How much Security is enough for A-Key ? Discuss about it cdmaguru 21-May-2008 06:50:46 AMComments A-Key requires the most security Posted by HamidAliKhan A-Key requires the most security Its requirements are 1.)Secure generation pseudo-random number-based 2.)Secure entry into mobile phone (3 methods) Pre-programmed by mobile phone manufacturer (default and random A-Keys) Manually entered by dealer or subscriber Entered via mobile phone data port 3.)Secure entry into AC database Originally generated internally to AC Manually entered by network administrative staff Automatically entered via communications links 4.)Zero human visibility!!! (if possible) Posted by jahangir1983 A-Key requires the most security Its requirements are 1.)Secure generation pseudo-random number-based 2.)Secure entry into mobile phone (3 methods) Pre-programmed by mobile phone manufacturer (default and random A-Keys) Manually entered by dealer or subscriber Entered via mobile phone data port 3.)Secure entry into AC database Originally generated internally to AC Manually entered by network administrative staff Automatically entered via communications links 4.)Zero human visibility!!! (if possible) Posted by jahangir1983 A-Key requires the most security Its requirements are 1.)Secure generation pseudo-random number-based 2.)Secure entry into mobile phone (3 methods) Pre-programmed by mobile phone manufacturer (default and random A-Keys) Manually entered by dealer or subscriber Entered via mobile phone data port 3.)Secure entry into AC database Originally generated internally to AC Manually entered by network administrative staff Automatically entered via communications links 4.)Zero human visibility!!! (if possible) Posted by jahangir1983 secure generation, secure entry into mobile, Secure entry into AC database are the requirements. Posted by waqqas1 A-Key requires the most security Its requirements are 1.)Secure generation pseudo-random number-based 2.)Secure entry into mobile phone (3 methods) Pre-programmed by mobile phone manufacturer (default and random A-Keys) Manually entered by dealer or subscriber Entered via mobile phone data port 3.)Secure entry into AC database Originally generated internally to AC Manually entered by network administrative staff Automatically entered via communications links 4.)Zero human visibility!!! (if possible) Posted by sagitraz |
Posted: 21-May-2008 09:28:32 AM By: sagitraz A-Key requires the most security Its requirements are 1.)Secure generation pseudo-random number-based 2.)Secure entry into mobile phone (3 methods) Pre-programmed by mobile phone manufacturer (default and random A-Keys) Manually entered by dealer or subscriber Entered via mobile phone data port 3.)Secure entry into AC database Originally generated internally to AC Manually entered by network administrative staff Automatically entered via communications links 4.)Zero human visibility!!! (if possible) | |
Posted: 30-December-2008 02:39:18 PM By: waqqas1 secure generation, secure entry into mobile, Secure entry into AC database are the requirements. | |
Posted: 31-January-2009 12:56:53 PM By: jahangir1983 A-Key requires the most security Its requirements are 1.)Secure generation pseudo-random number-based 2.)Secure entry into mobile phone (3 methods) Pre-programmed by mobile phone manufacturer (default and random A-Keys) Manually entered by dealer or subscriber Entered via mobile phone data port 3.)Secure entry into AC database Originally generated internally to AC Manually entered by network administrative staff Automatically entered via communications links 4.)Zero human visibility!!! (if possible) | |
Posted: 31-January-2009 12:58:10 PM By: jahangir1983 A-Key requires the most security Its requirements are 1.)Secure generation pseudo-random number-based 2.)Secure entry into mobile phone (3 methods) Pre-programmed by mobile phone manufacturer (default and random A-Keys) Manually entered by dealer or subscriber Entered via mobile phone data port 3.)Secure entry into AC database Originally generated internally to AC Manually entered by network administrative staff Automatically entered via communications links 4.)Zero human visibility!!! (if possible) | |
Posted: 31-January-2009 12:59:00 PM By: jahangir1983 A-Key requires the most security Its requirements are 1.)Secure generation pseudo-random number-based 2.)Secure entry into mobile phone (3 methods) Pre-programmed by mobile phone manufacturer (default and random A-Keys) Manually entered by dealer or subscriber Entered via mobile phone data port 3.)Secure entry into AC database Originally generated internally to AC Manually entered by network administrative staff Automatically entered via communications links 4.)Zero human visibility!!! (if possible) | |
Posted: 23-April-2009 12:49:15 AM By: HamidAliKhan A-Key requires the most security |