Extensive measures have been taken, when specifying the GSM system, to substantially increase security with regard to both call theft and equipment theft
Unique number coded into it when it is manufactured, can be checked against a database every time the mobile makes a call to validate the actual equipment
Uses a secret number called Kc, set to a different value for each call, together with the hyper-frame counter in a process involving repeated re-arrangement and modulo 2 addition of the bits
The MSIN part of the SUPI gets concealed by the protection scheme while the home network identifier i.e. MCC/MNC gets transmitted in plain-text
It uses an ECIES-based protection scheme with the public key of the Home Network that was securely provisioned to the USIM during the USIM registration
1. Upon receiving Registration Request message of type "initial registration" or "mobility registration update" from a UE, the AMF shall send a new 5G-GUTI to the UE in Registration Accept message
2. Upon receiving Registration Request message of type "periodic registration update" from a UE, the AMF should send a new 5G-GUTI to the UE in Registration Accept message
3. Upon receiving network triggered Service Request message from the UE (i.e., Service Request message sent by the UE in response to a Paging message), the AMF shall use a UE Configuration Update procedure to send a new 5G-GUTI to the UE
It identifies one or more AMF(s). When the GUAMI identifies only one AMF, the 5G-TMSI identifies the UE uniquely within the AMF. However, when AMF assigns a 5G-GUTI to the UE with a GUAMI value used by more than one AMF, the AMF shall ensure that the 5G-TMSI value used within the assigned 5G-GUTI is not already in use by the other AMF(s) sharing that GUAMI value.