Comments
www.multichannel.com/.../191126-Cable_Show_2009_Technologists_Outline_Next_Generation_Services.php
Posted by crouse
www.sharewareconnection.com/titles/mask.htm
Posted by crouse
AC uses SSD_B and the CAVE algorithm.
Posted by waqqas1
AC (or VLR if SSD is shared) uses SSD_B and the CAVE algorithm.
Posted by jzhang
Encryption keys (masks) are needed to encrypt the traffic channels, and the encryption keys are generated on a per-call basis. The mobile station generates the keys at the same time that the network generates the keys during the call setup process.
Voice Privacy (VP). VP, as its name implies, encrypts the voice signal that goes over the traffic channel between the mobile station and the serving base station.
The network generates the keys in the Home Location Register/Authentication Center (HLR/AC) and then provides them to the anchor MSC and the serving base station.
The same keys are used for the duration of the call, even if the mobile station is handed off to another MSC. Therefore, if the keys have already been provided to the anchor MSC, and the mobile station moves into the service area of another MSC, the keys must be passed in an inter-exchange handoff in order to enable the new serving MSC to encrypt the voice and/or control signals.
Posted by sagitraz