This document helps device manufacturers develop a comprehensive security architecture that facilitates the deployment of a range of solutions to protect the platform on which the IMEI mechanism is stored.
Audience: Technical security practitioner
Resource technology specifics: User equipment
Resource type: Guideline
Resource enforcement: Voluntary
Resource certification type: Self-assessment
Key Benefits |
|