Database Requirements IMEI/MEID CEIR March 30/31 JEM Geneva.

Slides:



Advertisements
Similar presentations
Experimental Internet Resource Allocations Philip Smith, Geoff Huston September 2002.
Advertisements

HR SERVICE REQUEST SYSTEM Department Demonstrations February 2012.
More on Processes Chapter 3. Process image _the physical representation of a process in the OS _an address space consisting of code, data and stack segments.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Grant Maintenance for New Title I Directors Title I Technical Assistance & Networking Session October 17, 2013.
File Management Chapter 12. File Management File management system is considered part of the operating system Input to applications is by means of a file.
Nokia Internal Use Only PAWS Database Discovery Some considerations since the last Berlin meeting IETF 88, Vancouver, Canada.
Outline of a TAC Conservation Approach Numbering JEM Teleconference, Nov. 3,
Restricted - Confidential Information © GSM Association 2009 IMEI Security Paul Gosden Director of Devices & Smart Card Groups, GSM Association April 24,
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Concurrent Processes Lecture 5. Introduction Modern operating systems can handle more than one process at a time System scheduler manages processes and.
1 Process Description and Control Chapter 3. 2 Process Management—Fundamental task of an OS The OS is responsible for: Allocation of resources to processes.
Doc.: IEEE /151r0 Submission Oct Jesse Caulfield, Key Bridge Global LLCSlide 1 Interfacing the White Space Database Notice: This document.
CSCE 351: Operating System Kernels
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Network security policy: best practices
Presented By: Matthew Garrison. Basics of Role Based Access Control  Roles are determined based on job functions within a given organization  Users.
Evolution from GMS to UMTS
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Session 6 Windows Platform Dina Alkhoudari. Learning Objectives What is Active Directory Logical components of active directory Physical components of.
© 2010 VMware Inc. All rights reserved Access Control Module 8.
1 An Update on EPA Attainment Modeling Guidance for the 8- Hour Ozone NAAQS Brian Timin EPA/OAQPS/EMAD/AQMG November 16, 2005.
File Management Chapter 12. File Management File management system is considered part of the operating system Input to applications is by means of a file.
Week 9 Objectives Securing Files and Folders Protecting Shared Files and Folders by Using Shadow Copies Configuring Network Printing.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Chapter 7: WORKING WITH GROUPS
CHAPTER 2: COMPUTER-SYSTEM STRUCTURES Computer system operation Computer system operation I/O structure I/O structure Storage structure Storage structure.
Day Plan 9:00 – 10:30 AM Session I: Use Case normal flow for multimode device 10:30 – 10:45 Break 10: :15 AM Session II: Detailed requirements 12:15.
© John M. Abowd 2007, all rights reserved Analyzing Frames and Samples with Missing Data John M. Abowd March 2007.
1 MEID (Mobile Equipment Identifier) in TSG-C WG2 WG-II February 13, 2004 Notice ©2004 Third Generation Partnership Project Two (3GPP2). All rights reserved.
Secure Credential Manager Claes Nilsson - Sony Ericsson
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
Using DHCPv6 for DNS Configuration in Hosts draft-ietf-droms-dnsconfig-dhcpv6-00.txt Ralph Droms.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
SYSTEM ADMINISTRATION Chapter 8 Internet Protocol (IP) Addressing.
Outline of a TAC Conservation Approach TSG-S WG1 Tampa, FL, USA, Oct ,
Network components of the Switching Subsystem The switching Subsystem comprises the following subsystems. MSC (Mobile Switching Centre) HLR (Home location.
SPS policy – Information Presentation Presentation to ROS June 16, 2004.
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
Outline of a TAC Conservation Approach TSG-S WG1 Tampa, FL, USA, Oct ,
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
MEID JEM February 11th-12th Seattle Operator Use of GSM IMEI Stephen Packer - Vodafone Ltd.
CABLING SYSTEM ADMINISTRATION. Administration Concept.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
Numbering Issues and EIR Gary Pellegrino TIA TR-45 EUMAG Chair Editor: 3GPP2 SC.R GHA Guidelines
1 Process Description and Control Chapter 3. 2 Process A program in execution An instance of a program running on a computer The entity that can be assigned.
Role of Account Management at ERCOT 2006 TAC Subcommittee Review ERCOT Board February 21, 2006.
NETWORKING (2) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
ECE 456 Computer Architecture Lecture #9 – Input/Output Instructor: Dr. Honggang Wang Fall 2013.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: IEEE as a Media Independence Service Layer Date Submitted: July 13, 2010.
1 A Look at the Application Authorized users can access Communicator! NXT from any Internet-capable computer via the Web.
1 California Water Plan Update 2009 Assumptions and Estimates Report.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: MIH security issues Date Submitted: July, 02, 2007 Presented at.
MAPP HHTS Implementation Preparation March 1, 2016.
Peter Ziu Northrop Grumman ACS-WG Grid Provisioning Appliance Concept GGF13, March 14, 2005
DAMIR for Releasers Tuesday 10/30/2007 Breakout Session 5A Wednesday 10/31/2007 Breakout Session 3A.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
August, 2012 MBANS FCC Rules Summary Information document for SRD/MG on the FCC adopted MBAN rules under part 95 MedRadio service on 24 May 2012.
Administrating a Database
APANPIRG Conclusions Regarding Frequency Management
Physical Database Design and Performance
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx
SHAKEN Governance Authority Criteria
Process Description and Control
Implementing Database Roles in the Enterprise Geodatababse
World Radiocommunications Conference
Experimental Internet Resource Allocations
Administrating a Database
Presentation transcript:

Database Requirements IMEI/MEID CEIR March 30/31 JEM Geneva

Issues (1 of N) How is the manufacturer code reflected in the database(s) (note: there is TAC in IMEI)? Does a manufacturer with assigned block(s) have a privilege to access allocations for that manufacturer? –Read only (YES, e.g. for warranty, time to deployment, …) –Read/write (maybe?) –Security issues: URL of manufacturer datasheet

Issues (2 of N) Assignment affirmation: Assignment revocation: –Conditions for affirmation/allocation –Time before it must be consumed Coordination of assignments for multi- mode devices between GHA/GDA data bases, if separate

Issues (3 of N) What are operators’ access privileges to MEID/IMEI (assignment) data base(s)? –Read? (Yes) –Read/Write? (No, administrators only)

Issues (4 of N) Secure access: –A Manufacturer’s access should be confined only to codes assigned to it; –Access privileges are to designated entities only (e.g. a member operator’s agent, likewise for other designated entities) –Level of authentication (is mutual authentication required?) –Protocol specifications –Backups

Use scenarios

CEIR Issues (1 of X) Is an IMEI/MEID implicitly white-listed (if not on the black/gray list)? –Normal = white list –Block = black –Track = gray Coordination on multi-mode devices, if separate CEIR deployed What are the criteria for black or gray listing? Hierarchy (EIR owned by operator feeding to CEIR)

CEIR Issues (2 of X) Only operators populate EIR, and implicitly CEIR. Are there any exceptions? White lists migrate from TAD-like database

Requirements The GHA/GDA or a designated regional administrator shall record MEID/IMEI allocations of numbering space to the appropriate Allocation Database (e.g. TAD in case of IMEI), within 3 business days of the grant of such allocation, or within the timeframe requested by the manufacturer. –The recording shall contain, as a minimum, the following information: Equipment manufacturer identity, segment of allocated numbering space. The recording should also contain: Reference to a manufacturer product data, or explicit information regarding equipment characteristics (e.g. power class, frequency band(s), technology modes supported).

Requirements (2 of N) The GDA/GHA entry should indicate allocation status as “granted”. A Manufacturer may have access to a section of allocation database reserved for that manufacturer’s use, only after allocation is “granted”. –If manufacturer has access to the allocation database, the manufacturer shall be able to read any data in its section of Allocation database. A manufacturer shall not have access to a section of database outside its domain.

Requirements (3 of N) As devices are manufactured, the manufacturer should be able to convert status of segments of it allocation from “granted” to “released”.

Requirements (4 of N) CEIR Allocation database (TAD) shall be reflected in the CEIR automatically upon assignment of codes (creation of “granted” status). CEIR whitelist (normal) range should reflect the serial number ranges of mobile equipment with status “released”.

Requirements (5 of N) EIR An Operator’s (explicit) EIR whitelist should be updated from the CEIR whitelist at a frequency deemed suitable to that operator (recommended on a daily basis).

Blacklist (Block) Requirements (1 of N) An Operator should create entries to the EIR blacklist per the internal policy of that operator (e.g. police report may be required before blacklisting). All EIR new blacklist entries should be uploaded to CEIR on a daily basis. An EIR should request blacklist updates from the CEIR on a daily basis. If implemented separately, the decimal CEIR and hexadecimal CEIR should exchange blacklists for multimode devices on a daily basis