Comments
There are two methods of it
1.)Re-programming of A-Keys
Handling of ”churned„ mobile phones
For authentication failures (after catching a cloner)
2.)Ensuring the A-Keys live in only one place in the network
Once A-Keys are distributed to the AC and phone, they should be deleted from
everywhere else
Posted by jahangir1983
There are two methods of it
1.)Re-programming of A-Keys
Handling of ”churned„ mobile phones
For authentication failures (after catching a cloner)
2.)Ensuring the A-Keys live in only one place in the network
Once A-Keys are distributed to the AC and phone, they should be deleted from
everywhere else
Posted by jahangir1983
There are two methods of it
1.)Re-programming of A-Keys
Handling of ”churned„ mobile phones
For authentication failures (after catching a cloner)
2.)Ensuring the A-Keys live in only one place in the network
Once A-Keys are distributed to the AC and phone, they should be deleted from
everywhere else
Posted by jahangir1983
It can be done in two ways:
1.)Re-programming of A-Keys
Handling of ”churned„ mobile phones
For authentication failures (after catching a cloner)
2.)Ensuring the A-Keys live in only one place in the network
Once A-Keys are distributed to the AC and phone, they should be deleted from
everywhere else
Posted by sagitraz