IMEI
   HOME

TheInfoList



OR:

The International Mobile Equipment Identity (IMEI) is a numeric
identifier An identifier is a name that identifies (that is, labels the identity of) either a unique object or a unique ''class'' of objects, where the "object" or class may be an idea, person, physical countable object (or class thereof), or physical mass ...
, usually unique, for
3GPP The 3rd Generation Partnership Project (3GPP) is an umbrella term for a number of standards organizations which develop protocols for mobile telecommunications. Its best known work is the development and maintenance of: * GSM and related 2G and ...
and
iDEN Integrated Digital Enhanced Network (iDEN) is a mobile telecommunications technology, developed by Motorola, which provides its users the benefits of a Trunked radio system, trunked radio and a mobile phone, cellular telephone. It was called ...
mobile phone A mobile phone or cell phone is a portable telephone that allows users to make and receive calls over a radio frequency link while moving within a designated telephone service area, unlike fixed-location phones ( landline phones). This rad ...
s, as well as some
satellite phone A satellite telephone, satellite phone or satphone is a type of mobile phone that connects to other phones or the telephone network by radio link through satellites orbiting the Earth instead of terrestrial cell sites, as cellphones do. Therefo ...
s. It is usually found printed inside the battery compartment of the phone but can also be displayed on-screen on most phones by entering the MMI Supplementary Service code *#06# on the dialpad, or alongside other system information in the settings menu on smartphone operating systems.
GSM The Global System for Mobile Communications (GSM) is a family of standards to describe the protocols for second-generation (2G) digital cellular networks, as used by mobile devices such as mobile phones and Mobile broadband modem, mobile broadba ...
networks use the IMEI number to identify valid devices, and can stop a stolen phone from accessing the network. For example, if a
mobile phone A mobile phone or cell phone is a portable telephone that allows users to make and receive calls over a radio frequency link while moving within a designated telephone service area, unlike fixed-location phones ( landline phones). This rad ...
is stolen, the owner can have their network provider use the IMEI number to blocklist the phone. This renders the phone useless on that network and sometimes other networks, even if the thief changes the phone's SIM card. Devices without a SIM card slot or
eSIM An eSIM (embedded SIM) is a form of SIM card that is embedded directly into a device as software installed onto a eUICC chip. First released in March 2016, eSIM is a global specification by the GSMA that enables remote SIM provisioning; end ...
capability usually do not have an IMEI, except for certain early Sprint LTE devices such as the
Samsung Samsung Group (; stylised as SΛMSUNG) is a South Korean Multinational corporation, multinational manufacturing Conglomerate (company), conglomerate headquartered in the Samsung Town office complex in Seoul. The group consists of numerous a ...
Galaxy Nexus and S III which emulated a SIM-free
CDMA Code-division multiple access (CDMA) is a channel access method used by various radio communication technologies. CDMA is an example of multiple access, where several transmitters can send information simultaneously over a single communicatio ...
activation experience and lacked roaming capabilities in
3GPP The 3rd Generation Partnership Project (3GPP) is an umbrella term for a number of standards organizations which develop protocols for mobile telecommunications. Its best known work is the development and maintenance of: * GSM and related 2G and ...
-only countries. However, the IMEI only identifies the device and has no particular relationship to the subscriber. The phone identifies the subscriber by transmitting the
International mobile subscriber identity The international mobile subscriber identity (IMSI; ) is a number that uniquely identifies every user of a cellular network. It is stored as a field and is sent by the mobile device to the network. It is also used for acquiring other details of t ...
(IMSI) number, which is stored on a SIM card that can, in theory, be transferred to any handset. However, the network's ability to know a subscriber's current, individual device enables many network and security features. Dual SIM enabled phones will normally have two IMEI numbers, except for devices such as the Pixel 3 (which has an eSIM and one physical SIM) which only allow one SIM card to be active at once.


IMEI and the law

Many countries have acknowledged the use of the IMEI in reducing the effect of mobile phone thefts. For example, in the
United Kingdom The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of European mainland, the continental mainland. It comprises England, Scotlan ...
, under the Mobile Telephones (Re-programming) Act, changing the IMEI of a phone, or possessing equipment that can change it, is considered an offence under some circumstances. A bill was introduced in the United States by Senator
Chuck Schumer Charles Ellis Schumer ( ; born November 23, 1950) is an American politician serving as the Seniority in the United States Senate, senior United States Senate, United States senator from New York (state), New York, a seat he has held since 1999. ...
in 2012 that would have made the changing of an IMEI illegal, but the bill was not enacted. IMEI blocking is not the only way to fight phone theft. Instead, mobile operators are encouraged to take measures such as immediate suspension of service and replacement of SIM cards in case of loss or theft. The existence of a formally allocated IMEI number range for a GSM terminal does not mean that the terminal is approved or complies with regulatory requirements. The linkage between regulatory approval and IMEI allocation was removed in April 2000, with the introduction of the European R&TTE Directive. Since that date, IMEIs have been allocated by BABT (or one of several other regional administrators acting on behalf of the GSM Association) to legitimate GSM terminal manufacturers without the need to provide evidence of approval.


Blocklists of stolen devices

When someone has their mobile equipment stolen or lost, they can ask their service provider to block the phone from their network, and the operator may do so, especially if required by law. If the local operator maintains an Equipment Identity Register (EIR), it adds the device IMEI to it. Optionally, it also adds the IMEI to shared registries, such as the Central Equipment Identity Register (CEIR), which blocklists the device with other operators that use the CEIR. This blocklisting makes the device unusable on any operator that uses the CEIR, which makes mobile equipment theft pointless, except for parts. To make blocklisting effective, the IMEI number is supposed to be difficult to change. However, a phone's IMEI may be easy to change with special tools. In addition, IMEI is an un-authenticated mobile identifier (as opposed to IMSI, which is routinely authenticated by home and serving mobile networks.) Using a spoofed IMEI can thwart some efforts to track handsets, or target handsets for lawful intercept. Australia was the first nation to implement IMEI blocking across all GSM networks, in 2003. In Australia the Electronic Information Exchange (EIE) Administration Node provides a blocked IMEI lookup service for Australian customers. In the UK, a voluntary charter operated by the mobile networks ensures that any operator's blocklisting of a handset is communicated to the CEIR and subsequently to all other networks. This ensures that the handset is quickly unusable for calls, at most within 48 hours. Some UK Police forces, including the Metropolitan Police Service, actively check IMEI numbers of phones found involved in crime. In New Zealand, the NZ Telecommunications Forum Inc provides a blocked IMEI lookup service for New Zealand consumers. The service allows up to three lookups per day and checks against a database that is updated daily by the three major mobile network operators. A blocked IMEI cannot be connected to any of these three operators. In Latvia the SIA "Datorikas institūts DIVI" provides a blocked IMEI lookup service for checks against a database that is updated by all major mobile network operators in Latvia. In some countries, such blocklisting is not customary. In 2012, major network companies in the United States, under government pressure, committed to introducing a blocklisting service, but it's not clear whether it will interoperate with the CEIR. GSM carriers AT&T and T-Mobile began blocking newly reported IMEIs in November 2012. Thefts reported prior to November 2012 were not added to the database. The CTIA refers users to websites a
www.stolenphonechecker.org
ref name="CTIAundated"/> an
the GSMA
ref name="CTIAundated"/> where consumers can check whether a smartphone has been reported as lost or stolen to its member carriers. The relationship between the former and any national or international IMEI blocklists is unclear. It is unclear whether local barring of IMEI has any positive effect, as it may result in international smuggling of stolen phones.


Limitations

IMEIs can sometimes be removed from a blocklist, depending on local arrangements. This would typically include quoting a password chosen at the time of blocklisting.


Law enforcement and intelligence use

Law enforcement and intelligence services can use an IMEI number as input for tracking devices that are able to locate a cell phone with an accuracy of a few meters. Saudi Arabian government agencies have reportedly used IMEI numbers retrieved from cell phone packaging to locate and detain women who fled Saudi Arabia's patriarchal society in other countries. An IMEI number retrieved from the remnants of a Nokia 5110 was used to trace and identify the perpetrators behind the 2002 Bali bombings.


Allowlists

Some countries use allowlists instead of blocklists for IMEI numbers, so that any mobile phone needs to be legally registered in the country in order to be able to access mobile networks of the country, with possible exceptions for international roaming and a grace period for registering. These include Chile, Turkey, Azerbaijan, Colombia, and Nepal. Other countries that have adopted some form of mandatory IMEI registration include India, Pakistan, Indonesia, Cambodia, Thailand, Iran, Nigeria, Ecuador, Ukraine, Lebanon, and Kenya. Prior to their merger with
T-Mobile T-Mobile is the brand of telecommunications by Deutsche Telekom Deutsche Telekom AG (, ; often just Telekom, DTAG or DT; stylised as ·T·) is a partially state-owned German telecommunications company headquartered in Bonn and the largest telec ...
, Sprint in the United States used an allowlist of devices where a user had to register their IMEI and SIM card before a LTE-capable device could be used, despite no US law mandating it. If a user changed their device, they had to register their new IMEI and SIM card. This isn't the case with other CDMA carriers like
Verizon Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
which only used allowlists for 3G (which was a requirement for CDMA) and T-Mobile does not use an allowlist but instead a blocklist, including for former Sprint customers.
AT&T AT&T Inc., an abbreviation for its predecessor's former name, the American Telephone and Telegraph Company, is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the w ...
and Telus also use an allowlist for VoLTE access, but does not require IMEI registration by customers. Instead, phone manufacturers are required to register their devices into AT&T's or Telus' databases, and customers are able to freely swap SIM cards or eSIMs into any allowlisted device. This has the problem that imported phones and some non-imported phones such as older OnePlus models or select
CDMA Code-division multiple access (CDMA) is a channel access method used by various radio communication technologies. CDMA is an example of multiple access, where several transmitters can send information simultaneously over a single communicatio ...
-capable LTE devices (including models sold on
Verizon Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
or Sprint) will not work for voice calls even if they have the LTE/5G bands for AT&T and Telus and support VoLTE on competitors or via VoLTE roaming.


Structure of the IMEI and IMEISV (IMEI software version)

The IMEI (15 decimal digits: 14 digits plus a check digit) or IMEISV (16 decimal digits: 14 digits plus two software version digits) includes information on the origin, model, and serial number of the device. The structure of the IMEI/SV is specified i
3GPP TS 23.003
The model and origin comprise the initial 8-digit portion of the IMEI/SV, known as the Type Allocation Code (TAC). The remainder of the IMEI is manufacturer-defined, with a Luhn check digit at the end. For the IMEI format prior to 2003, the GSMA guideline was to have this Check Digit always transmitted to the network as zero. This guideline seems to have disappeared for the format valid from 2003 onwards.GSM Association
IMEI Allocation and Approval Guidelines
, Version 5.0, 2010-09-01, chapter 2.1.5 vs. D.1.6
, the format of the IMEI is ''AA-BBBBBB-CCCCCC-D'', although it may not always be displayed this way. The IMEISV does not have the Luhn check digit but instead has two digits for the Software Version Number (SVN), making the format ''AA-BBBBBB-CCCCCC-EE'' Prior to 2002, the TAC was six digits and followed by a two-digit Final Assembly Code (FAC), which was a manufacturer-specific code indicating the location of the device's construction. From January 1, 2003 until April 1, 2004, the FAC for all phones was 00. After April 1, 2004, the Final Assembly Code ceased to exist and the Type Allocation Code increased to eight digits in length. In any of the above cases, the first two digits of the TAC are the Reporting Body Identifier, which identifies the GSMA-approved group that allocated the TAC. The RBI numbers are allocated by the Global Decimal Administrator. IMEI numbers being decimal helps distinguish them from an
MEID A mobile equipment identifier (MEID) is a globally unique number identifying a physical piece of CDMA2000 mobile station equipment. The number format is defined by th3GPP2 report S.R0048but in practical terms, it can be seen as an International M ...
, which is hexadecimal and always has 0xA0 or larger as the first two hexadecimal digits. For example, the old style IMEI code 35-209900-176148-1 or IMEISV code 35-209900-176148-23 tells us the following:
TAC: 35-2099 - issued by the BABT (code 35) with the allocation number 2099
FAC: 00 - indicating the phone was made during the transition period when FACs were being removed.
SNR: 176148 - uniquely identifying a unit of this model
CD: 1 so it is a GSM Phase 2 or higher
SVN: 23 - The "software version number" identifying the revision of the software installed on the phone. 99 is reserved.
By contrast, the new style IMEI code 49-015420-323751-8 has an 8-digit TAC of 49-015420. The CDMA Mobile Equipment Identifier uses the same basic format as the IMEI but gives more flexibility in allocation sizes and usage.


Check digit computation

The last number of the IMEI is a
check digit A check digit is a form of redundancy check used for Error detection and correction, error detection on identification numbers, such as bank account numbers, which are used in an application where they will at least sometimes be input manually. It ...
, calculated using the
Luhn algorithm The Luhn algorithm or Luhn formula (creator: IBM scientist Hans Peter Luhn), also known as the " modulus 10" or "mod 10" algorithm, is a simple check digit formula used to validate a variety of identification numbers. The algorithm is in the pub ...
, as defined in th
IMEI Allocation and Approval Guidelines
The Check Digit shall be calculated according to
Luhn formula The Luhn algorithm or Luhn formula (creator: IBM scientist Hans Peter Luhn), also known as the " modulus 10" or "mod 10" algorithm, is a simple check digit formula used to validate a variety of identification numbers. The algorithm is in the pub ...
(ISO/IEC 7812). (See GSM 02.16 / 3GPP 22.016). The Check Digit is a function of all other digits in the IMEI. The Software Version Number (SVN) of a mobile is not included in the calculation. The purpose of the Check Digit is to help guard against the possibility of incorrect entries to the CEIR and EIR equipment. The presentation of the Check Digit both electronically and in printed form on the label and packaging is very important. Logistics (using bar-code reader) and EIR/CEIR administration cannot use the Check Digit unless it is printed outside of the packaging, and on the ME IMEI/Type Accreditation label. The check digit is not transmitted over the radio interface, nor is it stored in the EIR database at any point. Therefore, all references to the last three or six digits of an IMEI refer to the actual IMEI number, to which the check digit does not belong.
The check digit is validated in three steps: # Starting from the right, double every other digit (e.g., 7 → 14). # Sum the digits (e.g., 14 → 1 + 4). # Check if the sum is divisible by 10. Conversely, one can calculate the IMEI by choosing the check digit that would give a sum divisible by 10. For the example IMEI 49015420323751''?'', To make the sum divisible by 10, we set = 8, so the complete IMEI becomes 490154203237518.


Usage on satellite phone networks

The
Broadband Global Area Network The Broadband Global Area Network (BGAN) is a global satellite network with telephony owned by Inmarsat using portable terminals. The terminals are normally used to connect a laptop computer to broadband Internet in remote locations, although as ...
(BGAN),
Iridium Iridium is a chemical element; it has the symbol Ir and atomic number 77. This very hard, brittle, silvery-white transition metal of the platinum group, is considered the second-densest naturally occurring metal (after osmium) with a density ...
and
Thuraya Thuraya (, Gulf Arabic pron.: ; from the Arabic name for the Pleiades, ''Thurayya'') is a United Arab Emirates-based regional mobile-satellite service (MSS) provider. The company operates two geosynchronous satellites and provides telecommunic ...
satellite phone A satellite telephone, satellite phone or satphone is a type of mobile phone that connects to other phones or the telephone network by radio link through satellites orbiting the Earth instead of terrestrial cell sites, as cellphones do. Therefo ...
networks all use IMEI numbers on their transceiver units as well as SIM cards in much the same way as GSM phones do. The Iridium 9601 modem relies solely on its IMEI number for identification and uses no SIM card; however, Iridium is a proprietary network and the device is incompatible with terrestrial GSM networks.


See also

*
International mobile subscriber identity The international mobile subscriber identity (IMSI; ) is a number that uniquely identifies every user of a cellular network. It is stored as a field and is sent by the mobile device to the network. It is also used for acquiring other details of t ...
* Mobile equipment identifier *
Mobile phone A mobile phone or cell phone is a portable telephone that allows users to make and receive calls over a radio frequency link while moving within a designated telephone service area, unlike fixed-location phones ( landline phones). This rad ...
*
SIM lock A SIM lock, simlock, network lock, carrier lock or (master) subsidy lock is a technical restriction built into GSM and CDMA mobile phones by mobile phone manufacturers for use by service providers to restrict the use of these phones to specific co ...


References

{{reflist, 2 Mobile telecommunications Checksum algorithms Mobile telecommunications standards Unique identifiers