Methods, systems, and computer readable media for providing a multi-network equipment identity register
First Claim
1. A system for providing a multi-network equipment identity register (EIR), the system comprising:
- a node in a telecommunications network configured to;
receive from a requesting entity a request to check an identity of a user equipment, the request containing the identity of the user equipment;
query an EIR using the identity of the user equipment;
receive a response from the EIR; and
forward the response to the requesting entity,wherein the node includes a first interface for receiving an identity check request to check an identity of user equipment in a first protocol and a second interface for receiving an identity check request to check an identity of user equipment in a second protocol, the second protocol being different from the first protocol and the identity of the user equipment in the second protocol being different from the identity of the user equipment in the first protocol, such that user equipment blacklisted in a network that uses the first protocol is also blacklisted in a network that uses the second protocol.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and computer readable media for providing a multi-network equipment identity register are disclosed. According to one aspect, the subject matter described herein includes a system for providing a multi-network equipment identity register. A node in a telecommunications network receives from a requesting entity a request to check an identity of a user equipment, the request containing the identity of the user equipment, queries an EIR using the identity of the user equipment, receives a response from the EIR, and forwards the response to the requesting entity. The node includes first and second interfaces for receiving requests to check an identity of a user equipment in a first and second protocol, respectively, such that a user equipment that is blacklisted in a network that uses the first protocol is also blacklisted in a network that uses the second protocol.
-
Citations
20 Claims
-
1. A system for providing a multi-network equipment identity register (EIR), the system comprising:
a node in a telecommunications network configured to; receive from a requesting entity a request to check an identity of a user equipment, the request containing the identity of the user equipment; query an EIR using the identity of the user equipment; receive a response from the EIR; and forward the response to the requesting entity, wherein the node includes a first interface for receiving an identity check request to check an identity of user equipment in a first protocol and a second interface for receiving an identity check request to check an identity of user equipment in a second protocol, the second protocol being different from the first protocol and the identity of the user equipment in the second protocol being different from the identity of the user equipment in the first protocol, such that user equipment blacklisted in a network that uses the first protocol is also blacklisted in a network that uses the second protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
11. A method for providing a multi-network equipment identity register (EIR), the method comprising:
at a node in a telecommunications network; receiving from a requesting entity a request to check an identity of a user equipment, the request containing the identity of the user equipment; querying an EIR using the identity of the user equipment; receiving a response from the EIR; and forwarding the response to the requesting entity, wherein the node includes a first interface for receiving an identity check request to check an identity of user equipment in a first protocol and a second interface for receiving an identity check request to check an identity of user equipment in a second protocol, the second protocol being different from the first protocol and the identity of the user equipment in the second protocol being different from the identity of the user equipment in the first protocol, such that user equipment blacklisted in a network that uses the first protocol is also blacklisted in a network that uses the second protocol. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
20. A non-transitory computer readable medium having stored thereon executable instructions that when executed by the processor of a computer control the computer to perform steps comprising:
at a node in a telecommunications network; receiving from a requesting entity a request to check an identity of a user equipment, the request containing the identity of the user equipment; querying an equipment identity register (EIR) using the identity of the user equipment; receiving a response from the EIR; and forwarding the response to the requesting entity, wherein the node includes a first interface for receiving an identity check request to check an identity of user equipment in a first protocol and a second interface for receiving an identity check request to check an identity of user equipment in a second protocol, the second protocol being different from the first protocol and the identity of the user equipment in the second protocol being different from the identity of the user equipment in the first protocol, such that user equipment blacklisted in a network that uses the first protocol is also blacklisted in a network that uses the second protocol.
Specification