability Testing AT&T Technical Acceptance Testing Appendix A - Minimum Requirements to Implement ODIS/DHIR/Portfolio for IoT Host Devices using an Approved Module (AM) Host Device Test Scope Appendix B - Custom Object ID for ODIS/DHIR Parameters utilizing LWM2M LwM2M Object: HostDeviceInfo Appendix C CoAP over SMS Registration Update Trigger

7 1. Introduction AT&T Internet of Things Solutions Organization AT&T Internet of Things Solutions (IoTS) envisions a scenario where we will enable the ability to provide device management to most of the IoTS embedded wireless radio modules and host devices in our network as a service/solution which may benefit our IoTS partners. This includes all verticals Architecture To better facilitate an understanding of the Device Management Implementation required by AT&T a diagram is provided below System Components For the purposes of this implementation guide, the following components will be referenced: Internet of Things Host Device (IoTHD) - The IoTHD could be a wide variety of connected devices usually serving a specific application and could be part of a larger system of connected devices. Examples could include, but are not limited to utility meters, vehicles, asset or fleet tracking devices, security alarm panels, routers or gateways, etc. In many cases for purposes of simplicity this document will refer to the IoTHD as the host device. IoT Host Device integrators are directed to review the Appendix A - Minimum Requirements to Implement ODIS/DHIR/Portfolio for IoT Host Devices using an Approved Module (AM) at the end of this document for a simplified guide for enabling and leveraging the ODIS/DHIR/Portfolio functionality embedded in an chosen radio module that supports ODIS/DHIR/Portfolio. 7

8 Embedded Wireless Radio Module (EWRM) - The EWRM provides wireless connectivity for the IoTHD. For the purposes of this implementation guide, it is assumed that the EWRM has an embedded Device Management (DM) Client that could be based on either OMA-DM (Open Mobile Alliance Device management) or LwM2M (Lightweight Machine to Machine) standards. In many cases for purposes of simplicity this document will refer the EWRM as the module, IOT module or radio module. OMA-DM IMEI Sync (ODIS) A device management service developed by AT&T used to identify unique IoT devices deployed in a wireless network. ODIS is primarily targeted to host devices which utilize an embedded wireless radio module. Without this service, it is very difficult for a wireless operator to identify unique IoT Host Devices which utilize/leverage an IMEI value which is assigned to the manufacturer of the embedded radio module. The initial implementation of this service utilized the OMA Device Management (OMA-DM) standard. It has since been expanded to also utilize the LwM2M standard API but is referred to as the Portfolio Object within LWM2M. The alternative to the Portfolio object is object also created by AT&T Device Host Identity Reporting (DHIR) This service application should be identical to the AT&T proprietary ODIS service. In an effort to promote wider adoption and use of the ODIS service in 2014 AT&T submitted the service to the committee in GSMA working on the GSMA Connection Efficiency Guidelines. The committee decided to rename the service Device Host Identity Reporting (DHIR) for use within GSMA. The GSMA guidelines containing DHIR were published in International Mobile Equipment Identity (IMEI) The IMEI is a unique 15-digit code used to identify an individual GSM or UTRA or E-UTRA device to a mobile network. The 15 digits of the IMEI consist of 3 parts (an 8 digit TAC, a 6 digit Serial Number Range, and a single digit Check Digit). The 6 digit Serial Number Range allows for up to 1 Million unique IMEI values for every assigned TAC value. Type Allocation Code (TAC) The TAC is the first 8 digits of a 15 digit IMEI. A TAC is issued in blocks of 1M. When a new unique IMEI range is to be assigned the next available TAC is assigned. Typical practice is that IoT devices leverage a TAC which is already allocated to an embedded radio module supplier hence any TAC database reference for such designs identify the supplier of the radio module and do not identify the host device. It is allowed for a Host Device using a radio module design to acquire a dedicated TAC for the device which would then need to be programmed into the embedded radio module before the IoT Host Device is deployed. This method requires tight logistic coordination between the embedded radio module supplier and the IoT Host device manufacturer which is why it is very seldom the chosen method of implementation. Device Management Platform - AT&T manages a DM Platform within its network. This platform is capable of supporting both OMA-DM and LwM2M protocols. The device 8

9 management platform will be used for various functions including device identification and device firmware upgrades. WARNING: For purposes of reading industry specifications such as OMA-DM, LwM2M, and even AT&T many of these documents may refer to the term device. Since the model AT&Tsupports leverages the EWRM to be the master of the device management function for our architecture the term device in these other specifications may be in reference to a function intended for the EWRM. Please be careful not to assume that references to the term device in other specifications is intended to refer to the IoT Host Device. 9

10 2. Support Requirements for IoT Host Devices 2.1. IoT Host Device Requirements IoT Host Devices are required to support the basic ODIS/DHIR/Portfolio functions. IoT Host Device integrators are directed to review the Appendix A - Minimum Requirements to Implement ODIS/DHIR/Portfolio for IoT Host Devices using an Approved Module (AM) of this document for a simplified guide describing how to enable and leverage the ODIS/DHIR/Portfolio functionality embedded in a chosen radio module that supports ODIS/DHIR/Portfolio. IoT Host Devices may optionally support services including data streaming, command and control, and FOTA of the host device offered from the device management applications embedded in the module. 10

11 3. General Support Requirements for Modules AT&T will heavily depend on its module partner ecosystem to properly implement these features to simplify the implementation for hundreds of IoT Host Device integrators. This is why the concepts presented rely on the radio module to be the master element in the relationship between the host device and the module Embedded Wireless Radio Module Requirements The types of device management applications that AT&T may deploy will vary according to customer need. Presently only one application (ODIS/DHIR/Portfolio) is mandatory for all radio modules. ODIS/DHIR/Portfolio support by Radio Modules via either OMA-DM or LwM2M: Effective July 1, 2014, new radio modules entering the AT&T Network Ready Lab for certification must support OMA-DM ODIS/DHIR or LWMWM Portfolio. EXCEPTION: The radio module will only be utilized by a single model of an integrated device and all TACs used in the radio module will only be utilized for that single integrated device. EXCEPTION: The radio module will only be utilized by computing based devices which by PTCRB rules are required to obtain a unique IMEI TAC per device model. (If the module will also be utilized for M2M use cases and does not meet any of the other exception rules then ODIS/DHIR/Portfolio is required). Additional applications supported by the radio module may include but are not limited to: Enablement of radio module firmware upgrade via FOTA Enablement of host device firmware upgrade via FOTA managed by the radio module. Enablement of remote configuration of the radio module Enablement of IoT host device management configuration & command/control managed by the radio module Enablement of enhanced security features Enablement of diagnostics data capture and visualization It is strongly recommended that radio modules entering the AT&T Network Ready Lab support FOTA methods for both the radio module as well as for the host device Device Management Client Protocols OMA-DM or LwM2M Device Management (DM) can be implemented with either of two Open Mobile Alliance (OMA) standards. The two standards are OMA-DM or LwM2M (Lightweight Machine to Machine). AT&T IoTS believes that LwM2M is the preferred standard for implementing device management on 11

12 IoTS radio modules and devices. Presently we will allow our radio module partners to choose between an OMA-DM client and LwM2M client for their particular implementations OMA-DM Specifications The official OMA-DM specifications can be downloaded from the OMA-DM download center at the following link: LwM2M Specifications The official LwM2M specifications can be downloaded from the LwM2M download center at the following link: AT&T Subscriber Product Engineering Device Requirements This implementation guide is written in alignment with Subscriber Product Engineering (SPE) Device Requirements OEM Specific DM Implementations Some radio module OEMs provide customized or proprietary FOTA or DM solutions to their customers. The requirements in this guide do not prohibit these implementations however all radio modules must comply with the ODIS/DHIR/Portfolio requirements utilizing OMA-DM or LwM2M as outlined in this guide. Additional DM accounts may be used to implement OEM specific solutions ODIS/DHIR/Portfolio Requirements for IOT Modules As radio modules are certified for use on the AT&T network and integrated into various IoT host devices the TAC range (first 8 digits of the 15 digit IMEI) of the module is often leveraged by the integrator of the host device. The current PTCRB requirement is that not more than 10,000 units of the host device can use the IMEI TAC range of the embedded radio module however it has frequently been seen that those rules are not always followed. Whenever a host device leverages the IMEI TAC of the module, AT&T has no traceability to the type of host device that the module is installed in and the number of those devices which are present on the network. This lack of traceability is problematic for several reasons including when field issues are discovered with a device and we are unable to pin point what devices or their software versions are causing such problems. To overcome this we have introduced a requirement for all new modules and host devices certified on the AT&T network to support a service which reports information to an AT&T database allowing us to identify each discrete device in our network which leverages the IMEI TAC range of the module. This service originally utilized the OMA Device Management (OMA- DM) standard and is known as OMA-DM IMEI Sync (ODIS). This same service is also part of the GSMA Connection Efficiency Guidelines published in 2015 known as Device Host Identity Reporting (DHIR). AT&T has created new custom OMA-DM nodes and LWM2M Objects to collect 12

13 the information from the host device into which the module is integrated. These requirements were introduced in version 5.4 of which was released in November of AT&T will also support the ODIS implementation using Lightweight M2M (LwM2M). This standard is also an OMA developed standard and was introduced to provide a solution for resource constrained devices generally deployed in the Internet of Things domain General ODIS/DHIR/Portfolio Requirements for the Module The module shall be the location within the IoT Host Device where ODIS/DHIR/Portfolio and other module specific details (Ex: DM DevDetail, DevInfo parameters) are maintained no matter whether those parameters are module based parameters or IoT device host parameters (Ex: ODIS/DHIR/Portfolio). The module shall allow programming of the OMA DM based Host Device custom ODIS/DHIR nodes or LWM2M objects through an interface as defined in section 3.5. The module shall maintain the ODIS/DHIR/Portfolio fields programmed from the IoT Host device on a persistent basis. The IoT host device shall not be expected to send ODIS/DHIR/Portfolio information to the module on each power up cycle. The host device has the responsibility to make sure that the radio module DM client is kept up to date with the correct information about the IoT host device. The host device will send updated information to the radio module for the following events: IoT host device should update ODIS/DHIR/Portfolio fields in module at the first power up after being manufactured/assembled together. IoT host device should update ODIS/DHIR/Portfolio fields in module if the IoT host device firmware is updated via any method (Ex: via FOTA, locally via USB, etc.) IoT host device updates ODIS/DHIR/Portfolio fields in module DM client after IoT host device detects a system reset to factory defaults. (ex. if these values are not persistent in module through a factory reset procedure) As a result the following events should trigger the communication of an alert by the module to the device management platform. Factory / Hard Reset Module FW upgrade (first power up after upgrade) Host Device FW upgrade (first power up after upgrade) Change in any Host information (Manufacturer, model, SW Version, Unique ID) Default ODIS/DHIR/Portfolio settings in DM client When implementing an OMA-DM or LwM2M client in the module the following defaults must be set. ODIS/DHIR/Portfolio must be configured and enabled in the module for any distribution channel of the module ODIS/DHIR/Portfolio should be enabled for any carrier SIM/UICC 13

14 The AT&T Device Management production server address must be configured as a default Any factory reset should default to the above settings Default ODIS/DHIR/Portfolio Values for IoT Modules The following values shall be used in the ODIS/DHIR/Portfolio nodes defined by radio modules for the purpose of certification testing. These values shall be the default values stored in production radio modules in the event that the Host Device has not properly overwritten these fields with host device values. These shall be the default values rewritten to the module fields in the event of a module reset to all factory defaults. Instance 1 for LWM2M Object and Portfolio is not a production requirement. Values for OMA-DM or LWM2M Instance (0) Host Device Manufacturer= HMAN0 Host Device Model= HMOD0 Host Device Software Version= HSW0 Host Device Unique ID = HUID0 Values for LWM2M Instance (1) Host Device Manufacturer= HMAN1 Host Device Model= HMOD1 Host Device Software Version= HSW1 Host Device Unique ID = HUID Firmware Update Over the Air (FOTA) FOTA support is optional for modules. Implementations may utilize either an OMA-DM or LWM2M client. Support for and the implementation of the methodology for interfacing with the host device for FOTA support of the host device firmware is module supplier specific. It is strongly recommended that the module support FOTA for the radio layer as well as the host device firmware Memory Allocation in the Module For IoT modules that support FOTA, OEMs should make sure that enough memory is included in the design of modules that support firmware updating. There must be enough onboard memory to facilitate the updating of the module itself. Module OEMs should also consider how the client within the module can manage updating of the host device as it relates to memory allocation. It is highly desired that the repository for a pending host device firmware update be stored within the module in a temporary memory but allowance for methods which would require the host device to allocate external memory are also acceptable. Module OEMs will be expected to indicate which method they intend to support for host device firmware updates. 14

15 3.5. Host Device to Radio Module Interface When implementing a device management client into the radio module, the module OEM must document and provide an API for the IoT host device OEM to be able to populate the information into the device management client nodes inside the radio module. It is at the radio module OEM s discretion to determine how to make the fields available to the host device to populate. (ex. AT Commands, etc.) This interface must be a secure interface which cannot be subject to reverse engineering or monitoring such that the content identifying the host device to AT&T cannot be compromised and potentially utilized to create cloned host devices utilizing a similar IMEI TAC range. See AT&T requirement <CDR-DVM-1600> Local Access to Host Device Details for an embedded IOT Module. 15

16 4. Requirements for IOT Modules supporting OMA DM 4.1. General OMA DM Requirements An IOT module supporting OMA DM for AT&T should at minimum support the following capabilities Dedicated APN for OMA DM IOT modules shall use the attm2mglobal APN for all Device Management functions (i.e., FOTA, OMA-DM, LWM2M) DM Account Provisioning for IoT Modules Supporting OMA DM A radio module will have two factory bootstrap DM Accounts. These will be AT&T default factory DM accounts as defined for IoT modules and devices in AT&T chapter 22 <CDR-DVM-392> Device Management Accounts. In addition there will be a third account that shall be left empty at the factory but restricted such that this account can only be programmed in the future by using the NETWPIN method for authentication. Additional DM Accounts may be provisioned based on OEM requirements. Account Usage 1 AT&T Default for IoT modules and devices per Chapter 22 of AT&T Default for IoT modules and devices per Chapter 22 of Blank for OTA bootstrap using NETWPIN method 4+ OEM discretion DM Account Parameters for IOT Modules Supporting OMA DM When a module is utilizing OMA DM the two factory bootstrapped DM Accounts will be configured as described in the requirements from AT&T specification which are duplicated in this section <CDR-DVM-3954> First DM Account Parameters for a Module Summary: The first DM Account for DM 1.2/1.3 will be factory bootstrapped to the production server per the following table. The use of MD5 or HMAC authentication is mandatory. DM Account URI./DMS/Cingular/AppID./DMS/Cingular/ServerID Values w7 Cingular 16

17 ./DMS/Cingular/Name./DMS/Cingular/AppAddr/mdm/Addr /DMS/Cingular/AppAddr/mdm/Port/mdm/Port Nbr./DMS/Cingular/AppAuth/client/AAuthLevel./DMS/Cingular/AppAuth/client/AAuthType Cingular (for secure connection) Secure connection shall use port 443 CLCRED MD5 or HMAC./DMS/Cingular/AppAuth/client/AAuthName Generated using utility in QC defect #25188./DMS/Cingular/AppAuth/client/AAuthSecret Generated using utility in QC defect #25188./DMS/Cingular/AppAuth/client/AAuthData./DMS/Cingular/AppAuth/server/AAuthLevel./DMS/Cingular/AppAuth/server/AAuthType./DMS/Cingular/AppAuth/server/AAuthName bnvsba== (Base 64 encoded value of string null) SVRCRED MD5 or HMAC Cingular <CDR-DVM-3955> Second DM Account Parameters for a Module Summary: The second DM Account for DM 1.2/1.3 will be factory bootstrapped to the lab server per the following table. The use of MD5 or HMAC authentication is mandatory. DM Account URI./DMS/Cingular/AppID./DMS/Cingular/ServerID./DMS/Cingular/Name./DMS/Cingular/AppAddr/mdm/Addr /DMS/Cingular/AppAddr/mdm/Port/mdm/Port Nbr./DMS/Cingular/AppAuth/client/AAuthLevel./DMS/Cingular/AppAuth/client/AAuthType Values w7 ATTLabA ATTLabA (for secure connection) Secure connection shall use port 443 CLCRED MD5 or HMAC./DMS/Cingular/AppAuth/client/AAuthName Generated using utility in QC defect #

18 ./DMS/Cingular/AppAuth/client/AAuthSecret Generated using utility in QC defect #25188./DMS/Cingular/AppAuth/client/AAuthData./DMS/Cingular/AppAuth/server/AAuthLevel./DMS/Cingular/AppAuth/server/AAuthType./DMS/Cingular/AppAuth/server/AAuthName bnvsba== (Base 64 encoded value of string null) SVRCRED MD5 or HMAC ATTLabA 4.3. Identity and Detail Nodes for IOT Modules Supporting OMA DM Standard nodes, as detailed in the OMA specification shall be supported by the module to gain visibility to the modules detail and other pertinent information. Any standards reference to device for nodes or objects in reference by this section shall be assumed to refer to the IOT Module itself. Sections and detail the device detail nodes required Embedded IOT Module SVN (IMEI SV) In addition to supporting the DevInfo Device Management Object and the DevDetail Device Management Object as specified in the OMA Device Management Standardized Objects document, the following OMA-DM node has been defined to enable tracking and verification of the SVN (Software Version Number) of the embedded IOT module. The 2 digit SVN is the last 2 digits of the 16 digit IMEI SV Type: IMEI SV Occurrence: One Format: Numeric String (2 digit SVN) Name: DevDetail/Ext/IMEISV Access Type: GET The IMEI is reported in DevInfo/DevId with the SVN to be stored in the IMEI SV node ODIS/DHIR Support by an IOT Module Utilizing OMA-DM Four new custom nodes have been specified to support ODIS/DHIR utilizing the OMA-DM API. Support for these four new custom nodes is mandatory. The following requirement describes the definition of the custom nodes. Access Type: GET <CDR-DVM-4532> Support for Module Host Device Reporting in the Device Detail Management Object 18

19 Summary: For modules embedded in a host device, the host device details shall be supported in an extension node within the Device Detail Management Object. Host Device Manufacturer The following OMA-DM node has been defined to specify information related to the manufacturer of the IoT host device, this field must match the Host Device manufacturer name that is referenced in the AT&T Network Ready Lab certification. Type: Host Device Manufacturer Occurrence: One Format: String Name: DevDetail/Ext/HostMan Access Type: GET Host Device Manufacturer The manufacturer name as submitted into the AT&T IOTS Onboarding Tool and reported in the AT&T Network Ready Lab Notice of Network Compatibility (TA Letter) for the Host Device. Host Device Model The following OMA-DM node has been defined to specify the Model name/number of the host device. This must match the model name/number used in the certification of the device. Type: Host Device Model Occurrence: One Format: String Name: DevDetail/Ext/HostMod Access Type: GET Host Device Model The model identifier as submitted into the AT&T IOTS Onboarding Tool and reported in the AT&T Network Ready Lab Notice of Network Compatibility (TA Letter) for the Host Device. Host Device Software Version The following OMA-DM node has been defined to specify the software version of the host device, this information must be populated by the host device manufacturer, must match the version of SW certified by PTCRB and must be updated whenever the SW is updated on the device. Type: Host Device Software Version Occurrence: One Format: String Name: DevDetail/Ext/HostSwV Access Type: GET Host Device Software Version The version value as submitted into the AT&T IOTS Onboarding Tool and reported in the AT&T Network Ready Lab Notice of Network Compatibility (TA Letter) for the Host Device. 19

20 Host Device Unique ID The following OMA-DM node has been defined to specify the Host Device Unique ID which is equivalent to the AT&T Onboarding Device ID allocated to the host device. The Host Device Unique ID is the ID that is assigned to a device when it is entered into the AT&T onboarding tool through the AT&T Developer portal. Type: Host Device Unique ID Occurrence: One Format: Alphanumeric String Name: DevDetail/Ext/HostUniqueID Access Type: GET Host Device Unique ID The unique ID assigned by AT&T as the Device ID in the AT&T IOTS Onboarding Tool and reported in the AT&T Network Ready Lab Notice of Network Compatibility (TA Letter) for the Host Device Firmware Update Over the Air (FOTA) The following specifications apply to IoT modules that will support FOTA OMA-DM Firmware Update Management Object (FUMO) Support OMA-DM clients will use FUMO as the mechanism to perform updates to the module and host device Proprietary Update A proprietary solution for updating the module or device firmware (either OTA or locally by USB) may also be implemented as long as the following requirement is met. <CDR-DVM-1533> Device Initiated Session following a non- FOTA Update Summary: Devices which are updated using one of the following scenarios shall automatically initiate a session with the AT&T Device Management platform to report new device details from the Device Detail Management Object following the update. This is needed to keep AT&T back-end systems in sync with the new device details. Device update by sideload/usb, WiFi, Bluetooth, etc. Device update using a proprietary OEM Device Management server Note, as well as the standard OMA-DM nodes defined in it is also required for modules to report the contents of the following custom nodes to the server: - Host Device Manufacturer - Host Device Model - Host Device Software Version 20

21 - Host Device Plasma ID AT&T Internet of Things Solutions Organization Memory Allocation in the Module Module OEMs should make sure that enough memory is included in the design of modules that support firmware updating. There needs to be enough onboard memory to facilitate the updating of the modules itself. Module OEMs should also consider how the client within the module can manage updating of the host device as it relates to memory allocation. It is highly desired that the repository for a pending host device firmware update be stored within the module in a temporary memory but allowance for methods which would require the host device to allocate external memory are also acceptable. Module OEMs will be expected to indicate which method they intend to support for host firmware updates. 5. Requirements for IOT Modules supporting LWM2M 5.1. General LWM2M Requirements An IOT module supporting LWM2M for AT&T should at minimum support the following capabilities Dedicated APN for LWM2M IOT modules shall use the attm2mglobal APN for all Device Management functions (i.e., FOTA, OMA-DM, LWM2M). For LWM2M specifically, this APN should be accessible simultaneously with any other context open UQS (UDP with Queue Mode and SMS) Transport and Binding Mode Support IOT modules must support the UQS (UDP with Queue Mode and SMS) transport binding mode as defined in the LWM2M specification section This mode is supported in the case that the device is in a sleep cycle and needs to react to a command from the server. Registration Update Trigger can be sent via SMS to the device to wake it up. This is one use case and should the user want to use CoAP over SMS they should be able to leverage UQS mode to do so. A full CoAP over SMS stack is not required, instead only a method for Registration Update Trigger. UDP (U mode) binding is preferred over SMS whenever possible. Appendix C contains a high level example flow for the CoAP over SMS Registration Update Trigger LWM2M Operations IoT modules shall support the operations in the LWM2M specification in regard to Client Registration Interface, Device Management and Service Enablement Interface, and Information 21

22 Reporting Interface. These operations are detailed in Sections 5.3, 5.4, and 5.5 of the OMA LWM2M Technical Specification. Observe and Notify will be used to monitor changes on object resources that are observable. This means that the LWM2M server will send an Observe command to a resource, and the client should use the Notify operation to update the LWM2M server with the new value of the resource as described in section 5.5 Information Reporting Interface of the OMA LWM2M Technical Specification. A Notify operation should be initiated by the client when all conditions of the Observe operation are met as described in Section of the OMA LWM2M Technical Specification Data Formats The IoT module shall support TLV data format as detailed in section 6.4 in the OMA LWM2M Technical Specification. Data formats beyond TLV will be implementation specific decided upon by the OEM Bootstrap Server Account Provisioning for IoT Modules Supporting LWM2M The Bootstrap Server for provisioning LWM2M servers and settings will be owned by ATT. This will be a single Bootstrap Server solution for all LWM2M capable modules giving the most flexibility to an end customer. The device will not be required to maintain both production and lab objects at a given time. The device will be certified against the lab objects and settings and then for production devices will be factory bootstrapped with the production objects Bootstrap Prioritization Sequence for IOT Modules Supporting LWM2M When a module is utilizing LWM2M, one bootstrapped LWM2M client will be configured as described in the requirements from AT&T specification which are duplicated in this section. Bootstrapping will be prioritized in the order of Factory Bootstrap, Server Initiated Bootstrap, and finally Client Initiated Bootstrap. A module shall be factory bootstrapped. In the case of corruption or failed registration the client shall have a Client Hold Off time of 8 hours. The Server Initiated Bootstrap should happen within this Client Hold Off time which follows the priority order of Factory Bootstrap, Server Initiated Bootstrap, then Client Initiated Bootstrap. Client Initiated Bootstrap should only happen in the case of Client Hold Off time being met before the server initiates bootstrapping. If the Client Initiated Bootstrap fails after the 8 hour Client Hold Off time the module must wait one more full Client Hold Off period before attempting again. In the case of another failure the module must not attempt again. Two Client Initiated Bootstrap attempts is the maximum. 22

23 <CDR-DVM-032> Support for OMA LWM2M Bootstrap Profile as specified in the OMA LWM2M specification Summary: The IOT module with a LWM2M client shall support the bootstrap process for the OMA Server Initiated Bootstrap mode as specified in Section and of the OMA LWM2M technical specification. Note that support of factory bootstrap is also required. The module with LWM2M client, upon downloading and installing a new bootstrap which has the same server ID as the factory bootstrap, shall use the new bootstrap for communication with the AT&T DM server. A factory reset shall wipe any downloaded bootstrap account on the IOT module. The IOT module will always use a factory bootstrap account to communicate with the AT&T DM server unless a new bootstrap was downloaded and installed on the IOT module, at which time the new bootstrap would be used for communication with the AT&T DM server <CDR-DVM-033> Support for OMA LWM2M Write of Bootstrap Profile Summary: The IOT module shall support a temporary write of the OMA LWM2M OTA bootstrap included in the TLV or JSON formatted payload sent by the LWM2M server, and as defined in Section of the OMA TS Lightweight M2M specification Production Bootstrap Server Security Object The Bootstrap Server account on a module supporting the LWM2M client will provision the LWM2M Server objects into the device given that the device cannot register to previous LWM2M servers provisioned or new LWM2M servers need to be added to the device. This account will reside in Instance 0. Following are the values to be provisioned in the account. Object Definition Name Object ID Instances Mandatory Object URN LWM2M Security Object 0 Multiple Mandatory urn:oma:lwm2m:oma:0 Resource Definitions ID Name Value 0 LWM2M Server URI coaps://lwprod.iot.attcompute.com: Bootstrap Server TRUE 2 Security Mode 0: Pre-Shared Key mode 3 Public Key/Identity Key Generation Tool to be provided 23

24 4 Server Public Key/Identity Password generated using utility in QC defect # Secret Key Key Generation Tool to be provided 6 SMS Security Mode 1: Secure Packet Structure Mode 7 SMS Binding Key Parameters Optional include KIc 8 SMS Binding Secret Keys Optional include KIc key 9 LWM2M Server SMS Number 10 Short Server ID Server ID for the AT&T lab LWM2M server will be an ID value in the range and will be sent by the AT&T production LWM2M server in the initial session. 11 Client Hold Off Time seconds (8 hours) LWM2M client must store this Server ID for future sessions with the server Lab Bootstrap Server Security Object The Bootstrap Server account on a module supporting the LWM2M client will provision the LWM2M Server objects into the device given that the device cannot register to previous LWM2M servers provisioned or new LWM2M servers need to be added to the device. This account will reside in Instance 0. Following are the values to be provisioned in the account. Object Definition Name Object ID Instances Mandatory Object URN LWM2M Security Object 0 Multiple Mandatory urn:oma:lwm2m:oma:0 Resource Definitions ID Name Value 0 LWM2M Server URI To be provided by Nokia 1 Bootstrap Server TRUE 2 Security Mode 0: Pre-Shared Key mode 3 Public Key/Identity Key Generation Tool to be provided 4 Server Public Key/Identity 5 Secret Key Key Generation Tool to be provided 6 SMS Security Mode 1: Secure Packet Structure Mode 24

25 7 SMS Binding Key Parameters Optional include KIc 8 SMS Binding Secret Keys Optional include KIc key 9 LWM2M Server SMS Number 10 Short Server ID Server ID for the AT&T lab LWM2M server will be an ID value in the range and will be sent by the AT&T production LWM2M server in the initial session. 11 Client Hold Off Time seconds (8 hours) LWM2M client must store this Server ID for future sessions with the server Production Server Security Object Parameters for an IOT Module supporting LWM2M Summary: The first account on a module supporting the LWM2M client will be factory bootstrapped to the production server per the following table. The use of DTLS authentication is mandatory. This account will be used to register with the AT&T LWM2M production server. This account will reside in Instance 1. This account will be supported in the LWM2M Security Object with defined resources and provisioned on the module. Following are the values to be provisioned in the account. Object Definition Name Object ID Instances Mandatory Object URN LWM2M Security Object 0 Multiple Mandatory urn:oma:lwm2m:oma:0 Resource Definitions ID Name Value 0 LWM2M Server URI coaps://lwprod.iot.attcompute.com:5684 (secure UDP) 1 Bootstrap Server FALSE 2 Security Mode 0: Pre-Shared Key mode 3 Public Key/Identity Key Generation Tool to be provided 4 Server Public Key/Identity Key Generation Tool to be provided 5 Secret Key Key Generation Tool to be provided 6 SMS Security Mode 1: Secure Packet Structure Mode 7 SMS Binding Key Parameters Optional include KIc 25

26 8 SMS Binding Secret Keys Optional include KIc key 9 LWM2M Server SMS Number 10 Short Server ID Server ID for the AT&T lab LWM2M server will be an ID value in the range and will be sent by the AT&T production LWM2M server in the initial session. 11 Client Hold Off Time seconds (8 hours) LWM2M client must store this Server ID for future sessions with the server Lab Server Security Object Parameters for an IOT Module supporting LWM2M Summary: The second account on a module supporting the LWM2M client will be factory bootstrapped to the lab server per the following table. The use of DTLS authentication is mandatory. This account will be used to register with the AT&T LWM2M lab server. This account will reside in Instance 1. This account will be supported in the LWM2M Security Object with defined resources and provisioned on the module. Following are the values to be provisioned in the account. Object Definition Name Object ID Instances Mandatory Object URN LWM2M Security Object 0 Multiple Mandatory urn:oma:lwm2m:oma:0 Resource Definitions ID Name Value 0 LWM2M Server URI coaps://lwdev.iot.attcompute.com:5684 (secure UDP) 1 Bootstrap Server FALSE 2 Security Mode 0: Pre-Shared Key mode 3 Public Key/Identity Key Generation Tool to be provided 4 Server Public Key/Identity Key Generation Tool to be provided 5 Secret Key Key Generation Tool to be provided 6 SMS Security Mode 1: Secure Packet Structure Mode 7 SMS Binding Key Parameters Optional include KIc 26

27 8 SMS Binding Secret Keys Optional include KIc key 9 LWM2M Server SMS Number 10 Short Server ID Server ID for the AT&T lab LWM2M server will be an ID value in the range and will be sent by the AT&T lab LWM2M server in the initial session. 11 Client Hold Off Time seconds LWM2M client must store this Server ID for future sessions with the server Production Server Object Parameters for an IOT Module supporting LWM2M The Server Object as detailed below describes the production server at the address given in the first Security Object. The Short Server ID here should correspond to the short server ID in the first Security Object. This account will reside in instance 0. Object Definition Name Object ID Instances Mandatory Object URN LWM2M Server Object 1 Multiple Mandatory urn:oma:lwm2m:oma:1 Resource Definitions ID Name Operations Instances Mandatory Type Range or Units Description Enumeration 0 Short Server ID R Single Mandatory Integer This should be the same in resource 10 in the Production Server Security Object (0/1/10). 1 Lifetime RW Single Mandatory (AT&T) Integer s (1 day) 2 Default RW Single Optional Integer s The default value the Minimum Period LwM2M Client should use for the Minimum Period of an Observation in the absence of this parameter being included in an Observation. 3 Default Maximum Period If this Resource doesn t exist, the default value is 0. RW Single Optional Integer s The default value the LwM2M Client should use for the Maximum Period of an Observation in the absence of this parameter being included in an Observation. If this Resource is executed, this LwM2M Server Object is 4 Disable E Single Mandatory (AT&T) 27

28 5 Disable Timeout 6 Notification Storing When Disabled or Offline RW Single Mandatory (AT&T) RW Single Mandatory (AT&T) disabled for a certain period defined in the Disabled Timeout Resource. After receiving Execute operation, LwM2M Client MUST send response of the operation and perform deregistration process, and underlying network connection between the Client and Server MUST be disconnected to disable the LwM2M Server account. After the above process, the LwM2M Client MUST NOT send any message to the Server and ignore all the messages from the LwM2M Server for the period. Integer s Boolean If true, the LwM2M Client stores Notify operations to the LwM2M Server while the LwM2M Server account is disabled or the LwM2M Client is offline. After the LwM2M Server account is enabled or the LwM2M Client is online, the LwM2M Client reports the stored Notify operations to the Server. If false, the LwM2M Client discards all the Notify operations or temporarily disables the Observe function while the LwM2M Server is disabled or the LwM2M Client is offline. The default value is true. 7 Binding RW Single Mandatory String The possible values of Resource are listed in Registration Update Trigger The maximum number of storing Notifications per Server is up to the implementation. UQS E Single Mandatory If this Resource is executed the LwM2M Client MUST perform an Update operation with this LwM2M Server using that transport for the Current Binding Mode. 28

29 Lab Server Object Parameters for an IOT Module supporting LWM2M The Server Object as detailed below describes the Lab server at the address given in the first Security Object. The Short Server ID here should correspond to the short server ID in the first Security Object. This account will reside in instance 0. Object Definition Name Object ID Instances Mandatory Object URN LWM2M Server Object 1 Multiple Mandatory urn:oma:lwm2m:oma:1 Resource Definitions ID Name Operations Instances Mandatory Type Range or Enumeration Units Description 0 Short Server ID R Single Mandatory Integer This should be the same as resource 10 in the Lab Server Security Object (0/1/10). 1 Lifetime RW Single Mandatory Integer s 900 (15 min.) 2 Default Minimum RW Single Optional Integer s The default value Period the LwM2M Client should use for the Minimum Period of an Observation in the absence of this parameter being included in an Observation. 3 Default Maximum Period If this Resource doesn t exist, the default value is 0. RW Single Optional Integer s The default value the LwM2M Client should use for the Maximum Period of an Observation in the absence of this parameter being included in 4 Disable E Single Mandatory (AT&T) 29 an Observation. If this Resource is executed, this LwM2M Server Object is disabled for a certain

30 period defined in the Disabled Timeout Resource. After receiving Execute operation, LwM2M Client MUST send response of the operation and perform deregistration process, and underlying network connection between the Client and Server MUST be disconnected to disable the LwM2M Server account. 5 Disable Timeout RW Single Mandatory (AT&T) 6 Notification Storing RW Single Mandatory When Disabled or (AT&T) Offline After the above process, the LwM2M Client MUST NOT send any message to the Server and ignore all the messages from the LwM2M Server for the period. Integer s Boolean If true, the LwM2M Client stores Notify operations to the LwM2M Server while the LwM2M Server account is disabled or the LwM2M Client is offline. After the LwM2M Server account is enabled or the LwM2M Client is online, the LwM2M Client reports the stored Notify operations to the Server. If false, the 30

31 7 Binding RW Single Mandatory String The possible values of Resource are listed in Registration Update Trigger LwM2M Client discards all the Notify operations or temporarily disables the Observe function while the LwM2M Server is disabled or the LwM2M Client is offline. The default value is true. The maximum number of storing Notifications per Server is up to the implementation. UQS E Single Mandatory If this Resource is executed the LwM2M Client MUST perform an Update operation with this LwM2M Server using that transport for the Current Binding Mode Device Details Object for IoT Modules Supporting LWM2M AT&T requires that radio modules support the following standard identity parameters according to the LWM2M specifications. This section aligns with AT&T specification requirements <CDR-DVM-4544> Support for OMA LWM2M Device Object and <CDR-DVM- 4545> Support for OMA LWM2M Device Object Resources. Any standards reference to device for nodes or objects in reference by this section shall be assumed to refer to the IOT Module Object Definition Name Object ID Instances Mandatory Object URN Device (IOT 3 Single Mandatory urn:oma:lwm2m:oma:3 Module) 31

32 Resource definitions ID Name Operation Instance Mandator Type Range or Enumeration Unit Description 0 Manufacturer R Single Mandatory String IOT Module Manufacturer Name as submitted into the AT&T IOTS Onboarding Tool and reported in the AT&T Network Ready Lab Notice of Network Compatibility 17 (TA Letter). Device Type R Single Mandatory String IOT Module type as submitted into the AT&T IOTS Onboarding Tool and reported in the AT&T Network Ready Lab Notice of Network Compatibility (TA Letter). (Example: Module BGA, Module Half Mini PCIe, Module - LCC, Module LGA, Module M.2, Module - PCIe, Module Proprietary) 1 Model Number 2 Serial Number 18 Hardware Version 3 Firmware Version 19 Software Version R Single Mandatory String IOT Module Model Identifier as submitted into the AT&T IOTS Onboarding Tool and reported in the AT&T Network Ready Lab Notice of Network Compatibility (TA Letter). R Single Mandatory String IOT Module IMEI - 15 digits as defined in the PTCRB PPMD specification. R Single Mandatory String IOT Module Hardware Version as submitted into the AT&T IOTS Onboarding Tool and reported in the AT&T Network Ready Lab Notice of Network Compatibility (TA Letter). R Single Mandatory String Current Firmware Version of the module as submitted into the AT&T IOTS Onboarding Tool and reported in the AT&T Network Ready Lab Notice of Network Compatibility (TA Letter). R Single Mandatory String IOT Module SVN - 2 digits as defined in the PTCRB PPMD specification. 22 ExtDevInfo R Multiple Optional Objln Connects Portfolio k 4 Reboot E Optional Manufacturer specific implementation. 5 Factory E Optional Manufacturer specific Reset implementation. 6 Available R Optional Manufacturer specific Power implementation. Sources 7 Power Source Voltage R Optional Manufacturer specific implementation. 32

Device Management Implementation Guide for IoT Solutions

Device Management Implementation Guide for IoT Solutions Device Management Implementation Guide Device Management Implementation Guide for IoT Solutions Version 2.3 Stephen Ambrose 6/6/2016 Author(s) Group Phone # E-mail Stephen IoT Solutions +1 (512) 372-5420

More information

Security Monitoring of LwM2M Protocol

Security Monitoring of LwM2M Protocol Security Monitoring of LwM2M Protocol Technical Report FIT-TR-2017-16 Ondřej Ryšavý Marek Rychlý Ondřej Ryšavý Technical Report no. FIT-TR-2017-16 Faculty of Information Technology Brno University of Technology

More information

Lightweight M2M Event Log Object (LwM2M Object EventLog)

Lightweight M2M Event Log Object (LwM2M Object EventLog) Lightweight M2M Event Log Object (LwM2M Object EventLog) Candidate Version 1.0 28 Feb 2018 Open Mobile Alliance OMA-TS-LwM2M_EventLog-V1_0-20180228-C OMA-TS-LwM2M_EventLog-V1_0-20180228-C Page 2 (15) Use

More information

Enabler Test Specification for RCS Conformance

Enabler Test Specification for RCS Conformance Enabler Test Specification for RCS Conformance Candidate Version 1.2.2 10 Mar 2014 Open Mobile Alliance OMA-ETS-RCS-CON-V1_2_2-20140310-C OMA-ETS-RCS-CON-V1_2_2-20140310-C Page 2 (74) Use of this document

More information

[OMA-Template-Spec I]

[OMA-Template-Spec I] Lightweight Machine to Machine Technical Specification Candidate Version 1.0 10 Dec 2013 Open Mobile Alliance OMA-TS-LightweightM2M-V1_0-20131210-C Used with the permission of the Open Mobile Alliance

More information

It s Time to Begin Network Testing with AT&T.

It s Time to Begin Network Testing with AT&T. IoT Devices Test Requirements for Evaluating Network Ready Devices for IoT (T.R.E.N.D.I.) It s Time to Begin Network Testing with AT&T. If you have your TEST SIMS, you can use this guide to begin testing.

More information

Firmware Update Management Object

Firmware Update Management Object Firmware Update Management Object Approved Version 1.0.2 28 Aug 2009 Open Mobile Alliance OMA-TS-DM-FUMO-V1_0_2-20090828-A OMA-TS-DM-FUMO-V1_0_2-20090828-A Page 2 (31) Use of this document is subject to

More information

ESR Consortium LWM2M-MQTT-1.0

ESR Consortium LWM2M-MQTT-1.0 ESR Consortium LWM2M-MQTT-1.0 LWM2M over MQTT Profile Specification ESR030 Reference: ESR-SPE-030-LWM2M-MQTT Version: 1.0 Rev: ADraft8 DEFINITIONS "ESR" means the Specification, including any modifications

More information

3G M2M Router Plus (NTC / NTC ) 3G M2M Router (NTC ) Firmware Release Notes

3G M2M Router Plus (NTC / NTC ) 3G M2M Router (NTC ) Firmware Release Notes 3G M2M Router Plus (NTC-6200-02 / NTC-6200-12) 3G M2M Router (NTC-6200-13) Firmware Release Notes Copyright Copyright 2016 NetComm Wireless Limited. All rights reserved. The information contained herein

More information

MasterCard NFC Mobile Device Approval Guide v July 2015

MasterCard NFC Mobile Device Approval Guide v July 2015 MasterCard NFC Mobile Device Approval Guide v2.0 30 July 2015 Notices Following are policies pertaining to proprietary rights, trademarks, translations, and details about the availability of additional

More information

ESR Consortium LWM2M-MQTT-1.0

ESR Consortium LWM2M-MQTT-1.0 ESR Consortium LWM2M-MQTT-1.0 LWM2M over MQTT Profile Specification ESR030 Reference: ESR-SPE-030-LWM2M-MQTT Version: 1.0 Rev: ADraft4 DEFINITIONS "ESR" means the Specification, including any modifications

More information

NAFEM Data Protocol Standard

NAFEM Data Protocol Standard NAFEM Data Protocol Standard Version 3.00 1.0 Scope This document provides a framework for standardized data transmission between a host computer and various pieces of commercial food service equipment.

More information

Introduction to Z-Wave SmartStart. Whitepaper

Introduction to Z-Wave SmartStart. Whitepaper Introduction to Z-Wave SmartStart Whitepaper TABLE OF CONTENTS Summary... 3 Abbreviations and Terminology... 3 Z-Wave SmartStart under the Hood... 5 Improved Inclusion Process...5 QR Data Structure...7

More information

AT&T Business Messaging Account Management

AT&T Business Messaging Account Management Account Management Administrator User Guide July 2016 1 Copyright 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 1.1 Document date: July 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

Lightweight Machine to Machine Architecture

Lightweight Machine to Machine Architecture Lightweight Machine to Machine Architecture Approved Version 1.0 08 Feb 2017 Open Mobile Alliance OMA-AD-LightweightM2M-V1_0-20170208-A OMA-AD-LightweightM2M-V1_0-20170208-A Page 2 (12) Use of this document

More information

GSMA TAC Allocation and IMEI Programming Rules for Device Brand Owners and Manufacturers

GSMA TAC Allocation and IMEI Programming Rules for Device Brand Owners and Manufacturers GSMA TAC Allocation and IMEI Programming Rules for Device Brand Owners and Manufacturers Training Guide February 2018 v1.0 Copyright 2018 GSMA Introduction About this document This is a practical training

More information

Harness the Power of Policy on Device

Harness the Power of Policy on Device Harness the Power of Policy on Device The Power of Policy on Device How do you respond to an insatiable demand for always-on, lightning-fast wireless data by millions of mobile users? Policy-on-Device

More information

ONE ID Identity and Access Management System

ONE ID Identity and Access Management System ONE ID Identity and Access Management System Local Registration Authority User Guide Document Identifier: 2274 Version: 1.8 Page 1 Copyright Notice Copyright 2011, ehealth Ontario All rights reserved No

More information

Windows 10. Tech Note. Open the Window to Endless Possibilities. Windows for the Enterprise. Universal App Experience

Windows 10. Tech Note. Open the Window to Endless Possibilities. Windows for the Enterprise. Universal App Experience Windows 10 ENTERPRISE MOBILITY MANAGEMENT Tech Note Open the Window to Endless Possibilities Windows 10 shows a renewed focus on the Enterprise. It successfully harmonizes user experience and device management

More information

IP Phone Gateway Setup and Operation Guide: For Avaya and Cisco UCM Blast

IP Phone Gateway Setup and Operation Guide: For Avaya and Cisco UCM Blast IP Phone Gateway Setup and Operation Guide: For Avaya and Cisco UCM Blast Version 7.0.0.1 April 2017 Copyright 2010 2017 AtHoc Inc., a Division of BlackBerry Limited. All Rights Reserved. This document

More information

Jonas Green, Björn Otterdahl HMS Industrial Networks AB. February 22, 2017

Jonas Green, Björn Otterdahl HMS Industrial Networks AB. February 22, 2017 Resource-constrained Industrial Things Proposal for the Adaptation of CoAP to EtherNet/IP Jonas Green, Björn Otterdahl HMS Industrial Networks AB February 22, 2017 Connect all devices in a factory to EtherNet/IP

More information

Lightweight Machine to Machine Requirements

Lightweight Machine to Machine Requirements Lightweight Machine to Machine Requirements Candidate Version 02 Oct 2012 Open Mobile Alliance OMA-RD-V1_0-20121002-C OMA-RD-V1_0-20121002-C Page 2 (20) Use of this document is subject to all of the terms

More information

Lightweight Machine to Machine Architecture

Lightweight Machine to Machine Architecture Lightweight Machine to Machine Architecture Candidate Version 1.0 10 Dec 2013 Open Mobile Alliance OMA-AD-LightweightM2M-V1_0-20131210-C OMA-AD-LightweightM2M-V1_0-20131210-C Page 2 (12) Use of this document

More information

IP Based Architecture for the Internet of Things. IPV6 and Related Standards for IoT Interoperability November 20, 2014

IP Based Architecture for the Internet of Things. IPV6 and Related Standards for IoT Interoperability November 20, 2014 IP Based Architecture for the Internet of Things IPV6 and Related Standards for IoT Interoperability November 20, 2014 1 IoT Architecture Problems to Solve Interoperability In the way in which software

More information

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Exchange ActiveSync The my Xperia service Third

More information

3GPP TS V ( )

3GPP TS V ( ) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Telecommunication management; Charging management; Control Plane (CP) data transfer

More information

IP Phone Gateway Setup and Operation Guide: For Avaya and Cisco UCM Blast

IP Phone Gateway Setup and Operation Guide: For Avaya and Cisco UCM Blast IP Phone Gateway Setup and Operation Guide: For Avaya and Cisco UCM Blast Version 7.4 January 2018 Copyright 2010 2018 BlackBerry Limited. All Rights Reserved. This document may not be copied, disclosed,

More information

Nokia Connected Device Platform

Nokia Connected Device Platform The (CDP) is a converged, cloud-enabled platform solution that allows enterprises and communications service providers (CSPs) to securely manage network-connected devices through the entire device lifecycle.

More information

Anjay LwM2M SDK. Enabling lightweight device management in the Internet of Things ecosystems

Anjay LwM2M SDK. Enabling lightweight device management in the Internet of Things ecosystems Anjay LwM2M SDK Enabling lightweight device management in the Internet of Things ecosystems Introduction In the era of the Internet of Things, the challenge that device manufacturers truly need to face

More information

It s Time to Begin Network Testing with AT&T.

It s Time to Begin Network Testing with AT&T. IoT Devices Test Requirements for Evaluating Network Ready Devices for IoT (T.R.E.N.D.I.) It s Time to Begin Network Testing with AT&T. If you have your TEST SIMS, you can use this guide to begin testing.

More information

Arm Mbed Edge. Shiv Ramamurthi Arm. Arm Tech Symposia Arm Limited

Arm Mbed Edge. Shiv Ramamurthi Arm. Arm Tech Symposia Arm Limited Arm Mbed Edge Shiv Ramamurthi Arm Arm Tech Symposia 2017 IoT increasing efficiency, yield, and convenience Commercial buildings Better energy & space utilization Precision farming and connected sites Increased

More information

CRU Configurator. User Manual for Mac OS X. Features

CRU Configurator. User Manual for Mac OS X. Features CRU Configurator User Manual for Mac OS X Features Receive email and SMS text notifications when warning or alarm events occur. View firmware information of select CRU storage devices. View temperature

More information

Point-to-Multipoint Push Requirements

Point-to-Multipoint Push Requirements Point-to-Multipoint Push Requirements Candidate Version 1.0 26 May 2009 Open Mobile Alliance OMA-RD-PTM_Push_V1_0-20090526-C [OMA-Template-Spec-20090101-I] OMA-RD-PTM_Push_V1_0-20090526-C Page 2 (16) Use

More information

1.2. Terminal Configuration Use-Cases SyncML Device Management

1.2. Terminal Configuration Use-Cases SyncML Device Management MOBILE DEVICE MANAGEMENT WITH SYNCML Alan Bok, Alan.Bok@motorola.com, Sandeep Adwankar, Sandeep.Adwankar@motorola.com, John Grosspietsch, John.Grosspietsch@motorola.com, Venu Vasudevan, venuv@labs.mot.com,

More information

IMEI Database. Manufacturer / Brand Owner User Guide. Version September Copyright Notice. Copyright 2015 GSM Association

IMEI Database. Manufacturer / Brand Owner User Guide. Version September Copyright Notice. Copyright 2015 GSM Association IMEI Database Manufacturer / Brand Owner User Guide Version 4.0 01 September 2015 Copyright Notice Copyright 2015 GSM Association GSM and the GSM logo are registered and owned by the GSM Association. Antitrust

More information

Compliance Manager ZENworks Mobile Management 2.7.x August 2013

Compliance Manager ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Compliance Manager ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

ETSI TS V (201

ETSI TS V (201 TS 124 484 V13.3.0 (201 17-01) TECHNICAL SPECIFICATION LTE; Mission Critical Services (MCS) configuration management; Protocol specification (3GPP TS 24.484 version 13.3.0 Release 13) 1 TS 124 484 V13.3.0

More information

OSEK/VDX. Communication. Version January 29, 2003

OSEK/VDX. Communication. Version January 29, 2003 Open Systems and the Corresponding Interfaces for Automotive Electronics OSEK/VDX Communication Version 3.0.1 January 29, 2003 This document is an official release and replaces all previously distributed

More information

Integration Architecture Of SDMS

Integration Architecture Of SDMS Integration Architecture Of SDMS 20 May 2017 Version 1.0 (Rakesh Ranjan, Consultant-IT) Table of Content 1 ABOUT SDMS...2 2 OBJECTIVE & STRUCTURE OF THIS DOCUMENT...2 3 TRANSACTIONAL SERVICES...3 3.1 HIGH

More information

CRU Configurator. User Manual for Windows. Features

CRU Configurator. User Manual for Windows. Features CRU Configurator User Manual for Windows Features Easily configure CRU storage devices Receive email and SMS text notifications when warning or alarm events occur. View and update the firmware of select

More information

N4A Device Manager 4.6.0

N4A Device Manager 4.6.0 N4ACMSX-UG460 N4A Device Manager 4.6.0 User Guide Version 1.0 October 30, 2015 NOVATEL WIRELESS COPYRIGHT STATEMENT 2015 Novatel Wireless, Inc. All rights reserved. The information contained in this document

More information

Opaali Portal Quick guide

Opaali Portal Quick guide Opaali Portal Quick guide Company information Telia Finland Oyj Teollisuuskatu 15, 00510 HELSINKI, FI Registered office: Helsinki Business ID 1475607-9, VAT No. FI14756079 1 (40) Page 2 (40) Copyright

More information

ETSI TS V ( )

ETSI TS V ( ) TS 124 304 V14.0.0 (2017-03) TECHNICAL SPECIFICATION Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; Mobility management based on Mobile

More information

Keys for Success: Today s Landscape of IoT Technologies and Security Standards

Keys for Success: Today s Landscape of IoT Technologies and Security Standards Keys for Success: Today s Landscape of IoT Technologies and Security Standards Pratul Sharma, Technical Marketing Manager, ARM Amit Shah, VP R&D, Alcatel-Lucent mbed Sponsored session/ ARM Tech Con 2015

More information

ETSI CTI Plugtests Guide Draft V0.0.5 ( ) IoT CoAP Plugtests; Las Vegas, USA; November 2013

ETSI CTI Plugtests Guide Draft V0.0.5 ( ) IoT CoAP Plugtests; Las Vegas, USA; November 2013 Guide Draft V0.0.5 (2013-11) IoT CoAP Plugtests; Las Vegas, USA; 19-22 November 2013 2 Guide Draft V0.0.5 (2013-11) ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94

More information

Premium FOTA Management Product Description ST10048a Rev

Premium FOTA Management Product Description ST10048a Rev Premium FOTA Management Product Description 80287ST10048a Rev.2 2014-12-29 SPECIFICATIONS SUBJECT TO CHANGE WITHOUT NOTICE Notice While reasonable efforts have been made to assure the accuracy of this

More information

Vodafone MachineLink 3G Plus

Vodafone MachineLink 3G Plus Vodafone MachineLink 3G Plus Firmware release notes Vodafone Power to you Copyright Copyright 2017 NetComm Wireless Limited. All rights reserved. Copyright 2017 Vodafone Group Plc. All rights reserved.

More information

WAP Provisioning Architecture Overview

WAP Provisioning Architecture Overview WAP Provisioning Architecture Overview WAP-182-PROVARCH Proposed Version 19-February-2000 Wireless Application Protocol WAP Provisioning Architecture Overview Wireless Application Protocol Forum Ltd.2000.

More information

Access auto, commercial, home, and life solutions from a single entry point.

Access auto, commercial, home, and life solutions from a single entry point. User Guide LexisNexis Insurance Solutions Batch/Online Order Processing Access auto, commercial, home, and life solutions from a single entry point. INS0224 -- 14 March 2018 Insurance Solutions Support

More information

CMS Enterprise Portal User Manual

CMS Enterprise Portal User Manual Centers for Medicare & Medicaid Services CMS expedited Life Cycle (XLC) 11/13/2017 Document Number: Enterprise_Portal_User_Manual_v6 Table of Contents Table of Contents 1. Introduction... 1 2. Overview...

More information

GMM-SM Event Logging. Feature Description. Feature Overview. Events to be Logged

GMM-SM Event Logging. Feature Description. Feature Overview. Events to be Logged With the introduction of this feature, the SGSN now supports limited use of event data records (EDRs). This chapters details the SGSN's event logging feature, with the use of EDRs, which is intended to

More information

VoIP and Network Quality Manager

VoIP and Network Quality Manager GETTING STARTED GUIDE VoIP and Network Quality Manager Version 4.4.1 Last Updated: Wednesday, August 9, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/voip_network_quality_manager_(vnqm)/vnqm_documentation

More information

The following device commands are used most frequently: Lock/Unlock device O - O O. Reset screen password O - O - Factory reset + Initialize SD Card

The following device commands are used most frequently: Lock/Unlock device O - O O. Reset screen password O - O - Factory reset + Initialize SD Card 10 Device management Administrators can install apps on an activated device using device commands and check the profiles settings. Moreover, they can update, delete, or re-install apps installed on users'

More information

Bristol/IP Driver PTC Inc. All Rights Reserved.

Bristol/IP Driver PTC Inc. All Rights Reserved. 2017 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 4 Overview 4 BSAP Networks 5 Channel Setup 6 Channel Properties - General 6 Channel Properties - Ethernet Communications 7 Channel

More information

Challenges of Positive Train Control Interoperability

Challenges of Positive Train Control Interoperability Challenges of Positive Train Control Interoperability Clark Palmer, Chief Technology Officer Meteorcomm, LLC Address: 1201 SW 7 th Street, Renton, WA 98057 Phone: 253 236 0115 E-Mail:cpalmer@meteorcomm.com

More information

Service Description: CNS Federal High Touch Technical Support

Service Description: CNS Federal High Touch Technical Support Page 1 of 1 Service Description: CNS Federal High Touch Technical Support This service description ( Service Description ) describes Cisco s Federal High Touch Technical support (CNS-HTTS), a tier 2 in

More information

ALEOS Release Notes

ALEOS Release Notes ALEOS 4.8.0 is for AirLink RV50X, AirLink RV50, AirLink GX450, AirLink ES450, and AirLink MP70 gateways. For upgrade instructions, refer to the ALEOS 4.8.0 Software Configuration User Guide. Gateways shipped

More information

OMA-ETS-DL-OTA-v1_ a Page 1 (24)

OMA-ETS-DL-OTA-v1_ a Page 1 (24) OMA-ETS-DL-OTA-v1_0-20040317-a Page 1 (24) Enabler Test Specification for Download 1.0 Version 1.0, 17-Mar-2004 Open Mobile Alliance OMA-ETS-DL-OTA-v1_0-20040317-a OMA-ETS-DL-OTA-v1_0-20040317-a Page 2

More information

F5 BIG-IQ Centralized Management: Local Traffic & Network. Version 5.2

F5 BIG-IQ Centralized Management: Local Traffic & Network. Version 5.2 F5 BIG-IQ Centralized Management: Local Traffic & Network Version 5.2 Table of Contents Table of Contents BIG-IQ Local Traffic & Network: Overview... 5 What is Local Traffic & Network?... 5 Understanding

More information

Client Profile of OMA Device Management v1.3

Client Profile of OMA Device Management v1.3 Client Profile of v1.3 Candidate Version 1.0 30 Apr 2013 Open Mobile Alliance OMA-PD-DM_Client_Profile-V1_3-20130430-C OMA-PD-DM_Client_Profile-V1_3-20130430-C Page 2 (18) Use of this document is subject

More information

ETSI TS V5.2.0 ( )

ETSI TS V5.2.0 ( ) TS 131 112 V5.2.0 (2002-06) Technical Specification Universal Mobile Telecommunications System (UMTS); USAT Interpreter Architecture Description; Stage 2 (3GPP TS 31.112 version 5.2.0 Release 5) 1 TS 131

More information

Security Requirements for Crypto Devices

Security Requirements for Crypto Devices Security Requirements for Crypto Devices Version 1.0 02 May 2018 Controller of Certifying Authorities Ministry of Electronics and Information Technology 1 Document Control Document Name Security Requirements

More information

GMM-SM Event Logging. Feature Description. Feature Overview. Events to be Logged

GMM-SM Event Logging. Feature Description. Feature Overview. Events to be Logged With the introduction of this feature, the SGSN now supports limited use of event data records (EDRs). This chapters details the SGSN's event logging feature, with the use of EDRs, which is intended to

More information

OPC UA Configuration Manager PTC Inc. All Rights Reserved.

OPC UA Configuration Manager PTC Inc. All Rights Reserved. 2017 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 4 Overview 4 5 Project Properties - OPC UA 5 Server Endpoints 7 Trusted Clients 9 Discovery Servers 10 Trusted Servers 11 Instance

More information

onem2m AND SMART M2M INTRODUCTION, RELEASE 2/3

onem2m AND SMART M2M INTRODUCTION, RELEASE 2/3 onem2m AND SMART M2M INTRODUCTION, RELEASE 2/3 Presenter: Omar Elloumi, onem2m TP Chair, Nokia Bell Labs and CTO group omar.elloumi@nokia.com onem2m www.onem2m.org 2016 onem2m Outline Introduction to onem2m

More information

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

VMware AirWatch Google Sync Integration Guide Securing Your  Infrastructure VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

Clover Flex Security Policy

Clover Flex Security Policy Clover Flex Security Policy Clover Flex Security Policy 1 Table of Contents Introduction General description Installation Guidance Visual Shielding Device Security Decommissioning Key Management System

More information

HAN Device Validation Program. March 31, 2015

HAN Device Validation Program. March 31, 2015 HAN Device Validation Program March 31, 2015 Version 1.1 - May 15, 2015 The Ameren Illinois name and Ameren logo are registered service marks of Ameren Illinois Company s parent, Ameren Corporation, in

More information

Exostar Identity Access Platform (SAM) User Guide July 2018

Exostar Identity Access Platform (SAM) User Guide July 2018 Exostar Identity Access Platform (SAM) User Guide July 2018 Copyright 2018 Exostar, LLC All rights reserved. 1 Version Impacts Date Owner Identity and Access Management Email Verification (Email OTP) July

More information

WiMAX Forum Trademark Policy and Trademark Usage Guidelines Part 1 WiMAX. Adopted March 27, 2007; Amended September 6, 2007

WiMAX Forum Trademark Policy and Trademark Usage Guidelines Part 1 WiMAX. Adopted March 27, 2007; Amended September 6, 2007 Introduction. WiMAX Forum Adopted March 27, 2007; Amended September 6, 2007 This policy provides usage guidelines and requirements for WiMAX. WiMAX is a trademark and service mark of the WiMAX Forum. As

More information

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

VMware AirWatch Google Sync Integration Guide Securing Your  Infrastructure VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Use Plug and Play to Deploy New Devices

Use Plug and Play to Deploy New Devices About Plug and Play, page 1 Prerequisites for Using Plug and Play, page 2 Plug and Play Workflow, page 2 Use the Plug and Play Dashboard to Monitor New Device Deployments, page 4 Create Plug and Play Profiles

More information

This Specification is provided for future development work within onem2m only. The Partners accept no liability for any use of this Specification.

This Specification is provided for future development work within onem2m only. The Partners accept no liability for any use of this Specification. Document Number Document Name: ONEM2M TECHNICAL SPECIFICATION TS-0014-V2.0.1 Interworking Date: 2018-03-12 Abstract: The present document specifies the interworking capabilities of the M2M Service Layer

More information

Quality-of-Service Option for Proxy Mobile IPv6

Quality-of-Service Option for Proxy Mobile IPv6 Internet Engineering Task Force (IETF) Request for Comments: 7222 Category: Standards Track ISSN: 2070-1721 M. Liebsch NEC P. Seite Orange H. Yokota KDDI Lab J. Korhonen Broadcom Communications S. Gundavelli

More information

Tab for router monitoring and configuration. Tab for managing RMS users and profiles. Tab for files uploading to RMS system

Tab for router monitoring and configuration. Tab for managing RMS users and profiles. Tab for files uploading to RMS system User Manual v_0.26 Table of Contents 1. Main Menu... 3 2. User Tab... 4 2.1. Inbox... 4 2.2. Notifications... 4 2.3. User settings... 5 2.3.1. User settings... 6 2.3.2. Setting... 6 2.3.3. Help guide...

More information

3GPP TS V ( )

3GPP TS V ( ) TS 24.244 V12.2.0 (2015-03) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Wireless LAN control plane protocol for trusted WLAN access

More information

Using the Cable Monitor Tool

Using the Cable Monitor Tool APPENDIX B This appendix describes the Cisco ubr905 and Cisco ubr925 cable access routers Cable Monitor tool. The Cable Monitor is part of the router s onboard software that provides a web-based diagnostic

More information

TALQ Specification Overview

TALQ Specification Overview TALQ Specification Overview TALQ Technical Working Group March 2015 References [1] TALQ Consortium http://www.talq-consortium.org/ [2] RFC 2616 - Hypertext Transfer Protocol -- HTTP/1.1 (http://www.tools.ietf.org/html/rfc2616)

More information

ETSI TS V5.3.0 ( )

ETSI TS V5.3.0 ( ) TS 131 114 V5.3.0 (2003-03) Technical Specification Universal Mobile Telecommunications System (UMTS); USAT interpreter protocol and administration (3GPP TS 31.114 version 5.3.0 Release 5) 1 TS 131 114

More information

Tungsten Security Whitepaper

Tungsten Security Whitepaper Tungsten Labs UG (haftungsbeschränkt) Email: contact@tungsten-labs.com Web: http://tungsten-labs.com Monbijouplatz 5, 10178 Berlin Tungsten Security Whitepaper Berlin, May 2018 Version 1 Contents Introduction

More information

Deploying Devices. Cisco Prime Infrastructure 3.1. Job Aid

Deploying Devices. Cisco Prime Infrastructure 3.1. Job Aid Deploying Devices Cisco Prime Infrastructure 3.1 Job Aid Copyright Page THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION,

More information

System Architecture Model Version 1.1 WV Tracking Number: WV-020

System Architecture Model Version 1.1 WV Tracking Number: WV-020 System Architecture Model Version 1.1 WV Tracking Number: WV-020 Notice Copyright 2001-2002 Ericsson, Motorola and Nokia. All Rights Reserved. Implementation of all or part of any Specification may require

More information

BLOOMBERG FOR BLACKBERRY

BLOOMBERG FOR BLACKBERRY BLOOMBERG FOR BLACKBERRY Maintenance of Device Software 13 February 2008 Version: 1.0 1 CONTENTS 1. INTRODUCTION 2 1.1. Scope 2 2. DOWNLOADING of DEVICE SOFTWARE 3 3. SOFTWARE RELEASE SCHEDULE 4 4. SOFTWARE

More information

ETSI TS V1.2.1 ( )

ETSI TS V1.2.1 ( ) TS 101 871-2 V1.2.1 (2003-04) Technical Specification Digital Enhanced Cordless Telecommunications (DECT); Application Specific Access Profile (ASAP); DECT Multimedia Access Profile (DMAP); Profile requirement

More information

FIFOTRACK PARAMETER TOOL USER GUIDE V1.1

FIFOTRACK PARAMETER TOOL USER GUIDE V1.1 FIFOTRACK PARAMETER TOOL USER GUIDE V1.1 Copyright 2015 fifotrack All rights reserved 1 Copyright and Disclaimer: All copyrights belong to Shenzhen fifotrack Solution Co., Ltd. You are not allowed to revise,

More information

HS1200N Wireless N Hotspot

HS1200N Wireless N Hotspot HS1200N Wireless N Hotspot Firmware Release Notes Copyright Copyright 2015 NetComm Wireless Limited. All rights reserved. The information contained herein is proprietary to NetComm Wireless. No part of

More information

Lightweight Machine to Machine Technical Specification: Core

Lightweight Machine to Machine Technical Specification: Core Lightweight Machine to Machine Technical Specification: Core Approved Version: 1.1-2018-07-10 Open Mobile Alliance OMA-TS-LightweightM2M_Core-V1_1-20180710-A master: 06 Aug 2018 16:47:00 rev: 230b17c OMA-TS-LightweightM2M_Core-V1_1-20180710-A

More information

OPEN BASE STATION ARCHITECTURE INITIATIVE

OPEN BASE STATION ARCHITECTURE INITIATIVE OPEN BASE STATION ARCHITECTURE INITIATIVE Conformance Test Specification Appendix H UDPCP Test Cases Version.00 Issue.00 (38) FOREWORD OBSAI description and specification documents are developed within

More information

OMA Management Object for Mobile_

OMA Management Object for Mobile_ OMA Management Object for Mobile_Email Approved Version 1.0 02 Aug 2011 Open Mobile Alliance OMA-TS-Mobile_Email_MO-V1_0-20110802-A OMA-TS-Mobile_Email_MO-V1_0-20110802-A Page 2 (17) Use of this document

More information

Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.

Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. Primavera Portfolio Management 9.0 What s New Copyright 1999-2011, Oracle and/or its affiliates. The Programs (which include both the software and documentation) contain proprietary information; they are

More information

System Requirements VERSION 2.5. Prepared for: Metropolitan Transportation Commission. Prepared by: April 17,

System Requirements VERSION 2.5. Prepared for: Metropolitan Transportation Commission. Prepared by: April 17, TO 8-06: Regional Real-Time Transit Architecture Design, Procurement and Technical Assistance Real-Time Transit Information System System Requirements VERSION 2.5 Prepared for: Metropolitan Transportation

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

OPC UA Configuration Manager Help 2010 Kepware Technologies

OPC UA Configuration Manager Help 2010 Kepware Technologies OPC UA Configuration Manager Help 2010 Kepware Technologies 1 OPC UA Configuration Manager Help Table of Contents 1 Getting Started... 2 Help Contents... 2 Overview... 2 Server Settings... 2 2 OPC UA Configuration...

More information

SOFTWARE LICENSE KEY GENERATOR AND SERIAL NUMBER REPOSITORY. SLK User Guide v5.0

SOFTWARE LICENSE KEY GENERATOR AND SERIAL NUMBER REPOSITORY. SLK User Guide v5.0 SOFTWARE LICENSE KEY GENERATOR AND SERIAL NUMBER REPOSITORY SLK User Guide v5.0 Document Title: SLK User Guide v5.0 DigitalCM Number: 365-095-31649 x.1 Publication Date: 5/2017 ARRIS Trademarks, Copyright,

More information

In-Vehicle Tracking Platform

In-Vehicle Tracking Platform In-Vehicle Tracking Platform Mobile Resource Management (MRM) PinPoint XT Connectivity for Fleet Management, Vehicle Telemetry, and Field Service The PinPoint XT in-vehicle tracking platform simplifies

More information

OCF Specification Overview Core Technology Specification. OCF 2.0 Release June 2018

OCF Specification Overview Core Technology Specification. OCF 2.0 Release June 2018 OCF Specification Overview Core Technology Specification OCF 2.0 Release June 2018 Core Framework Topics Outline (1 of 2) Objectives RESTful Architecture OCF Roles Resources Basic Operations Organization

More information

Cisco Meeting Management

Cisco Meeting Management Cisco Meeting Management Cisco Meeting Management 1.1 User Guide for Administrators September 19, 2018 Cisco Systems, Inc. www.cisco.com Contents 1 Introduction 4 1.1 The software 4 2 Deployment overview

More information

ETSI TS V7.0.0 ( ) Technical Specification. Smart Cards; Extensible Authentication Protocol support in the UICC (Release 7)

ETSI TS V7.0.0 ( ) Technical Specification. Smart Cards; Extensible Authentication Protocol support in the UICC (Release 7) TS 102 310 V7.0.0 (2008-09) Technical Specification Smart Cards; Extensible Authentication Protocol support in the UICC (Release 7) 2 TS 102 310 V7.0.0 (2008-09) Reference RTS/SCP-T0013v700 Keywords card,

More information