Resolving duplicate IMEIs on mobile networks

DeviceAtlas enables businesses to identify devices with modified or incorrect TACs/IMEIs

Contact us to learn more

Causes of Duplicate IMEIs

stolen-devices-revised

Stolen Devices

Stolen devices can be laundered for use on operator networks by modifying the IMEIs, thus removing them from the blacklist.

This enables a stolen device to go back into service despite being done for nefarious reasons.

Laundered devices appearing on networks that have duplicate or invalid IMEIs can be isolated using DeviceAssure and appropriate action can be taken.

non-standard-devices-revised

Non-standard Devices

Non-standard devices can be low cost, unbranded devices that are illegally imported and distributed, or they may be represented by higher value counterfeits masquerading as premium brand devices.

Non-standard devices typically have invalid or duplicate IMEIs and are thus outside of regulatory compliance.

DeviceAssure identifies these devices on the network, enabling service denial or appropriate action.

bypassing-revised

Bypassing Registration Systems

Some nations implement device registration systems for the purposes of controlling excise fraud and improving regulatory control over devices used on networks.

However, registration systems can be bypassed by modifying the IMEI on a device which can be done easily via an app.

DeviceAssure verifies that a registered device has a valid IMEI for that device, ensuring integrity of the registration process.

How are IMEIs modified?

IMEIs are very difficult to modify on Apple and Sony devices. However, on devices with Mediatek chipsets IMEIs can be straightforward to change via telephone key sequence inputs. There are also a number of IMEI changer apps which are easily accessible via the Google Play Store.

DeviceAtlas can identify whether an IMEI has been changed and resolve this issue for mobile operators and service providers.

The DeviceAtlas Solution

DeviceAtlas provides device intelligence to market leading organizations worldwide. Part of its portfolio includes DeviceAssure which identifies and authenticates devices. DeviceAssure enables identification of TACs which do not match the device. Key features include:

1

Remote

Verify anywhere in the world

2

Discreet

Invisible to end user if desired

3

Fast

Results in less than 1 second

4

No PII

No personal info, GDPR Compliant

How it works

DeviceAssure is easily integrated into existing apps, SDKs and websites to build device

verification into your own products and services.

SDK/JS library is embedded on the client website/app and visited by the device.

works2

A device profile is then captured and sent to the DeviceAssure service.

works3

A series of checks are then performed to assess the device’s authenticity.

vendor

The results are returned to the client for measurement and/or intervention.

Verify and authenticate devices with DeviceAssure