MEID and EUIMID Migration

MEID and EUIMID Migration

MEID and EUIMID Migration 1 MEID and EUIMID Migration 1 1 Executive Summary 2 3 • Issue. The recent (September 2007) TIA ESN Report predicts that ESN 4 manufacturer code address space for handsets will exhaust by Q1 2008. The 5 UIMID manufacturer code space for R-UIMs (a subset of the same resource) will 6 also exhaust. In fact, UIMID assignments are continuing only because the ESN 7 administrator has been able to continue to reclaim codes from older technologies 8 (AMPS analog and TDMA digital) and transfer them to the UIMID administrator. ® 9 • Industry Response. In response to these events, the cdma2000 industry is 10 migrating handsets from ESN to MEID-based addressing, and R-UIMs from 11 UIMID- to EUIMID-based addressing. 12 o Non-unique values, known as pESN (pseudo-ESN) or pUIMID 13 (pseudo-UIMID), will be used in ESN/UIMID fields, previously 14 depended upon to be unique 15 • Potential Impact. If there are no steps taken in the network and back-end 16 systems to accommodate this change, possible impacts include: 17 o Crosstalk, interference and dropped calls 18 o Misaddressed air interface messaging (e.g. SMS received by wrong 19 user) 20 o Inability to provision and/or bill some subscribers 21 o Spurious Fraud Detection alerts 22 • Migration Status. The migrations have already started ® 23 o Several major cdma2000 operators have already upgraded their 24 network and deployed MEID-based handsets 25 o EUIMID-based R-UIMs have already been deployed by at least one 26 major R-UIM vendor ® 27 • Recommended Actions. All cdma2000 operators are recommended to 28 o Upgrade their network to support C.S0072 to minimize PLCM collisions 29 o Remove any requirement in their back-end systems for a unique 30 ESN/UIMID value 31 o Use MEID-equipped devices 32 o Choose either Long or Short EUIMID format and provision in all new R- 33 UIMs ii MEID and EUIMID Migration 1 Contents 2 1 Executive Summary ......................................................................................................................... ii 3 2 The Need for Migration ....................................................................................................................1 4 2.1 Exhaust Impacts – Consequences of Inaction ......................................................................1 5 2.1.1 ESN Usage ...............................................................................................................2 6 2.1.2 Duplication Impact....................................................................................................3 7 2.1.3 Collision Impact ........................................................................................................4 8 2.1.4 MEID Support...........................................................................................................5 9 2.2 Resource Utilization and Timelines........................................................................................5 10 2.2.1 Predicted Timelines .................................................................................................5 11 2.2.2 Current Resource Utilization ...................................................................................6 12 2.2.3 Migration Activities ...................................................................................................7 13 2.3 Likelihood of Impacts...............................................................................................................7 14 2.3.1 Basic Duplication Probability ...................................................................................7 15 2.3.2 Duplications in a group of cards/devices................................................................7 16 2.3.3 PLCM Collision Probability ......................................................................................8 17 3 Hardware Identifiers Involved.......................................................................................................10 18 3.1 Identifier Relationships..........................................................................................................10 19 3.2 Existing Identifiers .................................................................................................................10 20 3.2.1 Electronic Serial Number (ESN) ...........................................................................10 21 3.2.2 User Identity Module Identifier (UIMID) ................................................................12 22 3.2.3 Integrated Circuit Card Identifier (ICCID) .............................................................13 23 3.3 New Identifiers .......................................................................................................................14 24 3.3.1 Mobile Equipment Identifier (MEID)......................................................................14 25 3.3.2 Expanded UIMID (EUIMID) ...................................................................................16 26 3.4 Derived Identifiers..................................................................................................................16 27 3.4.1 Secure Hash Algorithm 1 (SHA-1)........................................................................17 iii MEID and EUIMID Migration 1 3.4.2 Pseudo-ESN (pESN) .............................................................................................17 2 3.4.3 Pseudo-UIMID (pUIMID) .......................................................................................18 3 4 Standards Involved.........................................................................................................................20 4 4.1 MEID.......................................................................................................................................20 5 4.1.1 Requirements .........................................................................................................20 6 4.1.2 Administration.........................................................................................................20 7 4.1.3 Billing.......................................................................................................................20 8 4.1.4 Air Interface ............................................................................................................21 9 4.1.5 ANSI-41 MAP Updates ..........................................................................................22 10 4.1.6 Over-the-Air Activation...........................................................................................23 11 4.1.7 Interoperability and Testing ...................................................................................23 12 4.2 Expanded UIMID (EUIMID) ..................................................................................................24 13 4.2.1 Requirements .........................................................................................................24 14 4.2.2 Administration.........................................................................................................24 15 4.2.3 CDMA R-UIM..........................................................................................................25 16 4.2.4 CDMA SIM Application ..........................................................................................25 17 5 EUIMID Migration Options.............................................................................................................26 18 5.1 Long-Form EUIMID ...............................................................................................................26 19 5.2 Short-Form EUIMID...............................................................................................................27 20 5.3 CDMA Card Application Toolkit (CCAT) ..............................................................................28 21 5.4 Device Compatibility with EUIMID........................................................................................29 22 6 Recommendations..........................................................................................................................30 23 6.1 Operators with non-R-UIM-equipped handsets...................................................................30 24 6.2 Operators with R-UIM-equipped handsets ..........................................................................33 25 7 Scenarios .........................................................................................................................................37 26 7.1 Device / R-UIM Combinations of Interest ............................................................................37 27 7.2 Non-R-UIM Operator .............................................................................................................38 28 7.2.1 Basic Operation......................................................................................................39 29 7.2.2 Data Services .........................................................................................................45 30 7.2.3 Lost/Stolen Phone..................................................................................................46 31 7.2.4 Over the Air Service Provisioning .........................................................................46 iv MEID and EUIMID Migration 1 7.2.5 Roaming..................................................................................................................49 2 7.3 R-UIM Operator – existing R-UIM in MEID device..............................................................51

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    79 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us