Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Overview of anti-theft measures    
        6.1     Anti-theft measures  
        6.2     High-level requirements for anti-theft measures          
 7     Functional architecture for mobile phone anti-theft measures          
        7.1     Threats for mobile phone anti-theft measures
        7.2     Key security functions for mobile phone anti-theft measures  
       7.3      Functional architecture for mobile device anti-theft measures
        7.4     Mechanisms for mobile phone anti-theft measures    
 8     Functional security requirements   
        8.1     Overview       
        8.2     Functional security requirements for the mobile device owner              
        8.3     Functional security requirements for the authorized server     
        8.4     Functional security requirements for the stolen mobile device
        8.5     Functional security requirements for the backup server            
Appendix I – General requirements for anti-theft measures    
        I.1     Device owner
        I.2     Server              
        I.3     Mobile device
        I.4     Device manufacture   
Appendix II – Additional security requirements for anti-theft measures    
       II.1     Requirements for backup server           
Appendix III –    
      III.1     Threats between the Anti-theft specific threats mobile device owner and the authorized server    
      III.2     Threats between the authorized server and the anti-theft disabling agent          
      III.3     Threats between the anti-theft disabling agent and the backup server 
Appendix IV – Scenario for anti-theft measures    
       IV.1     Types of disabling features of mobile device  
       IV.2     Enabling for stolen/lost mobile device              
       IV.3     Disabling scenario for stolen/lost mobile device           
Appendix V  TLS profile for anti-theft measures    
        V.1     TLS protocol requirement      
        V.2     TLS cipher suites for interoperability  
        V.3     Digital certificates      
Appendix VI – Overview of OMA device management    
       VI.1     OMA device management specification           
Bibliography