SlideShare une entreprise Scribd logo
1  sur  29
Télécharger pour lire hors ligne
1
eSIM Deep Dive
Hossein Yavari
@senatelecom
Ref: airalo
Ref: airalo
SIM Functions
4
• SIM is responsible for:
– Connection between mobile device and
provider
– Storage (IMSI, Network data, Encryption
data and etc.)
© All Rights Reserved
5
SIM Card
Evolution
Embedded SIM: eSIM or eUICC
© All Rights Reserved
6
“Although the role of the SIM itself is not changing, the GSMA has defined a radical
new way to load it into devices. Now the SIM may be securely downloaded into a
‘Secure Element’ that can be permanently embedded inside any type of device.”
© All Rights Reserved
7
eSIM
Key Characteristics
• eSIM is:
– hardware based
– Non-removable
– Or like the ordinary removable SIM Card
• Remote Provisioning:
– SIM profile is transferred over the air (OTA)
to the device
• eSIM provides easier switch between
operators
© All Rights Reserved
8
eSIM
Key Characteristics
(Cont.)
• Improvement in customer experience
© All Rights Reserved
Stakeholders
Benefits
9
• Operators:
– Opens up new market opportunities
– Reduced costs in handling M2M SIM products
– Retains industry leading security levels
– Minimal impact to existing systems and network
infrastructure
– Low integration and testing costs
© All Rights Reserved
Stakeholders
Benefits
(Cont.)
10
• SIM Suppliers:
– Opens up wider M2M market opportunities by
providing Embedded SIM infrastructure and
services on a mass market basis
– Add value and flexibility to current SIM products
© All Rights Reserved
Stakeholders
Benefits
(Cont.)
11
• Business Customers:
– Business opportunities from new M2M connected
services including new deployment models
– Remote service activation enables the up-sell of
connected options after initial sale
– Connectivity management will be more flexible
and cost effective
© All Rights Reserved
Stakeholders
Benefits
(Cont.)
12
• End Consumers:
– Improved customer experience, products will
work ‘out of the box’
– Lower cost connected products
– Increase in number of valuable connected services
© All Rights Reserved
Stakeholders
Benefits
(Cont.)
13
• M2M Product Manufacturers:
– Opens up new M2M market opportunities
– Single Stock Keeping Unit at point of manufacture
– Enables flexible global product distribution
– Selection of operator subscription is performed on
first switch on in destination country
– Allows change of operator during the product
lifecycle
– Improved product reliability and longevity through
hermetic sealing -as there is no need to change
the physical SIM
© All Rights Reserved
Consumer
or
M2M?
15
eSIM
Solutions
© All Rights Reserved
• The GSMA has created solutions suited to different
types of channels:
– Consumer solution: for the ‘direct to consumer’
channel, this solution is required where the end user
has direct choice of the operator supplying
connectivity.
– M2M solution: for the ‘business to business to
consumer’ channels, this solution serves the needs
of business to business customers, specifically in the
Internet of Things (IoT) market.
16
• Consumer devices: like Cell Phones, watches or
other wearables
• Connected devices or M2M communications:
such as IoT / IoE
© All Rights Reserved
eSIM
Solutions
(Cont.)Pull
Model
Push
Model
17
eSIM
Players!
Involved
Elements
18
• eUICC:
– Functionally identical to a traditional SIM
– At manufacture will have a ‘provisioning profile’
assigned with secret keys that allows the
associated subscription manager to download and
manage ‘operational profiles’ on the eUICC
– The technical specification can accommodate both
an initial declaration of the MNO in the eUICC, as
well as the selection of a new MNO later.
© All Rights Reserved
Involved
Elements
(Cont.)
19
• Subscription Manager:
– Generating SIM profiles in real-time
– Management and execution of MNO policy
– Secure routing profiles to the eUICC
© All Rights Reserved
Involved
Elements
(Cont.)
20
• MNO:
– Uses subscription manager to manage profiles
– Maximum re-use of existing provisioning interfaces
and processes
© All Rights Reserved
21
RSP
Remote SIM
Provisioning
22© All Rights Reserved
RSP
Consumer Architecture
23© All Rights Reserved
RSP
Consumer Architecture
Elements
24
• SM-DP+:
- Profile storage (securely store MNO SIM profiles)
- Manage profiles (Download, Enable or Disable
profiles)
• SM-DS:
- Discovery server for newly available profiles for
each consumer
• LPA
- The Local Profile Assistant is a set of functions in
the device responsible for providing the capability
to download encrypted Profiles to the eUICC.
© All Rights Reserved
RSP
M2M Architecture
25© All Rights Reserved
RSP
M2M Architecture
Elements
26
• SM-DP:
- Profile storage (securely store MNO SIM
profiles)
• SM-SR:
- Securing communication channel to eUICC
- Manage profiles (Download, Enable or Disable
profiles)
• OTA Gateway*:
- SMS gateway for secure over the air
communication to eUICC
© All Rights Reserved
RSP
M2M vs Consumer
27© All Rights Reserved
M2M Solution Consumer Solution
Push Model / server-driven
option
Pull Model / client-driven option
Separated roles of SM-DP and
SM-SR
Profile management
operations can be run only
from the back-end
infrastructure side
Data Processing and Secure
Routing consolidated in SM-DP+.
SM-DS as an optional feature
Profile management is initiated
from the local device side
Consumer
RSP Initiation
28© All Rights Reserved
• QR activation, arguably the most popular option, it’s 2D
barcode format, it contains a Matching ID number and SM-
DP+ address, which are used for reaching a dedicated SM-
DP+ server and downloading a dedicated eSIM profile.
• Default SM-DP+ address, with an eUICC pre-provisioned with
operator’s SM-DP+ address, mostly useful with the operator
subsidized mobile phones market. It is a fully automatic
activation and doesn’t require any interaction from the end-
user except turning on the device itself.
• SM-DS activation, which is useful in situations when an end-
user purchases a mobile device and eSIM subscription
separately.
Hope to help you!

Contenu connexe

Tendances

Gsm based vehicle theft control system
Gsm based vehicle theft control systemGsm based vehicle theft control system
Gsm based vehicle theft control system
Ecwayt
 
High-end Inertial Sensors for Defense, Aerospace, and Industrial Applications...
High-end Inertial Sensors for Defense, Aerospace, and Industrial Applications...High-end Inertial Sensors for Defense, Aerospace, and Industrial Applications...
High-end Inertial Sensors for Defense, Aerospace, and Industrial Applications...
Yole Developpement
 
Vehicle Theft control system
Vehicle Theft control systemVehicle Theft control system
Vehicle Theft control system
Ankush Jamthikar
 

Tendances (20)

CellSIM OS Overview 1.0
CellSIM OS Overview 1.0CellSIM OS Overview 1.0
CellSIM OS Overview 1.0
 
Gsm based vehicle theft control system
Gsm based vehicle theft control systemGsm based vehicle theft control system
Gsm based vehicle theft control system
 
Autonomous vehicles: becoming economically feasible through improvements in l...
Autonomous vehicles: becoming economically feasible through improvements in l...Autonomous vehicles: becoming economically feasible through improvements in l...
Autonomous vehicles: becoming economically feasible through improvements in l...
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
High-end Inertial Sensors for Defense, Aerospace, and Industrial Applications...
High-end Inertial Sensors for Defense, Aerospace, and Industrial Applications...High-end Inertial Sensors for Defense, Aerospace, and Industrial Applications...
High-end Inertial Sensors for Defense, Aerospace, and Industrial Applications...
 
How vehicle telematics will transform your business
How vehicle telematics will transform your businessHow vehicle telematics will transform your business
How vehicle telematics will transform your business
 
Automotive telematics
Automotive telematicsAutomotive telematics
Automotive telematics
 
Vehical tracking system
Vehical tracking systemVehical tracking system
Vehical tracking system
 
SmartTrust WIB 1.3
SmartTrust WIB 1.3SmartTrust WIB 1.3
SmartTrust WIB 1.3
 
TechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center AssuranceTechWiseTV Workshop: Cisco DNA Center Assurance
TechWiseTV Workshop: Cisco DNA Center Assurance
 
Value for a Connected Vehicle (IoT)
Value for a Connected Vehicle (IoT)Value for a Connected Vehicle (IoT)
Value for a Connected Vehicle (IoT)
 
Smart Helmet
Smart HelmetSmart Helmet
Smart Helmet
 
Telecom security from ss7 to all ip all-open-v3-zeronights
Telecom security from ss7 to all ip all-open-v3-zeronightsTelecom security from ss7 to all ip all-open-v3-zeronights
Telecom security from ss7 to all ip all-open-v3-zeronights
 
Cisco ip phone key expansion module setup
Cisco ip phone key expansion module setupCisco ip phone key expansion module setup
Cisco ip phone key expansion module setup
 
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 iParanoid: an IMSI Catcher - Stingray Intrusion Detection System iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 
Apple iphone 6 and 6 plus front camera module teardown reverse costing report...
Apple iphone 6 and 6 plus front camera module teardown reverse costing report...Apple iphone 6 and 6 plus front camera module teardown reverse costing report...
Apple iphone 6 and 6 plus front camera module teardown reverse costing report...
 
Vehicle Theft control system
Vehicle Theft control systemVehicle Theft control system
Vehicle Theft control system
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon Library
 
Embedded system in automobile
Embedded system in automobileEmbedded system in automobile
Embedded system in automobile
 
BioMEMS Market and Technology 2020
BioMEMS Market and Technology 2020BioMEMS Market and Technology 2020
BioMEMS Market and Technology 2020
 

Similaire à eSIM Deep Dive

What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystWhat OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
mfrancis
 
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V IzzoKeynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
mfrancis
 

Similaire à eSIM Deep Dive (20)

Introduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & GatewaysIntroduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & Gateways
 
Embedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applicationsEmbedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applications
 
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSystWhat OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
What OSGi technology offers to mobile enterprise developers - Jo Ritter, ProSyst
 
Podsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_designPodsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_design
 
 Connected Living - Embedded SIM & M2M
 Connected Living - Embedded SIM & M2M Connected Living - Embedded SIM & M2M
 Connected Living - Embedded SIM & M2M
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
 
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
 
From eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the ManufacturingFrom eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the Manufacturing
 
Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix company brochure 2012
Cellnetrix company brochure 2012
 
SIMATIC manager سيماتك منجر سيمنز
SIMATIC manager سيماتك منجر سيمنزSIMATIC manager سيماتك منجر سيمنز
SIMATIC manager سيماتك منجر سيمنز
 
Cellnetrix brochure 2013
Cellnetrix brochure 2013Cellnetrix brochure 2013
Cellnetrix brochure 2013
 
The T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of TrustThe T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of Trust
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
 
Seminar
SeminarSeminar
Seminar
 
walker_embeddedsims.pdf
walker_embeddedsims.pdfwalker_embeddedsims.pdf
walker_embeddedsims.pdf
 
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V IzzoKeynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
Keynote - The Connected Home - It Starts With a Managed Service Gateway - V Izzo
 
61850IMU Substation Recorder
61850IMU Substation Recorder61850IMU Substation Recorder
61850IMU Substation Recorder
 
Presentation SIM CARD (GSM)
Presentation SIM CARD (GSM)Presentation SIM CARD (GSM)
Presentation SIM CARD (GSM)
 
Sierraware virtual phone
Sierraware virtual phoneSierraware virtual phone
Sierraware virtual phone
 

Plus de Hossein Yavari

Plus de Hossein Yavari (20)

What is Matroska?
What is Matroska?What is Matroska?
What is Matroska?
 
SIPREC RTPEngine Media Forking
SIPREC RTPEngine Media ForkingSIPREC RTPEngine Media Forking
SIPREC RTPEngine Media Forking
 
Windows Forensics
Windows ForensicsWindows Forensics
Windows Forensics
 
SIP over TLS
SIP over TLSSIP over TLS
SIP over TLS
 
Desjardins Data Breach
Desjardins Data BreachDesjardins Data Breach
Desjardins Data Breach
 
Introduction to Metasploit
Introduction to MetasploitIntroduction to Metasploit
Introduction to Metasploit
 
Which IT Certification is Better for You?
Which IT Certification is Better for You?Which IT Certification is Better for You?
Which IT Certification is Better for You?
 
Disassembly Using IDA
Disassembly Using IDADisassembly Using IDA
Disassembly Using IDA
 
Introduction to Snort
Introduction to SnortIntroduction to Snort
Introduction to Snort
 
DLL Injection
DLL InjectionDLL Injection
DLL Injection
 
SQL Injection in JAVA
SQL Injection in JAVASQL Injection in JAVA
SQL Injection in JAVA
 
Malware Static Analysis
Malware Static AnalysisMalware Static Analysis
Malware Static Analysis
 
Creativity and Role of the Leaders
Creativity and Role of the LeadersCreativity and Role of the Leaders
Creativity and Role of the Leaders
 
IPsec for IMS
IPsec for IMSIPsec for IMS
IPsec for IMS
 
Yeastar Technical Training Course
Yeastar Technical Training CourseYeastar Technical Training Course
Yeastar Technical Training Course
 
SENA Cloud UC
SENA Cloud UCSENA Cloud UC
SENA Cloud UC
 
FreePBX Disaster Recovery
FreePBX Disaster RecoveryFreePBX Disaster Recovery
FreePBX Disaster Recovery
 
LTE Architecture Overview
LTE Architecture OverviewLTE Architecture Overview
LTE Architecture Overview
 
Introduction to DIAMETER
Introduction to DIAMETERIntroduction to DIAMETER
Introduction to DIAMETER
 
Introduction to SS7- Part 2
Introduction to SS7- Part 2Introduction to SS7- Part 2
Introduction to SS7- Part 2
 

Dernier

Dernier (20)

WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 

eSIM Deep Dive

  • 1. 1 eSIM Deep Dive Hossein Yavari @senatelecom
  • 4. SIM Functions 4 • SIM is responsible for: – Connection between mobile device and provider – Storage (IMSI, Network data, Encryption data and etc.) © All Rights Reserved
  • 5. 5 SIM Card Evolution Embedded SIM: eSIM or eUICC © All Rights Reserved
  • 6. 6 “Although the role of the SIM itself is not changing, the GSMA has defined a radical new way to load it into devices. Now the SIM may be securely downloaded into a ‘Secure Element’ that can be permanently embedded inside any type of device.” © All Rights Reserved
  • 7. 7 eSIM Key Characteristics • eSIM is: – hardware based – Non-removable – Or like the ordinary removable SIM Card • Remote Provisioning: – SIM profile is transferred over the air (OTA) to the device • eSIM provides easier switch between operators © All Rights Reserved
  • 8. 8 eSIM Key Characteristics (Cont.) • Improvement in customer experience © All Rights Reserved
  • 9. Stakeholders Benefits 9 • Operators: – Opens up new market opportunities – Reduced costs in handling M2M SIM products – Retains industry leading security levels – Minimal impact to existing systems and network infrastructure – Low integration and testing costs © All Rights Reserved
  • 10. Stakeholders Benefits (Cont.) 10 • SIM Suppliers: – Opens up wider M2M market opportunities by providing Embedded SIM infrastructure and services on a mass market basis – Add value and flexibility to current SIM products © All Rights Reserved
  • 11. Stakeholders Benefits (Cont.) 11 • Business Customers: – Business opportunities from new M2M connected services including new deployment models – Remote service activation enables the up-sell of connected options after initial sale – Connectivity management will be more flexible and cost effective © All Rights Reserved
  • 12. Stakeholders Benefits (Cont.) 12 • End Consumers: – Improved customer experience, products will work ‘out of the box’ – Lower cost connected products – Increase in number of valuable connected services © All Rights Reserved
  • 13. Stakeholders Benefits (Cont.) 13 • M2M Product Manufacturers: – Opens up new M2M market opportunities – Single Stock Keeping Unit at point of manufacture – Enables flexible global product distribution – Selection of operator subscription is performed on first switch on in destination country – Allows change of operator during the product lifecycle – Improved product reliability and longevity through hermetic sealing -as there is no need to change the physical SIM © All Rights Reserved
  • 15. 15 eSIM Solutions © All Rights Reserved • The GSMA has created solutions suited to different types of channels: – Consumer solution: for the ‘direct to consumer’ channel, this solution is required where the end user has direct choice of the operator supplying connectivity. – M2M solution: for the ‘business to business to consumer’ channels, this solution serves the needs of business to business customers, specifically in the Internet of Things (IoT) market.
  • 16. 16 • Consumer devices: like Cell Phones, watches or other wearables • Connected devices or M2M communications: such as IoT / IoE © All Rights Reserved eSIM Solutions (Cont.)Pull Model Push Model
  • 18. Involved Elements 18 • eUICC: – Functionally identical to a traditional SIM – At manufacture will have a ‘provisioning profile’ assigned with secret keys that allows the associated subscription manager to download and manage ‘operational profiles’ on the eUICC – The technical specification can accommodate both an initial declaration of the MNO in the eUICC, as well as the selection of a new MNO later. © All Rights Reserved
  • 19. Involved Elements (Cont.) 19 • Subscription Manager: – Generating SIM profiles in real-time – Management and execution of MNO policy – Secure routing profiles to the eUICC © All Rights Reserved
  • 20. Involved Elements (Cont.) 20 • MNO: – Uses subscription manager to manage profiles – Maximum re-use of existing provisioning interfaces and processes © All Rights Reserved
  • 24. RSP Consumer Architecture Elements 24 • SM-DP+: - Profile storage (securely store MNO SIM profiles) - Manage profiles (Download, Enable or Disable profiles) • SM-DS: - Discovery server for newly available profiles for each consumer • LPA - The Local Profile Assistant is a set of functions in the device responsible for providing the capability to download encrypted Profiles to the eUICC. © All Rights Reserved
  • 25. RSP M2M Architecture 25© All Rights Reserved
  • 26. RSP M2M Architecture Elements 26 • SM-DP: - Profile storage (securely store MNO SIM profiles) • SM-SR: - Securing communication channel to eUICC - Manage profiles (Download, Enable or Disable profiles) • OTA Gateway*: - SMS gateway for secure over the air communication to eUICC © All Rights Reserved
  • 27. RSP M2M vs Consumer 27© All Rights Reserved M2M Solution Consumer Solution Push Model / server-driven option Pull Model / client-driven option Separated roles of SM-DP and SM-SR Profile management operations can be run only from the back-end infrastructure side Data Processing and Secure Routing consolidated in SM-DP+. SM-DS as an optional feature Profile management is initiated from the local device side
  • 28. Consumer RSP Initiation 28© All Rights Reserved • QR activation, arguably the most popular option, it’s 2D barcode format, it contains a Matching ID number and SM- DP+ address, which are used for reaching a dedicated SM- DP+ server and downloading a dedicated eSIM profile. • Default SM-DP+ address, with an eUICC pre-provisioned with operator’s SM-DP+ address, mostly useful with the operator subsidized mobile phones market. It is a fully automatic activation and doesn’t require any interaction from the end- user except turning on the device itself. • SM-DS activation, which is useful in situations when an end- user purchases a mobile device and eSIM subscription separately.
  • 29. Hope to help you!