SUBSCRIBE NOW
IN THIS ISSUE
PIPELINE RESOURCES

E-MEID: The Next Thing in Smartphone Security


E-MEID can be used to improve many facets of wireless network security, including the automated detection of counterfeit smartphones, smartphone software vulnerability monitoring, malicious modification of smartphone software, smartphone vishing and smishing attacks, and unlicensed use of digital streaming content.
The eSIM can deter SIM-jacking, but the COMSovereign eSIM also collects pertinent network security data for immutable and cryptographically protected storage on the E-MEID blockchain. This data can provide a verifiable record of network security operations, automated software vulnerability alerts, software provenance insight, change management process documentation, hardware or software component changes, and mobile device traceability data.

Total Network Services and Rypplzz are using the E-MEID to guard against unlicensed digital streaming content use. The companies combine $DigitalNames and a new media file format, called MFX, to prevent streaming content piracy caused by lost or stolen passwords, rootkit modified smartphones, or other malicious or illegal acts. MFX is a new media file format that has internal artificial intelligence (AI) scripting. AI constantly communicates with the management platform using its own decentralized global data network. This approach delivers complete content management and online distribution capabilities. The E-MEID documents and verifies licensed content consumption from the device while $DigitalNames documents authorized access to the content by the user. Rypplzz-embedded geospatial management services are used to geofence access to streaming content or disable access based on device location.

The E-MEID can also help address the telecommunications industry's supply chain security challenge. According to recent reports, the industry annually sells approximately $140B in counterfeit parts. This supply chain security failure results in 6.5 percent of ICT products having counterfeit parts and nearly 20 percent of mobile phones shipped being fake. As a consequence, the TIA is leading an initiative that goes beyond current organizational information security standards. The industry think tank sees the current standard as not specific enough to address potential security vulnerabilities in the supply chain. This challenge is why the TIA initiated its Supply Chain Security 9001 Standard development work in 2020. The effort represents a comprehensive approach to improving supply chain security by incorporating proven elements of existing industry-driven standards and adding new ICT requirements that address modern networks and their supporting technologies. A recent SCS9001 pilot project showed that the E-MEID could be used to automate the documentation of five of the 11 recommended security evaluation metrics.

In summary, the E-MEID can be used to improve many facets of wireless network security, including the automated detection of counterfeit smartphones, smartphone software vulnerability monitoring, malicious modification of smartphone software, smartphone vishing and smishing attacks, and unlicensed use of digital streaming content.

To learn more about how your organization could leverage this blockchain-enabled technology, please visit Total Network Services at https://TNSCorp.io or contact Kevin L. Jackson at Total Network Services kevin@TNSCorp.io.

____________________________

TIA does not endorse TNS or the solutions it proposes. TIA is technology and vendor neutral. The MEID is managed by TIA and the "enhanced" aspects proposed by TNS are products and services that utilize the MEID but are not standardized by TIA engineering committees nor approved or marketed by TIA.



FEATURED SPONSOR:

Latest Updates





Subscribe to our YouTube Channel