Skip to the content
IPification - Mobile authentication solutions
Menu
Menu
Have a Question?
Search
08. Data and Security
01. What data will be kept on the storage?
02. How long GMiD™Box keep data?
03. How long does information (from GGSN/PGW and CGN) be kept in the GMID™Box?
04. Can GMiD™Box encrypt all stored data?
05. Any impact on the storage of GMiD™Box if the subscriber's data session period is long?
06. During the Proof Of Concept (PoC), can we see information/data that is kept in the GMiD™Box? Can we see the DB schema that is kept in GMiD™Box?
07. Will any incoming authentication request go through every GMiD™Box?
08. How do you solve the tethering problem?
09. Do you collect the consent of the user to be recognized in the mobile network?
10. How would you handle the case of cloning a SIM Card?
11. How will you handle the case of Mobile number reuse?
12. How would you handle swapping SIM card issues?
13. Do you support Virtual SIM cards?
14. Authentication without the mobile Example: User has been robbed and needs to login into Telco Site to cancel/block the phone or call support
15. Hash MSSDN + IP + IMEI:
16. Sim swap change flow. How the identity is verified?
17. IMEI change flow. How the identity is verified?
18. MSISDN reuse flow. What happens if user 1 cancels his phone/telco plan and user 2 buys a new sim with the same MSISDN? This is a common situation in Brazil as MSISDN is reused after 3 months.
19. The MSISDN is not good but sometimes it is requested, at least to be used as a partial user id because the real email (and other customer details) may not be shared due to contract reasons. I understood that in IPification the MobileID would be changed as although MSISDN is the same, the IMEI would be different and hence trigger a user verification to assign a new MobileID, correct? If yes, in this case, we will receive a request to start a new OAUTH authentication, correct?
20. Some Telcos are asking if we can have an option for the user to avoid the support call? One example for a flow without the need for the mobile phone authentication would be the user to login with a username and a password in the Telco´s user area and request the cancellation and a new SIM card (and maybe a new phone) without the support interaction but with a 2nd-factor authentication.
21. How is the SIM change verified?
22. What does “Apple will require HTTPS for all iOS Apps? For the implementation of the GMID platform?
23. What happens when cell phone (device and SIM) is stolen, and SIM is still not deactivated.
24. Is there some vulnerability associated with the user's equipment in terms of low, medium, or high range and S. Operational, on WiFi 4G 5G platforms and operation in private or public WiFi networks?
25. How it works when a criminal cancels the phone number for theft. And this is done with the SIM operator (chip), and it enables a new SIM card with the same phone number removed?
26. What happens with other devices that are synchronized with the mobile device belonging to the same user (Tablets, PC’s, NB), which have the mobile device stolen or lost? Should he perform any action?
Show all articles (11)
Collapse Articles
You are here:
Main
08. Data and Security
Category - 08. Data and Security
Articles
01. What data will be kept on the storage?
02. How long GMiD™Box keep data?
03. How long does information (from GGSN/PGW and CGN) be kept in the GMID™Box?
04. Can GMiD™Box encrypt all stored data?
05. Any impact on the storage of GMiD™Box if the subscriber's data session period is long?
06. During the Proof Of Concept (PoC), can we see information/data that is kept in the GMiD™Box? Can we see the DB schema that is kept in GMiD™Box?
07. Will any incoming authentication request go through every GMiD™Box?
08. How do you solve the tethering problem?
09. Do you collect the consent of the user to be recognized in the mobile network?
10. How would you handle the case of cloning a SIM Card?
11. How will you handle the case of Mobile number reuse?
12. How would you handle swapping SIM card issues?
13. Do you support Virtual SIM cards?
14. Authentication without the mobile Example: User has been robbed and needs to login into Telco Site to cancel/block the phone or call support
15. Hash MSSDN + IP + IMEI:
16. Sim swap change flow. How the identity is verified?
17. IMEI change flow. How the identity is verified?
18. MSISDN reuse flow. What happens if user 1 cancels his phone/telco plan and user 2 buys a new sim with the same MSISDN? This is a common situation in Brazil as MSISDN is reused after 3 months.
19. The MSISDN is not good but sometimes it is requested, at least to be used as a partial user id because the real email (and other customer details) may not be shared due to contract reasons. I understood that in IPification the MobileID would be changed as although MSISDN is the same, the IMEI would be different and hence trigger a user verification to assign a new MobileID, correct? If yes, in this case, we will receive a request to start a new OAUTH authentication, correct?
20. Some Telcos are asking if we can have an option for the user to avoid the support call? One example for a flow without the need for the mobile phone authentication would be the user to login with a username and a password in the Telco´s user area and request the cancellation and a new SIM card (and maybe a new phone) without the support interaction but with a 2nd-factor authentication.
21. How is the SIM change verified?
22. What does “Apple will require HTTPS for all iOS Apps? For the implementation of the GMID platform?
23. What happens when cell phone (device and SIM) is stolen, and SIM is still not deactivated.
24. Is there some vulnerability associated with the user's equipment in terms of low, medium, or high range and S. Operational, on WiFi 4G 5G platforms and operation in private or public WiFi networks?
25. How it works when a criminal cancels the phone number for theft. And this is done with the SIM operator (chip), and it enables a new SIM card with the same phone number removed?
26. What happens with other devices that are synchronized with the mobile device belonging to the same user (Tablets, PC’s, NB), which have the mobile device stolen or lost? Should he perform any action?
+ 18 Articles
Show all articles