1     Scope           
 2     References 
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms              
 5     Conventions             
 6     Overview of anti-theft measures     
        6.1     Anti-theft measures   
        6.2     High-level requirements for anti-theft measures           
 7     Functional architecture for mobile phone anti-theft measures           
        7.1     Threats for mobile phone anti-theft measures 
        7.2     Key security functions for mobile phone anti-theft measures   
       7.3      Functional architecture for mobile device anti-theft measures 
        7.4     Mechanisms for mobile phone anti-theft measures     
 8     Functional security requirements    
        8.1     Overview        
        8.2     Functional security requirements for the mobile device owner               
        8.3     Functional security requirements for the authorized server      
        8.4     Functional security requirements for the stolen mobile device 
        8.5     Functional security requirements for the backup server             
Appendix I – General requirements for anti-theft measures     
        I.1     Device owner 
        I.2     Server               
        I.3     Mobile device 
        I.4     Device manufacture    
Appendix II – Additional security requirements for anti-theft
measures     
       II.1     Requirements for backup server            
Appendix III –     
      III.1     Threats between the Anti-theft specific threats mobile device
owner and the authorized server     
      III.2     Threats between the authorized server and the anti-theft
disabling agent           
      III.3     Threats between the anti-theft disabling agent and the backup
server  
Appendix IV – Scenario for anti-theft measures     
       IV.1     Types of disabling features of mobile device   
       IV.2     Enabling for stolen/lost mobile device               
       IV.3     Disabling scenario for stolen/lost mobile device            
Appendix V  TLS profile for anti-theft measures     
        V.1     TLS protocol requirement       
        V.2     TLS cipher suites for interoperability   
        V.3     Digital certificates       
Appendix VI – Overview of OMA device management     
       VI.1     OMA device management specification            
Bibliography