Ain Shams University Faculty of Computer and Information Science Virtual SIM Card
Team WorkSupervisors:PROF.Dr. Mohamed Hashem             Dr. KhaledElbhansy             T.A. Mahmoud Fayez
AgendaProblem DefinitionObjectivesScientific BackgroundSystem Analysis   use case diagram.
System Sequence diagram
System Design
Class Diagram
Sequence Diagram
System ArchitectureDevelopment Tools and PlatformsImplementation phasesSteps to use Virtual SIM CardReality
GSM Simulation
Demo
References                                                       Problem DefinitionMobile Users wants to Use More Than One SIM Card
Use one mobile with multiple SIM cardProblem DefinitionThe mobile users try achieving their goal by:Two optionsUse more than one Mobile device.
ContinueExpensiveUse more than one mobile deviceNot suitable
ContinueAt Most Three SIM Card Use one mobile with multiple SIM cardHigher quality ,higher cost Lower quality ,lower cost
AgendaProblem DefinitionObjectivesScientific BackgroundSystem Analysis   use case diagram.
System Sequence diagram
System Design
Class Diagram
Sequence Diagram
System ArchitectureDevelopment Tools and PlatformsImplementation phasesSteps to use Virtual SIM CardReality
GSM Simulation
Demo
ReferencesObjectivesRegular mobile phone support multi SIM cardLead toVirtual SIM Card  ConceptVirtual SIM CardOne Regular Mobile
AgendaProblem DefinitionObjectivesScientific BackgroundSystem Analysis   use case diagram.
System Sequence diagram
System Design
Class Diagram
Sequence Diagram
System ArchitectureDevelopment Tools and PlatformsImplementation phasesSteps to use Virtual SIM CardReality
GSM Simulation
Demo
ReferencesScientific BackgroundWhat Is the SIM Card ?The SIM, Subscriber Identity Module, is a smart microprocessor chip for mobile phones used in all GSM and 3G networks as well as other digital telephone networks
ContinueWhy using SIM cards in GSM networks? It Identifies the Subscriber. Subscriber information, such as the IMSI (International Mobile Subscriber Identity), is stored in the SIM
 Access and Security: Originally designed to allow access to mobile phone networks, it authenticates the subscriber and holds the GSM network authentication Keys and Algorithms.
 SIM card can be used to store user-defined information such as phonebook entries SMS, and Subscriber related informationContinueSIM Card Architecture8 bit CPU16 K ROM256 bytes RAM4K EEPROM
ContinueSIM Card Memory Structure
ContinueSIM Card Tasksauthentication algorithm (A3).
cipher key generation algorithm (A8).
Encryption and Decryption.
Data storage.AgendaProblem DefinitionObjectivesScientific BackgroundSystem Analysis   use case diagram.
System Sequence diagram
System Design
Class Diagram

Seminar