How much Security is enough for A-Key ? Discuss about it
cdmaguru 21-May-2008 06:50:46 AM

Comments


A-Key requires the most security
Posted by HamidAliKhan


A-Key requires the most security

Its requirements are

1.)Secure generation
pseudo-random number-based
2.)Secure entry into mobile phone (3 methods)
Pre-programmed by mobile phone manufacturer (default and random A-Keys)
Manually entered by dealer or subscriber
Entered via mobile phone data port
3.)Secure entry into AC database
Originally generated internally to AC
Manually entered by network administrative staff
Automatically entered via communications links
4.)Zero human visibility!!! (if possible)
Posted by jahangir1983


A-Key requires the most security

Its requirements are

1.)Secure generation
pseudo-random number-based
2.)Secure entry into mobile phone (3 methods)
Pre-programmed by mobile phone manufacturer (default and random A-Keys)
Manually entered by dealer or subscriber
Entered via mobile phone data port
3.)Secure entry into AC database
Originally generated internally to AC
Manually entered by network administrative staff
Automatically entered via communications links
4.)Zero human visibility!!! (if possible)
Posted by jahangir1983


A-Key requires the most security

Its requirements are

1.)Secure generation
pseudo-random number-based
2.)Secure entry into mobile phone (3 methods)
Pre-programmed by mobile phone manufacturer (default and random A-Keys)
Manually entered by dealer or subscriber
Entered via mobile phone data port
3.)Secure entry into AC database
Originally generated internally to AC
Manually entered by network administrative staff
Automatically entered via communications links
4.)Zero human visibility!!! (if possible)
Posted by jahangir1983


secure generation, secure entry into mobile, Secure entry into AC database are the requirements.
Posted by waqqas1


A-Key requires the most security

Its requirements are

1.)Secure generation
pseudo-random number-based
2.)Secure entry into mobile phone (3 methods)
Pre-programmed by mobile phone manufacturer (default and random A-Keys)
Manually entered by dealer or subscriber
Entered via mobile phone data port
3.)Secure entry into AC database
Originally generated internally to AC
Manually entered by network administrative staff
Automatically entered via communications links
4.)Zero human visibility!!! (if possible)

Posted by sagitraz



Posted: 21-May-2008 09:28:32 AM By: sagitraz

A-Key requires the most security

Its requirements are

1.)Secure generation
pseudo-random number-based
2.)Secure entry into mobile phone (3 methods)
Pre-programmed by mobile phone manufacturer (default and random A-Keys)
Manually entered by dealer or subscriber
Entered via mobile phone data port
3.)Secure entry into AC database
Originally generated internally to AC
Manually entered by network administrative staff
Automatically entered via communications links
4.)Zero human visibility!!! (if possible)

Posted: 30-December-2008 02:39:18 PM By: waqqas1

secure generation, secure entry into mobile, Secure entry into AC database are the requirements.

Posted: 31-January-2009 12:56:53 PM By: jahangir1983

A-Key requires the most security

Its requirements are

1.)Secure generation
pseudo-random number-based
2.)Secure entry into mobile phone (3 methods)
Pre-programmed by mobile phone manufacturer (default and random A-Keys)
Manually entered by dealer or subscriber
Entered via mobile phone data port
3.)Secure entry into AC database
Originally generated internally to AC
Manually entered by network administrative staff
Automatically entered via communications links
4.)Zero human visibility!!! (if possible)

Posted: 31-January-2009 12:58:10 PM By: jahangir1983

A-Key requires the most security

Its requirements are

1.)Secure generation
pseudo-random number-based
2.)Secure entry into mobile phone (3 methods)
Pre-programmed by mobile phone manufacturer (default and random A-Keys)
Manually entered by dealer or subscriber
Entered via mobile phone data port
3.)Secure entry into AC database
Originally generated internally to AC
Manually entered by network administrative staff
Automatically entered via communications links
4.)Zero human visibility!!! (if possible)

Posted: 31-January-2009 12:59:00 PM By: jahangir1983

A-Key requires the most security

Its requirements are

1.)Secure generation
pseudo-random number-based
2.)Secure entry into mobile phone (3 methods)
Pre-programmed by mobile phone manufacturer (default and random A-Keys)
Manually entered by dealer or subscriber
Entered via mobile phone data port
3.)Secure entry into AC database
Originally generated internally to AC
Manually entered by network administrative staff
Automatically entered via communications links
4.)Zero human visibility!!! (if possible)

Posted: 23-April-2009 12:49:15 AM By: HamidAliKhan

A-Key requires the most security