1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of anti-theft measures
6.1 Anti-theft measures
6.2 High-level requirements for anti-theft measures
7 Functional architecture for mobile phone anti-theft measures
7.1 Threats for mobile phone anti-theft measures
7.2 Key security functions for mobile phone anti-theft measures
7.3 Functional architecture for mobile device anti-theft measures
7.4 Mechanisms for mobile phone anti-theft measures
8 Functional security requirements
8.1 Overview
8.2 Functional security requirements for the mobile device owner
8.3 Functional security requirements for the authorized server
8.4 Functional security requirements for the stolen mobile device
8.5 Functional security requirements for the backup server
Appendix I – General requirements for anti-theft measures
I.1 Device owner
I.2 Server
I.3 Mobile device
I.4 Device manufacture
Appendix II – Additional security requirements for anti-theft
measures
II.1 Requirements for backup server
Appendix III –
III.1 Threats between the Anti-theft specific threats mobile device
owner and the authorized server
III.2 Threats between the authorized server and the anti-theft
disabling agent
III.3 Threats between the anti-theft disabling agent and the backup
server
Appendix IV – Scenario for anti-theft measures
IV.1 Types of disabling features of mobile device
IV.2 Enabling for stolen/lost mobile device
IV.3 Disabling scenario for stolen/lost mobile device
Appendix V TLS profile for anti-theft measures
V.1 TLS protocol requirement
V.2 TLS cipher suites for interoperability
V.3 Digital certificates
Appendix VI – Overview of OMA device management
VI.1 OMA device management specification
Bibliography