Misplaced Pages

Access Authentication in CDMA networks

Article snapshot taken from[REDACTED] with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Form of technical authentication for mobile devices
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
This article may be too technical for most readers to understand. Please help improve it to make it understandable to non-experts, without removing the technical details. (December 2021) (Learn how and when to remove this message)
This article does not cite any sources. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "Access Authentication in CDMA networks" – news · newspapers · books · scholar · JSTOR (February 2016) (Learn how and when to remove this message)
(Learn how and when to remove this message)

Access Authentication in CDMA networks for telecommunications and computing provide network access for a mobile device. Specific methods such as CAVE-based Authentication (IS-95/1xRTT), and A12 Authentication (1xEV-DO) are possible. The serving network provides the mobile device access authentication mechanism.

The exact method employed depends upon the type of service being used:

1xEV-DO Hybrid MS/AT devices may employ both CAVE-based and A12 authentication since these devices connect to both the 1xRTT and 1xEV-DO networks.

See also

References

Category:
Access Authentication in CDMA networks Add topic