Hi, Discuss Ongoing management of A-Keys?
cdmaguru 04-June-2008 04:42:24 PM

Comments


There are two methods of it

1.)Re-programming of A-Keys

Handling of ”churned„ mobile phones
For authentication failures (after catching a cloner)

2.)Ensuring the A-Keys live in only one place in the network

Once A-Keys are distributed to the AC and phone, they should be deleted from
everywhere else
Posted by jahangir1983


There are two methods of it

1.)Re-programming of A-Keys

Handling of ”churned„ mobile phones
For authentication failures (after catching a cloner)

2.)Ensuring the A-Keys live in only one place in the network

Once A-Keys are distributed to the AC and phone, they should be deleted from
everywhere else
Posted by jahangir1983


There are two methods of it

1.)Re-programming of A-Keys

Handling of ”churned„ mobile phones
For authentication failures (after catching a cloner)

2.)Ensuring the A-Keys live in only one place in the network

Once A-Keys are distributed to the AC and phone, they should be deleted from
everywhere else
Posted by jahangir1983


It can be done in two ways:

1.)Re-programming of A-Keys

Handling of ”churned„ mobile phones
For authentication failures (after catching a cloner)

2.)Ensuring the A-Keys live in only one place in the network

Once A-Keys are distributed to the AC and phone, they should be deleted from
everywhere else
Posted by sagitraz



Posted: 05-June-2008 12:13:02 AM By: sagitraz

It can be done in two ways:

1.)Re-programming of A-Keys

Handling of ”churned„ mobile phones
For authentication failures (after catching a cloner)

2.)Ensuring the A-Keys live in only one place in the network

Once A-Keys are distributed to the AC and phone, they should be deleted from
everywhere else

Posted: 31-January-2009 12:15:39 PM By: jahangir1983

There are two methods of it

1.)Re-programming of A-Keys

Handling of ”churned„ mobile phones
For authentication failures (after catching a cloner)

2.)Ensuring the A-Keys live in only one place in the network

Once A-Keys are distributed to the AC and phone, they should be deleted from
everywhere else

Posted: 31-January-2009 12:16:42 PM By: jahangir1983

There are two methods of it

1.)Re-programming of A-Keys

Handling of ”churned„ mobile phones
For authentication failures (after catching a cloner)

2.)Ensuring the A-Keys live in only one place in the network

Once A-Keys are distributed to the AC and phone, they should be deleted from
everywhere else

Posted: 31-January-2009 12:17:51 PM By: jahangir1983

There are two methods of it

1.)Re-programming of A-Keys

Handling of ”churned„ mobile phones
For authentication failures (after catching a cloner)

2.)Ensuring the A-Keys live in only one place in the network

Once A-Keys are distributed to the AC and phone, they should be deleted from
everywhere else