Soumettre la recherche
Mettre en ligne
eSIM Deep Dive
•
2 j'aime
•
906 vues
Hossein Yavari
Suivre
I tried to gather and share more info about eSIM and Remote SIM Provisioning.
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 29
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
e-SIM Technology || Electronics || Hariharan K
e-SIM Technology || Electronics || Hariharan K
Hariharan Krishnan
e-Sim Sharing (extract)
e-Sim Sharing (extract)
BearingPoint
Creating a smarter world with eSIM
Creating a smarter world with eSIM
JT IoT
eSIM Overview
eSIM Overview
Hossein Yavari
e-SIM
e-SIM
RanjithkumarBalla
esim
esim
G Pulla Reddy College of Engineering
IoT eSIM Test Bed
IoT eSIM Test Bed
Cellnetrix
eSIM
eSIM
Bala Sakri
Recommandé
e-SIM Technology || Electronics || Hariharan K
e-SIM Technology || Electronics || Hariharan K
Hariharan Krishnan
e-Sim Sharing (extract)
e-Sim Sharing (extract)
BearingPoint
Creating a smarter world with eSIM
Creating a smarter world with eSIM
JT IoT
eSIM Overview
eSIM Overview
Hossein Yavari
e-SIM
e-SIM
RanjithkumarBalla
esim
esim
G Pulla Reddy College of Engineering
IoT eSIM Test Bed
IoT eSIM Test Bed
Cellnetrix
eSIM
eSIM
Bala Sakri
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
ntel
Cisco Meraki Overview
Cisco Meraki Overview
SSISG
Private LTE Presentation Pitch
Private LTE Presentation Pitch
adolfoams2000
RSA SecurID Access
RSA SecurID Access
MarketingArrowECS_CZ
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateway
Cisco acs configuration guide
Cisco acs configuration guide
RichardsCCNA
Creating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case study
PositiveTechnologies
Positive approach to security of Core networks
Positive approach to security of Core networks
PositiveTechnologies
Introduction to SIM and USIM
Introduction to SIM and USIM
Naveen Jakhar, I.T.S
Automotive Hacking
Automotive Hacking
GAURAV. H .TANDON
4G to 5G Evolution
4G to 5G Evolution
Manoj Singh
5G Core Network White Paper
5G Core Network White Paper
ssusere032f4
Signaling security essentials. Ready, steady, 5G!
Signaling security essentials. Ready, steady, 5G!
PositiveTechnologies
Advanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public Networks
3G4G
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoT
PositiveTechnologies
Security for 5G presentation.pptx
Security for 5G presentation.pptx
Amr Said
What is Zero Trust
What is Zero Trust
Okta-Inc
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
ArianeSpano
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
Moti Sagey מוטי שגיא
RCS Overview
RCS Overview
Seungyul Kim
Introduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & Gateways
tawi123
Embedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applications
M2M Alliance e.V.
Contenu connexe
Tendances
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
ntel
Cisco Meraki Overview
Cisco Meraki Overview
SSISG
Private LTE Presentation Pitch
Private LTE Presentation Pitch
adolfoams2000
RSA SecurID Access
RSA SecurID Access
MarketingArrowECS_CZ
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateway
Cisco acs configuration guide
Cisco acs configuration guide
RichardsCCNA
Creating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case study
PositiveTechnologies
Positive approach to security of Core networks
Positive approach to security of Core networks
PositiveTechnologies
Introduction to SIM and USIM
Introduction to SIM and USIM
Naveen Jakhar, I.T.S
Automotive Hacking
Automotive Hacking
GAURAV. H .TANDON
4G to 5G Evolution
4G to 5G Evolution
Manoj Singh
5G Core Network White Paper
5G Core Network White Paper
ssusere032f4
Signaling security essentials. Ready, steady, 5G!
Signaling security essentials. Ready, steady, 5G!
PositiveTechnologies
Advanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public Networks
3G4G
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoT
PositiveTechnologies
Security for 5G presentation.pptx
Security for 5G presentation.pptx
Amr Said
What is Zero Trust
What is Zero Trust
Okta-Inc
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
ArianeSpano
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
Moti Sagey מוטי שגיא
RCS Overview
RCS Overview
Seungyul Kim
Tendances
(20)
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
Cisco Meraki Overview
Cisco Meraki Overview
Private LTE Presentation Pitch
Private LTE Presentation Pitch
RSA SecurID Access
RSA SecurID Access
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2
Cisco acs configuration guide
Cisco acs configuration guide
Creating a fuzzer for telecom protocol 4G LTE case study
Creating a fuzzer for telecom protocol 4G LTE case study
Positive approach to security of Core networks
Positive approach to security of Core networks
Introduction to SIM and USIM
Introduction to SIM and USIM
Automotive Hacking
Automotive Hacking
4G to 5G Evolution
4G to 5G Evolution
5G Core Network White Paper
5G Core Network White Paper
Signaling security essentials. Ready, steady, 5G!
Signaling security essentials. Ready, steady, 5G!
Advanced: Private Networks & 5G Non-Public Networks
Advanced: Private Networks & 5G Non-Public Networks
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoT
Security for 5G presentation.pptx
Security for 5G presentation.pptx
What is Zero Trust
What is Zero Trust
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
RCS Overview
RCS Overview
Similaire à eSIM Deep Dive
Introduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & Gateways
tawi123
Embedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applications
M2M Alliance e.V.
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
mfrancis
Podsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_design
podsystem1
 Connected Living - Embedded SIM & M2M
 Connected Living - Embedded SIM & M2M
Telefónica IoT
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
Alan Quayle
From eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the Manufacturing
Soracom Global, Inc.
Cellnetrix company brochure 2012
Cellnetrix company brochure 2012
Cellnetrix
SIMATIC manager سيماتك منجر سيمنز
SIMATIC manager سيماتك منجر سيمنز
EssosElectronic
Cellnetrix brochure 2013
Cellnetrix brochure 2013
Vladimir Nagin
The T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of Trust
Rivetz
Internet of Things
Internet of Things
cumulocity
CellSIM OS Overview 1.0
CellSIM OS Overview 1.0
Vladimir Nagin
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies
Programmable SIM cards, SoftSIMs and eSIMs
Programmable SIM cards, SoftSIMs and eSIMs
Gerry O'Prey
Seminar
Seminar
Noibita
walker_embeddedsims.pdf
walker_embeddedsims.pdf
amazon4it
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
mfrancis
61850IMU Substation Recorder
61850IMU Substation Recorder
GE Grid Solutions
Presentation SIM CARD (GSM)
Presentation SIM CARD (GSM)
Ekansh Agarwal
Similaire à eSIM Deep Dive
(20)
Introduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & Gateways
Embedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applications
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
Podsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_design
 Connected Living - Embedded SIM & M2M
 Connected Living - Embedded SIM & M2M
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
From eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the Manufacturing
Cellnetrix company brochure 2012
Cellnetrix company brochure 2012
SIMATIC manager سيماتك منجر سيمنز
SIMATIC manager سيماتك منجر سيمنز
Cellnetrix brochure 2013
Cellnetrix brochure 2013
The T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of Trust
Internet of Things
Internet of Things
CellSIM OS Overview 1.0
CellSIM OS Overview 1.0
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Programmable SIM cards, SoftSIMs and eSIMs
Programmable SIM cards, SoftSIMs and eSIMs
Seminar
Seminar
walker_embeddedsims.pdf
walker_embeddedsims.pdf
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
61850IMU Substation Recorder
61850IMU Substation Recorder
Presentation SIM CARD (GSM)
Presentation SIM CARD (GSM)
Plus de Hossein Yavari
What is Matroska?
What is Matroska?
Hossein Yavari
SIPREC RTPEngine Media Forking
SIPREC RTPEngine Media Forking
Hossein Yavari
Windows Forensics
Windows Forensics
Hossein Yavari
SIP over TLS
SIP over TLS
Hossein Yavari
Desjardins Data Breach
Desjardins Data Breach
Hossein Yavari
Introduction to Metasploit
Introduction to Metasploit
Hossein Yavari
Which IT Certification is Better for You?
Which IT Certification is Better for You?
Hossein Yavari
Disassembly Using IDA
Disassembly Using IDA
Hossein Yavari
Introduction to Snort
Introduction to Snort
Hossein Yavari
DLL Injection
DLL Injection
Hossein Yavari
SQL Injection in JAVA
SQL Injection in JAVA
Hossein Yavari
Malware Static Analysis
Malware Static Analysis
Hossein Yavari
Creativity and Role of the Leaders
Creativity and Role of the Leaders
Hossein Yavari
IPsec for IMS
IPsec for IMS
Hossein Yavari
Yeastar Technical Training Course
Yeastar Technical Training Course
Hossein Yavari
SENA Cloud UC
SENA Cloud UC
Hossein Yavari
FreePBX Disaster Recovery
FreePBX Disaster Recovery
Hossein Yavari
LTE Architecture Overview
LTE Architecture Overview
Hossein Yavari
Introduction to DIAMETER
Introduction to DIAMETER
Hossein Yavari
Introduction to SS7- Part 2
Introduction to SS7- Part 2
Hossein Yavari
Plus de Hossein Yavari
(20)
What is Matroska?
What is Matroska?
SIPREC RTPEngine Media Forking
SIPREC RTPEngine Media Forking
Windows Forensics
Windows Forensics
SIP over TLS
SIP over TLS
Desjardins Data Breach
Desjardins Data Breach
Introduction to Metasploit
Introduction to Metasploit
Which IT Certification is Better for You?
Which IT Certification is Better for You?
Disassembly Using IDA
Disassembly Using IDA
Introduction to Snort
Introduction to Snort
DLL Injection
DLL Injection
SQL Injection in JAVA
SQL Injection in JAVA
Malware Static Analysis
Malware Static Analysis
Creativity and Role of the Leaders
Creativity and Role of the Leaders
IPsec for IMS
IPsec for IMS
Yeastar Technical Training Course
Yeastar Technical Training Course
SENA Cloud UC
SENA Cloud UC
FreePBX Disaster Recovery
FreePBX Disaster Recovery
LTE Architecture Overview
LTE Architecture Overview
Introduction to DIAMETER
Introduction to DIAMETER
Introduction to SS7- Part 2
Introduction to SS7- Part 2
Dernier
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
UXDXConf
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
IoTAnalytics
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
FIDO Alliance
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
CzechDreamin
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
TopCSSGallery
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
FIDO Alliance
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
ScyllaDB
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
CzechDreamin
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
CzechDreamin
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
UXDXConf
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
CzechDreamin
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
IES VE
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
FIDO Alliance
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
Stephanie Beckett
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
CzechDreamin
ECS 2024 Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
Femke de Vroome
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FIDO Alliance
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
Mark Opanasiuk
Dernier
(20)
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
ECS 2024 Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
eSIM Deep Dive
1.
1 eSIM Deep Dive Hossein
Yavari @senatelecom
2.
Ref: airalo
3.
Ref: airalo
4.
SIM Functions 4 • SIM
is responsible for: – Connection between mobile device and provider – Storage (IMSI, Network data, Encryption data and etc.) © All Rights Reserved
5.
5 SIM Card Evolution Embedded SIM:
eSIM or eUICC © All Rights Reserved
6.
6 “Although the role
of the SIM itself is not changing, the GSMA has defined a radical new way to load it into devices. Now the SIM may be securely downloaded into a ‘Secure Element’ that can be permanently embedded inside any type of device.” © All Rights Reserved
7.
7 eSIM Key Characteristics • eSIM
is: – hardware based – Non-removable – Or like the ordinary removable SIM Card • Remote Provisioning: – SIM profile is transferred over the air (OTA) to the device • eSIM provides easier switch between operators © All Rights Reserved
8.
8 eSIM Key Characteristics (Cont.) • Improvement
in customer experience © All Rights Reserved
9.
Stakeholders Benefits 9 • Operators: – Opens
up new market opportunities – Reduced costs in handling M2M SIM products – Retains industry leading security levels – Minimal impact to existing systems and network infrastructure – Low integration and testing costs © All Rights Reserved
10.
Stakeholders Benefits (Cont.) 10 • SIM Suppliers: –
Opens up wider M2M market opportunities by providing Embedded SIM infrastructure and services on a mass market basis – Add value and flexibility to current SIM products © All Rights Reserved
11.
Stakeholders Benefits (Cont.) 11 • Business Customers: –
Business opportunities from new M2M connected services including new deployment models – Remote service activation enables the up-sell of connected options after initial sale – Connectivity management will be more flexible and cost effective © All Rights Reserved
12.
Stakeholders Benefits (Cont.) 12 • End Consumers: –
Improved customer experience, products will work ‘out of the box’ – Lower cost connected products – Increase in number of valuable connected services © All Rights Reserved
13.
Stakeholders Benefits (Cont.) 13 • M2M Product
Manufacturers: – Opens up new M2M market opportunities – Single Stock Keeping Unit at point of manufacture – Enables flexible global product distribution – Selection of operator subscription is performed on first switch on in destination country – Allows change of operator during the product lifecycle – Improved product reliability and longevity through hermetic sealing -as there is no need to change the physical SIM © All Rights Reserved
14.
Consumer or M2M?
15.
15 eSIM Solutions © All Rights
Reserved • The GSMA has created solutions suited to different types of channels: – Consumer solution: for the ‘direct to consumer’ channel, this solution is required where the end user has direct choice of the operator supplying connectivity. – M2M solution: for the ‘business to business to consumer’ channels, this solution serves the needs of business to business customers, specifically in the Internet of Things (IoT) market.
16.
16 • Consumer devices:
like Cell Phones, watches or other wearables • Connected devices or M2M communications: such as IoT / IoE © All Rights Reserved eSIM Solutions (Cont.)Pull Model Push Model
17.
17 eSIM Players!
18.
Involved Elements 18 • eUICC: – Functionally
identical to a traditional SIM – At manufacture will have a ‘provisioning profile’ assigned with secret keys that allows the associated subscription manager to download and manage ‘operational profiles’ on the eUICC – The technical specification can accommodate both an initial declaration of the MNO in the eUICC, as well as the selection of a new MNO later. © All Rights Reserved
19.
Involved Elements (Cont.) 19 • Subscription Manager: –
Generating SIM profiles in real-time – Management and execution of MNO policy – Secure routing profiles to the eUICC © All Rights Reserved
20.
Involved Elements (Cont.) 20 • MNO: – Uses
subscription manager to manage profiles – Maximum re-use of existing provisioning interfaces and processes © All Rights Reserved
21.
21 RSP
22.
Remote SIM Provisioning 22© All
Rights Reserved
23.
RSP Consumer Architecture 23© All
Rights Reserved
24.
RSP Consumer Architecture Elements 24 • SM-DP+: -
Profile storage (securely store MNO SIM profiles) - Manage profiles (Download, Enable or Disable profiles) • SM-DS: - Discovery server for newly available profiles for each consumer • LPA - The Local Profile Assistant is a set of functions in the device responsible for providing the capability to download encrypted Profiles to the eUICC. © All Rights Reserved
25.
RSP M2M Architecture 25© All
Rights Reserved
26.
RSP M2M Architecture Elements 26 • SM-DP: -
Profile storage (securely store MNO SIM profiles) • SM-SR: - Securing communication channel to eUICC - Manage profiles (Download, Enable or Disable profiles) • OTA Gateway*: - SMS gateway for secure over the air communication to eUICC © All Rights Reserved
27.
RSP M2M vs Consumer 27©
All Rights Reserved M2M Solution Consumer Solution Push Model / server-driven option Pull Model / client-driven option Separated roles of SM-DP and SM-SR Profile management operations can be run only from the back-end infrastructure side Data Processing and Secure Routing consolidated in SM-DP+. SM-DS as an optional feature Profile management is initiated from the local device side
28.
Consumer RSP Initiation 28© All
Rights Reserved • QR activation, arguably the most popular option, it’s 2D barcode format, it contains a Matching ID number and SM- DP+ address, which are used for reaching a dedicated SM- DP+ server and downloading a dedicated eSIM profile. • Default SM-DP+ address, with an eUICC pre-provisioned with operator’s SM-DP+ address, mostly useful with the operator subsidized mobile phones market. It is a fully automatic activation and doesn’t require any interaction from the end- user except turning on the device itself. • SM-DS activation, which is useful in situations when an end- user purchases a mobile device and eSIM subscription separately.
29.
Hope to help
you!
Télécharger maintenant