SlideShare a Scribd company logo
1 of 29
Download to read offline
1
eSIM Deep Dive
Hossein Yavari
@senatelecom
Ref: airalo
Ref: airalo
SIM Functions
4
• SIM is responsible for:
– Connection between mobile device and
provider
– Storage (IMSI, Network data, Encryption
data and etc.)
© All Rights Reserved
5
SIM Card
Evolution
Embedded SIM: eSIM or eUICC
© All Rights Reserved
6
“Although the role of the SIM itself is not changing, the GSMA has defined a radical
new way to load it into devices. Now the SIM may be securely downloaded into a
‘Secure Element’ that can be permanently embedded inside any type of device.”
© All Rights Reserved
7
eSIM
Key Characteristics
• eSIM is:
– hardware based
– Non-removable
– Or like the ordinary removable SIM Card
• Remote Provisioning:
– SIM profile is transferred over the air (OTA)
to the device
• eSIM provides easier switch between
operators
© All Rights Reserved
8
eSIM
Key Characteristics
(Cont.)
• Improvement in customer experience
© All Rights Reserved
Stakeholders
Benefits
9
• Operators:
– Opens up new market opportunities
– Reduced costs in handling M2M SIM products
– Retains industry leading security levels
– Minimal impact to existing systems and network
infrastructure
– Low integration and testing costs
© All Rights Reserved
Stakeholders
Benefits
(Cont.)
10
• SIM Suppliers:
– Opens up wider M2M market opportunities by
providing Embedded SIM infrastructure and
services on a mass market basis
– Add value and flexibility to current SIM products
© All Rights Reserved
Stakeholders
Benefits
(Cont.)
11
• Business Customers:
– Business opportunities from new M2M connected
services including new deployment models
– Remote service activation enables the up-sell of
connected options after initial sale
– Connectivity management will be more flexible
and cost effective
© All Rights Reserved
Stakeholders
Benefits
(Cont.)
12
• End Consumers:
– Improved customer experience, products will
work ‘out of the box’
– Lower cost connected products
– Increase in number of valuable connected services
© All Rights Reserved
Stakeholders
Benefits
(Cont.)
13
• M2M Product Manufacturers:
– Opens up new M2M market opportunities
– Single Stock Keeping Unit at point of manufacture
– Enables flexible global product distribution
– Selection of operator subscription is performed on
first switch on in destination country
– Allows change of operator during the product
lifecycle
– Improved product reliability and longevity through
hermetic sealing -as there is no need to change
the physical SIM
© All Rights Reserved
Consumer
or
M2M?
15
eSIM
Solutions
© All Rights Reserved
• The GSMA has created solutions suited to different
types of channels:
– Consumer solution: for the ‘direct to consumer’
channel, this solution is required where the end user
has direct choice of the operator supplying
connectivity.
– M2M solution: for the ‘business to business to
consumer’ channels, this solution serves the needs
of business to business customers, specifically in the
Internet of Things (IoT) market.
16
• Consumer devices: like Cell Phones, watches or
other wearables
• Connected devices or M2M communications:
such as IoT / IoE
© All Rights Reserved
eSIM
Solutions
(Cont.)Pull
Model
Push
Model
17
eSIM
Players!
Involved
Elements
18
• eUICC:
– Functionally identical to a traditional SIM
– At manufacture will have a ‘provisioning profile’
assigned with secret keys that allows the
associated subscription manager to download and
manage ‘operational profiles’ on the eUICC
– The technical specification can accommodate both
an initial declaration of the MNO in the eUICC, as
well as the selection of a new MNO later.
© All Rights Reserved
Involved
Elements
(Cont.)
19
• Subscription Manager:
– Generating SIM profiles in real-time
– Management and execution of MNO policy
– Secure routing profiles to the eUICC
© All Rights Reserved
Involved
Elements
(Cont.)
20
• MNO:
– Uses subscription manager to manage profiles
– Maximum re-use of existing provisioning interfaces
and processes
© All Rights Reserved
21
RSP
Remote SIM
Provisioning
22© All Rights Reserved
RSP
Consumer Architecture
23© All Rights Reserved
RSP
Consumer Architecture
Elements
24
• SM-DP+:
- Profile storage (securely store MNO SIM profiles)
- Manage profiles (Download, Enable or Disable
profiles)
• SM-DS:
- Discovery server for newly available profiles for
each consumer
• LPA
- The Local Profile Assistant is a set of functions in
the device responsible for providing the capability
to download encrypted Profiles to the eUICC.
© All Rights Reserved
RSP
M2M Architecture
25© All Rights Reserved
RSP
M2M Architecture
Elements
26
• SM-DP:
- Profile storage (securely store MNO SIM
profiles)
• SM-SR:
- Securing communication channel to eUICC
- Manage profiles (Download, Enable or Disable
profiles)
• OTA Gateway*:
- SMS gateway for secure over the air
communication to eUICC
© All Rights Reserved
RSP
M2M vs Consumer
27© All Rights Reserved
M2M Solution Consumer Solution
Push Model / server-driven
option
Pull Model / client-driven option
Separated roles of SM-DP and
SM-SR
Profile management
operations can be run only
from the back-end
infrastructure side
Data Processing and Secure
Routing consolidated in SM-DP+.
SM-DS as an optional feature
Profile management is initiated
from the local device side
Consumer
RSP Initiation
28© All Rights Reserved
• QR activation, arguably the most popular option, it’s 2D
barcode format, it contains a Matching ID number and SM-
DP+ address, which are used for reaching a dedicated SM-
DP+ server and downloading a dedicated eSIM profile.
• Default SM-DP+ address, with an eUICC pre-provisioned with
operator’s SM-DP+ address, mostly useful with the operator
subsidized mobile phones market. It is a fully automatic
activation and doesn’t require any interaction from the end-
user except turning on the device itself.
• SM-DS activation, which is useful in situations when an end-
user purchases a mobile device and eSIM subscription
separately.
Hope to help you!

More Related Content

What's hot

Ericsson 5G plug-ins
Ericsson 5G plug-insEricsson 5G plug-ins
Ericsson 5G plug-insEricsson
 
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...ThousandEyes
 
Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challengesParag Deodhar
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTPositiveTechnologies
 
Architecture d'un réseau GSM 2G (Téléphonie Mobile)
Architecture d'un réseau GSM 2G (Téléphonie Mobile)Architecture d'un réseau GSM 2G (Téléphonie Mobile)
Architecture d'un réseau GSM 2G (Téléphonie Mobile)Assia Mounir
 
5 g wireless systems
5 g wireless systems5 g wireless systems
5 g wireless systemsVaishnavi
 
Ericsson transports 5G
Ericsson transports 5GEricsson transports 5G
Ericsson transports 5GEricsson
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN OrchestrationEricsson
 
Private LTE Presentation Pitch
Private LTE Presentation PitchPrivate LTE Presentation Pitch
Private LTE Presentation Pitchadolfoams2000
 
Cisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Canada
 
Cybersécurité & protection des données personnelles
Cybersécurité & protection des données personnellesCybersécurité & protection des données personnelles
Cybersécurité & protection des données personnellesMohamed MDELLA
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPEMichelle Holley
 

What's hot (20)

Ericsson 5G plug-ins
Ericsson 5G plug-insEricsson 5G plug-ins
Ericsson 5G plug-ins
 
Mobile network structure
Mobile network structure Mobile network structure
Mobile network structure
 
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
 
5G Network Overview
 5G Network Overview 5G Network Overview
5G Network Overview
 
Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challenges
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoT
 
ZTE-Product PPT
ZTE-Product  PPTZTE-Product  PPT
ZTE-Product PPT
 
Réseaux mobiles
Réseaux mobiles Réseaux mobiles
Réseaux mobiles
 
Architecture d'un réseau GSM 2G (Téléphonie Mobile)
Architecture d'un réseau GSM 2G (Téléphonie Mobile)Architecture d'un réseau GSM 2G (Téléphonie Mobile)
Architecture d'un réseau GSM 2G (Téléphonie Mobile)
 
5 g wireless systems
5 g wireless systems5 g wireless systems
5 g wireless systems
 
Ericsson transports 5G
Ericsson transports 5GEricsson transports 5G
Ericsson transports 5G
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN Orchestration
 
Private LTE Presentation Pitch
Private LTE Presentation PitchPrivate LTE Presentation Pitch
Private LTE Presentation Pitch
 
5g ppt new
5g ppt new5g ppt new
5g ppt new
 
Cisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network Intuitive
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 
50868690 rapport-lte
50868690 rapport-lte50868690 rapport-lte
50868690 rapport-lte
 
Cybersécurité & protection des données personnelles
Cybersécurité & protection des données personnellesCybersécurité & protection des données personnelles
Cybersécurité & protection des données personnelles
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPE
 
cours-LES RESEAUX HAUTS DEBITS.pdf
cours-LES RESEAUX HAUTS DEBITS.pdfcours-LES RESEAUX HAUTS DEBITS.pdf
cours-LES RESEAUX HAUTS DEBITS.pdf
 

Similar to eSIM Deep Dive

Introduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & GatewaysIntroduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & Gatewaystawi123
 
Embedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applicationsEmbedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applicationsM2M Alliance e.V.
 
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystWhat OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystmfrancis
 
Podsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_designPodsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_designpodsystem1
 
Mobile and SIM Forensics
Mobile and SIM ForensicsMobile and SIM Forensics
Mobile and SIM ForensicsYugal Pathak
 
 Connected Living - Embedded SIM & M2M
 Connected Living - Embedded SIM & M2M Connected Living - Embedded SIM & M2M
 Connected Living - Embedded SIM & M2MTelefónica IoT
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEntel
 
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...Alan Quayle
 
From eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the ManufacturingFrom eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the ManufacturingSoracom Global, Inc.
 
Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix
 
SIMATIC manager سيماتك منجر سيمنز
SIMATIC manager سيماتك منجر سيمنزSIMATIC manager سيماتك منجر سيمنز
SIMATIC manager سيماتك منجر سيمنزEssosElectronic
 
Cellnetrix brochure 2013
Cellnetrix brochure 2013Cellnetrix brochure 2013
Cellnetrix brochure 2013Vladimir Nagin
 
The T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of TrustThe T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of TrustRivetz
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Thingscumulocity
 
CellSIM OS Overview 1.0
CellSIM OS Overview 1.0CellSIM OS Overview 1.0
CellSIM OS Overview 1.0Vladimir Nagin
 
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies
 
walker_embeddedsims.pdf
walker_embeddedsims.pdfwalker_embeddedsims.pdf
walker_embeddedsims.pdfamazon4it
 
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V IzzoKeynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzomfrancis
 
61850IMU Substation Recorder
61850IMU Substation Recorder61850IMU Substation Recorder
61850IMU Substation RecorderGE Grid Solutions
 

Similar to eSIM Deep Dive (20)

Introduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & GatewaysIntroduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & Gateways
 
Embedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applicationsEmbedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applications
 
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystWhat OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
 
Podsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_designPodsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_design
 
Mobile and SIM Forensics
Mobile and SIM ForensicsMobile and SIM Forensics
Mobile and SIM Forensics
 
 Connected Living - Embedded SIM & M2M
 Connected Living - Embedded SIM & M2M Connected Living - Embedded SIM & M2M
 Connected Living - Embedded SIM & M2M
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
 
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
 
From eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the ManufacturingFrom eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the Manufacturing
 
Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix company brochure 2012
Cellnetrix company brochure 2012
 
SIMATIC manager سيماتك منجر سيمنز
SIMATIC manager سيماتك منجر سيمنزSIMATIC manager سيماتك منجر سيمنز
SIMATIC manager سيماتك منجر سيمنز
 
Cellnetrix brochure 2013
Cellnetrix brochure 2013Cellnetrix brochure 2013
Cellnetrix brochure 2013
 
The T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of TrustThe T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of Trust
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
CellSIM OS Overview 1.0
CellSIM OS Overview 1.0CellSIM OS Overview 1.0
CellSIM OS Overview 1.0
 
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
 
Seminar
SeminarSeminar
Seminar
 
walker_embeddedsims.pdf
walker_embeddedsims.pdfwalker_embeddedsims.pdf
walker_embeddedsims.pdf
 
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V IzzoKeynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
 
61850IMU Substation Recorder
61850IMU Substation Recorder61850IMU Substation Recorder
61850IMU Substation Recorder
 

More from Hossein Yavari

SIPREC RTPEngine Media Forking
SIPREC RTPEngine Media ForkingSIPREC RTPEngine Media Forking
SIPREC RTPEngine Media ForkingHossein Yavari
 
Desjardins Data Breach
Desjardins Data BreachDesjardins Data Breach
Desjardins Data BreachHossein Yavari
 
Introduction to Metasploit
Introduction to MetasploitIntroduction to Metasploit
Introduction to MetasploitHossein Yavari
 
Which IT Certification is Better for You?
Which IT Certification is Better for You?Which IT Certification is Better for You?
Which IT Certification is Better for You?Hossein Yavari
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static AnalysisHossein Yavari
 
Creativity and Role of the Leaders
Creativity and Role of the LeadersCreativity and Role of the Leaders
Creativity and Role of the LeadersHossein Yavari
 
Yeastar Technical Training Course
Yeastar Technical Training CourseYeastar Technical Training Course
Yeastar Technical Training CourseHossein Yavari
 
FreePBX Disaster Recovery
FreePBX Disaster RecoveryFreePBX Disaster Recovery
FreePBX Disaster RecoveryHossein Yavari
 
LTE Architecture Overview
LTE Architecture OverviewLTE Architecture Overview
LTE Architecture OverviewHossein Yavari
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETERHossein Yavari
 
Introduction to SS7- Part 2
Introduction to SS7- Part 2Introduction to SS7- Part 2
Introduction to SS7- Part 2Hossein Yavari
 

More from Hossein Yavari (20)

What is Matroska?
What is Matroska?What is Matroska?
What is Matroska?
 
SIPREC RTPEngine Media Forking
SIPREC RTPEngine Media ForkingSIPREC RTPEngine Media Forking
SIPREC RTPEngine Media Forking
 
Windows Forensics
Windows ForensicsWindows Forensics
Windows Forensics
 
SIP over TLS
SIP over TLSSIP over TLS
SIP over TLS
 
Desjardins Data Breach
Desjardins Data BreachDesjardins Data Breach
Desjardins Data Breach
 
Introduction to Metasploit
Introduction to MetasploitIntroduction to Metasploit
Introduction to Metasploit
 
Which IT Certification is Better for You?
Which IT Certification is Better for You?Which IT Certification is Better for You?
Which IT Certification is Better for You?
 
Disassembly Using IDA
Disassembly Using IDADisassembly Using IDA
Disassembly Using IDA
 
Introduction to Snort
Introduction to SnortIntroduction to Snort
Introduction to Snort
 
DLL Injection
DLL InjectionDLL Injection
DLL Injection
 
SQL Injection in JAVA
SQL Injection in JAVASQL Injection in JAVA
SQL Injection in JAVA
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static Analysis
 
Creativity and Role of the Leaders
Creativity and Role of the LeadersCreativity and Role of the Leaders
Creativity and Role of the Leaders
 
IPsec for IMS
IPsec for IMSIPsec for IMS
IPsec for IMS
 
Yeastar Technical Training Course
Yeastar Technical Training CourseYeastar Technical Training Course
Yeastar Technical Training Course
 
SENA Cloud UC
SENA Cloud UCSENA Cloud UC
SENA Cloud UC
 
FreePBX Disaster Recovery
FreePBX Disaster RecoveryFreePBX Disaster Recovery
FreePBX Disaster Recovery
 
LTE Architecture Overview
LTE Architecture OverviewLTE Architecture Overview
LTE Architecture Overview
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETER
 
Introduction to SS7- Part 2
Introduction to SS7- Part 2Introduction to SS7- Part 2
Introduction to SS7- Part 2
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

eSIM Deep Dive

  • 1. 1 eSIM Deep Dive Hossein Yavari @senatelecom
  • 4. SIM Functions 4 • SIM is responsible for: – Connection between mobile device and provider – Storage (IMSI, Network data, Encryption data and etc.) © All Rights Reserved
  • 5. 5 SIM Card Evolution Embedded SIM: eSIM or eUICC © All Rights Reserved
  • 6. 6 “Although the role of the SIM itself is not changing, the GSMA has defined a radical new way to load it into devices. Now the SIM may be securely downloaded into a ‘Secure Element’ that can be permanently embedded inside any type of device.” © All Rights Reserved
  • 7. 7 eSIM Key Characteristics • eSIM is: – hardware based – Non-removable – Or like the ordinary removable SIM Card • Remote Provisioning: – SIM profile is transferred over the air (OTA) to the device • eSIM provides easier switch between operators © All Rights Reserved
  • 8. 8 eSIM Key Characteristics (Cont.) • Improvement in customer experience © All Rights Reserved
  • 9. Stakeholders Benefits 9 • Operators: – Opens up new market opportunities – Reduced costs in handling M2M SIM products – Retains industry leading security levels – Minimal impact to existing systems and network infrastructure – Low integration and testing costs © All Rights Reserved
  • 10. Stakeholders Benefits (Cont.) 10 • SIM Suppliers: – Opens up wider M2M market opportunities by providing Embedded SIM infrastructure and services on a mass market basis – Add value and flexibility to current SIM products © All Rights Reserved
  • 11. Stakeholders Benefits (Cont.) 11 • Business Customers: – Business opportunities from new M2M connected services including new deployment models – Remote service activation enables the up-sell of connected options after initial sale – Connectivity management will be more flexible and cost effective © All Rights Reserved
  • 12. Stakeholders Benefits (Cont.) 12 • End Consumers: – Improved customer experience, products will work ‘out of the box’ – Lower cost connected products – Increase in number of valuable connected services © All Rights Reserved
  • 13. Stakeholders Benefits (Cont.) 13 • M2M Product Manufacturers: – Opens up new M2M market opportunities – Single Stock Keeping Unit at point of manufacture – Enables flexible global product distribution – Selection of operator subscription is performed on first switch on in destination country – Allows change of operator during the product lifecycle – Improved product reliability and longevity through hermetic sealing -as there is no need to change the physical SIM © All Rights Reserved
  • 15. 15 eSIM Solutions © All Rights Reserved • The GSMA has created solutions suited to different types of channels: – Consumer solution: for the ‘direct to consumer’ channel, this solution is required where the end user has direct choice of the operator supplying connectivity. – M2M solution: for the ‘business to business to consumer’ channels, this solution serves the needs of business to business customers, specifically in the Internet of Things (IoT) market.
  • 16. 16 • Consumer devices: like Cell Phones, watches or other wearables • Connected devices or M2M communications: such as IoT / IoE © All Rights Reserved eSIM Solutions (Cont.)Pull Model Push Model
  • 18. Involved Elements 18 • eUICC: – Functionally identical to a traditional SIM – At manufacture will have a ‘provisioning profile’ assigned with secret keys that allows the associated subscription manager to download and manage ‘operational profiles’ on the eUICC – The technical specification can accommodate both an initial declaration of the MNO in the eUICC, as well as the selection of a new MNO later. © All Rights Reserved
  • 19. Involved Elements (Cont.) 19 • Subscription Manager: – Generating SIM profiles in real-time – Management and execution of MNO policy – Secure routing profiles to the eUICC © All Rights Reserved
  • 20. Involved Elements (Cont.) 20 • MNO: – Uses subscription manager to manage profiles – Maximum re-use of existing provisioning interfaces and processes © All Rights Reserved
  • 24. RSP Consumer Architecture Elements 24 • SM-DP+: - Profile storage (securely store MNO SIM profiles) - Manage profiles (Download, Enable or Disable profiles) • SM-DS: - Discovery server for newly available profiles for each consumer • LPA - The Local Profile Assistant is a set of functions in the device responsible for providing the capability to download encrypted Profiles to the eUICC. © All Rights Reserved
  • 25. RSP M2M Architecture 25© All Rights Reserved
  • 26. RSP M2M Architecture Elements 26 • SM-DP: - Profile storage (securely store MNO SIM profiles) • SM-SR: - Securing communication channel to eUICC - Manage profiles (Download, Enable or Disable profiles) • OTA Gateway*: - SMS gateway for secure over the air communication to eUICC © All Rights Reserved
  • 27. RSP M2M vs Consumer 27© All Rights Reserved M2M Solution Consumer Solution Push Model / server-driven option Pull Model / client-driven option Separated roles of SM-DP and SM-SR Profile management operations can be run only from the back-end infrastructure side Data Processing and Secure Routing consolidated in SM-DP+. SM-DS as an optional feature Profile management is initiated from the local device side
  • 28. Consumer RSP Initiation 28© All Rights Reserved • QR activation, arguably the most popular option, it’s 2D barcode format, it contains a Matching ID number and SM- DP+ address, which are used for reaching a dedicated SM- DP+ server and downloading a dedicated eSIM profile. • Default SM-DP+ address, with an eUICC pre-provisioned with operator’s SM-DP+ address, mostly useful with the operator subsidized mobile phones market. It is a fully automatic activation and doesn’t require any interaction from the end- user except turning on the device itself. • SM-DS activation, which is useful in situations when an end- user purchases a mobile device and eSIM subscription separately.
  • 29. Hope to help you!