SlideShare a Scribd company logo
1 of 29
Download to read offline
1
eSIM Deep Dive
Hossein Yavari
@senatelecom
Ref: airalo
Ref: airalo
SIM Functions
4
• SIM is responsible for:
– Connection between mobile device and
provider
– Storage (IMSI, Network data, Encryption
data and etc.)
© All Rights Reserved
5
SIM Card
Evolution
Embedded SIM: eSIM or eUICC
© All Rights Reserved
6
“Although the role of the SIM itself is not changing, the GSMA has defined a radical
new way to load it into devices. Now the SIM may be securely downloaded into a
‘Secure Element’ that can be permanently embedded inside any type of device.”
© All Rights Reserved
7
eSIM
Key Characteristics
• eSIM is:
– hardware based
– Non-removable
– Or like the ordinary removable SIM Card
• Remote Provisioning:
– SIM profile is transferred over the air (OTA)
to the device
• eSIM provides easier switch between
operators
© All Rights Reserved
8
eSIM
Key Characteristics
(Cont.)
• Improvement in customer experience
© All Rights Reserved
Stakeholders
Benefits
9
• Operators:
– Opens up new market opportunities
– Reduced costs in handling M2M SIM products
– Retains industry leading security levels
– Minimal impact to existing systems and network
infrastructure
– Low integration and testing costs
© All Rights Reserved
Stakeholders
Benefits
(Cont.)
10
• SIM Suppliers:
– Opens up wider M2M market opportunities by
providing Embedded SIM infrastructure and
services on a mass market basis
– Add value and flexibility to current SIM products
© All Rights Reserved
Stakeholders
Benefits
(Cont.)
11
• Business Customers:
– Business opportunities from new M2M connected
services including new deployment models
– Remote service activation enables the up-sell of
connected options after initial sale
– Connectivity management will be more flexible
and cost effective
© All Rights Reserved
Stakeholders
Benefits
(Cont.)
12
• End Consumers:
– Improved customer experience, products will
work ‘out of the box’
– Lower cost connected products
– Increase in number of valuable connected services
© All Rights Reserved
Stakeholders
Benefits
(Cont.)
13
• M2M Product Manufacturers:
– Opens up new M2M market opportunities
– Single Stock Keeping Unit at point of manufacture
– Enables flexible global product distribution
– Selection of operator subscription is performed on
first switch on in destination country
– Allows change of operator during the product
lifecycle
– Improved product reliability and longevity through
hermetic sealing -as there is no need to change
the physical SIM
© All Rights Reserved
Consumer
or
M2M?
15
eSIM
Solutions
© All Rights Reserved
• The GSMA has created solutions suited to different
types of channels:
– Consumer solution: for the ‘direct to consumer’
channel, this solution is required where the end user
has direct choice of the operator supplying
connectivity.
– M2M solution: for the ‘business to business to
consumer’ channels, this solution serves the needs
of business to business customers, specifically in the
Internet of Things (IoT) market.
16
• Consumer devices: like Cell Phones, watches or
other wearables
• Connected devices or M2M communications:
such as IoT / IoE
© All Rights Reserved
eSIM
Solutions
(Cont.)Pull
Model
Push
Model
17
eSIM
Players!
Involved
Elements
18
• eUICC:
– Functionally identical to a traditional SIM
– At manufacture will have a ‘provisioning profile’
assigned with secret keys that allows the
associated subscription manager to download and
manage ‘operational profiles’ on the eUICC
– The technical specification can accommodate both
an initial declaration of the MNO in the eUICC, as
well as the selection of a new MNO later.
© All Rights Reserved
Involved
Elements
(Cont.)
19
• Subscription Manager:
– Generating SIM profiles in real-time
– Management and execution of MNO policy
– Secure routing profiles to the eUICC
© All Rights Reserved
Involved
Elements
(Cont.)
20
• MNO:
– Uses subscription manager to manage profiles
– Maximum re-use of existing provisioning interfaces
and processes
© All Rights Reserved
21
RSP
Remote SIM
Provisioning
22© All Rights Reserved
RSP
Consumer Architecture
23© All Rights Reserved
RSP
Consumer Architecture
Elements
24
• SM-DP+:
- Profile storage (securely store MNO SIM profiles)
- Manage profiles (Download, Enable or Disable
profiles)
• SM-DS:
- Discovery server for newly available profiles for
each consumer
• LPA
- The Local Profile Assistant is a set of functions in
the device responsible for providing the capability
to download encrypted Profiles to the eUICC.
© All Rights Reserved
RSP
M2M Architecture
25© All Rights Reserved
RSP
M2M Architecture
Elements
26
• SM-DP:
- Profile storage (securely store MNO SIM
profiles)
• SM-SR:
- Securing communication channel to eUICC
- Manage profiles (Download, Enable or Disable
profiles)
• OTA Gateway*:
- SMS gateway for secure over the air
communication to eUICC
© All Rights Reserved
RSP
M2M vs Consumer
27© All Rights Reserved
M2M Solution Consumer Solution
Push Model / server-driven
option
Pull Model / client-driven option
Separated roles of SM-DP and
SM-SR
Profile management
operations can be run only
from the back-end
infrastructure side
Data Processing and Secure
Routing consolidated in SM-DP+.
SM-DS as an optional feature
Profile management is initiated
from the local device side
Consumer
RSP Initiation
28© All Rights Reserved
• QR activation, arguably the most popular option, it’s 2D
barcode format, it contains a Matching ID number and SM-
DP+ address, which are used for reaching a dedicated SM-
DP+ server and downloading a dedicated eSIM profile.
• Default SM-DP+ address, with an eUICC pre-provisioned with
operator’s SM-DP+ address, mostly useful with the operator
subsidized mobile phones market. It is a fully automatic
activation and doesn’t require any interaction from the end-
user except turning on the device itself.
• SM-DS activation, which is useful in situations when an end-
user purchases a mobile device and eSIM subscription
separately.
Hope to help you!

More Related Content

What's hot

Beginners: UICC & SIM
Beginners: UICC & SIMBeginners: UICC & SIM
Beginners: UICC & SIM3G4G
 
Creating a smarter world with eSIM
Creating a smarter world with eSIMCreating a smarter world with eSIM
Creating a smarter world with eSIMJT IoT
 
IoT eSIM Test Bed
IoT eSIM Test BedIoT eSIM Test Bed
IoT eSIM Test BedCellnetrix
 
End to end ussd implementation
End to end ussd implementationEnd to end ussd implementation
End to end ussd implementationLalit Gupta
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationWaldir R. Pires Jr
 
Evolution from 3_g_to_4g_and_beyond_5g
Evolution from 3_g_to_4g_and_beyond_5gEvolution from 3_g_to_4g_and_beyond_5g
Evolution from 3_g_to_4g_and_beyond_5gnaresh5b8
 
Offering Rich Communications Services (RCS) as a Multimedia Application to co...
Offering Rich Communications Services (RCS) as a Multimedia Application to co...Offering Rich Communications Services (RCS) as a Multimedia Application to co...
Offering Rich Communications Services (RCS) as a Multimedia Application to co...Ali Saghaeian
 
5G and V2X Automotive Slicing
5G and V2X Automotive Slicing5G and V2X Automotive Slicing
5G and V2X Automotive SlicingMarie-Paule Odini
 
IP Multimedia Subsystems Overview - My Training on IMS
IP Multimedia Subsystems Overview - My Training on IMSIP Multimedia Subsystems Overview - My Training on IMS
IP Multimedia Subsystems Overview - My Training on IMSInam Khosa
 
B3 eigrp sp
B3 eigrp spB3 eigrp sp
B3 eigrp sp1 2d
 
5 g core network and the cloud - A standards perspective
5 g core network and the cloud - A standards perspective5 g core network and the cloud - A standards perspective
5 g core network and the cloud - A standards perspectiveSridhar Bhaskaran
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Canada
 
In‐Vehicle Networking: a Survey and Look Forward
In‐Vehicle Networking: a Survey and Look ForwardIn‐Vehicle Networking: a Survey and Look Forward
In‐Vehicle Networking: a Survey and Look ForwardRealTime-at-Work (RTaW)
 
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 iParanoid: an IMSI Catcher - Stingray Intrusion Detection System iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
iParanoid: an IMSI Catcher - Stingray Intrusion Detection SystemLuca Bongiorni
 
4G LTE Man in the Middle Attack with a Hacked Femtocell
4G LTE Man in the Middle Attack with a Hacked Femtocell4G LTE Man in the Middle Attack with a Hacked Femtocell
4G LTE Man in the Middle Attack with a Hacked Femtocell3G4G
 

What's hot (20)

Beginners: UICC & SIM
Beginners: UICC & SIMBeginners: UICC & SIM
Beginners: UICC & SIM
 
Introduction to SIM and USIM
Introduction to SIM and USIMIntroduction to SIM and USIM
Introduction to SIM and USIM
 
Creating a smarter world with eSIM
Creating a smarter world with eSIMCreating a smarter world with eSIM
Creating a smarter world with eSIM
 
IoT eSIM Test Bed
IoT eSIM Test BedIoT eSIM Test Bed
IoT eSIM Test Bed
 
End to end ussd implementation
End to end ussd implementationEnd to end ussd implementation
End to end ussd implementation
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentation
 
Evolution from 3_g_to_4g_and_beyond_5g
Evolution from 3_g_to_4g_and_beyond_5gEvolution from 3_g_to_4g_and_beyond_5g
Evolution from 3_g_to_4g_and_beyond_5g
 
Offering Rich Communications Services (RCS) as a Multimedia Application to co...
Offering Rich Communications Services (RCS) as a Multimedia Application to co...Offering Rich Communications Services (RCS) as a Multimedia Application to co...
Offering Rich Communications Services (RCS) as a Multimedia Application to co...
 
5G and V2X Automotive Slicing
5G and V2X Automotive Slicing5G and V2X Automotive Slicing
5G and V2X Automotive Slicing
 
SIM Initialization
SIM InitializationSIM Initialization
SIM Initialization
 
IP Multimedia Subsystems Overview - My Training on IMS
IP Multimedia Subsystems Overview - My Training on IMSIP Multimedia Subsystems Overview - My Training on IMS
IP Multimedia Subsystems Overview - My Training on IMS
 
What is IVI (In Vehicle Infotainment)?
What is IVI (In Vehicle Infotainment)?What is IVI (In Vehicle Infotainment)?
What is IVI (In Vehicle Infotainment)?
 
B3 eigrp sp
B3 eigrp spB3 eigrp sp
B3 eigrp sp
 
5 g core network and the cloud - A standards perspective
5 g core network and the cloud - A standards perspective5 g core network and the cloud - A standards perspective
5 g core network and the cloud - A standards perspective
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying IT
 
In‐Vehicle Networking: a Survey and Look Forward
In‐Vehicle Networking: a Survey and Look ForwardIn‐Vehicle Networking: a Survey and Look Forward
In‐Vehicle Networking: a Survey and Look Forward
 
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 iParanoid: an IMSI Catcher - Stingray Intrusion Detection System iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 
4G LTE Man in the Middle Attack with a Hacked Femtocell
4G LTE Man in the Middle Attack with a Hacked Femtocell4G LTE Man in the Middle Attack with a Hacked Femtocell
4G LTE Man in the Middle Attack with a Hacked Femtocell
 
VoLTE flows - basics
VoLTE flows - basicsVoLTE flows - basics
VoLTE flows - basics
 
IMS presentation
IMS presentationIMS presentation
IMS presentation
 

Similar to eSIM Deep Dive

Introduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & GatewaysIntroduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & Gatewaystawi123
 
Embedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applicationsEmbedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applicationsM2M Alliance e.V.
 
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystWhat OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystmfrancis
 
Podsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_designPodsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_designpodsystem1
 
Mobile and SIM Forensics
Mobile and SIM ForensicsMobile and SIM Forensics
Mobile and SIM ForensicsYugal Pathak
 
 Connected Living - Embedded SIM & M2M
 Connected Living - Embedded SIM & M2M Connected Living - Embedded SIM & M2M
 Connected Living - Embedded SIM & M2MTelefónica IoT
 
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...Alan Quayle
 
From eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the ManufacturingFrom eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the ManufacturingSoracom Global, Inc.
 
Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix
 
SIMATIC manager سيماتك منجر سيمنز
SIMATIC manager سيماتك منجر سيمنزSIMATIC manager سيماتك منجر سيمنز
SIMATIC manager سيماتك منجر سيمنزEssosElectronic
 
Cellnetrix brochure 2013
Cellnetrix brochure 2013Cellnetrix brochure 2013
Cellnetrix brochure 2013Vladimir Nagin
 
The T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of TrustThe T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of TrustRivetz
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Thingscumulocity
 
CellSIM OS Overview 1.0
CellSIM OS Overview 1.0CellSIM OS Overview 1.0
CellSIM OS Overview 1.0Vladimir Nagin
 
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies
 
walker_embeddedsims.pdf
walker_embeddedsims.pdfwalker_embeddedsims.pdf
walker_embeddedsims.pdfamazon4it
 
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V IzzoKeynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzomfrancis
 
61850IMU Substation Recorder
61850IMU Substation Recorder61850IMU Substation Recorder
61850IMU Substation RecorderGE Grid Solutions
 
Presentation SIM CARD (GSM)
Presentation SIM CARD (GSM)Presentation SIM CARD (GSM)
Presentation SIM CARD (GSM)Ekansh Agarwal
 

Similar to eSIM Deep Dive (20)

Introduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & GatewaysIntroduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & Gateways
 
Embedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applicationsEmbedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applications
 
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystWhat OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
 
Podsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_designPodsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_design
 
Mobile and SIM Forensics
Mobile and SIM ForensicsMobile and SIM Forensics
Mobile and SIM Forensics
 
 Connected Living - Embedded SIM & M2M
 Connected Living - Embedded SIM & M2M Connected Living - Embedded SIM & M2M
 Connected Living - Embedded SIM & M2M
 
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
 
From eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the ManufacturingFrom eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the Manufacturing
 
Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix company brochure 2012
Cellnetrix company brochure 2012
 
SIMATIC manager سيماتك منجر سيمنز
SIMATIC manager سيماتك منجر سيمنزSIMATIC manager سيماتك منجر سيمنز
SIMATIC manager سيماتك منجر سيمنز
 
Cellnetrix brochure 2013
Cellnetrix brochure 2013Cellnetrix brochure 2013
Cellnetrix brochure 2013
 
The T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of TrustThe T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of Trust
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
CellSIM OS Overview 1.0
CellSIM OS Overview 1.0CellSIM OS Overview 1.0
CellSIM OS Overview 1.0
 
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
 
Seminar
SeminarSeminar
Seminar
 
walker_embeddedsims.pdf
walker_embeddedsims.pdfwalker_embeddedsims.pdf
walker_embeddedsims.pdf
 
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V IzzoKeynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
 
61850IMU Substation Recorder
61850IMU Substation Recorder61850IMU Substation Recorder
61850IMU Substation Recorder
 
Presentation SIM CARD (GSM)
Presentation SIM CARD (GSM)Presentation SIM CARD (GSM)
Presentation SIM CARD (GSM)
 

More from Hossein Yavari

SIPREC RTPEngine Media Forking
SIPREC RTPEngine Media ForkingSIPREC RTPEngine Media Forking
SIPREC RTPEngine Media ForkingHossein Yavari
 
Desjardins Data Breach
Desjardins Data BreachDesjardins Data Breach
Desjardins Data BreachHossein Yavari
 
Introduction to Metasploit
Introduction to MetasploitIntroduction to Metasploit
Introduction to MetasploitHossein Yavari
 
Which IT Certification is Better for You?
Which IT Certification is Better for You?Which IT Certification is Better for You?
Which IT Certification is Better for You?Hossein Yavari
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static AnalysisHossein Yavari
 
Creativity and Role of the Leaders
Creativity and Role of the LeadersCreativity and Role of the Leaders
Creativity and Role of the LeadersHossein Yavari
 
Yeastar Technical Training Course
Yeastar Technical Training CourseYeastar Technical Training Course
Yeastar Technical Training CourseHossein Yavari
 
FreePBX Disaster Recovery
FreePBX Disaster RecoveryFreePBX Disaster Recovery
FreePBX Disaster RecoveryHossein Yavari
 
LTE Architecture Overview
LTE Architecture OverviewLTE Architecture Overview
LTE Architecture OverviewHossein Yavari
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETERHossein Yavari
 
Introduction to SS7- Part 2
Introduction to SS7- Part 2Introduction to SS7- Part 2
Introduction to SS7- Part 2Hossein Yavari
 

More from Hossein Yavari (20)

What is Matroska?
What is Matroska?What is Matroska?
What is Matroska?
 
SIPREC RTPEngine Media Forking
SIPREC RTPEngine Media ForkingSIPREC RTPEngine Media Forking
SIPREC RTPEngine Media Forking
 
Windows Forensics
Windows ForensicsWindows Forensics
Windows Forensics
 
SIP over TLS
SIP over TLSSIP over TLS
SIP over TLS
 
Desjardins Data Breach
Desjardins Data BreachDesjardins Data Breach
Desjardins Data Breach
 
Introduction to Metasploit
Introduction to MetasploitIntroduction to Metasploit
Introduction to Metasploit
 
Which IT Certification is Better for You?
Which IT Certification is Better for You?Which IT Certification is Better for You?
Which IT Certification is Better for You?
 
Disassembly Using IDA
Disassembly Using IDADisassembly Using IDA
Disassembly Using IDA
 
Introduction to Snort
Introduction to SnortIntroduction to Snort
Introduction to Snort
 
DLL Injection
DLL InjectionDLL Injection
DLL Injection
 
SQL Injection in JAVA
SQL Injection in JAVASQL Injection in JAVA
SQL Injection in JAVA
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static Analysis
 
Creativity and Role of the Leaders
Creativity and Role of the LeadersCreativity and Role of the Leaders
Creativity and Role of the Leaders
 
IPsec for IMS
IPsec for IMSIPsec for IMS
IPsec for IMS
 
Yeastar Technical Training Course
Yeastar Technical Training CourseYeastar Technical Training Course
Yeastar Technical Training Course
 
SENA Cloud UC
SENA Cloud UCSENA Cloud UC
SENA Cloud UC
 
FreePBX Disaster Recovery
FreePBX Disaster RecoveryFreePBX Disaster Recovery
FreePBX Disaster Recovery
 
LTE Architecture Overview
LTE Architecture OverviewLTE Architecture Overview
LTE Architecture Overview
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETER
 
Introduction to SS7- Part 2
Introduction to SS7- Part 2Introduction to SS7- Part 2
Introduction to SS7- Part 2
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

eSIM Deep Dive

  • 1. 1 eSIM Deep Dive Hossein Yavari @senatelecom
  • 4. SIM Functions 4 • SIM is responsible for: – Connection between mobile device and provider – Storage (IMSI, Network data, Encryption data and etc.) © All Rights Reserved
  • 5. 5 SIM Card Evolution Embedded SIM: eSIM or eUICC © All Rights Reserved
  • 6. 6 “Although the role of the SIM itself is not changing, the GSMA has defined a radical new way to load it into devices. Now the SIM may be securely downloaded into a ‘Secure Element’ that can be permanently embedded inside any type of device.” © All Rights Reserved
  • 7. 7 eSIM Key Characteristics • eSIM is: – hardware based – Non-removable – Or like the ordinary removable SIM Card • Remote Provisioning: – SIM profile is transferred over the air (OTA) to the device • eSIM provides easier switch between operators © All Rights Reserved
  • 8. 8 eSIM Key Characteristics (Cont.) • Improvement in customer experience © All Rights Reserved
  • 9. Stakeholders Benefits 9 • Operators: – Opens up new market opportunities – Reduced costs in handling M2M SIM products – Retains industry leading security levels – Minimal impact to existing systems and network infrastructure – Low integration and testing costs © All Rights Reserved
  • 10. Stakeholders Benefits (Cont.) 10 • SIM Suppliers: – Opens up wider M2M market opportunities by providing Embedded SIM infrastructure and services on a mass market basis – Add value and flexibility to current SIM products © All Rights Reserved
  • 11. Stakeholders Benefits (Cont.) 11 • Business Customers: – Business opportunities from new M2M connected services including new deployment models – Remote service activation enables the up-sell of connected options after initial sale – Connectivity management will be more flexible and cost effective © All Rights Reserved
  • 12. Stakeholders Benefits (Cont.) 12 • End Consumers: – Improved customer experience, products will work ‘out of the box’ – Lower cost connected products – Increase in number of valuable connected services © All Rights Reserved
  • 13. Stakeholders Benefits (Cont.) 13 • M2M Product Manufacturers: – Opens up new M2M market opportunities – Single Stock Keeping Unit at point of manufacture – Enables flexible global product distribution – Selection of operator subscription is performed on first switch on in destination country – Allows change of operator during the product lifecycle – Improved product reliability and longevity through hermetic sealing -as there is no need to change the physical SIM © All Rights Reserved
  • 15. 15 eSIM Solutions © All Rights Reserved • The GSMA has created solutions suited to different types of channels: – Consumer solution: for the ‘direct to consumer’ channel, this solution is required where the end user has direct choice of the operator supplying connectivity. – M2M solution: for the ‘business to business to consumer’ channels, this solution serves the needs of business to business customers, specifically in the Internet of Things (IoT) market.
  • 16. 16 • Consumer devices: like Cell Phones, watches or other wearables • Connected devices or M2M communications: such as IoT / IoE © All Rights Reserved eSIM Solutions (Cont.)Pull Model Push Model
  • 18. Involved Elements 18 • eUICC: – Functionally identical to a traditional SIM – At manufacture will have a ‘provisioning profile’ assigned with secret keys that allows the associated subscription manager to download and manage ‘operational profiles’ on the eUICC – The technical specification can accommodate both an initial declaration of the MNO in the eUICC, as well as the selection of a new MNO later. © All Rights Reserved
  • 19. Involved Elements (Cont.) 19 • Subscription Manager: – Generating SIM profiles in real-time – Management and execution of MNO policy – Secure routing profiles to the eUICC © All Rights Reserved
  • 20. Involved Elements (Cont.) 20 • MNO: – Uses subscription manager to manage profiles – Maximum re-use of existing provisioning interfaces and processes © All Rights Reserved
  • 24. RSP Consumer Architecture Elements 24 • SM-DP+: - Profile storage (securely store MNO SIM profiles) - Manage profiles (Download, Enable or Disable profiles) • SM-DS: - Discovery server for newly available profiles for each consumer • LPA - The Local Profile Assistant is a set of functions in the device responsible for providing the capability to download encrypted Profiles to the eUICC. © All Rights Reserved
  • 25. RSP M2M Architecture 25© All Rights Reserved
  • 26. RSP M2M Architecture Elements 26 • SM-DP: - Profile storage (securely store MNO SIM profiles) • SM-SR: - Securing communication channel to eUICC - Manage profiles (Download, Enable or Disable profiles) • OTA Gateway*: - SMS gateway for secure over the air communication to eUICC © All Rights Reserved
  • 27. RSP M2M vs Consumer 27© All Rights Reserved M2M Solution Consumer Solution Push Model / server-driven option Pull Model / client-driven option Separated roles of SM-DP and SM-SR Profile management operations can be run only from the back-end infrastructure side Data Processing and Secure Routing consolidated in SM-DP+. SM-DS as an optional feature Profile management is initiated from the local device side
  • 28. Consumer RSP Initiation 28© All Rights Reserved • QR activation, arguably the most popular option, it’s 2D barcode format, it contains a Matching ID number and SM- DP+ address, which are used for reaching a dedicated SM- DP+ server and downloading a dedicated eSIM profile. • Default SM-DP+ address, with an eUICC pre-provisioned with operator’s SM-DP+ address, mostly useful with the operator subsidized mobile phones market. It is a fully automatic activation and doesn’t require any interaction from the end- user except turning on the device itself. • SM-DS activation, which is useful in situations when an end- user purchases a mobile device and eSIM subscription separately.
  • 29. Hope to help you!