The Exclusive Mobile Security Solution
Transcription
The Exclusive Mobile Security Solution
The Exclusive Mobile Security Solution What is meir? Prevents service procurement of the unregistered mobile devices and contributes national economy. Detects unregistered mobile devices and prevents them to get service procurement from the GSM Operators. Prevents service procurement of the stolen mobile devices and contributes national security. Builds a detection system which is fast, reliable and efficient. Informs the cloned, unregistered and stolen mobile devices to the GSM Operators quickly and collaborates several systems which are integrated each other. How does it work? PIS Prosecutor Interception System Import Interception System Countries National Judgement Network Project Countries Central Demographic Control System mckstk.gov.tr Countries GSM Operators Information Notice Center (INC) Personal Application System Data Transfer Rate Countries Communication Auhority Personal Application System (PAS) The devices which are brought by the passengers are registered. The devices which have not registered yet are registered under the related law scope. Prosecutor Interception System (PIS) PIS Opening or Closing processes of the service procurement of the devices is executed through the prosecutor request Import Interception System (IIS) The importer firms who import mobile devices from the foreign countries enter the inputs to the system. Importer: makes necessary notices in the legal interval. The documents those belong to the import operation is entered to the system and for every single IMEI there has been paid a standard amount of money. Foundation User: evaluates the documents those come from the importer firms and confirms the IMEIs and then IMEIs become legally usable in the country’s border. Clone Device Detection Clone detection which are reproduced from the current IMEIs. IMEI Control Clone (Black) Classic (Time Based Clone) Unregistered (Grey) Modern (Service Based Clone) Forbidden (Red) Clone detection which the IMEIs are reproduced from the legal records and take place in the data source. Clone detection which the IMEIs are reproduced form the illegal records and do not take place in the data source. Clone Detection: The IMEIs which belong to old model mobile devices are integrated to the devices those come from foreign countries legally. Personal Imports Application by personal import mobile devices from foreign countries The graph shows that the number of registered devices those are brought by the citizens without leading any commercial purpose have increased every year. Financial Feasibility Turkey (Actual) Sudan (Estimate) Population 78.785.548 45.585.874 Subscribe 66.000.000 37.746.000 140.000.000 59.625.000 Internet Users 55.233.000 24.162.000 Delivering cellular devices 17.251.000 8.734.000 97 70 1.673.347.000 $ 611.380.000 $ Quantity of Cellular Devices The tax for the devices The annual total tax revenue Registered by Importers’ Registered IMEI numbers by importers' application The graph shows that the number of the registered devices those are brought legally by the importers have increased every year. Registered by Importers’ Notices made by phone to information and Notice Center for stolen and lost mobile devices The graph shows that the number of the registered devices those are brought legally by the importers have increased every year. The Exclusive Mobile Security Solution Thank You [email protected]
Similar documents
Counterfeit (fake ) Mobile Phones
The price of a counterfeit is usually less than that of the genuine phone. Note that, not all cheap phones are fake. · Counterfeits pass off non-existing model numbers as authentic ones. Check if ...
More information