9
BILLING SECURITY

9.1
Cordless devices
(1) Cordless devices include the following types of equipment:-

(a) Simple cordless telephones with one portable unit dedicated to one base unit (CT1).

(b) The more complex arrangements such as CT2 and CT3 multiple user systems.

(2) Cordless devices shall incorporate a security system which will, as far as practicable, eliminate the risk of other similar devices accessing the transmission of speech or other communications. Such security systems fall into one of the following categories:-

(a) A system of security codes which satisfies the requirements of clause 9.2.

(b) A process accepted within the industry as being highly secure. Such a process will be subject to acceptance by Access Standards.

* An example of an acceptable 'highly secure' process is the DSS system.

Return to Contents

9.2
Security codes for cordless devices
(1) The following requirements relating to the use of security codes apply as appropriate:-

(a) No less than 8000 security codes shall be provided to control radio frequency access between a portable handset and its base unit(s).

* This is required to minimise the risk of fraudulent calling by any person "roaming" with a cordless handset or inadvertent access to an adjacent base station of the same make and model over a common radio channel.

* The requirement for the increased number of security codes from the 1000 minimum proposed in November 1995 recognises the continuingly increasing numbers of cordless telephones in service in urban areas.

* It is estimated that there may now be 100,000 or more of the most common models in service on the Telecom network. The 8000 codes now called for, together with the number of selectable frequencies available and the geographical location factors, ensure a security probability closely aligned with the Austel requirement without being excessively restrictive.

(b) The applicant shall state in the User Instructions the number of discrete codes that are available to each model for which a Telepermit is required.

(c) The applicant shall describe in general terms how the security codes are allocated. Also a written assurance shall be given stating that allocation of those security codes is randomly spread over the entire range specified by the manufacturer.

* For example, are they pre-allocated by the manufacturer on a truly random basis, or are they generated within the telephone as part of an initialisation process?

(d) If a security code can be 'lost' for any reason, then regeneration of a code shall also be on a random basis. A security code shall not, under any circumstances, be allocated by means of a default code list for that particular make and model.

* Typically, security codes may be lost in some models if the battery is removed or left discharged for a prolonged period.

(e) The applicant shall describe how the security codes used are transferred between portable and base units to ensure security from unauthorised handsets.

(f) Preferably, if the handset of a simple cordless phone is in place on its associated base unit, the PSTN line should not be accessible from another handset via the radio path.

* This does not apply in cases where a base unit is designed to cope with more than one portable unit, as in systems using processes such as CT2 and CT3.

(g) The following shall apply to all originated calls:-

(I) The security code shall be automatically transmitted by the portable unit.

(ii) The base unit shall seize the PSTN line only after the pre- determined security code is received.

(h) On incoming calls, only the portable unit with the predetermined security code should ring, regardless of other portable units being within radio range of the base unit.

Return to Contents