Explain Encrypted Communications between AC or A-Key?
cdmaguru 24-May-2008 07:28:56 AM

Comments


The cryptographic content of various standards is based on secret key technology.
The key here is called the A-Key.This key is unique and private.
This A-Key is NAM programmed into the MS and also stored in the AC.
And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal.
Posted by jahangir1983


The cryptographic content of various standards is based on secret key technology.
The key here is called the A-Key.This key is unique and private.
This A-Key is NAM programmed into the MS and also stored in the AC.
And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal.
Posted by jahangir1983


The cryptographic content of various standards is based on secret key technology.
The key here is called the A-Key.This key is unique and private.
This A-Key is NAM programmed into the MS and also stored in the AC.
And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal.
Posted by jahangir1983


In short A-key is stored in AC and provide encryption between AC and system, operation and AC, through ought system where A-key exists.
Posted by HamidAliKhan


A-key is stored in AC and provide encryption between AC and system, operation and AC, throughought system where A-key exists.
Posted by waqqas1


■=> Encryption throughout administrative/provisioning system
■=> Encryption between AC and administrative/provisioning system
■=> Encryption between point of A-Key generation and AC
■=> Encryption between operations system and AC (i.e., maintenance terminal)
■=> Encryption over any network where A-Keys are transported
Posted by michaelchristopher


The cryptographic content of various standards is based on secret key technology.
The key here is called the A-Key.This key is unique and private.
This A-Key is NAM programmed into the MS and also stored in the AC.
And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal.
Posted by sagitraz



Posted: 24-May-2008 09:08:45 AM By: sagitraz

The cryptographic content of various standards is based on secret key technology.
The key here is called the A-Key.This key is unique and private.
This A-Key is NAM programmed into the MS and also stored in the AC.
And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal.

Posted: 26-May-2008 10:22:56 AM By: michaelchristopher

■=> Encryption throughout administrative/provisioning system
■=> Encryption between AC and administrative/provisioning system
■=> Encryption between point of A-Key generation and AC
■=> Encryption between operations system and AC (i.e., maintenance terminal)
■=> Encryption over any network where A-Keys are transported

Posted: 30-December-2008 06:39:38 AM By: waqqas1

A-key is stored in AC and provide encryption between AC and system, operation and AC, throughought system where A-key exists.

Posted: 30-December-2008 02:07:41 PM By: HamidAliKhan

In short A-key is stored in AC and provide encryption between AC and system, operation and AC, through ought system where A-key exists.

Posted: 31-January-2009 12:40:41 PM By: jahangir1983

The cryptographic content of various standards is based on secret key technology.
The key here is called the A-Key.This key is unique and private.
This A-Key is NAM programmed into the MS and also stored in the AC.
And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal.

Posted: 31-January-2009 12:42:32 PM By: jahangir1983

The cryptographic content of various standards is based on secret key technology.
The key here is called the A-Key.This key is unique and private.
This A-Key is NAM programmed into the MS and also stored in the AC.
And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal.

Posted: 31-January-2009 12:43:40 PM By: jahangir1983

The cryptographic content of various standards is based on secret key technology.
The key here is called the A-Key.This key is unique and private.
This A-Key is NAM programmed into the MS and also stored in the AC.
And Encryption is always made between point of A-Key generation and AC and encrypted communication is also occur where A-Keys are transported.And encrypted communication is also made at maintenance terminal.