[Last Call] Learn how to a build a cloud-first strategyRegister Now


what is WTLS ? How is it related with WAP ? How can i use WTLS and WAP for SMS secure messaging ?

Posted on 2007-10-12
Medium Priority
Last Modified: 2013-12-27
Product :Mobile devices -Java enabled.
OS : Windows and Linux
what is WTLS ? How is it related with WAP ?
How can i use WTLS and WAP for SMS secure messaging ?
Question by:joseph301074
  • 2

Accepted Solution

firekool earned 2000 total points
ID: 20063796
WTLS is the security layer of the WAP, providing privacy, data integrity and authentication for WAP services. WTLS, designed specifically for the wireless environment, is needed because the client and the server must be authenticated in order for wireless transactions to remain secure and because the connection needs to be encrypted. For example, a user making a transaction with a bank over a wireless device needs to know that the connection is secure and private and not subject to a security breach during transfer (sometimes referred to as a man-in-the-middle attack). WTLS is needed because mobile networks do not provide complete end-to-end security.

WTLS is based on the widely used TLS v1.0 security layer used in Internet. Because of the nature of wireless transmissions, modifications were made to the TLS v1.0 in order to accommodate for wireless' low bandwidth, datagram connection, limited processing power and memory capacity, and cryptography exporting restrictions.

I do not believe you can use WTLS for SMS  messaging. What type of phone do you have?

Author Comment

ID: 20065287
I have blackberry 7320 ,Nokia 3310 and Sony 750ki handsets having midlets which can send sms to my gateway say +121 which is a Motorola v2 connected with usb to my computer running the server app software. Deamon application is written in java using comm package(Standalone java application running thru the command prompt with 3 minutes break).

Author Comment

ID: 20136780
fire kool - i have increased the points - can u help ?

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hopefully this article will help someone who's had the same issues I had. I have a Dell Wireless 1390 WLAN Mini-Card and Windows 7, and for the past couple of days I was beyond frustrated because my wireless laptop was not able to access the Inte…
For Sennheiser, comfort, quality and security are high priority areas. This paper addresses the security of Bluetooth technology and the supplementary security that Sennheiser’s Contact Center and Office (CC&O) headsets provide.  
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Suggested Courses
Course of the Month18 days, 14 hours left to enroll

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question