CIBER Records,MEID and EUIMID



Similar documents
Review of Cell Phone Technology

TS-3GB-S.R0048-Av1.0 3G Mobile Equipment Identifier (MEIA)

CDMA + Code Dialing Options

GSM v. CDMA: Technical Comparison of M2M Technologies

Data Plans for GPS 6500 Units with a Rover Bundle

Removable User Identity Module for Spread Spectrum Systems

How To Get A Phone In The United States

Beloit College ListServs

Number of bits needed to address hosts 8

Global System for Mobile Communication Technology

C E L L U L A R P H O N E E V I D E N C E DATA EXTRACTION AND DOCUMENTATION DET. CINDY MURPHY

Chapters 1-21 Introduction to Wireless Communication Systems

Mobile Networking. SS7 Network Architecture. Purpose. Mobile Network Signaling

Use of C-SIM (R-UIM) in Roaming G CDMA Latin America Regional Conference

Mobile Phone Security. Hoang Vo Billy Ngo

LIST OF STANDARDS DEVELOPMENT ORGANIZATIONS. Telecommunications networks employ technical standards to ensure that:

Developing Process for Mobile Device Forensics

CELLULAR PHONE EVIDENCE DATA EXTRACTION & DOCUMENTATION DET. CINDY MURPHY

Authentication, Authorization and Accounting (AAA) Protocols

BlackBerry Internet Service. Version: Administration Guide

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions

C ell phones have changed the way people

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements

Toolkit for vulnerability assessment in 3G networks. Kameswari Kotapati The Pennsylvania State University University Park PA 16802

T-MOBILE WIRELESS SERVICE CHECKLIST

Ai eshots A bespoke marketing system that helps you reach more customers, more effectively... Ai eshots. design. web. marketing.

Worldwide attacks on SS7 network

1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre

Decimal to Binary Conversion

9.1 Introduction. 9.2 Roaming

CTAP Wireless Equipment Distribution Program Factsheet

RTI Spreadsheet Add-in

WordPress Pages. AmeriFlux Create Account r7. WordPress to Wile account connections. Notes

Mobile Application Part protocol implementation in OPNET

RSA SecurID Software Token 1.0 for Android Administrator s Guide

IBM BPM V8.5 Standard Consistent Document Managment

STEPPING UP TO THE ELECTRONIC ARCHIVING CHALLENGE: OCLC S ROLE. Andrea Keyhani Director, Licensing & Publisher Relations

Goals. Unary Numbers. Decimal Numbers. 3,148 is s 100 s 10 s 1 s. Number Bases 1/12/2009. COMP370 Intro to Computer Architecture 1

THE BINARY NUMBER SYSTEM

GobiTM SDK Developing Code to Connect, Locate, and Manage 3G/4G Data Devices. Monte Giles Director Product Management, Qualcomm

Sprint WeGo User Guide

Global System for Mobile Communication (GSM)

Overall Score range. Funded or Not funded

Wireless Cellular Networks: 1G and 2G

Chapter 19 Network Layer: Logical Addressing 19.1

3GPP TS V7.0.0 ( )

How to Setup SQL Server Replication

Online Bill Pay. Quick Reference Guide

TABLE OF CONTENTS. Introduction 3 OTP SMS Two-Factor Authentication 5 Technical Overview 9 Features 10 Benefits 11 About MobiWeb 12 Quality 13

The Evolution of 3G CDMA Wireless Networks. David W. Paranchych IEEE CVT Luncheon January 21, 2003

Aeris Device Certification Process

This guide provides step by step instructions for using the IMF elibrary Data - My Data area. In this guide, you ll learn how to:

The Growth and Evolution of CDMA2000 1xEV-DO

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

CELLULAR TECHNOLOGY AND SECURITY Author: RYAN JONES ADVENT OF CELLULAR TECHNOLOGY

Mobile Application Part (MAP) - Voice Feature Scenarios: Call Forwarding REVISION HISTORY TIA E. Revision Date Remarks

AT&T s 2G GSM Sunset

Network Support for MDN-Based Message Centers

Mobile Device Automated Testing and Certification:

BlackBerry Internet Service. Version: User Guide

Subscription Training. Contents

Interface Certification for a RMA Interface

First Citizens Mobile & Tablet Banking

Teltonika FM41XX. Configurator v. 1.0

SnoPAY FREQUENTLY ASKED QUESTIONS

Hello viewers, welcome to today s lecture on cellular telephone systems.

Sitecore is a trademark of Sitecore A/S. All other brand and product names are the property of their respective holders.

DATA RECOVERY SOLUTIONS EXPERT DATA RECOVERY SOLUTIONS FOR ALL DATA LOSS SCENARIOS.

Transferring your existing phone number. TELUS Business Connect

Security features include Authentication and encryption to protect data and prevent eavesdropping.

Positional Numbering System

SIP Roaming Server Product Overview. Mobile Convergence Technology

Should Pakistan Leapfrog the Developed World in Broadband? By: Syed Ismail Shah Iqra University Islamabad Campus

On Database for Mobile Phones Ownership

LTE450 Julian Bright, Senior Analyst LTE450 Global Seminar 2014 Copyright Ovum All rights reserved.

Common Questions & Answers

CSI 333 Lecture 1 Number Systems

Security Requirements for Wireless Networking

Introduction to MLC Client Data Exchange USER GUIDE v4.1

Introduction to Wireless Communications and Networks

PA-5000 Series SSD Storage Options Configuring RAID and Disk Backup

Transcription:

CIBER Records,MEID and EUIMID CDG International Roaming Team (IRT) Plenary Montego Bay, Jamaica 27-29 November, 2007 (r2 December, 2007) Bill Dahnke* David Crowe meid@cdg.org * On loan from Qualcomm to CDG

Overview The migration to MEID and EUIMID provides a second identifier to replace the 32-bit ESN and/or UIMID. The 32-bit identifier is always associated with a subscription. The 56-bit identifier is not always associated with a subscription. CIBER records allow either a 32-bit ESN-like identifier to be included or a 56-bit IMEI/MEID. CIBER does not allow both records to be included. Billing systems traditionally perform MIN/ESN validation. It is recommended that carriers continue to include a 32-bit identifier in CIBER records to allow continued validation. 2

Migration to MEID and EUIMID MEID is a 56-bit identifier that can uniquely identify a phone. A pseudo-esn (pesn) is derived from MEID for backwards compatibility. Expanded UIMID (EUIMID) is an identifier that can uniquely identifier a R-UIM. EUIMID can either be Short Form (SF_EUIMID) based on MEID or Long Form (LF_EUIMID based on ICCID. A pseudo-uimid (puimid) is derived from EUIMID for backwards compatibility. The SF_EUIMID may replace the MEID. 3

What is Transmitted? 32-bit Identifier Integrated devices will transmit pesn. R-UIM devices will normally transmit puimid 56-bit Identifier Integrated devices will transmit MEID upon request. LF_EUIMID devices will also transmit MEID. SF_EUIMID devices will probably transmit SF_EUIMID in place of MEID. 4

Identifier Relation to Subscriptions Integrated Devices Both MEID and ESN will be associated with the subscription. Unique UIMID Devices UIMID will be associated with the subscription. MEID will not. LF_EUIMID Devices puimid will be associated with the subscription. MEID will not. SF_EUIMID Devices puimid will be associated with the subscription. MEID may be associated with subscription (if SF_EUIMID) or not associated (if MEID). 5

CIBER Record Identifier Several CIBER Records Contain the 19 digit ESN/IMEI/MEID field. This field has enough room for MEID (18 digit decimal format plus 1 check digit). Hexadecimal (14 digit) format cannot be included. Only one of the ESN (including the forms pesn, UIMID, puimid) or IMEI or MEID can be included. In an environment where both a 32 bit ESN is available and a 56-bit MEID (or SF_EUIMID), which should be included? 6

MIN/ESN Validation MIN/ESN validation is traditional in ANSI-41 and billing systems supporting ANSI-41 systems (e.g. CDMA) Protects against billing records from an unsubscribed phone getting on a legitimate subscriber s bill. MIN and ESN are stored in HLR and billing system, and system simply verifies that a matched pair are received. R-UIM mobiles generally transmit UIMID (or puimid) instead of ESN (or pesn). MIN/ ESN validation is maintained when a true ESN is not available by including a pesn, UIMID or puimid in the ESN field when appropriate. A mismatch will result in the call record being rejected. 7

Validation Failure Situations KDDI identified some scenarios in a June, 2006 presentation to CDG IRT: Unvalidatable phones can make calls in some networks, e.g. using a credit card. Calls to specific numbers may be allowed from unvalidatable phones. Systems without pre-call validation still exist. These calls should not appear on customer bills and definitely should not be charged to customers. MIN/ ESN validation allows these calls to be filtered out. 8

CIBER Recommendation 9 If the ESN/IMEI/MEID field is filled with an MEID it will often be an identifier that is not associated with a MIN/IMSI. This breaks MIN/ESN validation. It is recommended that the ESN/IMEI/MEID field continue to be populated with the 32-bit identifier: pesn or puimid. This recommendation should stay in place until: It is agreed that MIN/ESN validation in billing systems is no longer needed. AND All carriers are prepared to accept a non-32-bit identifier in CIBER records.

Thank You Bill Dahnke, David Crowe, meid@cdg.org