Summary

As defined in the ITU-T Q.5050 series of Recommendations, a central equipment identity register (CEIR) can be used to combat counterfeit information and communication technology (ICT) devices, to combat the use of stolen ICT devices and for other purposes. However, implementing a CEIR is a complex project that involves and impacts multiple stakeholders, and may require different processes in each country.

Therefore, to assist ITU members on implementation, Supplement 76 to ITU-T Q-series Recommendations aims to identify current industry approaches on the data exchange between CEIR and the equipment identity register (EIR) and propose common approaches and interfaces on this topic.