Rec. ITU-T Q.5051 (03/2020) Framework for combating the use of stolen mobile devices
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 General aspects
7 High level requirements
     7.1 Preventing stolen mobile devices from being used by unauthorized user
     7.2 Preventing stolen mobile devices from accessing the network
     7.3 Preventing the use of mobile devices with tampered and/or cloned unique identifiers
     7.4 Preventing stolen mobile devices from other countries to access the network
     7.5 Reduce consumer impact
     7.6 Protect consumer private data
     7.7 Preventing stolen mobile devices from accessing the markets
     7.8 Other considerations to address the tampering of stolen mobile devices unique identifiers
8 Framework requirements
     8.1 Centralized reference database
     8.2 Network support for blocking the devices
     8.3 Reliable unique identifiers
     8.4 Close collaboration with law enforcement agencies and other domestic agencies
     8.5 Tools to check the status of mobile devices
     8.6 Support of applicable national legal and regulatory frameworks
9 Reference framework
10 Desirable features
     10.1 Lost and stolen devices global reference database
     10.2 Actions regarding establishments that sell lost, stolen or tampered devices
Appendix I  GSMA approach to combating mobile device theft
Bibliography