Misplaced Pages

Central Equipment Identity Register

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

A Central Equipment Identity Register (CEIR) is a database of mobile equipment identifiers ( IMEI – for networks of GSM standard, MEID – for networks of CDMA standard). Such an identifier is assigned to each SIM slot of the mobile device.

#965034

57-658: Lists of IMEIs may be the: Depending on the rules of mobile equipment registration in a country the CEIR database may contain other lists or fields beside IMEI. For example, the subscriber number ( MSISDN ), which is bound to the IMEI, the ID of the individual (passport data, National ID , etc.) who registered IMEI in the database, details of the importer who brought the device into the country, etc. Originally abbreviation CEIR stood for IMEI Database, created and provided by GSM Association . It

114-518: A broadband-internet connection. Umbrella cells are used to cover shadowed regions of smaller cells and to fill in gaps in coverage between those cells. Cell horizontal radius varies – depending on antenna height, antenna gain , and propagation conditions – from a couple of hundred meters to several tens of kilometers. The longest distance the GSM specification supports in practical use is 35 kilometres (22 mi). There are also several implementations of

171-559: A memorandum of understanding in Copenhagen to develop and deploy a common cellular telephone system across Europe, and EU rules were passed to make GSM a mandatory standard. The decision to develop a continental standard eventually resulted in a unified, open, standard-based network which was larger than that in the United States. In February 1987 Europe produced the first agreed GSM Technical Specification. Ministers from

228-459: A 6-digit serial number to obtain the IMEI. Thus, with one TAC, a manufacturer can release up to 1 million devices with a unique IMEI. Usually, CEIR receives a list of allocated TACs from the GSMA, since if the first 8 digits of the IMEI of a device are not in this list, this is a sign that it is counterfeit. If the central database of identifiers does not work with GSM networks, but with CDMA, then for

285-437: A country are usually: Additionally, CEIR most often contributes to the solution of such problems: Known results achieved in some countries: Some countries have used local developers to implement CEIR for their country (Great Britain, Turkey, India, and Azerbaijan). EIR is a system that is standardized in a 2G-5G networks. Such system may be established at mobile network even it doesn’t use black list and there are no CEIR in

342-449: A country. Some developers of MNO’s signal core include EIR in a complex solution. However, its standard capabilities are usually lacking for specific requirements when implementing CEIR. MSISDN MSISDN ( / ˈ ɛ m ɛ s aɪ ɛ s d iː ɛ n / MISS -den ) is a number uniquely identifying a subscription in a Global System for Mobile communications or a Universal Mobile Telecommunications System mobile network. It

399-664: A generic term for the plethora of G mobile phone technologies evolved from it. In 1983, work began to develop a European standard for digital cellular voice telecommunications when the European Conference of Postal and Telecommunications Administrations (CEPT) set up the Groupe Spécial Mobile (GSM) committee and later provided a permanent technical-support group based in Paris . Five years later, in 1987, 15 representatives from 13 European countries signed

456-426: A mast or a building above average rooftop level. Micro cells are cells whose antenna height is under average rooftop level; they are typically deployed in urban areas. Picocells are small cells whose coverage diameter is a few dozen meters; they are mainly used indoors. Femtocells are cells designed for use in residential or small-business environments and connect to a telecommunications service provider 's network via

513-456: A problem for any open-source GSM implementation, because it is not possible for GNU or any other free software distributor to guarantee immunity from all lawsuits by the patent holders against the users. Furthermore, new features are being added to the standard all the time which means they have patent protection for a number of years. The original GSM implementations from 1991 may now be entirely free of patent encumbrances, however patent freedom

570-658: A rare unity and speed guided by four public officials: Armin Silberhorn (Germany), Stephen Temple (UK), Philippe Dupuis (France), and Renzo Failli (Italy). In 1989 the Groupe Spécial Mobile committee was transferred from CEPT to the European Telecommunications Standards Institute (ETSI). The IEEE/RSE awarded to Thomas Haug and Philippe Dupuis the 2018 James Clerk Maxwell medal for their "leadership in

627-481: A relationship between two parts of the algorithm. The researchers found that this relationship was very unlikely to have happened if it was not intentional. This may have been done in order to satisfy European controls on export of cryptographic programs. The GSM systems and services are described in a set of standards governed by ETSI , where a full list is maintained. Several open-source software projects exist that provide certain GSM features: Patents remain

SECTION 10

#1732798623966

684-407: A rule, a national IMEI database is created, which contains general lists of blocked IMEIs. Since the registration in the cellular operator's network is directly blocked by a network node called EIR (Equipment Identity Register), the system that contains the national IMEI base became known as Central EIR (CEIR). To avoid confusion the database of GSM Association was renamed to IMEI Database - IMEI DB (it

741-481: A stronger one. Since 2000, different efforts have been made in order to crack the A5 encryption algorithms. Both A5/1 and A5/2 algorithms have been broken, and their cryptanalysis has been revealed in the literature. As an example, Karsten Nohl developed a number of rainbow tables (static values which reduce the time needed to carry out an attack) and have found new sources for known plaintext attacks . He said that it

798-443: A term referring to inexperienced individuals utilizing readily available hardware and software. The vulnerability arises from the accessibility of tools such as a DVB-T TV tuner, posing a threat to both mobile and network users. Despite the term "script kiddies" implying a lack of sophisticated skills, the consequences of their attacks on GSM can be severe, impacting the functionality of cellular networks . Given that GSM continues to be

855-447: Is 4.615 ms. TDMA noise is interference that can be heard on speakers near a GSM phone using TDMA, audible as a buzzing sound. The transmission power in the handset is limited to a maximum of 2 watts in GSM 850/900 and 1 watt in GSM 1800/1900 . GSM has used a variety of voice codecs to squeeze 3.1 kHz audio into between 7 and 13 kbit/s. Originally, two codecs, named after

912-426: Is called SIM locking and is implemented by a software feature of the phone. A subscriber may usually contact the provider to remove the lock for a fee, utilize private services to remove the lock, or use software and websites to unlock the handset themselves. It is possible to hack past a phone locked by a network operator. In some countries and regions (e.g. Brazil and Germany ) all phones are sold unlocked due to

969-477: Is needed indoors, as in shopping centers or airports. However, this is not a prerequisite, since indoor coverage is also provided by in-building penetration of radio signals from any nearby cell. GSM networks operate in a number of different carrier frequency ranges (separated into GSM frequency ranges for 2G and UMTS frequency bands for 3G), with most 2G GSM networks operating in the 900 MHz or 1800 MHz bands. Where these bands were already allocated,

1026-443: Is not certain due to the United States' "first to invent" system that was in place until 2012. The "first to invent" system, coupled with "patent term adjustment" can extend the life of a U.S. patent far beyond 20 years from its priority date. It is unclear at this time whether OpenBTS will be able to implement features of that initial specification without limit. As patents subsequently expire, however, those features can be added into

1083-486: Is possible to build "a full GSM interceptor   ... from open-source components" but that they had not done so because of legal concerns. Nohl claimed that he was able to intercept voice and text conversations by impersonating another user to listen to voicemail , make calls, or send text messages using a seven-year-old Motorola cellphone and decryption software available for free online. GSM uses General Packet Radio Service (GPRS) for data transmissions like browsing

1140-511: Is said to be in use on some more modern networks. If used with USIM to prevent connections to fake base stations and downgrade attacks , users will be protected in the medium term, though migration to 128-bit GEA/4 is still recommended. The first public cryptanalysis of GEA/1 and GEA/2 (also written GEA-1 and GEA-2) was done in 2021. It concluded that although using a 64-bit key, the GEA-1 algorithm actually provides only 40 bits of security, due to

1197-400: Is structured into several discrete sections: GSM utilizes a cellular network , meaning that cell phones connect to it by searching for cells in the immediate vicinity. There are five different cell sizes in a GSM network: The coverage area of each cell varies according to the implementation environment. Macro cells can be regarded as cells where the base-station antenna is installed on

SECTION 20

#1732798623966

1254-480: Is the mapping of the telephone number to the subscriber identity module in a mobile or cellular phone. This abbreviation has several interpretations, the most common one being " Mobile Station International Subscriber Directory Number ". The MSISDN and international mobile subscriber identity (IMSI) are two important numbers used for identifying a mobile subscriber. The IMSI is stored in the SIM (the card inserted into

1311-457: The 3GPP developed third-generation ( 3G ) UMTS standards, followed by the fourth-generation ( 4G ) LTE Advanced and the fifth-generation 5G standards, which do not form part of the ETSI GSM standard. Beginning in the late 2010s, various carriers worldwide started to shut down their GSM networks . Nevertheless, as a result of the network's widespread use, the acronym "GSM" is still used as

1368-432: The GSM variant PCS 1900 , MSISDN is built up as The country code identifies a country or geographical area, and may be between 1-3 digits. The ITU defines and maintains the list of assigned country codes . Example Number: +880 15 00121121 (Teletalk Hotline Number) Has the following subscription number: MSISDN=8801500121121 MSISDN=CCCXX N 1 N 2 N 3 N 4 N 5 N 6 N 7 N 8 For further information on

1425-529: The 3GPP. GSM, for the first time, set a common standard for Europe for wireless networks. It was also adopted by many countries outside Europe. This allowed subscribers to use other GSM networks that have roaming agreements with each other. The common standard reduced research and development costs, since hardware and software could be sold with only minor adaptations for the local market. Telstra in Australia shut down its 2G GSM network on 1 December 2016,

1482-614: The 850 MHz and 1900 MHz bands were used instead (for example in Canada and the United States). In rare cases the 400 and 450 MHz frequency bands are assigned in some countries because they were previously used for first-generation systems. For comparison, most 3G networks in Europe operate in the 2100 MHz frequency band. For more information on worldwide GSM frequency usage, see GSM frequency bands . Regardless of

1539-484: The CEIR database too. Usually, changes in a grey list – new IMEIs on the network that are not in any list – are transmitted from EIR to CEIR. In addition to synchronizing lists across multiple networks, the main function of CEIR is to implement the scenarios of changes at these lists. This usually requires interaction with various IT systems (databases) of other organizations and/or with subscribers. Еxamples of such scenarios: The goals and results of CEIR implementation in

1596-477: The MNOs on their initiative were not going to do this because if many phones stopped working in their networks, but works in another, it puts them at a disadvantage and can lead to an outflow of subscribers. It became clear that the blocking of stolen devices should be introduced simultaneously in all mobile networks of the country by legislative measures at the initiative of the communications regulator. In this case, as

1653-640: The MSISDN can change in time, i.e. different MSISDNs can be associated with the SIM. The MSISDN follows the numbering plan defined in the International Telecommunication Standard Sector recommendation E.164 . Depending on source or standardization body, the abbreviation MSISDN can be written out in several different ways. These are today the most widespread and common in use. The ITU-T recommendation E.164 limits

1710-557: The MSISDN format, see the ITU-T specification E.164 . GSM The Global System for Mobile Communications ( GSM ) is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation ( 2G ) digital cellular networks used by mobile devices such as mobile phones and tablets. GSM is also a trade mark owned by the GSM Association . " GSM " may also refer to

1767-508: The UK by 1993, called the DCS 1800. Also that year, Telstra became the first network operator to deploy a GSM network outside Europe and the first practical hand-held GSM mobile phone became available. In 1995 fax, data and SMS messaging services were launched commercially, the first 1900 MHz GSM network became operational in the United States and GSM subscribers worldwide exceeded 10 million. In

Central Equipment Identity Register - Misplaced Pages Continue

1824-542: The United States; A5/2 is weaker and used in other countries. Serious weaknesses have been found in both algorithms: it is possible to break A5/2 in real-time with a ciphertext-only attack , and in January 2007, The Hacker's Choice started the A5/1 cracking project with plans to use FPGAs that allow A5/1 to be broken with a rainbow table attack. The system supports multiple algorithms so operators may replace that cipher with

1881-427: The abundance of dual-SIM handsets and operators. GSM was intended to be a secure wireless system. It has considered the user authentication using a pre-shared key and challenge–response , and over-the-air encryption. However, GSM is vulnerable to different types of attack, each of them aimed at a different part of the network. Research findings indicate that GSM faces susceptibility to hacking by script kiddies ,

1938-596: The blacklist from IMEI DB, the regulator decides from which countries it will receive it (IMEI DB stores the information exactly who blacklisted the IMEI). For example, you can get a list from neighboring countries, from countries in your region, from around the world. In addition to the blacklist, the GSMA is developing a list of IMEIs allocated to manufacturers for use in their devices. The manufacturer for each new device model gets at least one TAC (Type Allocation Code) allocated by GSMA, consisting of 8 digits, to which he can add

1995-507: The concept of an extended cell, where the cell radius could be double or even more, depending on the antenna system, the type of terrain, and the timing advance . GSM supports indoor coverage – achievable by using an indoor picocell base station, or an indoor repeater with distributed indoor antennas fed through power splitters – to deliver the radio signals from an antenna outdoors to the separate indoor distributed antenna system. Picocells are typically deployed when significant call capacity

2052-537: The development of the first international mobile communications standard with subsequent evolution into worldwide smartphone data communication". The GSM (2G) has evolved into 3G, 4G and 5G. In parallel France and Germany signed a joint development agreement in 1984 and were joined by Italy and the UK in 1986. In 1986, the European Commission proposed reserving the 900 MHz spectrum band for GSM. It

2109-492: The first HSDPA -capable network also became operational. The first HSUPA network launched in 2007. ( High Speed Packet Access (HSPA) and its uplink and downlink versions are 3G technologies, not part of GSM.) Worldwide GSM subscribers exceeded three billion in 2008. The GSM Association estimated in 2011 that technologies defined in the GSM standard served 80% of the mobile market, encompassing more than 5 billion people across more than 212 countries and territories, making GSM

2166-453: The first Multimedia Messaging Service (MMS) was introduced and the first GSM network in the 800 MHz frequency band became operational. Enhanced Data rates for GSM Evolution (EDGE) services first became operational in a network in 2003, and the number of worldwide GSM subscribers exceeded 1 billion in 2004. By 2005 GSM networks accounted for more than 75% of the worldwide cellular network market, serving 1.5 billion subscribers. In 2005,

2223-735: The first mobile network operator to decommission a GSM network. The second mobile provider to shut down its GSM network (on 1 January 2017) was AT&T Mobility from the United States . Optus in Australia completed the shut down of its 2G GSM network on 1 August 2017, part of the Optus GSM network covering Western Australia and the Northern Territory had earlier in the year been shut down in April 2017. Singapore shut down 2G services entirely in April 2017. The network

2280-645: The four big EU countries cemented their political support for GSM with the Bonn Declaration on Global Information Networks in May and the GSM MoU was tabled for signature in September. The MoU drew in mobile operators from across Europe to pledge to invest in new GSM networks to an ambitious common date. In this short 38-week period the whole of Europe (countries and industries) had been brought behind GSM in

2337-416: The frequency selected by an operator, it is divided into timeslots for individual phones. This allows eight full-rate or sixteen half-rate speech channels per radio frequency . These eight radio timeslots (or burst periods) are grouped into a TDMA frame. Half-rate channels use alternate frames in the same timeslot. The channel data rate for all 8 channels is 270.833 kbit/s, and the frame duration

Central Equipment Identity Register - Misplaced Pages Continue

2394-579: The key features of GSM is the Subscriber Identity Module , commonly known as a SIM card . The SIM is a detachable smart card containing a user's subscription information and phone book. This allows users to retain their information after switching handsets. Alternatively, users can change networks or network identities without switching handsets - simply by changing the SIM. Sometimes mobile network operators restrict handsets that they sell for exclusive use in their own network. This

2451-414: The main source of cellular technology in numerous countries, its susceptibility to potential threats from malicious attacks is one that needs to be addressed. The development of UMTS introduced an optional Universal Subscriber Identity Module (USIM), that uses a longer authentication key to give greater security, as well as mutually authenticating the network and the user, whereas GSM only authenticates

2508-414: The maximum length of an MSISDN to 15 digits. 1-3 digits are reserved for country code. Prefixes are not included (e.g., 00 prefixes an international MSISDN when dialing from Sweden). Minimum length of the MSISDN is not specified by ITU-T but is instead specified in the national numbering plans by the telecommunications regulator in each country. In GSM and its variant DCS 1800 , MSISDN is built up as In

2565-422: The mobile phone), and uniquely identifies the mobile station, its home wireless network, and the home country of the home wireless network. The MSISDN is used for routing calls to the subscriber. The IMSI is often used as a key in the home location register ("subscriber database") and the MSISDN is the number normally dialed to connect a call to the mobile phone. A SIM has a unique IMSI that does not change, while

2622-598: The most ubiquitous of the many standards for cellular networks. GSM is a second-generation (2G) standard employing time-division multiple-access (TDMA) spectrum-sharing, issued by the European Telecommunications Standards Institute (ETSI). The GSM standard does not include the 3G Universal Mobile Telecommunications System (UMTS), code-division multiple access (CDMA) technology, nor the 4G LTE orthogonal frequency-division multiple access (OFDMA) technology standards issued by

2679-416: The same purposes it is necessary to interact with another worldwide database that contains MEIDs – MEID Database. A system that directly blocks the registration of a mobile device on a cellular network – EIR. Each MNO must have at least one EIR, to which IMEI check requests (CheckIMEI) are sent when registering a device on the network. A typical EIR and CERI interaction scheme: EIR can transmit some data to

2736-459: The same year, the GSM Association formed. Pre-paid GSM SIM cards were launched in 1996 and worldwide GSM subscribers passed 100 million in 1998. In 2000 the first commercial General Packet Radio Service (GPRS) services were launched and the first GPRS-compatible handsets became available for sale. In 2001, the first UMTS (W-CDMA) network was launched, a 3G technology that is not part of GSM. Worldwide GSM subscribers exceeded 500 million. In 2002,

2793-458: The signal. GSM was further enhanced in 1997 with the enhanced full rate (EFR) codec, a 12.2 kbit/s codec that uses a full-rate channel. Finally, with the development of UMTS , EFR was refactored into a variable-rate codec called AMR-Narrowband , which is high quality and robust against interference when used on full-rate channels, or less robust but still relatively high quality when used in good radio conditions on half-rate channel. One of

2850-400: The types of data channel they were allocated, were used, called Half Rate (6.5 kbit/s) and Full Rate (13 kbit/s). These used a system based on linear predictive coding (LPC). In addition to being efficient with bitrates , these codecs also made it easier to identify more important parts of the audio, allowing the air interface layer to prioritize and better protect these parts of

2907-415: The user to the network (and not vice versa). The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non-repudiation . GSM uses several cryptographic algorithms for security. The A5/1 , A5/2 , and A5/3 stream ciphers are used for ensuring over-the-air voice privacy. A5/1 was developed first and is a stronger algorithm used within Europe and

SECTION 50

#1732798623966

2964-821: The voice codec initially used in GSM. It was first implemented in Finland in December 1991. By the mid-2010s, it became a global standard for mobile communications achieving over 90% market share, and operating in over 193 countries and territories. 2G networks developed as a replacement for first generation ( 1G ) analog cellular networks. The GSM standard originally described a digital, circuit-switched network optimized for full duplex voice telephony . This expanded over time to include data communications, first by circuit-switched transport , then by packet data transport via General Packet Radio Service (GPRS), and Enhanced Data Rates for GSM Evolution (EDGE). Subsequently,

3021-535: The web. The most commonly deployed GPRS ciphers were publicly broken in 2011. The researchers revealed flaws in the commonly used GEA/1 and GEA/2 (standing for GPRS Encryption Algorithms 1 and 2) ciphers and published the open-source "gprsdecode" software for sniffing GPRS networks. They also noted that some carriers do not encrypt the data (i.e., using GEA/0) in order to detect the use of traffic or protocols they do not like (e.g., Skype ), leaving customers unprotected. GEA/3 seems to remain relatively hard to break and

3078-467: Was actually made by me. I called Marjo Jousinen, in Salo.", Lonka informed. The following year saw the sending of the first short messaging service (SMS or "text message") message, and Vodafone UK and Telecom Finland signed the first international roaming agreement. Work began in 1991 to expand the GSM standard to the 1800 MHz frequency band and the first 1800 MHz network became operational in

3135-471: Was in 2003-2008, see “Document History” at IMEI Database File Format Specification). Also sometimes a common IMEI database for several EIRs is called SEIR (Shared EIR). In each country, the CEIR can interact with IMEI DB differently. National CEIR may not communicate with IMEI DB at all. Firstly, it is separately decided whether CEIR will send information about its blacklist to IMEI DB (which IMEIs are placed in it or removed from there). Secondly, upon receipt of

3192-478: Was long believed that the former Finnish prime minister Harri Holkeri made the world's first GSM call on 1 July 1991, calling Kaarina Suonio (deputy mayor of the city of Tampere ) using a network built by Nokia and Siemens and operated by Radiolinja . In 2021 a former Nokia engineer Pekka Lonka revealed to Helsingin Sanomat making a test call just a couple of hours earlier. "World's first GSM call

3249-530: Was proposed to blacklist the IMEIs of stolen or lost phones. It was assumed that any MNO would be able to receive this list to block the registration of such devices on their network. Thus, it turns out that a stolen phone, once blacklisted by the GSMA CEIR, cannot be used on a large number of cellular networks, which means that the theft of mobile devices will become meaningless. However, it soon became clear that

#965034