Equipment Identity Register

Stolen and fraudulent devices are an ever-present danger to the Quality of Service of Mobile Networks. It is important to eliminate these unauthorized devices to minimize the risk to operator revenues and customer experience. Invigo Equipment Identity Register (EIR) enables operators to control and prevent stolen or fraudulent devices from accessing operator networks. It gives operators and law enforcement agencies unprecedented power to cut crime and eliminate unauthorized activity from their networks. EIR also directly interfaces with the worldwide GSMA Central database, which lets operators query and exchange data down to the individual IMEI level.
The capabilities of EIR include blocking stolen devices and even locking a SIM card to a device. This enables operators to define marketing bundles and device-based tariff plans while ensuring only approved devices can take advantage of the offers.

Key Components of Invigo's EIR

automatic-configuration-img

Device Block

Allows to block, in real-time, devices from attaching to the network, block rules can also be applied per subscriber. Invigo’s EIR is fully 3GPP compliant and supports 2G/3G, 4G/LTE, and 5G networks

automatic-configuration-img

Device Lock

Allows locking SIM cards to a device. Different lock types are available to control the devices used by the subscribers.

automatic-configuration-img

Integration with CEIR

Allows integration with a countrywide Central EIR database to retrieve EIR rules.

automatic-configuration-img

GSMA Device Registry

Allows integrating, retrieving and sharing EIR rules with the GSMA Device Registry.

 

automatic-configuration-img

Invalid IMEI handling

Automatically blacklist any invalid device.

automatic-configuration-img

Fraud Detection

Detect fraudulent behavior on operator networks.

Operators and law
enforcement agencies benefits

flexible-img
Fight device theft
flexible-img
Block fake IMEIs and duplicate IMEIs
flexible-img
Fight illegal import of devices and increase tax revenues
flexible-img
Protect consumers from counterfeit devices
flexible-img
Identify the actual user of any mobile device
flexible-img
Prevent non-compliant devices from using the network
flexible-img
Protect the network from congestion from unauthorized devices
flexible-img
Track device usage countrywide