Publicité

shubhadappt(3273)

6 Feb 2019
Publicité

Contenu connexe

Publicité

shubhadappt(3273)

  1. CONTENTS  INTRODUCTION  IMPORTANT TERMS  HOW A PHONE CLONED?  METHODS TO DETECT CLONED PHONES  IMPACT OF CLONING  HOW TO PREVENT CLONING  FACTS AND FIGURES 
  2. INTRODUCTION  CLONING :  Cloning is the creation of an organism that is an exact genetic copy of other.  This means that every single bit of DNA is the same between the two!  CELL PHONE CLONING:  Cell phone cloning is copying the identity of one mobile telephone to another mobile telephone. 
  3.  Fixed data stored before the subscription is sold.  Temporary network data  Service related data  ESN  Which stands for Electronic Serial Number . It is same as the IMEI but it is used in the CDMA handset.  MIN  Stands for Mobile Identification Number ,which is the same as the SIM of GSM .
  4. SOFTWARES AVAILABLE FOR CLONING  FOR CDMA. If PIN and ESN are known, a mobile phone can be cloned in seconds using some software’s like Patagonia which is used to clone CDMA phones.  FOR GSM. However, if the accused manages to also clone the IMEI number of the handset, for which software’s are available, there is no way he can be traced.  BLUETOOTH HACK is the software available in the market which is used to hack/clone GSM phone.
  5.  CALL COUNTING :Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call , service is denied.  PIN CODES : Prior to placing a call , the caller unlocks the phone by entering a PIN code and then calls as usual . After the call has been completed , the user locks the phone by PIN code again. Operators may share PIN information to enable safer roaming .
  6. IMPACT OF CLONING  Each year , the mobile phone industry loses millions of dollars in revenue because of the criminal actions of persons who are able to reconfigure mobile phones so that their calls are billed to other phones owned by innocent third persons. 
  7.  The best way to prevent you SIM card or mobile phone from being cloned is to use Authentication feature. Authentication is a mathematical process by which identical calculations are performed in both the network and the mobile phone. • These calculations use secret information (known as a “key”) pre-programmed into both the mobile phone and the network before service is activated.  Cloners typically have no access to this secret information (i.e., the key), and therefore cannot obtain the same results to the calculations.  A legitimate mobile phone will produce the same calculated result as the network.  The mobile phone’s result is sent to the network and compared with the network’s results. If they match, the phone is not a ”cloned”
  8. PRESENTATION BY :
Publicité