Supplement 73 to ITU-T Q-series Recommendations (03/2021) Guidelines for permissive versus restrictive system implementations to address counterfeit, stolen and illegal mobile devices
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Supplement
4 Abbreviations and acronyms
5 Conventions
6 System implementation modes
     6.1 Permissive versus restrictive modes
          Figure 1 – Permissive and restrictive modes
          6.1.1 Permissive mode
          6.1.2 Restrictive mode
               6.1.2.1 Synchronization mode
               6.1.2.2 Authorization mode
               6.1.2.3 Hybrid mode
          6.1.3 Roaming in permissive and restrictive modes
          6.1.4 Mobile number portability (MNP) handling in permissive and restrictive modes
7 Considerations for system deployment
     7.1 Customer considerations
          7.1.1 Device status verification
          7.1.2 Duplication before purchase
          7.1.3 Duplication after purchase
          7.1.4 SIM swapping
          7.1.5 Device registration
     7.2 Technical considerations
          7.2.1 EIR impact
     7.3 Regulatory considerations
          7.3.1 Data privacy
          7.3.2 Blocking
               7.3.2.1 Device blocking in a permissive system
                    7.3.2.1.1 Blocked devices
                    7.3.2.1.2 Unregistered devices
                    7.3.2.1.3 Duplication
               7.3.2.2 Device blocking in a restrictive system
                    7.3.2.2.1 Immediate blocking
                    7.3.2.2.2 Unregistered devices
                    7.3.2.2.3 Duplication
          7.3.3 Oversight
8 Conclusion
Appendix I
Bibliography
<\pre>