Discuss A-Key management problems?
cdmaguru 22-May-2008 05:11:18 AM

Comments


1.) Fulfill all previous requirements for authentication security
Eliminate possibility of compromise
2.) Minimize cost
A-Key management is an additional function, usually not budgeted by revenue assurance, fraud or network technology groups within a service provider organization
3.) Minimize impact to subscriber (heavy marketing issue)
a. Ideally, there will be no impact
b.No delay in subscription activation process
c.No additional actions need to be taken by subscriber
4.) Secure A-Key storage and distribution (mobile phone and AC)
5.) Ongoing management of A-Keys
Posted by jahangir1983


1.) Fulfill all previous requirements for authentication security
Eliminate possibility of compromise
2.) Minimize cost
A-Key management is an additional function, usually not budgeted by revenue assurance, fraud or network technology groups within a service provider organization
3.) Minimize impact to subscriber (heavy marketing issue)
a. Ideally, there will be no impact
b.No delay in subscription activation process
c.No additional actions need to be taken by subscriber
4.) Secure A-Key storage and distribution (mobile phone and AC)
5.) Ongoing management of A-Keys
Posted by jahangir1983


1.) Fulfill all previous requirements for authentication security
Eliminate possibility of compromise
2.) Minimize cost
A-Key management is an additional function, usually not budgeted by revenue assurance, fraud or network technology groups within a service provider organization
3.) Minimize impact to subscriber (heavy marketing issue)
a. Ideally, there will be no impact
b.No delay in subscription activation process
c.No additional actions need to be taken by subscriber
4.) Secure A-Key storage and distribution (mobile phone and AC)
5.) Ongoing management of A-Keys
Posted by jahangir1983


1.) Fulfill all previous requirements for authentication security
Eliminate possibility of compromise
2.) Minimize cost
A-Key management is an additional function, usually not budgeted by revenue assurance, fraud or network technology groups within a service provider organization
3.) Minimize impact to subscriber (heavy marketing issue)
a. Ideally, there will be no impact
b.No delay in subscription activation process
c.No additional actions need to be taken by subscriber
4.) Secure A-Key storage and distribution (mobile phone and AC)
5.) Ongoing management of A-Keys
Posted by jahangir1983


1.) Fulfill all previous requirements for authentication security
Eliminate possibility of compromise
2.) Minimize cost
A-Key management is an additional function, usually not budgeted by revenue assurance, fraud or network technology groups within a service provider organization
3.) Minimize impact to subscriber (heavy marketing issue)
a. Ideally, there will be no impact
b.No delay in subscription activation process
c.No additional actions need to be taken by subscriber
4.) Secure A-Key storage and distribution (mobile phone and AC)
5.) Ongoing management of A-Keys

Posted by sagitraz



Posted: 22-May-2008 07:31:51 AM By: sagitraz

1.) Fulfill all previous requirements for authentication security
Eliminate possibility of compromise
2.) Minimize cost
A-Key management is an additional function, usually not budgeted by revenue assurance, fraud or network technology groups within a service provider organization
3.) Minimize impact to subscriber (heavy marketing issue)
a. Ideally, there will be no impact
b.No delay in subscription activation process
c.No additional actions need to be taken by subscriber
4.) Secure A-Key storage and distribution (mobile phone and AC)
5.) Ongoing management of A-Keys

Posted: 31-January-2009 12:51:30 PM By: jahangir1983

1.) Fulfill all previous requirements for authentication security
Eliminate possibility of compromise
2.) Minimize cost
A-Key management is an additional function, usually not budgeted by revenue assurance, fraud or network technology groups within a service provider organization
3.) Minimize impact to subscriber (heavy marketing issue)
a. Ideally, there will be no impact
b.No delay in subscription activation process
c.No additional actions need to be taken by subscriber
4.) Secure A-Key storage and distribution (mobile phone and AC)
5.) Ongoing management of A-Keys

Posted: 31-January-2009 12:52:19 PM By: jahangir1983

1.) Fulfill all previous requirements for authentication security
Eliminate possibility of compromise
2.) Minimize cost
A-Key management is an additional function, usually not budgeted by revenue assurance, fraud or network technology groups within a service provider organization
3.) Minimize impact to subscriber (heavy marketing issue)
a. Ideally, there will be no impact
b.No delay in subscription activation process
c.No additional actions need to be taken by subscriber
4.) Secure A-Key storage and distribution (mobile phone and AC)
5.) Ongoing management of A-Keys

Posted: 31-January-2009 12:53:11 PM By: jahangir1983

1.) Fulfill all previous requirements for authentication security
Eliminate possibility of compromise
2.) Minimize cost
A-Key management is an additional function, usually not budgeted by revenue assurance, fraud or network technology groups within a service provider organization
3.) Minimize impact to subscriber (heavy marketing issue)
a. Ideally, there will be no impact
b.No delay in subscription activation process
c.No additional actions need to be taken by subscriber
4.) Secure A-Key storage and distribution (mobile phone and AC)
5.) Ongoing management of A-Keys

Posted: 31-January-2009 12:53:58 PM By: jahangir1983

1.) Fulfill all previous requirements for authentication security
Eliminate possibility of compromise
2.) Minimize cost
A-Key management is an additional function, usually not budgeted by revenue assurance, fraud or network technology groups within a service provider organization
3.) Minimize impact to subscriber (heavy marketing issue)
a. Ideally, there will be no impact
b.No delay in subscription activation process
c.No additional actions need to be taken by subscriber
4.) Secure A-Key storage and distribution (mobile phone and AC)
5.) Ongoing management of A-Keys