4 Knowledge Base

 

 TelecomTrainning.net > Knowledge Base
 Viewing KB Article
Good Morning, - Please register or - log-in to your account.
Search
Search   Saved Questions   Ask a question
Keywords 
 
Available categories
LTE
100 of Questions in LTE
CCNA Certification
CCNA Sample Q & A (1000 + Q &A)
(Network +) Certification
(Network +) Sample Q & A (1000 + Q &A)
Networking
General/Interview Q& A on Networking
Home Networking
General/Interview Q& A on Networking
VOIP, SIP & Asterisk
Q & A on VOIP,Ethereal, SIP & Asterisk
Telecom Test Equipments
Q & A on Telecom Test Equipment
PSTN / Wireline
General / Interview Q & A on PSTN / Wireline
LTE, Wireless, 3G ,Diameter and HSS
General/Interview Q & A on LTE, Wireless, 3G ,Diameter and HSS
Telecom General
Any Q & A in Telecom in General

Top Questions
Friends, Describe Secure storage and distribution of A-Keys?
what is the difference between E1 signal & Ethernet signal ?
How do I monitor SS7 Traffic in spectra2?
Can you tell me about PBGT?
Explain me the difference between a repeater, bridge and router? Relate this to the OSI model.
What is the difference between BRI & PRI ?
Guys what is the purpose of Umbrella Cell Approach in GSM ?
how can we explain media gateway in MSc?
What is GGSN?
What is the difference between Electrical-tilt and Mechanical-tilt of an antenna?
What is BSC?
What is demarc point?
Can any one explain me how sms flow will work using ss7 network ?( from physical layer to application layer)
why cellphone towers are painted in red and white?
Explain SLTA and SLTM messages in MTP3?
Hi guys what is WAP?
wat is the difference betweem MSC & GMSC, & MSS & GCS?
what is EDAp? what is the functions of EDAP?
What is a circuit id?
what is sdh?

What is SSD (Shared Secret Data)?
shanz 14-May-2008 09:44:09 AM

Comments


SSD (Society System Decontrol) were a straight edge hardcore (and later heavy metal) band from Boston. They released two records as SS Decontrol and then formally changed their name to SSD. As SSD they released two more records, these with a very heavy metal influenced sound. However the group is often simply referred to, including all its periods, as SSD.


Posted by waqasahmad


It is a part of an encryption process and can also be used to establish a voice privacy key.
Posted by waqqas1


SSD is basically a part of an encryption process supporting authentication of mobile phones.and all the procedures use a secondary key called shared Secret Data.
Posted by HamidAliKhan


hared Secret Data (SSD) is part of an encryption process supporting authentication of mobile phones. It uses an encryption key installed in the phone at the time of activation and known to the system through an entry in the HLR, that protects signalling and identity information. It can also be used to establish a voice privacy key.
Posted by sagitraz


All the procedures use a secondary key called SSD (Shared Secret Data).
Posted by rickwalker

Q&A Rating

Q&A Rating
Rate This Question and Answer

Related Questions
Which protocol is used to send a destination network unknown message back to originating hosts?
Guys, Draw a diagram for Network Field and Host Field?
 
Who does location Tracking?


Search questions via popularity
Top viewed questions  Top emailed questions  Most printed questions  Most saved questions
 
Copyright © Telecom Training, All Rights Reserved