SlideShare a Scribd company logo
1 of 29
Download to read offline
1
eSIM Deep Dive
Hossein Yavari
@senatelecom
Ref: airalo
Ref: airalo
SIM Functions
4
• SIM is responsible for:
– Connection between mobile device and
provider
– Storage (IMSI, Network data, Encryption
data and etc.)
© All Rights Reserved
5
SIM Card
Evolution
Embedded SIM: eSIM or eUICC
© All Rights Reserved
6
“Although the role of the SIM itself is not changing, the GSMA has defined a radical
new way to load it into devices. Now the SIM may be securely downloaded into a
‘Secure Element’ that can be permanently embedded inside any type of device.”
© All Rights Reserved
7
eSIM
Key Characteristics
• eSIM is:
– hardware based
– Non-removable
– Or like the ordinary removable SIM Card
• Remote Provisioning:
– SIM profile is transferred over the air (OTA)
to the device
• eSIM provides easier switch between
operators
© All Rights Reserved
8
eSIM
Key Characteristics
(Cont.)
• Improvement in customer experience
© All Rights Reserved
Stakeholders
Benefits
9
• Operators:
– Opens up new market opportunities
– Reduced costs in handling M2M SIM products
– Retains industry leading security levels
– Minimal impact to existing systems and network
infrastructure
– Low integration and testing costs
© All Rights Reserved
Stakeholders
Benefits
(Cont.)
10
• SIM Suppliers:
– Opens up wider M2M market opportunities by
providing Embedded SIM infrastructure and
services on a mass market basis
– Add value and flexibility to current SIM products
© All Rights Reserved
Stakeholders
Benefits
(Cont.)
11
• Business Customers:
– Business opportunities from new M2M connected
services including new deployment models
– Remote service activation enables the up-sell of
connected options after initial sale
– Connectivity management will be more flexible
and cost effective
© All Rights Reserved
Stakeholders
Benefits
(Cont.)
12
• End Consumers:
– Improved customer experience, products will
work ‘out of the box’
– Lower cost connected products
– Increase in number of valuable connected services
© All Rights Reserved
Stakeholders
Benefits
(Cont.)
13
• M2M Product Manufacturers:
– Opens up new M2M market opportunities
– Single Stock Keeping Unit at point of manufacture
– Enables flexible global product distribution
– Selection of operator subscription is performed on
first switch on in destination country
– Allows change of operator during the product
lifecycle
– Improved product reliability and longevity through
hermetic sealing -as there is no need to change
the physical SIM
© All Rights Reserved
Consumer
or
M2M?
15
eSIM
Solutions
© All Rights Reserved
• The GSMA has created solutions suited to different
types of channels:
– Consumer solution: for the ‘direct to consumer’
channel, this solution is required where the end user
has direct choice of the operator supplying
connectivity.
– M2M solution: for the ‘business to business to
consumer’ channels, this solution serves the needs
of business to business customers, specifically in the
Internet of Things (IoT) market.
16
• Consumer devices: like Cell Phones, watches or
other wearables
• Connected devices or M2M communications:
such as IoT / IoE
© All Rights Reserved
eSIM
Solutions
(Cont.)Pull
Model
Push
Model
17
eSIM
Players!
Involved
Elements
18
• eUICC:
– Functionally identical to a traditional SIM
– At manufacture will have a ‘provisioning profile’
assigned with secret keys that allows the
associated subscription manager to download and
manage ‘operational profiles’ on the eUICC
– The technical specification can accommodate both
an initial declaration of the MNO in the eUICC, as
well as the selection of a new MNO later.
© All Rights Reserved
Involved
Elements
(Cont.)
19
• Subscription Manager:
– Generating SIM profiles in real-time
– Management and execution of MNO policy
– Secure routing profiles to the eUICC
© All Rights Reserved
Involved
Elements
(Cont.)
20
• MNO:
– Uses subscription manager to manage profiles
– Maximum re-use of existing provisioning interfaces
and processes
© All Rights Reserved
21
RSP
Remote SIM
Provisioning
22© All Rights Reserved
RSP
Consumer Architecture
23© All Rights Reserved
RSP
Consumer Architecture
Elements
24
• SM-DP+:
- Profile storage (securely store MNO SIM profiles)
- Manage profiles (Download, Enable or Disable
profiles)
• SM-DS:
- Discovery server for newly available profiles for
each consumer
• LPA
- The Local Profile Assistant is a set of functions in
the device responsible for providing the capability
to download encrypted Profiles to the eUICC.
© All Rights Reserved
RSP
M2M Architecture
25© All Rights Reserved
RSP
M2M Architecture
Elements
26
• SM-DP:
- Profile storage (securely store MNO SIM
profiles)
• SM-SR:
- Securing communication channel to eUICC
- Manage profiles (Download, Enable or Disable
profiles)
• OTA Gateway*:
- SMS gateway for secure over the air
communication to eUICC
© All Rights Reserved
RSP
M2M vs Consumer
27© All Rights Reserved
M2M Solution Consumer Solution
Push Model / server-driven
option
Pull Model / client-driven option
Separated roles of SM-DP and
SM-SR
Profile management
operations can be run only
from the back-end
infrastructure side
Data Processing and Secure
Routing consolidated in SM-DP+.
SM-DS as an optional feature
Profile management is initiated
from the local device side
Consumer
RSP Initiation
28© All Rights Reserved
• QR activation, arguably the most popular option, it’s 2D
barcode format, it contains a Matching ID number and SM-
DP+ address, which are used for reaching a dedicated SM-
DP+ server and downloading a dedicated eSIM profile.
• Default SM-DP+ address, with an eUICC pre-provisioned with
operator’s SM-DP+ address, mostly useful with the operator
subsidized mobile phones market. It is a fully automatic
activation and doesn’t require any interaction from the end-
user except turning on the device itself.
• SM-DS activation, which is useful in situations when an end-
user purchases a mobile device and eSIM subscription
separately.
Hope to help you!

More Related Content

What's hot

Betriebssysteme - Verzeichnisdienst LDAP
Betriebssysteme - Verzeichnisdienst LDAPBetriebssysteme - Verzeichnisdienst LDAP
Betriebssysteme - Verzeichnisdienst LDAP
Markus Groß
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletion
vitam,berhampur
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchange
P1Security
 

What's hot (20)

Knox Manage
Knox ManageKnox Manage
Knox Manage
 
Simjacker: how to protect your network from the latest hot vulnerability
Simjacker: how to protect your network from the latest hot vulnerabilitySimjacker: how to protect your network from the latest hot vulnerability
Simjacker: how to protect your network from the latest hot vulnerability
 
Why esim required for ais 140
Why esim required for ais 140 Why esim required for ais 140
Why esim required for ais 140
 
SmartTrust WIB 1.3
SmartTrust WIB 1.3SmartTrust WIB 1.3
SmartTrust WIB 1.3
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope Overview
 
Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenes
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
2015 wearable technology
2015 wearable technology2015 wearable technology
2015 wearable technology
 
Telematics
TelematicsTelematics
Telematics
 
Betriebssysteme - Verzeichnisdienst LDAP
Betriebssysteme - Verzeichnisdienst LDAPBetriebssysteme - Verzeichnisdienst LDAP
Betriebssysteme - Verzeichnisdienst LDAP
 
Changing Telecom trends with VAS- Value Added Services
Changing Telecom trends with VAS- Value Added ServicesChanging Telecom trends with VAS- Value Added Services
Changing Telecom trends with VAS- Value Added Services
 
Sim cards
Sim cardsSim cards
Sim cards
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation Report
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletion
 
The Evolution of the Datacenter
The Evolution of the DatacenterThe Evolution of the Datacenter
The Evolution of the Datacenter
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchange
 
Routed Optical Networking by Shahnaz Mohamad, Cisco
Routed Optical Networking by Shahnaz Mohamad, CiscoRouted Optical Networking by Shahnaz Mohamad, Cisco
Routed Optical Networking by Shahnaz Mohamad, Cisco
 
pixeom-cloud device
pixeom-cloud devicepixeom-cloud device
pixeom-cloud device
 
Presentation SIM CARD (GSM)
Presentation SIM CARD (GSM)Presentation SIM CARD (GSM)
Presentation SIM CARD (GSM)
 

Similar to eSIM Deep Dive

What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystWhat OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
mfrancis
 
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V IzzoKeynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
mfrancis
 

Similar to eSIM Deep Dive (20)

Introduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & GatewaysIntroduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & Gateways
 
e-Sim Sharing (extract)
e-Sim Sharing (extract)e-Sim Sharing (extract)
e-Sim Sharing (extract)
 
Embedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applicationsEmbedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applications
 
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystWhat OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
 
Podsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_designPodsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_design
 
 Connected Living - Embedded SIM & M2M
 Connected Living - Embedded SIM & M2M Connected Living - Embedded SIM & M2M
 Connected Living - Embedded SIM & M2M
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
 
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
 
From eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the ManufacturingFrom eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the Manufacturing
 
Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix company brochure 2012
Cellnetrix company brochure 2012
 
SIMATIC manager سيماتك منجر سيمنز
SIMATIC manager سيماتك منجر سيمنزSIMATIC manager سيماتك منجر سيمنز
SIMATIC manager سيماتك منجر سيمنز
 
Cellnetrix brochure 2013
Cellnetrix brochure 2013Cellnetrix brochure 2013
Cellnetrix brochure 2013
 
The T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of TrustThe T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of Trust
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
CellSIM OS Overview 1.0
CellSIM OS Overview 1.0CellSIM OS Overview 1.0
CellSIM OS Overview 1.0
 
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
 
Seminar
SeminarSeminar
Seminar
 
walker_embeddedsims.pdf
walker_embeddedsims.pdfwalker_embeddedsims.pdf
walker_embeddedsims.pdf
 
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V IzzoKeynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
 
61850IMU Substation Recorder
61850IMU Substation Recorder61850IMU Substation Recorder
61850IMU Substation Recorder
 

More from Hossein Yavari

More from Hossein Yavari (20)

What is Matroska?
What is Matroska?What is Matroska?
What is Matroska?
 
SIPREC RTPEngine Media Forking
SIPREC RTPEngine Media ForkingSIPREC RTPEngine Media Forking
SIPREC RTPEngine Media Forking
 
Windows Forensics
Windows ForensicsWindows Forensics
Windows Forensics
 
SIP over TLS
SIP over TLSSIP over TLS
SIP over TLS
 
Desjardins Data Breach
Desjardins Data BreachDesjardins Data Breach
Desjardins Data Breach
 
Introduction to Metasploit
Introduction to MetasploitIntroduction to Metasploit
Introduction to Metasploit
 
Which IT Certification is Better for You?
Which IT Certification is Better for You?Which IT Certification is Better for You?
Which IT Certification is Better for You?
 
Disassembly Using IDA
Disassembly Using IDADisassembly Using IDA
Disassembly Using IDA
 
Introduction to Snort
Introduction to SnortIntroduction to Snort
Introduction to Snort
 
DLL Injection
DLL InjectionDLL Injection
DLL Injection
 
SQL Injection in JAVA
SQL Injection in JAVASQL Injection in JAVA
SQL Injection in JAVA
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static Analysis
 
Creativity and Role of the Leaders
Creativity and Role of the LeadersCreativity and Role of the Leaders
Creativity and Role of the Leaders
 
IPsec for IMS
IPsec for IMSIPsec for IMS
IPsec for IMS
 
Yeastar Technical Training Course
Yeastar Technical Training CourseYeastar Technical Training Course
Yeastar Technical Training Course
 
SENA Cloud UC
SENA Cloud UCSENA Cloud UC
SENA Cloud UC
 
FreePBX Disaster Recovery
FreePBX Disaster RecoveryFreePBX Disaster Recovery
FreePBX Disaster Recovery
 
LTE Architecture Overview
LTE Architecture OverviewLTE Architecture Overview
LTE Architecture Overview
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETER
 
Introduction to SS7- Part 2
Introduction to SS7- Part 2Introduction to SS7- Part 2
Introduction to SS7- Part 2
 

Recently uploaded

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 

eSIM Deep Dive

  • 1. 1 eSIM Deep Dive Hossein Yavari @senatelecom
  • 4. SIM Functions 4 • SIM is responsible for: – Connection between mobile device and provider – Storage (IMSI, Network data, Encryption data and etc.) © All Rights Reserved
  • 5. 5 SIM Card Evolution Embedded SIM: eSIM or eUICC © All Rights Reserved
  • 6. 6 “Although the role of the SIM itself is not changing, the GSMA has defined a radical new way to load it into devices. Now the SIM may be securely downloaded into a ‘Secure Element’ that can be permanently embedded inside any type of device.” © All Rights Reserved
  • 7. 7 eSIM Key Characteristics • eSIM is: – hardware based – Non-removable – Or like the ordinary removable SIM Card • Remote Provisioning: – SIM profile is transferred over the air (OTA) to the device • eSIM provides easier switch between operators © All Rights Reserved
  • 8. 8 eSIM Key Characteristics (Cont.) • Improvement in customer experience © All Rights Reserved
  • 9. Stakeholders Benefits 9 • Operators: – Opens up new market opportunities – Reduced costs in handling M2M SIM products – Retains industry leading security levels – Minimal impact to existing systems and network infrastructure – Low integration and testing costs © All Rights Reserved
  • 10. Stakeholders Benefits (Cont.) 10 • SIM Suppliers: – Opens up wider M2M market opportunities by providing Embedded SIM infrastructure and services on a mass market basis – Add value and flexibility to current SIM products © All Rights Reserved
  • 11. Stakeholders Benefits (Cont.) 11 • Business Customers: – Business opportunities from new M2M connected services including new deployment models – Remote service activation enables the up-sell of connected options after initial sale – Connectivity management will be more flexible and cost effective © All Rights Reserved
  • 12. Stakeholders Benefits (Cont.) 12 • End Consumers: – Improved customer experience, products will work ‘out of the box’ – Lower cost connected products – Increase in number of valuable connected services © All Rights Reserved
  • 13. Stakeholders Benefits (Cont.) 13 • M2M Product Manufacturers: – Opens up new M2M market opportunities – Single Stock Keeping Unit at point of manufacture – Enables flexible global product distribution – Selection of operator subscription is performed on first switch on in destination country – Allows change of operator during the product lifecycle – Improved product reliability and longevity through hermetic sealing -as there is no need to change the physical SIM © All Rights Reserved
  • 15. 15 eSIM Solutions © All Rights Reserved • The GSMA has created solutions suited to different types of channels: – Consumer solution: for the ‘direct to consumer’ channel, this solution is required where the end user has direct choice of the operator supplying connectivity. – M2M solution: for the ‘business to business to consumer’ channels, this solution serves the needs of business to business customers, specifically in the Internet of Things (IoT) market.
  • 16. 16 • Consumer devices: like Cell Phones, watches or other wearables • Connected devices or M2M communications: such as IoT / IoE © All Rights Reserved eSIM Solutions (Cont.)Pull Model Push Model
  • 18. Involved Elements 18 • eUICC: – Functionally identical to a traditional SIM – At manufacture will have a ‘provisioning profile’ assigned with secret keys that allows the associated subscription manager to download and manage ‘operational profiles’ on the eUICC – The technical specification can accommodate both an initial declaration of the MNO in the eUICC, as well as the selection of a new MNO later. © All Rights Reserved
  • 19. Involved Elements (Cont.) 19 • Subscription Manager: – Generating SIM profiles in real-time – Management and execution of MNO policy – Secure routing profiles to the eUICC © All Rights Reserved
  • 20. Involved Elements (Cont.) 20 • MNO: – Uses subscription manager to manage profiles – Maximum re-use of existing provisioning interfaces and processes © All Rights Reserved
  • 24. RSP Consumer Architecture Elements 24 • SM-DP+: - Profile storage (securely store MNO SIM profiles) - Manage profiles (Download, Enable or Disable profiles) • SM-DS: - Discovery server for newly available profiles for each consumer • LPA - The Local Profile Assistant is a set of functions in the device responsible for providing the capability to download encrypted Profiles to the eUICC. © All Rights Reserved
  • 25. RSP M2M Architecture 25© All Rights Reserved
  • 26. RSP M2M Architecture Elements 26 • SM-DP: - Profile storage (securely store MNO SIM profiles) • SM-SR: - Securing communication channel to eUICC - Manage profiles (Download, Enable or Disable profiles) • OTA Gateway*: - SMS gateway for secure over the air communication to eUICC © All Rights Reserved
  • 27. RSP M2M vs Consumer 27© All Rights Reserved M2M Solution Consumer Solution Push Model / server-driven option Pull Model / client-driven option Separated roles of SM-DP and SM-SR Profile management operations can be run only from the back-end infrastructure side Data Processing and Secure Routing consolidated in SM-DP+. SM-DS as an optional feature Profile management is initiated from the local device side
  • 28. Consumer RSP Initiation 28© All Rights Reserved • QR activation, arguably the most popular option, it’s 2D barcode format, it contains a Matching ID number and SM- DP+ address, which are used for reaching a dedicated SM- DP+ server and downloading a dedicated eSIM profile. • Default SM-DP+ address, with an eUICC pre-provisioned with operator’s SM-DP+ address, mostly useful with the operator subsidized mobile phones market. It is a fully automatic activation and doesn’t require any interaction from the end- user except turning on the device itself. • SM-DS activation, which is useful in situations when an end- user purchases a mobile device and eSIM subscription separately.
  • 29. Hope to help you!