35

Fraud & Security

Fraud & Security

IMEI Database

Centrally located database of valid and stolen handset IMEIs to which operators may connect to upload and download data to control mobile device access on their networks.

Security Algorithms

Provide authentication, cipher key generation, integrity and radio link privacy to users on mobile networks.

Security Accreditation Scheme

Voluntary scheme where smart card suppliers subject their production sites and processes to a comprehensive security audit providing confidence to network operators that adequate security is in place.

Security Advice for Mobile Phone Users

These pages aim to provide mobile phone users with simple, easy to follow advice to help mobile users minimise the risk of experiencing potential problems firsthand.

Leave a Reply