Você está na página 1de 10

EQUIPMENT IDENTITY REGISTER

AN INDUSTRIAL INTERNSHIP REPORT


Submitted by DEEPAK SHARMA (10BCE1030) In partial fulfillment for the award of the degree of

COMPUTER SCIENCE AND ENGINEERING

VIT
UNIVERSITY
(Estd. u/s 3 of UGC Act 1956)

Vellore - 632 014, Tamil Nadu, India

DECLARATION BY THE CANDIDATE

I hereby declare that the Training entitled EQUIPMENT REGISTER submitted by me to the School of Computing University, the degree of Engineering

IDENTITY Sciences, VIT

Chennai in partial fulfillment of the requirements for the award of Bachelor is of Technology in Computer Science and

a record

of bonafide work carried out by me/us under the

supervision of Utpal Ranjan. I further declare that the work reported in this report has not been submitted and will not be submitted, either in part or in full, for the award of any other degree or diploma in this institute or any other institute or university.

Chennai: Date:

Signature of the Candidate

ii

VIT
UNIVERSITY
(Estd. u/s 3 of UGC Act 1956)

Vellore - 632 014, Tamil Nadu, India The report entitled EQUIPMENT IDENTITY REGISTER is prepared and submitted by DEEPAK SHARMA (Register No: 10BCE1030). It has been found satisfactory in terms of scope, quality and presentation as partial fulfillment of the requirements for the award of the degree of Bachelor of Technology in Computer Science and Engineering in VIT University, Chennai in partial fulfillment of the requirement for the award of the degree of B.Tech in CSE is a record of bonafide inplant training undertaken by him/her under my supervision. The training fulfills the requirements as per the regulations of this Institute and in my opinion meets the necessary standards for submission. The contents of this report have not been submitted and will not be submitted either in part or in full, for the award of any other degree or diploma in this institute or any other institute or university.

Program Manager (B.Tech CSE)

SUPERVISOR

Date:

Date:

iii

ACKNOWLEDGEMENT
It is always a pleasure to remind the fine people in the Engineering program for their sincere guidance I received to perform my practical as well as theoretical skills in engineering.

Firstly I would like to thank Dr. L. Jegannathan (Program manager for CSE, VIT University, Chennai) for meticulously planning academic curriculum in such a way that student are not only academically sound but also industry ready by including such industrial training pattern.

I would also like to acknowledge my heartfelt gratitude to UTPAL RANJAN (Site Incharge) for giving me this opportunity and trusting me enough to share entire source

code to let me add the new features. I would like to thank him for continuously supporting me in every possible way during the course of this training.

Place : Chennai (Deepak Sharma)

Date :

iv

ABSTRACT
Mobile phone theft has become a growing problem worldwide, with hundreds of thousands of phones reported stolen each year. In many countries, GSM handset theft has become a major factor in rising street crime, particularly among young people. A stolen GSM handset can be reused with a different subscriber's SIM card, possibly in a different mobile network. Upon subscribing to a network and obtaining a legitimate SIM card with subscriber information, the perpetrator will initially buy an inexpensive handset and later steal a better model from another subscriber. The SIM card is then switched and the network operator is unaware that a stolen handset is being used. The telecommunications industry is working hard to make this crime less attractive to thieves. Screening solutions, along with jointly shared databases of stolen handset numbers, can effectively render a stolen handset useless across all networks. Once the consumer reports the theft to the network operator, it can be cancelled much like a stolen credit card. The Equipment Identity Register is a database employed within mobile networks. The database holds records for 3 types of mobile; namely black, grey and white. Besides, there is also a 4th category i.e. "Unknown". EIR provides an additional level of security which is performed on the mobile equipment itself, as opposed to the mobile subscriber. When a mobile requests services from the network its IMEI (International Mobile Equipment Identity) may be checked against the EIR, to assess which category of mobile it falls under. It is a tool to deny services or track problem equipment.

LIST OF FIGURES FIGURE NO.


3.1

CAPTION
Subscriber Account Status State Machine

PAGE NO.
7

4.1

Restrict Account with Black Listed Device

Remove Account Restrictions with New Device

4.2

12

4.3

Deny Account with Black Listed Device

15

4.4

Re-authorize Restricted Account

17

4.5

Query Device Based on Record Age

20

4.6

Query Device with an Empty Record

22

Network Architecture 4.7 25

Software Architecture
4.8 Web Based Management GUI. 5.1 5.2 IMEI Upload. 27 27 25

vi

GUI Based Management 5.3 29

vii

Acronyms and Abbreviations

Acronym
3GPP2 CEIR EIA EIR ER ESN HW ID IMSI MDN MEID MIN MS NV RUIM RUIMID SMS

Meaning
3rd Generation Partnership Central EIR Electronics Industry Association International Forum on ANSI-41 Standards Technology Equipment Registry Electronic Serial Number Hardware Identifier International Mobile Subscriber Identity Mobile Dialed Number Mobile Equipment Identifier Mobile Identification Number Mobile Station Non-volatile Removable User Identity Module RUIM Identification Short Message Service

viii

Acronym
SMSC TIA UIM ID

Meaning
Short Message Service Center Telecommunication Industry Association User Identity Module Identifier

TABLE OF CONTENTS

CHAPTER NO.

TITLE
ABSTRACT

PAGE NO.
v

LIST OF FIGURES

vi

ACRONYMS AND ABBREVIATIONS

vii

1. 2. 3.

INTRODUCTION SYSTEM REQUIREMENTS OVERVIEW OF THE PROPOSED SYSTEM 3.1 Mobile Station 3.2 Equipment Registry 3.3 Provisioning System

1 2 5 5 5 7 7 7 7

DESIGN OF THE SYSTEM Design Requirements 4.1 Call Flows

ix

4.1.1 Restrict Account with Black Listed Device 4.1.2 Remove Account Restrictions with New Device 4.1.3 Deny Account with Black Listed device 4.1.4 Remove Account Restrictions Via Customer Service Call 4.1.5 Query A Device: Based on Age of Record 4.1.6 Query A Device: Based on Empty Device 4.2 Database Requirements 4.3 Network Requirements 4.4 Network Architecture

12

15

17

19

21 23 24 24 25

4.5 Software Architecture RESULTS AND DISCUSSIONS 5

26

5.1 Operators Benefits 5.2 Subscriber Benefits 5.3 EIR Features 5.4 Report Features 5.5 Additional Features 5.6 Sample Reports 5.7 Fault and Alarm Management 5.8 Alarm Management System 6 CONCLUSION

26 26 26 28 28 29 29 29 30

Você também pode gostar