{"title":"讨论移动电话服务的安全概念","authors":"M. Oleyar","doi":"10.1109/VTC.1976.1622319","DOIUrl":null,"url":null,"abstract":"Various levels of protection from unauthorized use of a mobile-telephone service can be provided where the exchange for the service is under stored-program control. The security techniques that provide this protection can be upgraded on a per-subscriber or per-system basis as the incidence of unauthorized use increases. The \"ultimate\" arrangement provides for the encryption of variable passwords. Proper protection of auxiliary storage devices precludes compromise of the cipher-keys assigned to individual mobile units. The techniques that apply and, in particular, those that provide for better security, are more readily implemented in a system with common channel signaling where signaling speeds are considerably faster than those that are used in present-day practice.","PeriodicalId":342659,"journal":{"name":"26th IEEE Vehicular Technology Conference","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1976-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Address security concepts for mobile-telephone service\",\"authors\":\"M. Oleyar\",\"doi\":\"10.1109/VTC.1976.1622319\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Various levels of protection from unauthorized use of a mobile-telephone service can be provided where the exchange for the service is under stored-program control. The security techniques that provide this protection can be upgraded on a per-subscriber or per-system basis as the incidence of unauthorized use increases. The \\\"ultimate\\\" arrangement provides for the encryption of variable passwords. Proper protection of auxiliary storage devices precludes compromise of the cipher-keys assigned to individual mobile units. The techniques that apply and, in particular, those that provide for better security, are more readily implemented in a system with common channel signaling where signaling speeds are considerably faster than those that are used in present-day practice.\",\"PeriodicalId\":342659,\"journal\":{\"name\":\"26th IEEE Vehicular Technology Conference\",\"volume\":\"71 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1976-03-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"26th IEEE Vehicular Technology Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/VTC.1976.1622319\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"26th IEEE Vehicular Technology Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/VTC.1976.1622319","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Address security concepts for mobile-telephone service
Various levels of protection from unauthorized use of a mobile-telephone service can be provided where the exchange for the service is under stored-program control. The security techniques that provide this protection can be upgraded on a per-subscriber or per-system basis as the incidence of unauthorized use increases. The "ultimate" arrangement provides for the encryption of variable passwords. Proper protection of auxiliary storage devices precludes compromise of the cipher-keys assigned to individual mobile units. The techniques that apply and, in particular, those that provide for better security, are more readily implemented in a system with common channel signaling where signaling speeds are considerably faster than those that are used in present-day practice.