Herunterladen Inhalt Inhalt Diese Seite drucken

Viewing The Air Encryption State; Air Encryption Key Deletion; K Validity; Verifying K Validity - Motorola MTM800 FuG Bedienungsanleitung

Vorschau ausblenden Andere Handbücher für MTM800 FuG:
Inhaltsverzeichnis

Werbung

Verfügbare Sprachen

Verfügbare Sprachen

78 | Main Menu

Viewing the Air Encryption State

Procedure:
1 From the home screen, press the
2 Select Security → AirEncrypt.
3 Your radio displays:
a Air Encryption Is Off.
b Air Encryption Is On.

Air Encryption Key Deletion

Please check with your service provider whether the radio is provided with Air interface encryption keys. You can
delete the Air interface encryption keys from the radio by entering the following sequence: **00##.
Note:
It takes a minute for this feature to delete all the encryption keys from the radio.
Deletion is performed in idle TMO/DMO or Emergency Operation.
Caution: Using this feature will disable the radio, and your service provider will need to re-enable the
radio.

K Validity

K (Key) is a secret key the infrastructure uses to authenticate the radio in the system. It is part of the authentication
that provides service confidentiality between your radio and the system.

Verifying K Validity

Procedure:
1 From the home screen, press the
2 Select Security → K Validity.
3 Your radio displays:
K is Valid — the infrastructure can authenticate your radio.
K is Invalid — the infrastructure is unable to authenticate your radio. Please call your service provider to
restore the key to your radio.

SCK (Air Interface Encryption Class 2)

SCK (Static Cipher Key) is a secret key used for the Air Interface Encryption Class 2. It may be used to encrypt calls
and data in TMO and DMO. The SCK air interface encryption provides service confidentiality between radios and
infrastructure when in TMO, and between radios when in DMO. A radio is capable of being loaded with up to 32
SCKs. Specific keys are used for encrypting the air interface.
Any mismatch between radios and/or infrastructure impacts communication – only those using the same key as the
transmitting party are able to decode and hear the communication.

TMO SCK

Use of SCKs in TMO needs to be enabled by your service provider. The SCKs used in TMO are called TMSCKs.

DMO SCK

Use of SCKs in DMO needs to be enabled by your service provider. The SCKs used in DMO are called DMSCKs.
Send Feedback
| |
key.
MENU
key.
MENU

Quicklinks ausblenden:

Werbung

Kapitel

Inhaltsverzeichnis
loading

Inhaltsverzeichnis