Explain Encrypted Communications between AC or A-Key? cdmaguru 24-May-2008 07:28:56 AMComments The cryptographic content of various standards is based on secret key technology. The key here is called the A-Key.This key is unique and private. This A-Key is NAM programmed into the MS and also stored in the AC. And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal. Posted by jahangir1983 The cryptographic content of various standards is based on secret key technology. The key here is called the A-Key.This key is unique and private. This A-Key is NAM programmed into the MS and also stored in the AC. And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal. Posted by jahangir1983 The cryptographic content of various standards is based on secret key technology. The key here is called the A-Key.This key is unique and private. This A-Key is NAM programmed into the MS and also stored in the AC. And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal. Posted by jahangir1983 In short A-key is stored in AC and provide encryption between AC and system, operation and AC, through ought system where A-key exists. Posted by HamidAliKhan A-key is stored in AC and provide encryption between AC and system, operation and AC, throughought system where A-key exists. Posted by waqqas1 ■=> Encryption throughout administrative/provisioning system ■=> Encryption between AC and administrative/provisioning system ■=> Encryption between point of A-Key generation and AC ■=> Encryption between operations system and AC (i.e., maintenance terminal) ■=> Encryption over any network where A-Keys are transported Posted by michaelchristopher The cryptographic content of various standards is based on secret key technology. The key here is called the A-Key.This key is unique and private. This A-Key is NAM programmed into the MS and also stored in the AC. And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal. Posted by sagitraz |
Posted: 24-May-2008 09:08:45 AM By: sagitraz The cryptographic content of various standards is based on secret key technology. The key here is called the A-Key.This key is unique and private. This A-Key is NAM programmed into the MS and also stored in the AC. And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal. | |
Posted: 26-May-2008 10:22:56 AM By: michaelchristopher ■=> Encryption throughout administrative/provisioning system ■=> Encryption between AC and administrative/provisioning system ■=> Encryption between point of A-Key generation and AC ■=> Encryption between operations system and AC (i.e., maintenance terminal) ■=> Encryption over any network where A-Keys are transported | |
Posted: 30-December-2008 06:39:38 AM By: waqqas1 A-key is stored in AC and provide encryption between AC and system, operation and AC, throughought system where A-key exists. | |
Posted: 30-December-2008 02:07:41 PM By: HamidAliKhan In short A-key is stored in AC and provide encryption between AC and system, operation and AC, through ought system where A-key exists. | |
Posted: 31-January-2009 12:40:41 PM By: jahangir1983 The cryptographic content of various standards is based on secret key technology. The key here is called the A-Key.This key is unique and private. This A-Key is NAM programmed into the MS and also stored in the AC. And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal. | |
Posted: 31-January-2009 12:42:32 PM By: jahangir1983 The cryptographic content of various standards is based on secret key technology. The key here is called the A-Key.This key is unique and private. This A-Key is NAM programmed into the MS and also stored in the AC. And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal. | |
Posted: 31-January-2009 12:43:40 PM By: jahangir1983 The cryptographic content of various standards is based on secret key technology. The key here is called the A-Key.This key is unique and private. This A-Key is NAM programmed into the MS and also stored in the AC. And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal. |