esim for consumer devices MWC 2016 Telefonica S.A. Feb. 2016
|
|
|
- Juliet Morgan Shields
- 9 years ago
- Views:
Transcription
1 esim for consumer devices MWC 2016 Telefonica S.A. Feb. 2016
2 The SIM ensures connectivity & security for users What is a SIM? It s a computer. A SIM has memory, microprocessor, cryptoprocessor, OS, execution environment, communication protocols, input/output capabilities 2
3 The SIM ensures connectivity & security for users Why it is so relevant for customers & operators? Identity It authenticates the subscription (customers) and the network It grants access to the communication network regardless of the device Security Stores secret keys and information for securing communications Tamper proof! The information inside cannot be accessed without the right credentials. 3
4 How SIM has evolved: Hardware & Software Hardware Capabilities more memory, better processors, Form factor SIM, Micro SIM, Nano SIM, MFF2 Removable, soldered Software SIM, USIM, ISIM, Payments applets, Mobile Connect, 4
5 How SIM has evolved: new esim paradigm New devices and business cases lead to the esim Machine-to-machine (M2M) required a new type of SIM. Sometimes the SIM cannot be inserted easily. The devices might not be accessible. New conditions: temperature, vibration, humidity Country/operator might not be known or might need to be changed afterwards. and adding frictionless connectivity to the next billion devices (e.g. wearables and IoT) required a further evolution from M2M esim to esim for consumer devices. Subscriptions have to be remotely downloaded The UICC has to be included at factory/production time. 5
6 Common specification & Interoperability GSMA Specification Freedom of choice Any esim card should be interoperable with any remote server provided that both are compliant with the GSMA specification. Users should be able to choose any device regardless of the esim provider, device manufacturer or mobile operator. Operators should be able to select and deploy any remote server to manage any esim independently of the supplier. The key requirement is compliancy with GSMA specification.. The whole industry (Operators, SIM Vendors, Device manufactures, Chipset makers) is defining, supporting and endorsing a common specification for esim. A fully interoperable standard is required to ensure an open competitive market place, customer choice and a frictionless customer experience Interoperability 6
7 Telefónica has tested interoperability in 2015 Proof-of-concept (PoC) Architecture GSMA 2.0 compliant architecture Real mobile network for data connections SMSC in laboratory environment Oberthur Technologies server hosted in Paris Valid server hosted in Argentina INTEROPERABLE PROFILE PACKAGE Subscription Manager A set of key industry partners has participated in the PoC 7
8 Demo at MWC 2016 Key messages esim Connecting the next billion devices Telefónica is excited to bring a better connectivity experience to our customers, whilst preserving the trusted role the SIM has played in protecting our customers security and privacy Integrity, security, reliability The physical euicc element together with a strong certification-based authentication schema ensures that esim offers the same levels of trust (security, integrity, privacy) as the SIM today. Interoperability, diversity End-to-end download process of subscriptions to different devices from several vendors. Emulating both point of sales and customer-managed use cases. Subscriptions from different operators around the world: Chile, China, Spain, Peru, Qatar & UK. Remote servers from Giesecke & Devrient, Oberthur Technologies and Valid. esim from Gemalto, Giesecke & Devrient, Oberthur Technologies and Valid. Different types of commercial devices from ALCATEL ONETOUCH, HUAWEI, LG, SAMSUNG and SONY MOBILE. 8
9 Demo at MWC 2016 Use cases 01 Provision and download of profiles This use case is a simulation of the user experience at the point of sales when a new contract is signed and the subscription has to be downloaded to the device. 02 Renewing a device This use-case emulates the process of moving the subscription from one device to another 03 Self-Managing Profiles This use case shows how the user can manage several subscriptions stored inside the esim 04 Telefonica UnicaSIM Card This demo shows how esim can improve the user experience for customers whilst also simplifying the logistics for operators and SIM suppliers 9
10 Demo at MWC 2016 Some details Subscriptions from different Operators China Unicom Ooredoo Qatar Movistar Chile, Movistar Peru, Movistar Spain O2-UK Point-of-Sales emulation Web access to show how subscriptions can be managed Local applications on devices Applications to show how user experience can be enhanced and how subscriptions are locally managed by the user Local Profile Assistant (LPA) at euicc Using Smart Card Web Server functionality as an example to show that euicc is really a powerful element that can perform all the logic required for Remote Subscription Management. 10
11 Gear S2 3G Classic RSP Phase 1 & Phase 2 demos Profiles download managed from both, the device and the SIM RSP Phase 2* RSP Phase Profile is downloaded to the smartphone Platform Platform The smartwatch gets the profile in direct connection with the platform. No additional device is needed. 2.- The smartphone connects and sends the profile to the smartwatch 11 Direct connection between platform and device, brings the capabilities needed to connect the next billion devices
12
OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE
OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,
Training. MIFARE4Mobile. Public. MobileKnowledge April 2015
MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture
The Importance of Secure Elements in M2M Deployments: An Introduction
The Importance of Secure Elements in M2M Deployments: An Introduction February 2014 Securing the future of mobile services 2 Contents THE IMPORTANCE OF SECURE ELEMENTS IN M2M DEPLOYMENTS... 3 1. INTRODUCTION...
Mobile Connect & FIDO
Mobile Connect & FIDO About the GSMA The GSMA represents the interests of mobile operators worldwide Spanning more than 220 countries, the GSMA unites nearly 800 of the world s mobile operators, as well
Securing the Growth of IoT and M2M
Securing the Growth of IoT and M2M Svetlana Grant, Director, Future IoT Networks Connected Living Programme, GSMA 9 September 2015 Connected Living - Mobilising the Internet of Things GSMA VISION 2020
3GPP TSG SA WG3 Security S3#30 S3-030534 6-10 October 2003 Povoa de Varzim, Portugal. Abstract
3GPP TSG SA WG3 Security S3#30 S3-030534 6-10 October 2003 Povoa de Varzim, Portugal Source: Gemplus, Oberthur, Schlumberger Title: Over-The-Air (OTA) technology Document for: Discussion and decision Agenda
White Paper. Bearer Independent Protocol (BIP)
White Paper Bearer Independent Protocol (BIP) - 2 - Contents 1 Executive summary...4 2 Introduction...5 3 Solution description...5 3.1 Standards compliance...5 3.2 Interface architecture...6 3.3 Data carriers...9
M2M Connectivity T: 08456 200 200 W: www.2circles.com
Product Profile M2M Connectivity Number of devices in billions 2 Circles M2M at a glance Partnered with Telefónica, one of the largest mobile network operators in the world, we can offer M2M connectivity
GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M
GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M Anvay Lonkar, Marketing Manager M2M Solutions & Services Gemalto M2M FORUM, MILAN, 15 May 2013 Gemalto delivers trusted and convenient digital services to billions
M2M without Borders. Why esim is a Game Changer for the International Internet of Things
M2M without Borders Why esim is a Game Changer for the International Internet of Things When hearing the term, machine-to-machine, most people probably think of the ubiquitous cell phone in one form or
Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0
Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International
SIMULITY PRODUCTS & SERVICES OVERVIEW
TM simulity SIMULITY PRODUCTS & SERVICES OVERVIEW About Simulity Simulity is an established software company specialising in embedded communications software and related server-based applications. We connect
4G (LTE) Roaming Experience_. Mobile World Congress 2014
4G (LTE) Roaming Experience_ Mobile World Congress 2014 Telefonica offers to customers of multiple partner operators in more than 15 different countries and during MWC in Barcelona in anticipation of the
Mobile Electronic Payments
Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to
The Role of the Trusted Service Manager in Mobile Commerce
About the GSMA The GSMA represents the interests of mobile operators worldwide. Spanning more than 220 countries, the GSMA unites nearly 800 of the world s mobile operators with 250 companies in the broader
M2M innovations that will drive the market: Big Data, Cloud and LTE technologies impact?
M2M innovations that will drive the market: Big Data, Cloud and LTE technologies impact? M2M + Industry Forum / 13 April 2013 Joachim Dressler Board Member - M2M Alliance e.v. VP EMEA Sales Sierra Wireless
Unleashing the Power of the Internet of Things
Gemalto M2M Make an M2M wish! Unleashing the Power of the Internet of Things Our M2M portfolio is enabling secure solutions in industries ranging from healthcare, retail services, smart energy, transportation,
Roles of Smart TV in Internet of Things
Roles of Smart TV in Internet of Things PG Demidov Yaroslavl State University Yaroslavl FRUCT Laboratory Our goal Roles of Smart TV in IoT We analyzed hardware and software which comes with modern Smart
M2M Solutions. Jose Rabello M2M Solution Sales Manager LATAM Gemalto Telecom Forum 2013
M2M Solutions Jose Rabello M2M Solution Sales Manager LATAM Gemalto Telecom Forum 2013 Does M2M look complex? 2 Moving from classic to connected machine system NEW INFORMATION = + New business model New
Mobile Payment: The next step of secure payment VDI / VDE-Colloquium. Hans-Jörg Frey Senior Product Manager May 16th, 2013
Mobile Payment: The next step of secure payment VDI / VDE-Colloquium May 16th, 2013 G&D has been growing through continuous innovation Server software and services Token and embedded security Cards for
Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation
Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation CELTIC Day, Berlin, June 25 th 2014 Gemalto at a glance 2.4bn revenue 2013 2bn+ end-users benefit from our solutions
Benefits Analysis of GSMA Embedded SIM Specification on the Mobile Enabled M2M Industry
September 2014 Benefits Analysis of GSMA Embedded SIM Specification on the Mobile Enabled M2M Industry Researched and Published by Beecham Research Ltd. GLOSSARY AND READING GUIDANCE Benefits Analysis
How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm
ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
CINTERION The global leader in cellular M2M communication. Cinterion Wireless Modules GmbH 2011, All rights reserved
The global leader in cellular M2M communication Cinterion Wireless Modules GmbH 2011, All rights reserved is a Gemalto company Company History Gemalto The company was founded in 1995 as a business unit
CASQUE SNR Presentation 16 th April 2015
Presentation 16 th April 2015 What is it Distributed Management Systems Innovative Methodology from UK owned company with accompanying Protocol that allows Key Generation, Key Distribution and Key Change
WHITE PAPER Security in M2M Communication What is secure enough?
WHITE PAPER Security in M2M Communication What is secure enough? Motivation Wireless Machine-To-Machine (M2M) communication has grown dramatically over the past decade and is still growing rapidly. In
IoT is an opportunity for the foundation of new businesses in the future connected society.
04 A STARTEGY FOR IOT IoT is an opportunity for the foundation of new businesses in the future connected society. In just a few years, tens of billions of devices will be spread around the world, demanding
Increasing M2M device intelligence drive fast decisions and help new business
Increasing M2M device intelligence drive fast decisions and help new business M2M+ Industry Summit / 19-20 May 2014 Joachim Dressler Board Member - M2M Alliance e.v. VP EMEA Sales Sierra Wireless M2M Alliance
Huawei Agile Network FAQ... 2. 1 What is an agile network? What is the relationship between an agile network and SDN?... 2
Contents Huawei Agile Network FAQ... 2 1 What is an agile network? What is the relationship between an agile network and SDN?... 2 2 What is an agile campus?... 3 3 What are the benefits of an agile network?...
Network Data Management Protocol (NDMP) White Paper
Network Data Management Protocol (NDMP) White Paper Summary What is the primary goal of enterprise storage management? To back up and restore information in an intelligent, secure, timely, cost-effective
Credential Management for Cloud Computing
Credential Management for Cloud Computing Workshop Cloud Security, 16.07.2014 Dr. Johannes Luyken Page 1 Security breaches increase in their impact by exploiting online access to confidential data that
Reprogrammable SIMs:
Reprogrammable SIMs: Technology, Evolution and Implications Final Report Prepared for: Prepared by: CSMG Descartes House 8 Gate Street London WC2A 3HP United Kingdom www.csmg-global.com 25 September 2012
OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org [email protected]
OpenMTC M2M Solutions for Smart Cities and the Internet of Things www.open-mtc.org [email protected] 2. March März 2, 2013 Understanding M2M Machine-to-Machine (M2M) is a paradigm in which the end-to-end
Telefonica s Journey to 5G_ Enrique Blanco - Global CTO You choose. We connect_
Telefonica s Journey to 5G_ Enrique Blanco - Global CTO You choose. We connect_ We want our Clients to enjoy all the Benefits of the Digital World New Services Demand Higher Speeds and Quality Assurance
Smartcard Web Server Enabler Architecture
Smartcard Web Server Enabler Architecture Candidate Version 1.0 09 Feb 2007 Open Mobile Alliance OMA-AD-Smartcard_Web_Server-V1_0-20070209-C OMA-AD-Smartcard_Web_Server-V1_0-20070209-C Page 2 (17) Use
HCE and SIM Secure Element:
HCE and SIM Secure Element: It s not black and white A Discussion Paper from Consult Hyperion Supported by: Date: June 2014 Authors: Steve Pannifer, Dick Clark, Dave Birch [email protected] Consult
A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies. November 2014
A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies November 2014 Internet-Of-Things Solution Deployment Gains Momentum Among Firms Globally Improved Customer Experience
CHINA UNICOM COMMIT TO MAKE CONNECTED LIVING EASIER
2014 年 6 月 CHINA UNICOM COMMIT TO MAKE CONNECTED LIVING EASIER Keduo XIN 10 th June, 2014 Connected Living is becoming true in China Total connections in China-2013 Connected living growing fast in scale
Ingenious Systems. Evolute System's. Mobile Payment. Initiative
Ingenious Systems Evolute System's Mobile Payment Initiative The Mobile Payment Concept A mobile payment is any payment where a mobile device is used to initiate, authorize and confirm an exchange of financial
Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application
Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application Introduction Security continues to be a hot topic in all areas of technology, including machine-tomachine (M2M) applications.
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
Summer projects for Dept. of IT students in the summer 2015
Summer projects for Dept. of IT students in the summer 2015 Here are 7 possible summer project topics for students. If you are interested in any of them, contact the person associated with the project
M 2 M IWG. Eclipse, M2M and the Internet of Things. Overview. M 2 M Industry WorkGroup! M2M?
M 2 M IWG Eclipse, M2M and the Internet of Things Overview M2M? Technology that supports wired or wireless communication between machines. (TechTarget) M2M Market Opportunity Key Trends 1. New connected
WHITEPAPER BEST PRACTICES IN MOBILE APPLICATION TESTING
WHITEPAPER BEST PRACTICES IN MOBILE APPLICATION TESTING 1 The basic frame of software testers mind-set is attuned to check documentation, functionality, stability, API and performance and make sure that
What is Internet of Things?
Internet of Things What is Internet of Things? It is the ability to interact with more and more objects around us With Non Connected or Reactive Devices And With Connected and Active Devices (Machine to
How much do you pay for your PKI solution?
Information Paper Understand the total cost of your PKI How much do you pay for your PKI? A closer look into the real costs associated with building and running your own Public Key Infrastructure and 3SKey.
Key Trends in M2M Alliance Networking
Overcoming market fragmentation by creating alliances and partnerships across the M2M value chain M2M Africa Summit / 24-26 June 2014 Joachim Dressler Board Member - M2M Alliance e.v. VP EMEA Sales Sierra
Android pay. Frequently asked questions
Android pay Frequently asked questions June 2015 Android Pay - FAQs In May 2015, Android Pay was announced by Google. Android Pay is Google s payments solution that allows consumers to do in-store and
Maintain Fleet Management Solutions Using Wide Area Wireless Technology
Maintain Fleet Management Solutions Using Wide Area Wireless Technology Andreas Kohn Sierra Wireless, Inc. August, 2010 1 Introduction Wireless technology can provide a competitive advantage in today s
Simplifying Payment Card Industry Compliance
Simplifying Payment Card Industry Compliance 2014 Globalscape, Inc. All Rights Reserved. 1 Simplifying Payment Card Industry Compliance Agenda: What is PCI? Why do I need to worry about this? What changed
WHITE PAPER. SOFTWARE AND FIRMWARE UPDATING Streamlining the Indispensable FOTA in m2m Applications
SOFTWARE AND FIRMWARE UPDATING Streamlining the Indispensable FOTA in m2m Applications INTRODUCTION Firmware over-the-air (FOTA) updating provides a cost-effective, fast, secure and reliable way for wirelessly
OT PRODUCTS & SOLUTIONS TRANSPORT
OT PRODUCTS & SOLUTIONS TRANSPORT TOWARDS TRUE MOBILITY TRANSPORT OPERATORS AND TODAY, CONTACTLESS INTEGRATORS ARE FACING TRANSPORT SYSTEMS STRATEGIC CHALLENGES LACK INTEROPERABILITY, WHILST A FULL RANGE
A Secure and Open Solution for Seamless Transit Systems
A Secure and Open Solution for Seamless Transit Systems Today s Proprietary Fare Collection Systems Transit operators must combat growing security threats while identifying new revenue sources and enhancing
M2M For industrial and automotive
M2M For industrial and automotive Content ST at a glance... 4 Where to find us... 5 The value chain... 5 Secure MCU... 6 Focus on ST33 secure microcontrollers... 6 M2M fields of application... 7 What is
IoT Potential Risks and Challenges
IoT Potential Risks and Challenges GRIFES / GITI / EPFL Alumni Conference, Lausanne, May 7 th, 2015 Stefan Schiller, HP ESP Fortify Solution Architect D/A/CH IoT Potential Risks and Challenges Agenda IDC
A Symantec Connect Document. A Total Cost of Ownership Viewpoint
A Symantec Connect Document Two-Factor Authentication A Total Cost of Ownership Viewpoint White Paper: Two-Factor Authentication: A TCO Viewpoint Two-Factor Authentication Contents Introduction............................................................................................
How To Understand And Understand The Mobile Nfc Ecosystem
NFC services mobile Version 1.0 February 2007 Disclaimer and Legal Notices Every care has been taken in the preparation of this report to ensure that the information provided is accurate, factual and correct
Design for Success: Designing for the Internet of Things with TiWiConnect
Design for Success: Designing for the Internet of Things with TiWiConnect Today s presenters Scott Lederer Senior Software Architect Dave Burleton Vice President of Marketing LSR.com Today s Agenda Why
Agile VPN for Carrier/SP Network. ONOS- based SDN Controller for China Unicom MPLS L3VPN Service
Agile VPN for Carrier/SP Network ONOS- based SDN Controller for China Unicom MPLS L3VPN Service Introduction In order to meet strong service demand on their network and respond to the new competition (who
Use of C-SIM (R-UIM) in Roaming. 2006 3G CDMA Latin America Regional Conference
Use of C-SIM (R-UIM) in Roaming 2006 3G CDMA Latin America Regional Conference AGENDA 1 C-SIM role in Roaming 2 CSIM for advanced roaming 3 CSIM beyond roaming The C-SIM Card Security PIN = Secret codes
Two-Factor Authentication
Two-Factor Authentication A Total Cost of Ownership Viewpoint CONTENTS + Two-Factor Authentication 3 A Total Cost of Ownership Viewpoint + Introduction 3 + Defining Total Cost of Ownership 3 + VeriSign
User Authentication Platform using Provisioning in Cloud Computing Environment
User Authentication Platform using Provisioning in Cloud Computing Environment Hyosik Ahn, Hyokyung Chang, Changbok Jang, Euiin Choi Dept. Of Computer Engineering, Hannam University, Daejeon, Korea {hsahn,
YOUR GLOBAL M2M PARTNER
YOUR GLOBAL M2M PARTNER The Global M2M Association (GMA) brings together leading mobile operators to make it easier for enterprises to launch global M2M services. We help enterprises reduce time-to-market,
SECURE MOBILE APP DEVELOPMENT: DIFFERENCES FROM TRADITIONAL APPROACH
SECURE MOBILE APP DEVELOPMENT: DIFFERENCES FROM TRADITIONAL APPROACH Suhas Desai Aujas Information Risk Services Session ID: MBS-T02 Session Classification: Intermediate Agenda Trends in Mobile Technology
Licensing Guide BES12. Version 12.1
Licensing Guide BES12 Version 12.1 Published: 2015-04-02 SWD-20150402115554403 Contents Introduction... 5 About this guide...5 What is BES12?...5 Key features of BES12... 5 About licensing...7 Steps to
Enhancing TAM E-SSO with smart phones, smart cards and other tokens. IBM Tivoli Talk
Enhancing TAM E-SSO with smart phones, smart cards and other tokens Sven Gossel IBM Tivoli Talk October 7 th, 2011 Charismathics Milestones 2005 2007 2010 Re-inventing PKI middleware Re-inventing Trusted
Calypso Technology. A leader application to build up eticketing systems for modern and smart urban transport systems of the future
Calypso Technology A leader application to build up eticketing systems for modern and smart urban transport systems of the future Ing. Nicolas Generali SNCF 7cke7ng expert Calypso Networks Associa7on (CNA)
NVM memory: A Critical Design Consideration for IoT Applications
NVM memory: A Critical Design Consideration for IoT Applications Jim Lipman Sidense Corp. Introduction The Internet of Things (IoT), sometimes called the Internet of Everything (IoE), refers to an evolving
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein INNOVATORS START HERE. EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly growing data
Mobile Near-Field Communications (NFC) Payments
Mobile Near-Field Communications (NFC) Payments OCTOBER 2013 GENERAL INFORMATION American Express continues to develop its infrastructure and capabilities to support growing market interest in mobile payments
INSTALLATION GUIDE Netop Mobile for Android
INSTALLATION GUIDE Netop Mobile for Android Version 10.50 Copyright 1981-2015 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE
FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE The demand for cloud infrastructure is rapidly increasing, the world of information is becoming application and
Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices
A Forrester Consulting Thought Leadership Paper Commissioned By Xively By LogMeIn August 2015 Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices Table
Internet of Things From Idea to Scale
PRG Symposium Internet of Things From Idea to Scale September 12, 2014 [email protected] @AlexBlanter You are here today because you are interested in the Internet of Things and so is everybody
Smart Anytime, Safe Anywhere. Climax Home Portal Platform. Envisage and Enable a Connected Future
Smart Anytime, Safe Anywhere Climax Home Portal Platform Envisage and Enable a Connected Future Climax Home Portal Platform An IP/GPRS-Based Solution to Deliver Smart Home and Mobile Control Services Reliable
Smartcards with Webservice Interface
Smartcards with Webservice Interface 22. SIT-SmartCard Workshop 8./9. February 2012 Jan Eichholz Agenda Benefits of a Webservice Interface for Smartcards The Service Access Layer out of ISO/IEC 24727 The
Bringing Security & Interoperability to Mobile Transactions. Critical Considerations
Bringing Security & Interoperability to Mobile Transactions Critical Considerations April 2012 Transactions 2 Table of Contents 1. Introduction... 3 2. Section 1: Facing up the challenges of a connected
Global M2M Platform vodacom.co.za/business
Vodacom Global M2M Global M2M Platform vodacom.co.za/business Vodacom Global M2M Opening up the potential for a new range of smart M2M services Vodacom Global M2M Services are designed to help you accelerate
IBM WebSphere Premises Server
Integrate sensor data to create new visibility and drive business process innovation IBM WebSphere Server Highlights Derive actionable insights that support Enable real-time location tracking business
INTRODUCTION AND HISTORY
INTRODUCTION AND HISTORY EMV is actually younger than we all may think as it only became available, as a specification that could be implemented, in 1996. The evolution of EMV can be seen in the development
Seminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, [email protected]
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
Mobile application testing for the enterprise
Mobile application testing for the enterprise Accenture brings together deep knowledge of the enterprise, expertise in mobile technologies and strong end-to-end testing practices to help all enterprises
Study of Java Card and its Application 1 Nainesh Rawani, 2 Akhil Patel
Study of Java Card and its Application 1 Nainesh Rawani, 2 Akhil Patel [email protected] 1,2 Information Technology Department, 1,2 Gujarat Technological University, Gujarat, India. Abstract: Sun Microsystems
