User Traffic Confidentiality
- Ciphering algorithm agreement: the mobile and the station can securely negotiate ciphering algorithm that they use.
- Cipher key agreement: the mobile and the station agree on a cipher key that they may use.
- Confidentiality of user and signalling data: neither user data nor sensitive signalling data can be overheard on the radio access interface.
Read more about this topic: UMTS Security
Famous quotes containing the words user and/or traffic:
“A worker may be the hammers master, but the hammer still prevails. A tool knows exactly how it is meant to be handled, while the user of the tool can only have an approximate idea.”
—Milan Kundera (b. 1929)
“Poems stirred
into paper coffee-cups, eaten
with petals on rye in the
sunthe cold shadows in back,
and the traffic grinding the
borders of spring ...”
—Denise Levertov (b. 1923)
Related Phrases
Related Words