Abstract:
Methods, systems, and computer readable media for providing a multi-network equipment identity register are disclosed. According to one aspect, the subject matter described herein includes a system for providing a multi-network equipment identity register. A node in a telecommunications network receives from a requesting entity a request to check an identity of a user equipment, the request containing the identity of the user equipment, queries an EIR using the identity of the user equipment, receives a response from the EIR, and forwards the response to the requesting entity. The node includes first and second interfaces for receiving requests to check an identity of a user equipment in a first and second protocol, respectively, such that a user equipment that is blacklisted in a network that uses the first protocol is also blacklisted in a network that uses the second protocol.
Abstract:
Methods, systems, and computer readable media for providing a multi-network equipment identity register are disclosed. According to one aspect, the subject matter described herein includes a system for providing a multi-network equipment identity register. A node in a telecommunications network receives from a requesting entity a request to check an identity of a user equipment, the request containing the identity of the user equipment, queries an EIR using the identity of the user equipment, receives a response from the EIR, and forwards the response to the requesting entity. The node includes first and second interfaces for receiving requests to check an identity of a user equipment in a first and second protocol, respectively, such that a user equipment that is blacklisted in a network that uses the first protocol is also blacklisted in a network that uses the second protocol.