Skip navigation

Equipment Identity Register Front End

Portfolio

With the rate of mobile phone theft and identity fraud increasing year over year around the world (mainly pushed by the massive adoption of smartphones), considerably affecting service provider revenue and costs per subscriber, t he Ericsson Equipment Identity Register Front End (EIR-FE) has been developed to bring service providers control over the identity of the mobile equipment preventing calls from stolen, unauthorized, or defective mobile stations.

EIR-FE is a solution to counteract attempts at fraud, protecting service provider networks and revenue as well as their investments i n subscribers. It also helps to ultimately protect the physical integrity and identity of subscribers by making phone theft less lucrative for offending individuals.

EIR-FE as part of the Ericsson UDC solution Key benefits of EIR-FE

EIR-FE is a fully integrated part of our User Data Consolidation (UDC) solution, offering harmonized functionality and hardware/virtual network functions (VNFs) to the rest of the solution. Fulfilling regulatory requirements used in mobile networks to authenticate mobile equipment, EIR-FE responds to network requests based on “black,” ”grey,” ”whitelist,” or “unknown” designations, additionally helping service providers protect their investments in subsidized handsets and preventing revenue leakage.

Apart from traditional 2G and 3G support, EIR-FE offers LTE and Wi-Fi support with an S13/S13’ interface, enabling the transfer of identity data for identification of mobile equipment and the enablement of control over access within a 3GPP Evolved Packet System (EPS) and 4G LTE network. Leveraging this, service providers will be able to provide International Mobile Equipment Identity (IMEI) and International Mobile Subscriber Identity (IMSI) enforcement on LTE networks.

The Ericsson Equipment Identity Register Front End brings service providers a number of benefits to protect and optimize their investments and safeguard their networks. These include:

  • Protection of revenue through prevention of malicious usage of network resources (such as cloned numbers or calls made  from stolen devices)
  • Protection of investments in subscribers through the prevention of subsidized terminals being used in competitor networks (and thus generating revenue for competitors)
  • Enhancement of brand (service providers will be able to position themselves as doing the utmost to protect subscribers from theft and fraudulent activity)
  • Cost-efficiency, with life cycle, operations and maintenance (O&M), and spare parts alignment with the majority of our core products portfolio (for example, Ericsson UDC)