Device Register
Manage blacklisted devices
Register your country's stolen or lost devices in one central database.
Request a demoWhat is a Device Register?
A Device Register, also known as Central Equipment Identity Register (CEIR), allows stakeholders to centrally manage a country's lost and stolen devices. That makes it possible to block their mobile network access (blacklisting). Devices are identified by their unique IMEI number.
How it works
Every device has a unique code (IMEI)
When a device is stolen or lost, the IMEI is registered
This device register is frequently updated
Every new device on the network is checked
Stolen or missing devices can be blacklisted
Why use our solution?
Our Device Register makes it easy to blacklist lost or stolen devices.
One central source
A standardized central and secure solution for regulators, operators and customers alike.
Easy to use
Accessible solution for third parties to update devices and device statuses.
Blacklisting
Don’t allow devices to access mobile networks when they’re reported stolen or lost.
Validity check
Allow customers to easily check the legitimacy of their device.
How we get you started
Establishing data format
Definition of the data format. Validation rules can be set up to ensure data accuracy and quality.
Implementation & integration
Implementation of the platform in accordance with the dataset and validation rules.
Testing and onboarding
Access configuration and helping operators and third parties to connect to the system.
Go live
Keeping your solution up-to-date after implementation. Our customer support is always there to help.
Popular features
Real-time database queries
Authorized parties, such as customers and law enforcement agencies can review registered devices data using the REST-API.
Data validation & processing
Verification of data with predefined validation rules, to ensure data accuracy and quality.
Data exports
Provision of data to authorized parties, to block devices from their network and to gain useful insights.
End user portal
The ability for consumers to review their device information and status.
Frequently asked questions
Why does the Device Register only register stolen or lost devices?
By solely registering stolen or lost devices, the solution can be set up and managed easier for its main objective: blacklisting unwanted devices on mobile networks. Registering all devices could potentially serve more purposes, but that would entail a large and costly project, including many stakeholders. It would take a lot of work to add all devices initially, and after release it means a daily operation to keep the register up-to-date with new and discontinued devices. Limiting the Device Register to blacklisting solves a security risk fast, without spending many resources.
How much does the Device Register cost?
The specific price of the Device Register depends on several factors, such as your set-up and requirements. These are the most important aspects that determine pricing:
- Local or cloud hosting: the solution can either run in the cloud or in a local data center. Cloud hosting gives you more flexibility and is most cost-effective.
- Market size: a bigger market (e.g., number of operators connected) means more data processing, which may impact platform requirements and support needs.
- Specific needs: implementing the Device Register is based on international best practices, resulting in an economical solution and short time to market.
- Contract term: a longer contract gives you more time and opportunity to recover costs.
How long does it take to implement the Device Register?
The implementation time of the Device Register ranges from 6 to 12 months, dependent of the scope and the stakeholders involved.
Can I transfer existing data to the new Device Register?
It is definitely possible to transfer existing data to the Device Register. We will analyze the existing data together and define a migration strategy based on that analysis as part of the project.
What are the benefits of the Device Register?
The Device Register is beneficial to customers and third parties, providing a central solution to register stolen or lost devices.
- Benefits for third parties: selected organizations (such as law enforcement agencies) can access the centralized Device Register, to report devices missing or stolen and preventing them from accessing the mobile network (blacklisting).
- Benefits for customers: through the Device Register, customers are able to check the legitimacy of their devices, and are ensured a stolen device can no longer access the network.
- Benefits for operators: blacklisting enables operators to block lost or stolen devices from their network. This helps them supporting their customers effectively, and by doing so, improving their customer satisfaction rates.
Is it safe to run the Device Register in the cloud?
Running the SIM Register in the cloud is the most effective, and usually the safest way to operate. It eliminates all the disadvantages of maintaining and updating local infrastructure. Our application is secure by design, and we take technical and organizational measures for data security and availability. These measures include regular audits and assessments of our solutions, carried out by an independent company.
Also consider these general safety benefits of a state-of-the-art cloud infrastructure:
- Increased availability: in the cloud, the platform data is stored in multiple data centers that are geo-redundant. If one server goes down, the other server instantly takes over. Achieving this on a local level is expensive.
- Improved physical security: major cloud providers such as Microsoft and Amazon spare no expense to protect their data centers. They have state-of-the-art physical and digital security, as well as round-the-clock security monitoring.
- 24/7 security monitoring: cloud providers invest in a security operations center (SOC), monitoring the infrastructure 24/7. It is costly and challenging to achieve this on a local level.
- Up-to-date hardware: in order to run a secure platform locally, hardware has to be replaced when its economical and physical lifecycle ends (usually every five years). This often includes renewing software licenses. Cloud providers invest in hardware and maintain it regularly to keep their infrastructure up-to-date.
How is personal data in the Device Register being shared and protected?
Properly protecting data requires technical and organizational procedures. We guarantee that all data processing complies with local data and privacy protection regulations. All of our security measures are in line with global best practices, with our solutions regularly being tested by an independent company. These tests are based on a cybersecurity assessment, including pen tests, vulnerability tests and infrastructure security tests.
What kind of customer support can I expect?
Everyone using the Device Register receives tailored customer support. Documentation is centrally available, and your users are properly onboarded and trained. Because the platform is delivered as a managed service, we will keep it up-to-date and add new functionalities when available. Of course, the platform is also continuously monitored, to fix any issues fast and adequately.
Latest Posts
Explore our knowledge base
Future-ready numbering services: all benefits of the cloud for your business
In this blog, we discuss all opportunities and benefits of the cloud for numbering services: for a faster time to market and an effective operation.
Read moreWhy we proudly support Mercy Ships, the hospital fleet providing free healthcare
PXS proudly supports Mercy Ships, a fleet of mobile hospitals sailing around the world to provide healthcare to people in need.
Read moreStay aligned with EU regulations: offer seamless internet switching
Part of the EECC often overlooked is seamless internet switching. We explain why and how you should implement service switching.
Read moreTake control of number information
Start using our Device Register today! Contact one of our experts to discuss your business case.