* Question
* Answer
2.User PIN operation and management
3.User identity authentication
4.Security algorithm and key in SIM card
COMMENTS