SIM Evolution. Klaus Vedder. Presented by: 10 July 2018 ETSI th Sigos Conference
|
|
- Shanon Page
- 5 years ago
- Views:
Transcription
1 SIM Evolution Presented by: Klaus Vedder For: 20 th Sigos Conference 10 July 2018 ETSI 2018
2 The Subscriber Identity Module in 1988 "A SIM is the physically secured module which contains the IMSI, an authentication algorithm, the authentication key and other (security related) information and functions. The basic function of the SIM is to authenticate the subscriber identity in order to prevent misuse of the MS (Mobile Station) and the network." From the report of SIMEG#1 in January 1988 GSM System Requirement: provide the same level of security as the fixed network Plug-in SIM with carrier Telemig, Brazil, 2005 The question at the time: Wouldn't it be sufficient to have a functional specification and let every operator specify its own interface (except for the form factor)? ETSI
3 3 The Form Factors in 1988 Option 1: "IC card" The ID-1 card used by Deutsche Telekom in their analogue network Option 2: "Fixed" = Software SIM fully incorporated into the handset Rejected due to security concerns and less flexibility - would require operator specific personalisation of the handset Option 3 (Plug-in SIM): "Removable" a vs 24 pin DIL with 8 pins connected ETSI
4 The SIM card: The key to gain access to your customer Some Early SIMs Used for the first call in June 1991 The contact area well integrated into the design Signature strip Plastic not suitable for embossing and use as a credit card ETSI
5 Security, Technology and Services The SIM: Providing the security Issuer specific authentication algorithm Issuer specific algorithm for cipher key generation Security management specified by issuer Attacks 1998 black box attack against Comp Chosen plaintext-ciphertext attack to calculate the secret authentication key 2013 Black Hat Conference Las Vegas: Faulty SW implementations This talk ends this myth of unbreakable SIM cards and illustrates that the cards - like any other computing system are plagued by implementation and configuration bugs. Karsten Nohl The SIM card: Providing universal plastic roaming The SIM card: Fostering the mass market by Freeing the Mobile of the subscription The SIM: Driving Technology and Applications Leading to new generations of micro-controllers Memory requirements for smart cards were driven solely by GSM High temperature card material to satisfy the new environment The SIM Application Toolkit The world's first global platform for secure Value Added Services ETSI
6 Fire walls between applications From the SIM to the UICC or from mono -application to multi-application 1999/2000 Split of all SIM specifications and responsibility A generic part (UICC) to form the multi-application platform (ETSI) An application specific part, the SIM application (3GPP) The UICC consists of (all) application independent functions and features Separation of lower layers and applications Up to 20 logical channels to run applications in parallel USB, NFC, security, part of UICC specification ID Ticketing Specified by the respective industry sector Specified by ETSI TC SCP USIM SIM Toolkit Public Transport UICC the multi-application smart card platform Electr. Purse ETSI
7 7 Some Thoughts on Standardisation Standardisation can create a mass market GSM vs Telepoint ("Birdie", "Rabbit, ) Standardisation can drive technology Standardisation is a way to achieve interoperability There is, however, more needed than just the specification containing the technical realisation of the requirement specification Standardisation shall not prevent technical, commercial and market progress Backwards compatibility is not always a desired feature Advancing from 2G to 3G and ignoring total backwards compatibility would have provided a huge improvement on the technical side with a high potential for the commercial side in the mid to long term Using a standards body to delay or block a topic may prove counterproductive and lead to a fragmented market Standardisation for the sake of standardisation is a waste of time and money ETSI
8 The What s Machine a Title to? Machine UICC March 2010: ETSI TC SCP approves a new specification for UICCs inm2m (TS Smart Cards, Machine to Machine UICC, Physical and logical characteristics) M2M specific constraints such as data retention, temperature, memory update cycles, vibration resistance, humidity MFF1 (M2M Form Factor 1) socketable 8 pin solution MFF2 : a non-removable, to-be-soldered package (SON8) Plug-in SIM card 15mm x 25 mm SON8 5mm x 6mm SON8 5mm x 6mm Can the use of M2M Form Factors really be restricted to Machine-to-Machine applications? ETSI
9 Some Impacts of a Solderable UICC No more "plastic roaming " Need to change the operator after deployment Ownership of an embedded UICC In some countries the end user will own the "black beetle No point in stealing a mobile device with an embedded UICC Lifetime issues of the chip - as long as the device (?) Lifecycle management - personalisation and distribution Future role of the MNOs and service providers (car manufacturers, energy suppliers, ) ETSI
10 Managing an embedded UICC Today: HW, SW, security data out of one and the same source The SIM manufacturer develops OS including security optimised algorithms The SIM manufacturer generates personalisation data (serial numbers, keys, MNO credentials, ), loads them into the chip in its premises, together with an MNO specific profile, and sends SIMs and data to the MNO Tomorrow: Split system OEMs (device vendors) are provided with chips containing OS and algorithms Subscription Manager (SIM manufacturer) generates personalisation data (serial numbers, keys, MNO credentials. ) and sends these data to MNO and OEM OEM loads data on its premises in a secure way into the UICCs Two questions: How to handle the case that the device is not specifically produced for a specific MNO (in particular in the case of M2M devices) How to change the subscription of a device in the field 10 ETSI
11 Challenges Provisioning of subscriptions over-the-air or over-the-wire after production, outside of factory New ecosystem with dynamic subscription management (changing of subscriptions and profiles in the field) ETSI
12 The Road to embedded UICCs, the Loss of the Fast Interface and Other Form Factors "Today's SIM card is the most expensive piece of real estate on a PCB" (OEM manufacturer in 2012) The ID-1 Card (1FF, 1988) Plug-in Card (2FF, 1989) 3FF (2003) 4FF (2012) MFF2 (2010) ~ 2016 Non-standardised packages - size of the package down to chipscale VCC RST GND SWP The 4th form factor does not provide the space for the USB interface which had taken years to be approved Courtesy Giesecke & Devrient CLK USB I/O USB SWP (Single Wire Protocol) is the standardised interface for NFC-applications ETSI
13 Secure Elements: From Separate to Integrated The traditional SIM needs to be re-considered in the context of new mobile communication challenges, including machine to machine communications.* euicc** The UICC becomes an integrated, though dedicated piece of hardware of the device (e.g.,mff2) Provides the possibility of dematerialising the issuance of the SIM SSP (Smart Secure Platform) First informal discussions at SCP#71 in Cupertino in October 2015 Idea: Get rid of the UICC transport protocol (T=0), APDUs,.. Create a new high level interface application - independent of lower levels * Prof. Mike Walker when presenting the work of Deutsche Telekom, G&D, Telefónica O2 UK and Vodafone on the management of embedded UICCs at the ETSI Security Conference in January 2011 ** An embedded UICC or euicc is a "UICC which is not easily accessible or replaceable, is not intended to be removed or replaced in the terminal, and enables the secure changing of subscriptions" (ETSI TS ) ETSI
14 The Smart Secure Platform Objective: better integration of the UICC into the specific use case while retaining its characteristics Layout of the SSP protocol stack SSP is designed to be a modular platform offering a core set of features as well as a number of options that need to be selected at the time of implementation based on the intended application (e.g., a system of sensors in an IoT application will most likely not require full fledged UICCs in every sensor). An open platform for multiple applications Clear separation of layers Choice of protocols (SPI, I2C, ) Faster and flexible Choice of hardware New filesystem Support of existing features Contactless, Toolkit, Figure taken from ETSI TS v ETSI
15 The New SSP Specifications The SSP classes issp: the UICC (and thus the SIM) becomes an integrated part of the chipset (SoC) essp: SSP version of the euicc; rssp: SSP version of the (removable) UICC Priority on integrated SSP; essp and rssp to follow Requirements split into generic requirements for all classes and class specific requirements (currently only for issp) TS Smart Secure Platform; Requirements Status: under change control The technical realisations TS Smart Secure Platform; General characteristics TS Smart Secure Platform; Integrated SSP (issp) characteristics Status: both are approaching completion ETSI
16 The issp Concept Integration of the functionality of the UICC into a System on Chip (SoC) solution. The issp is an independent secure processor within the SoC Advantage lies in the reduction of the number of chips, deeper integration and thus reduced amount of space Several bundles may co-exist in the SoC; one being executed within the Tamper Resistant Element (TRE) and the rest stored securely outside the TRE, ready to be swapped in and executed as required Bundle 1 Telecoms Bundle 2 Payment Bundle 3 Identity Bundle 4 DRM Bundle 5 IoT Primary Platform Interface Primary Platform * (underlying HW, low level OS, ) Technology & use ase independent *For details and a diagram depicting an SoC solution see GlobalPlatform Technology VPP Concepts and Interfaces Version 1.0 (March 2018) ETSI
17 Multiple Industry Sector SSP Device Payment Bundle Management Entity* Connections forbidden? Under discussion 3GPP Functions Connects to the enabled and active Telecom Bundle(s)** Telecom Bundle Management Entity* ** (s) or no (s), that s the question SSP Bundle 1 Bundle 2 Family Identifier: Family Identifier: Payment Payment Bundle 3 Family Identifier: XYC Bundle 4 Bundle 5 Bundle 6 Family Identifier: Family Identifier: Family Identifier: Telecom Bundle Telecom Bundle Telecom Bundle *Not yet specified; rules up to the specific industry sector Primary Platform Interface Primary Platform ETSI
18 Conclusion The standardised SIM packages will (largely) disappear and x SoC a new logical interface will replace today s rather old interface for use by all industry sectors. ETSI
19 Where is this Trip Really Leading Us? The meeting which started the concept of the UICC at the total eclipse of the sun in 1999 ETSI
20 Thank You nearly Dr. Klaus Vedder Chairman ETSI TC SCP Zeata Security Ltd. ETSI TC Smart Card Platform Home of the UICC The most widely deployed Secure Element in the world Next ETSI TC SCP Plenary Meeting Paris, France September 2018 see: ETSI
21 ETSI TC SCP Home of the UICC the most widely deployed Secure Element with more than 5 billion pieces going into the market every year 30 years of dedication and real-life experience Scope Creation of a series of specifications for a Secure Element platform on which bodies from inside and outside the telecom-world can base their system specific applications to achieve compatibility between all applications resident on the Secure Element Development and maintenance of interface, procedures and protocol specifications between the Secure Element and entities (remote or local) used in the management of that Secure Element. This includes interfaces, procedures and protocol specifications used between such entities for the secure provisioning and operation of services making use of that Secure Element Output Over fifty specifications and reports on Secure Elements encompassing for every topic the whole range from requirements via the technical solution to the related test specification; topics range from administrative commands to APIs, browsers, Internet connectivity, Machine-to-Machine, new interfaces for high speed and NFC as well as remote management All specifications can be downloaded free of charge from the ETSI website The specifications are application agnostic. ETSI
2 nd ETSI Security Workshop: Future Security. Smart Cards. Dr. Klaus Vedder. Chairman ETSI TC SCP Group Senior VP, Giesecke & Devrient
2 nd ETSI Security Workshop: Future Security Smart Cards Dr. Klaus Vedder Chairman ETSI TC SCP Group Senior VP, Giesecke & Devrient ETSI TC SCP, the Smart Card Committee 19 Years of Dedication and Real-life
More informationThe SIM Turns 20. Dr. Klaus Vedder. Chairman ETSI TC SCP. 3rd ETSI Security WS Sophia Antipolis, France January 2008
The SIM Turns 20 Dr. Klaus Vedder Chairman ETSI TC SCP Footer text (edit in View : Header and Footer) 3rd ETSI Security WS Sophia Antipolis, France 14-15 January 2008 World Class Standards ETSI TC SCP,
More informationThe UICC. Recent Work of ETSI TC Smart Card Platform. Dr. Klaus Vedder Chairman ETSI TC SCP
Dr. Klaus Vedder Chairman ETSI TC SCP The UICC Recent Work of ETSI TC Smart Card Platform 8th ETSI Security Workshop, Sophia Antipolis, France, 16-17 January 2012 ETSI 2012. All rights reserved SIMs, USIMs,
More informationThe UICC. Recent Work of SCP and Related Security Aspects. Dr. Klaus Vedder Chairman ETSI TC SCP
The UICC Recent Work of SCP and Related Security Aspects Dr. Klaus Vedder Chairman ETSI TC SCP Footer text (edit in View : Header and Footer) 5 th ETSI Security WS Sophia Antipolis, France 20-22 January
More informationGSMA Embedded SIM Specification Remote SIM Provisioning for M2M. A single, common and global specification to accelerate growth in M2M
GSMA Embedded SIM Specification Remote SIM Provisioning for M2M Purpose of this Reference Messaging Pack Appropriate slides may be selected to be used for within different presentations for multiple audiences
More informationGSM Association (GSMA) Mobile Ticketing Initiative
GSM Association (GSMA) Mobile Ticketing Initiative Sue Monahan Director - GSMA NA Clif Campbell Lead Member of Technical Staff AT&T April 2010 Content GSM World Today GSMA Overview GSMA M-Ticketing Initiative
More informationConnected Living. SIMs & M2M the Central and Developing Role of SIMs
Connected Living SIMs & M2M the Central and Developing Role of SIMs 2014.06.10 M2M Services requires a Specific Machine SIM M2M services have specific characteristics that imply a different Machine SIM
More informationebook - TRUSTED esim TESTING FRAMEWORK - June 2016 BUILDING A TRUSTED EMBEDDED SIM TESTING FRAMEWORK IN THE AGE OF IOT
ebook - TRUSTED esim TESTING FRAMEWORK - June 2016 BUILDING A TRUSTED EMBEDDED SIM TESTING FRAMEWORK IN THE AGE OF IOT INTRODUCTION 3 INTRODUCTION The launch of the GSMA s Embedded SIM Specification, together
More informationGSMA Embedded SIM 9 th December Accelerating growth and operational efficiency in the M2M world
GSMA Embedded SIM 9 th December 2013 Purpose of this Reference Messaging Pack Appropriate slides may be selected to used for within different presentations for multiple audiences To provide consistent
More informationSEPA goes Mobile Dr. Marijke De Soete ETSI Security Workshop January 2011 Sophia Antipolis, France
www.europeanpaymentscouncil.eu SEPA goes Mobile Dr. Marijke De Soete ETSI Security Workshop 2011 19-20 January 2011 Sophia Antipolis, France Global mobile subscribers (millions) Mobile phone: some statistics
More informationNew Business. Opportunities for Cellular IoT. Loic Bonvarlet Director of Marketing Secure Identity Arm. Copyright 2018 Arm, All rights reserved.
New Business Opportunities for Cellular IoT Loic Bonvarlet Director of Marketing Secure Identity Arm Key Takeaways Cellular IoT market worth $9.65 Billion by 2025 (CAGR: 21.4%)* New SIM technologies unleash
More informationThe Open Application Platform for Secure Elements.
The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java
More informationSecure Elements 101. Sree Swaminathan Director Product Development, First Data
Secure Elements 101 Sree Swaminathan Director Product Development, First Data Secure Elements Secure Element is a tamper resistant Smart Card chip that facilitates the secure storage and transaction of
More informationSecure Over-The-Air Services in NFC Ecosystems
Secure Over-The-Air Services in NFC Ecosystems Sirpa Nordlund Venyon Hagenberg March 20th, 2007 Contents of the presentation 1. Building up NFC ecosystem 2. Trusted third party and value proposition 3.
More informationSecure Application Trend in Smartphones. STMicroelectronics November 2017
Secure Application Trend in Smartphones STMicroelectronics November 2017 A global semiconductor leader 2016 revenues of $6.97B Listed: NYSE, Euronext Paris and Borsa Italiana, Milan Who We Are 2 Research
More informationSMART CARDS. Miguel Monteiro FEUP / DEI
SMART CARDS Miguel Monteiro apm@fe.up.pt FEUP / DEI WHAT IS A SMART CARD Distinguishable characteristics Can participate in automated electronic transactions Used primarily to add security Not easily forged
More information5G SIM: Maximising MNO Investment in 5G Networks
5G SIM: Maximising MNO Investment in 5G Networks MNO migration to 5G has begun 67 Mobile Network Operators (MNOs) in 39 countries have announced 5G availability between 2018 and 2022 Source: GSA 1.36 billion
More informationDate: 13 June Location: Sophia Antipolis. Integrating the SIM. Dr. Adrian Escott. Qualcomm Technologies, Inc.
Date: 13 June 2018 @qualcomm Location: Sophia Antipolis Integrating the SIM Dr. Adrian Escott Qualcomm Technologies, Inc. Agenda 1 2 3 4 5 6 Path to isim isim Size benefit Hardware Architecture Certification
More informationintroducing it? CME Sharing Initiative 21 st of July 2016
What is the e and why introducing it? CME Sharing Initiative st of July 0 cards as a connector between mobile phone and provider have experienced a huge evolution in the past years next evolutionary step
More informationSolutions to Enhance IoT Authentication Using SIM Cards (UICC)
Solutions to Enhance IoT Authentication Using SIM Cards (UICC) Copyright 2016 GSM Association Solutions to Enhance IoT Authentication Using SIM Cards (UICC) 4 1 Contents 1 Introduction 2 1.1 Purpose 2
More informationEUROPEAN ETS TELECOMMUNICATION September 1994 STANDARD
EUROPEAN ETS 300 509 TELECOMMUNICATION September 1994 STANDARD Source: ETSI TC-SMG Reference: GSM 02.17 ICS: 33.060.20 Key words: European digital cellular communications system, Global System for Mobile
More informationGSMA Embedded SIM for Connected Cars
GSMA Embedded SIM for Connected Cars C-ITS ronde tafel Security 10 mei 2016 Arjan Geluk UL Software & Security UL and the UL logo are trademarks of UL LLC 2016 1 Arjan Geluk - bio Principal Advisor, Software
More informationEnabler Release Definition for Smartcard-Web-Server
Enabler Release Definition for Smartcard-Web-Server Candidate Version 1.0 09 Feb 2007 Open Mobile Alliance OMA-ERELD-Smartcard_Web_Server-V1_0-20070209-C OMA-ERELD-Smartcard_Web_Server-V1_0-20070209-C
More informationOpen Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014
The enabler of solutions Alexander Summerer, Giesecke & Devrient 30th Oct. 2014 SIMalliance Allows usage of Secure Elements in Mobile Devices Designed for Open Handset OS platforms Common API for Apps
More informationEnabling Mobile NFC CTST 2008
CTST 2008 Presented by Patrick Waters 15 May 2008 GROUP R&D - Enablers AGENDA Developing a Mobile NFC platform Turning NFC into Reality Re-inventing the SIM to Enable Trusted Services 2 1 Developing a
More informationBuilding Digital Key Solution for Automotive
Building Digital Key Solution for Automotive Content Overview Use Cases Unlocking Use Cases Key Provisioning Use Cases Key Sharing Use Cases Key Properties High Level Architecture and Related Standards
More information3GPP R15 5G SIM card: A definition
3GPP R15 5G SIM card: A definition Copyright 2018 SIMalliance Ltd. November 2018 Contents: 1 - What is a 5G SIM? 2 Three different types of 5G SIM 3 Conclusion 1 - What is a 5G SIM? A Universal Integrated
More informationUSIM Quad Short Product Information
Machine to Machine Identity Modules Last update : January 2011 www.gemalto.com Table of Contents 1. Overview... 4 2. Physical characteristics... 4 3. Embedded Security... 4 4. Soldering Profile... 4 5.
More informationesim Whitepaper The what and how of Remote SIM Provisioning March 2018
esim Whitepaper The what and how of Remote SIM Provisioning March 2018 Table of Contents esim Whitepaper... 1 The what and how of Remote SIM Provisioning... 1 Introduction... 3 How it Works... 4 SIM Cards
More informationPreface. Structure of the Book
When the first edition of this book was published back in 2008, the scope was anything to do with smart cards and security tokens in the widest sense. The aim was in fact to provide a complete story, looking
More informationSecurity Strategy for Mobile ID GSMA Mobile Connect Summit
Security Strategy for Mobile ID GSMA Mobile Connect Summit Singapore, 22 nd November 2017 G+D Mobile Security G+D Mobile Security: Managing Billions of Connected Digital Identities Today 660 million contactless
More informationM2MD Communications Gateway: fast, secure, efficient
Solution Brief M2MD Communications Gateway: fast, secure, efficient G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular automotive connectivity.
More informationDie Zukunft des M-Payment The future of m-payment NFC. Andreas Johne. Düsseldorf, 25. Januar 2008
Die Zukunft des M-Payment Düsseldorf, 25. Januar 2008 Andreas Johne Agenda Brief company presentation M-payment with Near Field Communication Success stories with Page 2 Giesecke & Devrient From Printing
More informationSmart cards are made of plastic, usually polyvinyl chloride. The card may embed a hologram to prevent counterfeiting. Smart cards provide strong
Smart Cards By: Definition Smart cards, chip card, or integrated circuit card (ICC) are card with embedded integrated circuits that contain a computer chip capable of carrying out a cryptographic protocol.
More informationSmartcards. ISO 7816 & smartcard operating systems. Erik Poll Digital Security Radboud University Nijmegen
Smartcards ISO 7816 & smartcard operating systems Erik Poll Digital Security Radboud University Nijmegen 1 Standard for contact smartcards ISO7816 7816-1 Physical characteristics 7816-2 Dimension & size
More informationProvisioning secure Identity for Microcontroller based IoT Devices
Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May
More informationM2MD Communications Gateway: fast, secure and efficient
Solution Brief M2MD Communications Gateway: fast, secure and efficient Key Benefits G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular
More informationTelenor SIM specification General Purpose Telematics (GPT) Profile no: 001
Page 1 (12) Telenor SIM specification General Purpose Telematics (GPT) Profile no: 001 Page 2 (12) Contents 1. Template revisions... 3 2. Customer revisions... 3 3. General... 3 4. Terminology... 3 5.
More informationDr. Char-Shin Miou Chunghwa Telecom. Co. April 7, 2011
Mobile Security Application Current Status Overview in Taiwan Dr. Char-Shin Miou Chunghwa Telecom. Co. April 7, 2011 Content Problems and Current Status Approach for the Mobile Security Application Mobile
More informationETSI TS V7.1.0 ( )
TS 102 266 V7.1.0 (2006-01) Technical Specification Smart Cards; USSM: UICC Security Service Module; Stage 1 2 TS 102 266 V7.1.0 (2006-01) Reference RTS/SCP-R0002r1 Keywords smart card, security 650 Route
More informationTCG activities on Mobile Security standardization. Mr. Janne Uusilehto, Nokia Chairman, TCG MPWG Embedded Security Seminar September 12, 2005
TCG activities on Mobile Security standardization Mr. Janne Uusilehto, Nokia Chairman, TCG MPWG Embedded Security Seminar September 12, 2005 1 Trusted Computing Definition Hardware and Software behave
More informationEmbedded SIM (esim)/euicc Technology
Embedded SIM (esim)/euicc Technology Dr. Youssouf Ould Cheikh Mouhamedou Grandmetric Technical Advisor March 2017 Agenda 1. Introduction Difference between M2M and Consumer What is an embedded SIM (esim)
More informationMobile Devices as Identity Carriers. Pre Conference Workshop October 14 th 2013
Mobile Devices as Identity Carriers Pre Conference Workshop October 14 th 2013 Mobile Market Worldwide Smartphones Market by OS (in thousands of units) 1,400,000 1,200,000 1,000,000 800,000 600,000 400,000
More informationeuicc for: Connected cars
euicc for: Connected cars INTRODUCTION The growth in the Internet of Things (IoT) is disrupting even the most traditional market sectors. Transportation is no exception; connected car use cases today are
More informationRESHAPING SIM BUSINESS PARIS. MOSCOW. DUBAI. SINGAPORE. SEATTLE.
RESHAPING SIM BUSINESS PARIS. MOSCOW. DUBAI. SINGAPORE. SEATTLE. VALUEPROPOSITION a USIM Solution Specialist Oasis relies on its expertise insim technology and lifecycle management. Our aim is to provide
More informationEmerging Mobile IoT Technologies: Use Cases, Business and Security Requirements
Emerging Mobile IoT Technologies: Use Cases, Business and Security Requirements Svetlana Grant, Director, Future IoT Networks Connected Living Programme, GSMA ETSI M2M Workshop 9 December 2015 From M2M
More informationSmart Card Operating Systems Overview and Trends
Smart Card Operating Systems Overview and Trends Pierre.Paradinas@gemplus.com Gemplus Labs Smart card A piece of plastic with a chip that contains: CPU, memories and programs SC is your personal information
More informationGSME proposals regarding mobile theft and IMEI security
GSM Europe The European interest group of the GSM Association http://www.gsmeurope.org GSME proposals regarding mobile theft and IMEI security The question of mobile theft and ways of combating it has
More informationExtensible standards and impact on technology switching costs. Mark Pecen, Sr. VP, BlackBerry Research and Advanced Technology September 2013
Extensible standards and impact on technology switching costs Mark Pecen, Sr. VP, BlackBerry Research and Advanced Technology September 2013 Agenda Why standardize? Impact of standardization on adoption
More informationETSI TS V6.0.0 ( )
TS 102 226 V6.0.0 (2002-04) Technical Specification Smart cards; Remote APDU Structure for UICC based Applications (Release 6) 2 TS 102 226 V6.0.0 (2002-04) Reference DTS/SCP-000285 Keywords smart card,
More informationMicrocontrollers. Claude Dardanne Executive Vice President, General Manager, Microcontrollers, Memory & Secure MCU Group.
Microcontrollers Claude Dardanne Executive Vice President, General Manager, Microcontrollers, Memory & Secure MCU Group Francois Guibert Executive Vice President, President, Greater China and South Asia
More informationMobile/NFC Security Fundamentals. Secure Elements 101. Smart Card Alliance Webinar March 28, 2013
Mobile/NFC Security Fundamentals Secure Elements 101 Smart Card Alliance Webinar March 28, 2013 Introductions Brent Bowen, INSIDE Secure Chair, Mobile & NFC Council, Smart Card Alliance Mobile & NFC Council
More informationDesign and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet
Design and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet Hao Zhao, Sead Muftic School of Information and Communication Technologies (ICT) Royal Institute of Technology
More information... Lecture 8. Smartcards and Related Application Infrastructures. Mobile Business I (WS 2017/18) Prof. Dr. Kai Rannenberg
Lecture 8 Smartcards and Related Application Infrastructures Mobile Business I (WS 2017/18) Prof. Dr. Kai Rannenberg Deutsche Telekom Chair of Mobile Business & Multilateral Security Johann Wolfgang Goethe
More informationBringing you an end to end Mobile Connect Solution. Mobile Connect for Mobile Network Operator. Mars 2016
Bringing you an end to end Mobile Connect Solution Mobile Connect for Mobile Network Operator Mars 2016 1 What is Mobile Connect for MNO? is a strong authentication to 2 factors 2 Unmatched end to end
More informationWAVECOM All rights reserved Erik Rasmussen Key Accounts Manager. Meter Communications: What Makes Sense?
Erik Rasmussen Key Accounts Manager Meter Communications: What Makes Sense? Agenda Technologies: Private RF, PLC, mesh, cellular? What is the right choice for AMI? Smart Metering: what is required, what
More informationonem2m - A Common Service Layer for IoT Basic principles and architecture overview
onem2m - A Common Service Layer for IoT Basic principles and architecture overview Presented by: Xavier Piednoir For: ILNAS & ETSI Workshop IoT & Technical Standardization 6 July 2018 ETSI 2018 Contents
More informationMIFARE4MOBILE: the road TO NFC MASS ADOPTION. NFC WORLD CONGRESS Sophia Antipolis, 2011
MIFARE4MOBILE: the road TO NFC MASS ADOPTION NFC WORLD CONGRESS Sophia Antipolis, 2011 Creating a Mobile-nfc Ecosystem Challenges to Mobile NFC s success: technical and business complexity, interoperability,
More informationeuicc for: Connected wearable technology
euicc for: Connected wearable technology INTRODUCTION The explosive growth of the wearable technology market has been one of the key technological trends of recent years. Worldwide wearable device shipments
More information3GPP security. Valtteri Niemi 3GPP SA3 (Security) chairman Nokia
3GPP security Valtteri Niemi 3GPP SA3 (Security) chairman Nokia 1 Some history and background 2 Some history 1/2 SA3 took over the responsibility of specifications created by ETSI SMG10, e.g. TS 43.020
More informationETSI TS V7.1.1 ( )
TS 100 922 V7.1.1 (1999-07) Technical Specification Digital cellular telecommunications system (Phase 2+); Subscriber Identity Modules (SIM); Functional characteristics (GSM 02.17 version 7.1.1 Release
More informationMasterCard NFC Mobile Device Approval Guide v July 2015
MasterCard NFC Mobile Device Approval Guide v2.0 30 July 2015 Notices Following are policies pertaining to proprietary rights, trademarks, translations, and details about the availability of additional
More informationIDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller
IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart
More informationCALYPSO FUNCTIONAL SPECIFICATION. CNA Calypso rev 3.1 Applet Presentation
1 / 13 CALYPSO FUNCTIONAL SPECIFICATION VERSION The information contained in this document is public. (This document may be accessed at http://www.calypsonet-asso.org/) 2014. All rights reserved. The authors
More informationMinne menet, Mobiili-Java?
Minne menet, Mobiili-Java? Java Platform, Micro Edition Status and Future Directions Antero Taivalsaari Sun Microsystems, Inc. December 2005 Growth Continues (2005 vs. 2003) 1 Billion Installed Base as
More informationKigen SIM Solutions. Unlock the full potential of IoT
Kigen SIM Solutions Unlock the full potential of IoT One trillion IoT devices by 2035 We re here to make the IoT growth happen With the ever-accelerating growth of the IoT, trillions of IoT devices will
More informationDigital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans
Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October 2014 Frazier D. Evans Evans_Frazier@bah.com There are four key areas that need to be investigated when talking
More informationWireless Best Kept Secret For Now
Wireless Best Kept Secret For Now IoT Event June 2014 Gilles Thonet Managing Director Europe, ZigBee Alliance 2014 ZigBee Alliance. All rights reserved. 1 ZigBee Alliance at 10 Years Who we are Open, global,
More informationBasics of GSM in depth
This document will be helpful for the telecom engineers who deal with GSM as well as for the fresher /interested readers. This document has some advantages over other GSM texts in that it quickly gets
More informationRecommendations on residual issues relevant to ecall
Recommendations on residual issues relevant to ecall Robert MacDougall Vodafone Group Public Policy ECC Public Workshop on numbering for ecall Copenhagen 31 January 2017 Vodafone Connected car services
More informationSOLUTIONSPORTFOLIO RESHAPING SIM BUSINESS
SOLUTIONSPORTFOLIO RESHAPING SIM BUSINESS The telecom industries are experiencing radical changes in many countries dealing with confl icts, instability and threats from terrorism. Governments are pushing
More informationETSI TS V (201
TS 123 101 V13.0.0 (201 16-01) TECHNICAL SPECIFICATION Universal Mobile Telecommunications System (UMTS); General Universal Mobile Telecommunications System (UMTS) architecture (3GPP TS 23.101 version
More information3GPP TS V9.1.0 ( )
TS 31.101 V9.1.0 (2010-06) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; UICC-terminal interface; Physical and logical characteristics
More informationOmniRAN Overview and status
OmniRAN Overview and status 2012-11-13 Max Riegel (OmniRAN SG Chair) 1 OmniRAN OmniRAN discussed in 802.16 HetNet study group since March 2012 IEEE 802 tutorial in July 2012 OmniRAN defines generic network
More informationNTT DOCOMO Technical Journal. 1. Introduction. Kazunari Suzuki Teppei Azuma
Standardization of Embedded UICC Remote Provisioning M2M esim Remote Provisioning Embedded UICC Remote Provisioning technology is receiving much attention in the M2M field. NTT DOCOMO has participated
More informationA MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) A MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS Vilnius, October 2005 Page
More informationGlobalPlatform Trusted Execution Environment (TEE) for Mobile
GlobalPlatform Trusted Execution Environment (TEE) for Mobile Kevin Gillick Executive Director, GlobalPlatform @GlobalPlatform_ www.linkedin.com/company/globalplatform GlobalPlatform Overview GlobalPlatform
More informationContents. Preface. Acknowledgments. xxiii. List of Acronyms i xxv
Preface xv Acknowledgments. xxiii List of Acronyms i xxv 1 Executive Summary 1 1.1 Towards NFC Era 2 1.1.1 Ubiquitous Computing 2 1.1.2 Mobile Phones 3 1.1.3 Technological Motivation of NFC 4 1.1.4 Wireless
More informationNFC Identity and Access Control
NFC Identity and Access Control Peter Cattaneo Vice President, Business Development Agenda Basics NFC User Interactions Architecture (F)ICAM Physical Access Logical Access Future Evolution 2 NFC Identity
More informationCase Study. gsma.com/iotsecurity
Case Study LEveraging the SIM to Secure IoT Services gsma.com/iotsecurity The GSMA represents the interests of mobile operators worldwide, uniting more than 750 operators with over 350 companies in the
More informationECC Recommendation (17)04. Numbering for ecall
ECC Recommendation (17)04 Numbering for ecall Approved 22 November 2017 ECC/REC/(17)04 Page 2 INTRODUCTION ecall is a service designed for automotive vehicles to provide quick emergency response in case
More informationNFC is the double click in the internet of the things
NFC is the double click in the internet of the things Name Frank Graeber, Product Manager NFC Subject 3rd Workshop on RFID Systems and Technologies Date 12.06.2007 Content NFC Introduction NFC Technology
More informationETSI TS V9.1.0 ( ) Technical Specification
TS 102 705 V9.1.0 (2011-01) Technical Specification Smart Cards; UICC Application Programming Interface for Java Card for Contactless Applications (Release 9) 2 TS 102 705 V9.1.0 (2011-01) Reference RTS/SCP-THCIAPIv910
More information3GPP TS V ( )
TS 31.122 V11.0.0 (2012-09) Technical Specification 3 rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Universal Subscriber Identity Module (USIM) conformance
More informationOECD work on IoT. Regulatory impacts of IoT or the liberalisation of the SIM-card
OECD work on IoT Regulatory impacts of IoT or the liberalisation of the SIM-card Disclaimer The views expressed here are my own and may not be those of the OECD or its member countries. OECD work on IoT
More informationNew Approaches to Connected Device Security
New Approaches to Connected Device Security Erik Jacobson Architecture Marketing Director Arm Arm Techcon 2017 - If you connect it to the Internet, someone will try to hack it. - If what you put on the
More information- Lessons Learnt in Asia. Dr. Jack C. Pan Watchdata Technologies
Mobile Proximity Payment - Lessons Learnt in Asia 1 Dr. Jack C. Pan Watchdata Technologies About Watchdata Established in 1994 Top 5 smart card vendor worldwide TimeCOS - First COS developed in China Headquarter
More informationScalable Security solutions to enable Cyber Security and to manage Digital Identities
Scalable Security solutions to enable Cyber Security and to manage Digital Identities It s all about managing identities GIC@CeBIT 2017 International Cyber Security Conference Axel Deininger 20.03.2017
More informationGöran Näslund M2M Business Development Manager Smart Metering Vodafone Global Enterprise Sweden
Göran Näslund M2M Business Development Manager Smart Metering Vodafone Global Enterprise Sweden M2M An enabler of Smart Grid 2 OUR CREDENTIALS We have over 200 people dedicated to M2M in our organisation
More informationNatural Security Alliance
Natural Security Alliance Business model and pilot projects ITU 14 & 15 October 2014 Philippe'Batard' Batard&&&Partners' Summary Natural Security Alliance: an initiative from retailers and banks The solution
More informationHitachi Releases Smart Card Microcontroller AE45X series Equipped with Contact/Contactless Dual Interface in a Single Chip
Hitachi Releases Smart Card Microcontroller AE45X series Equipped with Contact/Contactless Dual Interface in a Single Chip Suitable for multi-purpose multi-application smart cards in the fields such as
More informationMobile telephones/international roaming frequently asked questions (see also IP/05/161)
MEMO/05/44 Brussels, 10 th February 2005 Mobile telephones/international roaming frequently asked questions (see also IP/05/161) What is international roaming? International roaming provides subscribers
More information3GPP TS V6.4.0 ( )
TS 22.234 V6.4.0 (2006-06) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Requirements on system to Wireless Local Area Network (WLAN)
More informationFOUR INDEPENDENT TOOLS TO MANAGE COMPLEXITY INHERENT TO DEVELOPING STATE OF THE ART SYSTEMS. DEVELOPER SPECIFIER TESTER
TELECOM AVIONIC SPACE AUTOMOTIVE SEMICONDUCTOR IOT MEDICAL SPECIFIER DEVELOPER FOUR INDEPENDENT TOOLS TO MANAGE COMPLEXITY INHERENT TO DEVELOPING STATE OF THE ART SYSTEMS. TESTER PragmaDev Studio is a
More informationThe Mobile Java Card TM Grid Project
The Mobile Java Card TM Grid Project Serge Chaumette 1, Konstantinos Markantonakis 2 Keith Mayes 2, and Damien Sauveron 3 1 LaBRI, UMR CNRS 5800, Université Bordeaux 1 351 cours de la Libération, 33405
More informationETSI standards are enabling a global M2M solution. Enrico Scarrone, ETSI TC M2M Chairman, Telecom Italia 3 ETSI M2M workshop, Mandelieu, France, EU
ETSI standards are enabling a global M2M solution Enrico Scarrone, ETSI TC M2M Chairman, Telecom Italia 3 ETSI M2M workshop, Mandelieu, France, EU From (smart) phones to a world.. made of intelligent and
More informationWindows 10 IoT Core Azure Connectivity and Security
Windows 10 IoT Core Azure Connectivity and Security Published July 27, 2016 Version 1.0 Table of Contents Introduction... 2 Device identities... 2 Building security into the platform... 3 Security as a
More informationSIM Smart Card Overview
SIM Smart Card Overview Smart Card Introduction 2 Java Card Java Card Based SIM Development Environment Service Examples 3 Smart Cards? A smart card is a plastic card that contains an embedded integrated
More informationConnect Your IoT Device: Bluetooth 5, , NB-IoT
Connect Your IoT Device: Bluetooth 5, 802.15.4, NB-IoT Craig Tou Business Development Manager, Arm Arm Tech Symposia 2017, Taipei IoT Devices - Everything Connects New classes of connectivity for a new
More informationEUROPEAN ETS TELECOMMUNICATION November 1996 STANDARD
EUROPEAN ETS 300 522 TELECOMMUNICATION November 1996 STANDARD Third Edition Source: ETSI TC-SMG Reference: RE/SMG-030302PR2 ICS: 33.020 Key words: Digital cellular telecommunications system, Global System
More information