top of page

Equipment Identity Register (EIR)

FIGHT FRAUD

Address fraud and underperforming devices by utilizing intelligent lockout strategies. Combine these with targeted campaigns to recover banned subscribers and create alternative offers. Stay ahead of the increasing global trade in grey market devices, device theft, and identity fraud. Operators face heightened pressure to develop strategies that implement security measures to safeguard their networks and revenues from grey market devices, prevent access by stolen devices, and ensure compliance with regulatory standards and tax guidelines.


Examine trends, growth patterns, and intervene in issues related to theft, tax enforcement, subscriber registration, identification, and identity fraud.

Offer comprehensive analytics with both high-level and network-specific views. Provide standard and customized reporting along with an intuitive dashboard interface built on a fully compliant architecture that integrates seamlessly with operators' back-end systems.

Detect SIM boxes and enable precise geographical targeting, while offering real-time options for managing them, such as automatic blacklisting or blocking of the device and associated SIM cards, along with geographical data for investigative purposes.

What We Offer

Security and Compliance

A next generation solution to meet legislative compliance, protect network integrity, manage devices, subscriber profiling and commercial engagements.

List Management

Comprehensive List Management (Black, Gray, White and unlimited, customizable variables, Exceptions, VIP and others).

Deployment

Cloud or Private Cloud - Supports VNF and bare metal. Repositories available for Containers. 

Real-Time

Data is updated near real-time using our unique high performance storage algorithms. You gain access to aggregate information  in near real-time.

GSMA Integration

Integration with GSMA Centralised IMEI Database

The EIR supports batch imports from the latest GSMA databases on a configurable schedule, and uploading of local additions to the database if these additions are compliant with the standard lists and conditions utilized by the GSMA.

​

Automatic Clone detection - IMEI and SIM Cards

Detect and locate cloned IMEI and SIM cards by running a network scan to scan all devices and SIM cards active on the network, picking out those that are not registered. By applying the rule that there can only one IMEI and IMSI active on the network at any given time the EIR can find all duplicates within the network, or, in the case of a Central EIR, all networks. Any conflicting IMEI and IMSI numbers are reported in a duplication list for processing or blacklisting.

Lists and List Management 

Digital Network_edited.jpg
white background full of smart phones.jpg

The EIR supports three subsets of lists, depending on the selected feature set, including all 3GPP types – and three additional lists for commercial applications.

​

01

Non-Standard lists

The EIR supports several different non-standard lists; Amnesty, Bind and Location. These are usually more used in a commercial setting – or to mitigate agreed transitions towards an EIR.

03

Location list

The location lists tie an IMEI and optionally an IMSI to a specific cell range – for locality lock down of CPE.

05

Extended Lists

Extended list administration adds two more lists which are the explicit white list and the unknown list. When operating within an extended list setup the EIR requires all devices to be marked for access as white. This means all IMEI’s on the network must be on either the Black, Grey or White lists – if not on one of these lists, the equipment is said to be unknown and placed into the unknown list, awaiting further processing for a pre-set grace period allowed onto the network – but after the expiry of the grace period – the IMEI is moved to the Blacklist automatically.

02

Device Binds

The Bind list, as implies, binds an IMEI and IMSI together so only this pair is legal on the network. This can be used for bundling IMEI and IMSI together – for example, SIM cards in modems and CPE – so these SIM’s are not placed into Smart phones and used for personal data.

04

Amnesty list

The Amnesty list allows for the combinations of IMSI / IMEI to be allowed to exist on the network even though the IMEI is Blacklist. This is normally used in a transition period where all known cloned IMEI and IMSI and current IMEI are allowed – while all new combinations be banned.

06

Standard List-based operation

The standard lists consist of Black and Grey lists with implicit whitelisting – i.e. if an IMEI is not either Black or Grey – it’s assumed to be white.

Enterprise Edition

 Comprehensive product features including EIR/ADD, SS7/Diameter, and Radio Network Probing options, along with analytics, campaigns, and triggering capabilities. - A Professional Device Library featuring 52 handset properties and over 155,000 handsets. - Settings and Device Management for more than 2 million subscribers. - An Enterprise-Level Support package.

Simu.IQ Ltd.  

Address: London,WC1N 3AX United Kingdom

Simu.IQ L.L.C.

Address: 30N Gould St., Sheridan, WY, US

Email:    sales@simuiq.com

                info@simuiq.com

          support@simuiq.com

Tel: +1 970 512-5097

      +1 781 650-8024

© 2025 Simu.IQ Limited - All Right Reserved

bottom of page