212:(NAI) and A12 CHAP key) must be provisioned into the AT and the user's home AAA server. Since these credentials are only shared between the AT and its home AAA, the AN-AAA forwards A12 challenge responses received from an AT to its home AAA to determine whether they are correct. A12 authentication is separate from packet data authentication that may occur later when a data session is being established.
22:
215:
A12 authentication is important for roaming since all participating operators in the IRT have agreed to support it. If A12 credentials are not provisioned into an AT, that AT will not be able to access any visited network that performs A12 authentication. In addition, the Mobile Node
Identifier (MN
203:
A12 authentication occurs when an AT first attempts to access the AN and is repeated after some authentication timeout period. The element in the AN that performs this authentication is the Radio
Network Controller (RNC) using its Access Network
216:
ID) is obtained from the AN-AAA during successful A12 authentication. This MN ID is used by the AN on the A8/A9 and A10/A11 interfaces to enable handoffs of
130:
224:
systems. If A12 authentication is not performed, the MN ID must be somehow derived and such handoffs may not be possible without establishing a new
279:
39:
105:
244:
86:
58:
43:
65:
72:
32:
249:
185:
162:
209:
217:
126:
54:
225:
79:
150:
254:
208:(AN-AAA). In order to support A12 authentication, matching A12 credentials (i.e., an A12
184:
a user or network host to an authenticating entity. That entity may be, for example, an
181:
273:
205:
21:
169:
221:
154:
134:
137:
Access
Network (AN) to authenticate a 1xEV-DO Access Terminal (AT).
232:
158:
220:(PDSN) packet data sessions between ANs and between 1xEV-DO and
15:
46:. Unsourced material may be challenged and removed.
8:
194:is the core wireless air interface standard.
174:Challenge-Handshake Authentication Protocol
231:A12 authentication is defined in TIA-878 (
106:Learn how and when to remove this message
7:
44:adding citations to reliable sources
14:
266:see CDG Reference Document #136.
245:List of authentication protocols
20:
31:needs additional citations for
1:
280:Code division multiple access
157:transmission of data through
133:-based mechanism used by a
296:
210:Network Address Identifier
141:Evolution-Data Optimized (
250:List of CDMA2000 networks
186:Internet service provider
163:broadband Internet access
218:Packet Data Serving Node
226:Point-to-Point Protocol
161:signals, typically for
123:Access Authentication
55:"A12 Authentication"
40:improve this article
151:telecommunications
119:A12 Authentication
153:standard for the
116:
115:
108:
90:
287:
255:Mobile broadband
111:
104:
100:
97:
91:
89:
48:
24:
16:
295:
294:
290:
289:
288:
286:
285:
284:
270:
269:
263:
241:
228:(PPP) session.
201:
112:
101:
95:
92:
49:
47:
37:
25:
12:
11:
5:
293:
291:
283:
282:
272:
271:
268:
267:
262:
259:
258:
257:
252:
247:
240:
237:
200:
197:
196:
195:
189:
166:
114:
113:
28:
26:
19:
13:
10:
9:
6:
4:
3:
2:
292:
281:
278:
277:
275:
265:
264:
260:
256:
253:
251:
248:
246:
243:
242:
238:
236:
234:
229:
227:
223:
219:
213:
211:
207:
198:
193:
190:
187:
183:
182:authenticates
179:
175:
171:
167:
164:
160:
156:
152:
149:, etc.) is a
148:
144:
140:
139:
138:
136:
132:
128:
124:
120:
110:
107:
99:
88:
85:
81:
78:
74:
71:
67:
64:
60:
57: –
56:
52:
51:Find sources:
45:
41:
35:
34:
29:This article
27:
23:
18:
17:
230:
214:
202:
191:
177:
173:
146:
142:
122:
118:
117:
102:
93:
83:
76:
69:
62:
50:
38:Please help
33:verification
30:
199:Description
261:References
235:A.S0008).
96:March 2016
66:newspapers
170:computing
274:Category
239:See also
192:CDMA2000
155:wireless
135:CDMA2000
129:) is a
127:1xEV-DO
80:scholar
172:, the
82:
75:
68:
61:
53:
233:3GPP2
222:1xRTT
159:radio
143:EV-DO
87:JSTOR
73:books
178:CHAP
147:EVDO
131:CHAP
125:for
59:news
206:AAA
168:In
42:by
276::
180:)
145:,
188:.
176:(
165:.
121:(
109:)
103:(
98:)
94:(
84:·
77:·
70:·
63:·
36:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.