Embedded SIMs and M2M Communications
|
|
- Bruce Dickerson
- 7 years ago
- Views:
Transcription
1 Embedded SIMs and M2M Communications Michael Walker Vodafone Fellow and Executive Technical Advisor Professor of Telecommunications, Royal Holloway University of London ETSI Security Workshop, 20th January Embedded SIMs & M2M Communications 20th January 2011
2 New Opportunities for Mobile Communications Mobile networks are starting to be used to connect all sorts of devices wireless for mobility, ease of connection and remote management The traditional removable SIM may not be appropriate for certain applications SIMs may be embedded in devices at manufacture this may even be in advance of choice of country of use and network operator network operator may be changed during life time of the device Deutsche Telekom, Telefónica O2 UK, Vodafone and Giesecke & Devrient (G&D) have worked together to prepare for the standardization of a trusted and flexible solution for the remote management of embedded SIMs Our work will contribute to the GSMA Task Force on the subject 2 Embedded SIMs & M2M Communications 20 January 2011
3 Example Use-cases for the Embedded SIM Set-up subscriptions for a number of connected M2M devices to start telecommunication services, and if later needed, change MNO: automated reading of utility meters provided by the utility company household security camera a consumer purchased service automotive provided by vehicle manufacturer Set-up a subscription for a consumer electronics devices to start telecommunication services, and if later needed, change MNO: tablet PC with or without wireless service included personal navigation device with wireless service included 3 Embedded SIMs & M2M Communications 20 January 2011
4 Remote Management of the Embedded SIM Main security challenge is to securely provision the MNO unique key and authentication algorithm needed for chargeable telecommunication services download of key in encrypted form, or secure means to derive key download of an MNO authentication algorithm is an unacceptable security risk, so standard algorithms must be used SIM card is the MNO network presence in the device, and this function should be preserved End user must be provided with use of communications services without limitation in choice and without additional effort Solution proposed makes use of a Subscription Manager trusted by M2M service providers and MNOs securely provisions, changes and deletes MNO subscriptions may use a provisioning subscription and OTA access to embedded SIMs 4 Embedded SIMs & M2M Communications 20 January 2011
5 High Level Architecture esim Supplier Device Vendor M2M Service Provider esim M2M Device esim ID and Key Data Provisioning Network Subscription Credentials Provisioned Telecom Services Subscription Credentials Subscription Manager MNO 1 MNO 2 MNO 2 MNO 2 MNO 1 MNO 2 5 Embedded SIMs & M2M Communications 20 January 2011 esim / device provisioning data telecom services
6 Options to Provision the Authentication Key The overall security shall be at least equivalent to that achieved with current removable SIM card, processes and OTA management A number of symmetric key solutions considered for provisioning of the secret key (as well as asymmetric solutions) but not developed further: pre-provision of multiple keys as used for vehicle tracking in Brazil derive keys from a root key and MCC/MNC data sequence of keys generated by a deterministic random bit generator from a secret seed in embedded SIM and the Subscription Manager Preferred method is to encrypt the subscription key under a root key shared by the SM and the embedded SIM allows MNO to choose subscription key may be installed using OTA if provisioning subscription is enabled, or over Internet connection will include integrity checking 6 Embedded SIMs & M2M Communications 20 January 2011
7 Architecture for Provisioning wired network device Internet, private network 1a 1b mobile network via provisioning subscr. Device euicc 2 mobile network via MNO1 subscr. 3 mobile network via MNO2 subscr. Use secure packets in the proven OTA mechanism [TS ]; run over other forms of connectivity: Internet (fixed or wireless) local connectivity (eg Bluetooth or NFC) SM1 1b 1a 2 Provision first MNO key + IMSI: Over the wire (1a) MNO1 MNO2 Over the air (1b) Change key + IMSI to second MNO (2) 7 Embedded SIMs & M2M Communications 20 January 2011
8 Working for an Industry Solution Leverage the proven strengths of the SIM card and provide a new capability for secure remote management of an embedded version a separate hardware integrated circuit soldered into the device using the recently standardised ETSI SCP MFF2 package the embedded SIM and its manufacture will be accredited to industry standards so that only certified embedded SIMs will be supplied to device vendors Once provisioned, the embedded SIM will hold the active key and IMSI authorising the device for telecommunication services, possibly together with dormant subscriptions 8 Embedded SIMs & M2M Communications 20 January 2011
9 In Summary Traditional SIM needs to be re-considered in the context of new mobile communication opportunities, in particular machine to machine communications Deutsche Telekom, Telefónica O2 UK, Vodafone and Giesecke & Devrient are preparing for the development of an open and standardized solution in 2011 SIMEG 2010 We can re-use and profile existing international standards and minimise changes to existing SIM processes Extend the proven secure hardware identity module and secure OTA mechanisms that have made the SIM the bedrock for secure mobile communications world wide and contribute to the GSMA Task Force 9 Embedded SIMs & M2M Communications 20 January 2011
The Importance of Secure Elements in M2M Deployments: An Introduction
The Importance of Secure Elements in M2M Deployments: An Introduction February 2014 Securing the future of mobile services 2 Contents THE IMPORTANCE OF SECURE ELEMENTS IN M2M DEPLOYMENTS... 3 1. INTRODUCTION...
More informationesim for consumer devices MWC 2016 Telefonica S.A. Feb. 2016
esim for consumer devices MWC 2016 Telefonica S.A. Feb. 2016 The SIM ensures connectivity & security for users What is a SIM? It s a computer. A SIM has memory, microprocessor, cryptoprocessor, OS, execution
More informationOT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE
OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,
More informationBenefits Analysis of GSMA Embedded SIM Specification on the Mobile Enabled M2M Industry
September 2014 Benefits Analysis of GSMA Embedded SIM Specification on the Mobile Enabled M2M Industry Researched and Published by Beecham Research Ltd. GLOSSARY AND READING GUIDANCE Benefits Analysis
More informationCredential Management for Cloud Computing
Credential Management for Cloud Computing Workshop Cloud Security, 16.07.2014 Dr. Johannes Luyken Page 1 Security breaches increase in their impact by exploiting online access to confidential data that
More informationReprogrammable SIMs:
Reprogrammable SIMs: Technology, Evolution and Implications Final Report Prepared for: Prepared by: CSMG Descartes House 8 Gate Street London WC2A 3HP United Kingdom www.csmg-global.com 25 September 2012
More informationMobile Payment: The next step of secure payment VDI / VDE-Colloquium. Hans-Jörg Frey Senior Product Manager May 16th, 2013
Mobile Payment: The next step of secure payment VDI / VDE-Colloquium May 16th, 2013 G&D has been growing through continuous innovation Server software and services Token and embedded security Cards for
More informationTHE KEY TO UNLOCKING 50 BILLION CONNECTED DEVICES
2014 OCTOBER WHITE PAPER THE KEY TO UNLOCKING 50 BILLION CONNECTED DEVICES - A white paper on the importance of lock-in avoidance in the M2M-market ABSTRACT A lot has happened within M2M since the first
More informationM2M For industrial and automotive
M2M For industrial and automotive Content ST at a glance... 4 Where to find us... 5 The value chain... 5 Secure MCU... 6 Focus on ST33 secure microcontrollers... 6 M2M fields of application... 7 What is
More informationM2M innovations that will drive the market: Big Data, Cloud and LTE technologies impact?
M2M innovations that will drive the market: Big Data, Cloud and LTE technologies impact? M2M + Industry Forum / 13 April 2013 Joachim Dressler Board Member - M2M Alliance e.v. VP EMEA Sales Sierra Wireless
More informationM2M Solutions. Jose Rabello M2M Solution Sales Manager LATAM Gemalto Telecom Forum 2013
M2M Solutions Jose Rabello M2M Solution Sales Manager LATAM Gemalto Telecom Forum 2013 Does M2M look complex? 2 Moving from classic to connected machine system NEW INFORMATION = + New business model New
More informationSecurity features include Authentication and encryption to protect data and prevent eavesdropping.
What is a SIM card? A SIM card, also known as a subscriber identity module, is a subscriber identity module application on a smartcard that stores data for GSM/CDMA Cellular telephone subscribers. Such
More informationOperator-based Over-the-air M2M Wireless Sensor Network Security
Operator-based Over-the-air M2M Wireless Sensor Network Security Sachin Agarwal Christoph Peylo Deutsche Telekom A.G., Laboratories Ernst-Reuter-Platz 7 10587 Berlin DE Email: {sachin.agarwal, christoph.peylo}@telekom.de
More informationCARTES 2012 Demo presentation. Secure Cloud Storage
CARTES 2012 Demo presentation Cloud Computing: NIST Framework Public Private Hybrid Deployment model Infrastructure as a service (IaaS Platform as a service (PaaS) Software as a service (SaaS) Service
More informationKey Trends in M2M Alliance Networking
Overcoming market fragmentation by creating alliances and partnerships across the M2M value chain M2M Africa Summit / 24-26 June 2014 Joachim Dressler Board Member - M2M Alliance e.v. VP EMEA Sales Sierra
More informationStudy Paper on Security Accreditation Scheme for SIM
May 2014 MOBILE Study Paper on Security Accreditation Scheme for SIM TEC TELECOMMUNICATION ENGINEERING CENTRE KHURSHID LAL BHAWAN, JANPATH NEW DELHI - 110001 INDIA 1 Introduction... 4 2 Security Threats...
More informationTraining. MIFARE4Mobile. Public. MobileKnowledge April 2015
MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture
More informationGlobal M2M Platform vodacom.co.za/business
Vodacom Global M2M Global M2M Platform vodacom.co.za/business Vodacom Global M2M Opening up the potential for a new range of smart M2M services Vodacom Global M2M Services are designed to help you accelerate
More informationIncreasing M2M device intelligence drive fast decisions and help new business
Increasing M2M device intelligence drive fast decisions and help new business M2M+ Industry Summit / 19-20 May 2014 Joachim Dressler Board Member - M2M Alliance e.v. VP EMEA Sales Sierra Wireless M2M Alliance
More informationM2M ~ Building a Connected World
WHITEPAPER M2M ~ Building a Connected World This whitepaper is an extract from: M2M & Embedded Strategies Telematics, Smart CE, Meters and Buildings 2012-2017... information you can do business with M2M
More informationHow To Understand And Understand The Mobile Nfc Ecosystem
NFC services mobile Version 1.0 February 2007 Disclaimer and Legal Notices Every care has been taken in the preparation of this report to ensure that the information provided is accurate, factual and correct
More informationWhite Paper. Bearer Independent Protocol (BIP)
White Paper Bearer Independent Protocol (BIP) - 2 - Contents 1 Executive summary...4 2 Introduction...5 3 Solution description...5 3.1 Standards compliance...5 3.2 Interface architecture...6 3.3 Data carriers...9
More informationDecember 2013 Copyright 2013 GSM Association
The Embedded SIM Whitepaper December 2013 Copyright 2013 GSM Association Abstract In the future, everyone and everything around us that might benefit from a wireless connection will, in fact, have one.
More informationGEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M
GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M Anvay Lonkar, Marketing Manager M2M Solutions & Services Gemalto M2M FORUM, MILAN, 15 May 2013 Gemalto delivers trusted and convenient digital services to billions
More informationExecutive Summary. Page 2 of 12
Vodafone s comments to the BEREC Machine to Machine Expert Working Group on an appropriate regulatory framework for Machine to Machine communications and the Internet of Things 1 31 st July 2014 1 Vodafone
More informationYOUR GLOBAL M2M PARTNER
YOUR GLOBAL M2M PARTNER The Global M2M Association (GMA) brings together leading mobile operators to make it easier for enterprises to launch global M2M services. We help enterprises reduce time-to-market,
More informationSecure Authentication for the Development of Mobile Internet Services Critical Considerations
Secure Authentication for the Development of Mobile Internet Services Critical Considerations December 2011 V1 Mobile Internet Security Working Group, SIMalliance AGENDA SIMalliance presentation What s
More informationMaintain Fleet Management Solutions Using Wide Area Wireless Technology
Maintain Fleet Management Solutions Using Wide Area Wireless Technology Andreas Kohn Sierra Wireless, Inc. August, 2010 1 Introduction Wireless technology can provide a competitive advantage in today s
More informationSecuring the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility
1 An Introduction v2.0 September 2015 Document History 2 Version Date Editor Remarks 1.0 06/04/2011 OMAPI Working Group Public release 2.0 27/09/2015 OMAPI Working Group Public release Copyright 2015 SIMalliance
More informationCryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager
Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager About our Cryptographic and Security Testing Laboratory Bringing together a suite of conformance testing
More informationDescription of the Technical Component:
Confirmation concerning Products for Qualified Electronic Signatures according to 15 Sec. 7 S. 1, 17 Sec. 4 German Electronic Signature Act 1 and 11 Sec. 2 and 15 German Electronic Signature Ordinance
More informationPreventing Telecommunication Fraud in Machine-to Machine Communications
Preventing Telecommunication Fraud in Machine-to Machine Communications Introduction Machine to Machine (M2M) Communications and the related concept of Embedded Mobile refer to the communication between
More informationIoT Platforms and Software
Brochure More information from http://www.researchandmarkets.com/reports/3197586/ IoT Platforms and Software Description: The world of machine-to-machine (M2M) communication is gradually moving from vertical,
More informationTransaction Security. Training Academy
Transaction Security Training Academy Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over a hundred years of history.
More informationsmart! Securing the Growing NFC Mobile Payments Market G&D Supplies German Olympians with Visa Cards for Contactless Payment special smart! smart!
NFC special Securing the Growing NFC Mobile Payments Market 1 NFC Security Success Stories 4 AUTHENTICATE FIPS Certification for StarSign Crypto USB Token 2 PAY Discover the World of Mobile Security 1/
More information1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
More informationEvolution of the SIM to esim
Evolution of the SIM to esim Elaheh Vahidian Master of Telematics - Communication Networks and Networked Services (2 Submission date: Januar 2013 Supervisor: Van Thanh Do, ITEM Norwegian University of
More informationInteragency Advisory Board Meeting Agenda, Wednesday, February 22, 2012
Interagency Advisory Board Meeting Agenda, Wednesday, February 22, 2012 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. Generic Identity Command Set (GICS): Leveraging PIV to Build a Standard Platform
More informationMobile Trust Net. Powering the mobile revolution MOBILE TRUST NET
Mobile Trust Net Powering the mobile revolution MOBILE TRUST NET 1 Trust is everything Trust is critical to the current phase of the mobile revolution. Without trust, users won t try services that ask
More informationSIMULITY PRODUCTS & SERVICES OVERVIEW
TM simulity SIMULITY PRODUCTS & SERVICES OVERVIEW About Simulity Simulity is an established software company specialising in embedded communications software and related server-based applications. We connect
More informationEmpowering Wholesale Customers: WWAN/ Machine to Machine APR 2015
Empowering Wholesale Customers: WWAN/ Machine to Machine APR 2015 2014 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo and other marks are trademarks of AT&T Intellectual Property. More
More information2014 - Advanced Card Technology All Rights Reserved
M2M (Machine to Machine) AGENDA Agenda 2 About Advance Card Technology 3 Our Customers 6 What is M2M 7 M2M imposes new demands 9 M2M product offering 10 M2M applications 21 M2M use cases 22 Contact us
More informationSecure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
More informationSecurity Aspects of Smart Cards in Machine-to- Machine (M2M) Advanced Mobile Network Applications
Security Aspects of Smart Cards in Machine-to- Machine (M2M) Advanced Mobile Network Applications Mike Meyerstein 1, Inhyok Cha, Yogendra Shah InterDigital Communications Corporation LLC, King of Prussia,
More informationModule 1: e- Learning
Module 1: e- Learning SECTION 1: OVERVIEW... 2 PRIMER ON INFORMATION TECHNOLOGY, IS INFRASTRUCTURE AND EMERGING TECHNOLOGIES (12%) E-LEARNING... 2 Objective Objective:... 2 Task Statements... 2 Knowledge
More information( ) ( ) TECHNOLOGY BRIEF. XTNDConnect Server: Security XTNDCONNECT SERVER OFFERS A VARIETY OF FEATURES TO SECURELY EXTEND MISSION-CRITICAL
Server: Security In this growing mobile and wireless world, anytime, anywhere access to corporate data is becoming a necessity. Mobile workers are demanding access to mission-critical data in order to
More informationCASQUE SNR Presentation 16 th April 2015
Presentation 16 th April 2015 What is it Distributed Management Systems Innovative Methodology from UK owned company with accompanying Protocol that allows Key Generation, Key Distribution and Key Change
More informationTHE CONNECTED WORKPLACE A strategy for making the most of mobile devices while protecting your enterprise.
THE CONNECTED WORKPLACE A strategy for making the most of mobile devices while protecting your enterprise. Enterprises are realizing a new vision where CONSTANT CONNECTIVITY AND COMMUNICATION Plays a major
More informationSecure software updates for ITS communications devices
Secure software updates for ITS communications devices - International Standardization Activity in ITU-T SG17 - Masashi Eto, Senior researcher, Cybersecurity laboratory, Network security research institute,
More informationM2M without Borders. Why esim is a Game Changer for the International Internet of Things
M2M without Borders Why esim is a Game Changer for the International Internet of Things When hearing the term, machine-to-machine, most people probably think of the ubiquitous cell phone in one form or
More informationOT PRODUCTS & SOLUTIONS TRANSPORT
OT PRODUCTS & SOLUTIONS TRANSPORT TOWARDS TRUE MOBILITY TRANSPORT OPERATORS AND TODAY, CONTACTLESS INTEGRATORS ARE FACING TRANSPORT SYSTEMS STRATEGIC CHALLENGES LACK INTEROPERABILITY, WHILST A FULL RANGE
More informationKey Management Best Practices
White Paper Key Management Best Practices Data encryption is a fundamental component of strategies to address security threats and satisfy regulatory mandates. While encryption is not in itself difficult
More informationAGAINST OUTSIDE THREATS
SECURING CONTROL NETWORKS AGAINST OUTSIDE THREATS MARK BUCKLAND MAY 2015 2015 Echelon Corporation IzoT PLATFORM PILLARS Full Monitoring and Control over IP Legacy Co-Existence and Evolution Industrial-strength
More informationThe Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
More informationM2M business opportunities beyond connectivity. Example T-City Friedrichshafen.
M2M business opportunities beyond connectivity. Example T-City Friedrichshafen. Jürgen Hase,Vice President M2M Competence Center, Deutsche Telekom AG Connected Living Summit, Gothenburg, October 23rd,
More informationBringing MNOs an end to end Mobile Connect Solution. Mobile Connect for Mobile Network Operator
Bringing MNOs an end to end Mobile Connect Solution Mobile Connect for Mobile Network Operator 1 What is Mobile Connect for MNO? 2 Unmatched end to end solution 1. Complete authenticator out of the box
More informationSecurity Principles. Related to. Handset Theft
Security Principles Related to Handset Theft Table of Contents TABLE OF CONTENTS...2 GLOSSARY OF TERMS...3 1. INTRODUCTION...4 1.1 IMPORTANCE OF IMEI INTEGRITY...4 1.2 IMPROVED IMEI INTEGRITY PRINCIPLES...4
More informationHP ProtectTools Windows Mobile
HP ProtectTools Windows Mobile White Paper Introduction... 2 Risks... 2 Features... 3 Password Hashing... 4 Password Generation... 5 Password Types... 5 Strong Alphanumeric Passwords... 5 Password Lifetime...5
More informationLife is now. www.vodafone.com.mt
BlackBerry Enterprise Solution Mobilise Your E-mail and Enterprise Applications The leading wireless solution for connecting mobile users to the customers, colleagues and information that drive business.
More informationOpal SSDs Integrated with TPMs
Opal SSDs Integrated with TPMs August 21, 2012 Robert Thibadeau, Ph.D. U.S. Army SSDs Must be Opal s We also Studied using the TPM (Trusted Platform Module) with an Opal SSD (Self-Encrypting Drive) 2 Security
More informationTrusted Computing in Mobile Platforms
Schwerpunkt Trusted Computing in Mobile Platforms Players, Usage Scenarios, and Interests Evgenia Pisko, Kai Rannenberg, Heiko Roßnagel Trusted Computing for mobile platforms is considered important, and
More informationTHE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein INNOVATORS START HERE. EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly growing data
More informationWirecard Mobile Payments take up!
Wirecard Mobile Payments take up! PRESENTATION JANUARY 2014 2013 Wirecard AG 1 Mobile Payments take up in all European key countries EU27 Terminals: 2011: POS -Terminals 1 : 8.8 mn 2012: POS -Terminals
More informationFemtocells: A Poisonous Needle in the Operator s Hay Stack
Femtocells: A Poisonous Needle in the Operator s Hay Stack Ravishankar Borgaonkar, Nico Golde and Kevin Redon Security in Telecommunications Technische Universität Berlin and Deutsche Telekom Laboratories
More informationThe Shift to Wireless Data Communication
The Shift to Wireless Data Communication Choosing a Cellular Solution for Connecting Devices to a WWAN Dana Lee, Senior Product Manager dana.lee@moxa.com Recent developments in the wireless and industrial
More informationUnderstanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
More informationBlackBerry 10.3 Work Space Only
GOV.UK Guidance BlackBerry 10.3 Work Space Only Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network architecture
More informationThe Global M2M Market in 2013
Machina Research White Paper The Global M2M Market in 2013 January 2013 Introduction: what is M2M? Machine-to-Machine (M2M) is becoming an increasingly important feature in the telecoms and IT landscape.
More informationInternet ID - Flexible Re-use of Mobile Phone Authentication Security for Service Access
Internet ID - Flexible Re-use of Mobile Phone Authentication Security for Service Access Marko Schuba, Volker Gerstenberger, Paul Lahaije Abstract Identity management systems like.net Passport and the
More informationBlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
More informationFrequently Asked Questions (FAQ s)
Frequently Asked Questions (FAQ s) 1. What is the Internet Modem Server? 2. A fee based service? Why do I have to pay to program DoorKing systems? 3. How s does the Internet Modem Server work? 4. What
More informationM2M The Next Industrial Revolution & Energy Transition Driver. M2M+ Visions, April 30, 2015, Milano Edmund Hain, Managing Director, MarComSo
M2M The Next Industrial Revolution & Energy Transition Driver M2M+ Visions, April 30, 2015, Milano Edmund Hain, Managing Director, MarComSo MarComSo Short Profile Founded in 1997 Focus on M2M/IoT-, IT
More informationSmartcard Web Server Enabler Architecture
Smartcard Web Server Enabler Architecture Candidate Version 1.0 09 Feb 2007 Open Mobile Alliance OMA-AD-Smartcard_Web_Server-V1_0-20070209-C OMA-AD-Smartcard_Web_Server-V1_0-20070209-C Page 2 (17) Use
More informationConnected Car Forecast: Global Connected Car Market to Grow Threefold Within Five Years
chnology Roadmap : Global Connected Car Market to Grow Threefold Within Five Years February 2013 Version 1.0 chnology Roadmap 3 The global connected car market will be worth 39 billion in 2018 up from
More informationMobile Device as a Platform for Assured Identity for the Federal Workforce
Mobile Device as a Platform for Assured Identity for the Federal Workforce Dr. Sarbari Gupta President and CEO, Electrosoft U.S. Army Information Technology Agency (ITA) Security Forum Fort Belvoir Electrosoft
More informationdect provides high protection against unauthorized access
dect provides high protection against unauthorized access BACKGROUND 2 Wireless communication for voice and data is growing worldwide. The amount of DECT (Digital Enhanced Cordless Telecommunications)
More informationDie Zukunft des M-Payment The future of m-payment
Die Zukunft des M-Payment Düsseldorf, 25. Januar 2008 Andreas Johne Agenda Brief company presentation M-payment with Near Field Communication Success stories with Page 2 Giesecke & Devrient From Printing
More informationMobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0
Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International
More informationHMS Industrial Networks
HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks AB Stationsgatan 37 30245
More informationControl and management of privileged users
Control and management of privileged users The secure solution for monitoring and recording privileged users Visulox The complete Access Management Solution ToolBox Solution GmbH, established in 2003,
More informationController of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
More informationM2M Standardization and its perspectives
M2M Standardization and its perspectives (ITU-T, ETSI, 3GPP) 2011. 11.11 윤 주 상 (동의대학교) jsyoun@deu.ac.kr 1 Contents Introduction - General M2M definition, Communication model, Properties of M2M applications
More informationMOBILE SECURITY. Enabling Mobile Qualified Signatures with Certification On Demand. Heiko Rossnagel. Abstract. Introduction
Enabling Mobile Qualified Signatures with Certification On Demand Heiko Rossnagel Abstract Despite a legal framework being in place for several years, the market share of qualified electronic signatures
More informationSolutions. Machine-to-Machine. Arrow Electronics. Complete, end-to-end solutions over the life of your product.
AR R OW E L E CTR O N I CS A MERI CA S CO MP ONENTS machine machine-to- CAPABILITIES Arrow Electronics Americas Components m2m@arrow.com Arrow Electronics Machine-to-Machine Solutions Complete, end-to-end
More informationGlobal Machine to Machine Smart Services
Global Machine to Machine Smart Services Connecting people, devices and systems vodacom.co.za/business M2M communications helping to reduce costs and improving efficiency and service to customers 2 Global
More informationEXPANDING THE ROLE OF THE MOBILE NETWORK OPERATOR IN M2M
EXPANDING THE ROLE OF THE MOBILE NETWORK OPERATOR IN M2M STRATEGIC WHITE PAPER INTRODUCTION Machine-to-machine (M2M) communications is on the rise. Most mobile network operators (MNOs) are turning to M2M
More informationWhite Paper. The risks of authenticating with digital certificates exposed
White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric
More information3GPP TSG SA WG3 Security S3#30 S3-030534 6-10 October 2003 Povoa de Varzim, Portugal. Abstract
3GPP TSG SA WG3 Security S3#30 S3-030534 6-10 October 2003 Povoa de Varzim, Portugal Source: Gemplus, Oberthur, Schlumberger Title: Over-The-Air (OTA) technology Document for: Discussion and decision Agenda
More informationThe Internet of Things: 4 security dimensions of smart devices
The Internet of Things: 4 security dimensions of smart devices Like all major technological revolutions, digital transformation is spreading over many areas: home automation, physical security, mobility,
More informationDeutsche Telekom AG (DTE) - Financial and Strategic SWOT Analysis Review
Brochure More information from http://www.researchandmarkets.com/reports/1314989/ Deutsche Telekom AG (DTE) - Financial and Strategic SWOT Analysis Review Description: Deutsche Telekom AG (DTE) - Financial
More informationGSM Risks and Countermeasures
GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked
More informationM2M-IoT News Updates October 2015
M2M-IoT News Updates October 2015 About Mind Commerce Publishing Mind Commerce provides both off-the-shelf and customized research, as well as related consulting and training. Our clients include manufacturers,
More informationNETWRIX IDENTITY MANAGEMENT SUITE
NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationOur School Backup A trusted, safe and secure remote backup solution for the UK education sector.
Our School Backup A trusted, safe and secure remote backup solution for the UK education sector. A trusted, safe and secure remote data backup solution for schools. Our ICT presents Our School Backup,
More informationCHINA UNICOM COMMIT TO MAKE CONNECTED LIVING EASIER
2014 年 6 月 CHINA UNICOM COMMIT TO MAKE CONNECTED LIVING EASIER Keduo XIN 10 th June, 2014 Connected Living is becoming true in China Total connections in China-2013 Connected living growing fast in scale
More informationGlobal System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
More informationmobile NFC technical guidelines
mobile NFC technical guidelines Version 2.0 November 2007 Disclaimer and Legal Notices Every care has been taken in the preparation of this report to ensure that the information provided is accurate, factual
More informationCloud Sourcing G-Cloud 5 Framework
Cloud Sourcing G-Cloud 5 Framework Cloud Sourcing Service Definition Document April 2014 Warnford Court, 29 Throgmorton Street, London, EC2N 2AT T: +44 20 7947 4176 Table of contents 1 Cloud Sourcing 3
More informationInformation and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
More information