4 Knowledge Base

 

 TelecomTrainning.net > Knowledge Base
 Viewing KB Article
Good Afternoon, - Please register or - log-in to your account.
Search
Search   Saved Questions   Ask a question
Keywords 
 
Available categories
LTE
100 of Questions in LTE
CCNA Certification
CCNA Sample Q & A (1000 + Q &A)
(Network +) Certification
(Network +) Sample Q & A (1000 + Q &A)
Networking
General/Interview Q& A on Networking
Home Networking
General/Interview Q& A on Networking
VOIP, SIP & Asterisk
Q & A on VOIP,Ethereal, SIP & Asterisk
Telecom Test Equipments
Q & A on Telecom Test Equipment
PSTN / Wireline
General / Interview Q & A on PSTN / Wireline
LTE, Wireless, 3G ,Diameter and HSS
General/Interview Q & A on LTE, Wireless, 3G ,Diameter and HSS
Telecom General
Any Q & A in Telecom in General

Top Questions
Friends, Describe Secure storage and distribution of A-Keys?
How do I monitor SS7 Traffic in spectra2?
what is the difference between E1 signal & Ethernet signal ?
Can you tell me about PBGT?
Explain me the difference between a repeater, bridge and router? Relate this to the OSI model.
What is the difference between BRI & PRI ?
Guys what is the purpose of Umbrella Cell Approach in GSM ?
how can we explain media gateway in MSc?
What is GGSN?
What is the difference between Electrical-tilt and Mechanical-tilt of an antenna?
What is BSC?
What is demarc point?
Can any one explain me how sms flow will work using ss7 network ?( from physical layer to application layer)
why cellphone towers are painted in red and white?
Explain SLTA and SLTM messages in MTP3?
Hi guys what is WAP?
wat is the difference betweem MSC & GMSC, & MSS & GCS?
what is EDAp? what is the functions of EDAP?
What is a circuit id?
what is sdh?

Discuss A-Key management problems?
cdmaguru 22-May-2008 05:11:18 AM

Comments


1.) Fulfill all previous requirements for authentication security
Eliminate possibility of compromise
2.) Minimize cost
A-Key management is an additional function, usually not budgeted by revenue assurance, fraud or network technology groups within a service provider organization
3.) Minimize impact to subscriber (heavy marketing issue)
a. Ideally, there will be no impact
b.No delay in subscription activation process
c.No additional actions need to be taken by subscriber
4.) Secure A-Key storage and distribution (mobile phone and AC)
5.) Ongoing management of A-Keys
Posted by jahangir1983


1.) Fulfill all previous requirements for authentication security
Eliminate possibility of compromise
2.) Minimize cost
A-Key management is an additional function, usually not budgeted by revenue assurance, fraud or network technology groups within a service provider organization
3.) Minimize impact to subscriber (heavy marketing issue)
a. Ideally, there will be no impact
b.No delay in subscription activation process
c.No additional actions need to be taken by subscriber
4.) Secure A-Key storage and distribution (mobile phone and AC)
5.) Ongoing management of A-Keys
Posted by jahangir1983


1.) Fulfill all previous requirements for authentication security
Eliminate possibility of compromise
2.) Minimize cost
A-Key management is an additional function, usually not budgeted by revenue assurance, fraud or network technology groups within a service provider organization
3.) Minimize impact to subscriber (heavy marketing issue)
a. Ideally, there will be no impact
b.No delay in subscription activation process
c.No additional actions need to be taken by subscriber
4.) Secure A-Key storage and distribution (mobile phone and AC)
5.) Ongoing management of A-Keys
Posted by jahangir1983


1.) Fulfill all previous requirements for authentication security
Eliminate possibility of compromise
2.) Minimize cost
A-Key management is an additional function, usually not budgeted by revenue assurance, fraud or network technology groups within a service provider organization
3.) Minimize impact to subscriber (heavy marketing issue)
a. Ideally, there will be no impact
b.No delay in subscription activation process
c.No additional actions need to be taken by subscriber
4.) Secure A-Key storage and distribution (mobile phone and AC)
5.) Ongoing management of A-Keys
Posted by jahangir1983


1.) Fulfill all previous requirements for authentication security
Eliminate possibility of compromise
2.) Minimize cost
A-Key management is an additional function, usually not budgeted by revenue assurance, fraud or network technology groups within a service provider organization
3.) Minimize impact to subscriber (heavy marketing issue)
a. Ideally, there will be no impact
b.No delay in subscription activation process
c.No additional actions need to be taken by subscriber
4.) Secure A-Key storage and distribution (mobile phone and AC)
5.) Ongoing management of A-Keys

Posted by sagitraz

Q&A Rating

Q&A Rating
Rate This Question and Answer

Related Questions
Help me in an IP access list; I want to refer to host 172.16.50.1 only. What wildcard mask would I use to make the list as specific as possible?
 
The User has moved to a conference room on a different proxy, Can some one explain the call flow between UAC, UAS, Proxy and location Server when user logs in using softphone from conference room?
 
What is BHCA mean in Telecom?


Search questions via popularity
Top viewed questions  Top emailed questions  Most printed questions  Most saved questions
 
Copyright © Telecom Training, All Rights Reserved