esim for consumer devices MWC 2016 Telefonica S.A. Feb. 2016

Size: px
Start display at page:

Download "esim for consumer devices MWC 2016 Telefonica S.A. Feb. 2016"

Transcription

1 esim for consumer devices MWC 2016 Telefonica S.A. Feb. 2016

2 The SIM ensures connectivity & security for users What is a SIM? It s a computer. A SIM has memory, microprocessor, cryptoprocessor, OS, execution environment, communication protocols, input/output capabilities 2

3 The SIM ensures connectivity & security for users Why it is so relevant for customers & operators? Identity It authenticates the subscription (customers) and the network It grants access to the communication network regardless of the device Security Stores secret keys and information for securing communications Tamper proof! The information inside cannot be accessed without the right credentials. 3

4 How SIM has evolved: Hardware & Software Hardware Capabilities more memory, better processors, Form factor SIM, Micro SIM, Nano SIM, MFF2 Removable, soldered Software SIM, USIM, ISIM, Payments applets, Mobile Connect, 4

5 How SIM has evolved: new esim paradigm New devices and business cases lead to the esim Machine-to-machine (M2M) required a new type of SIM. Sometimes the SIM cannot be inserted easily. The devices might not be accessible. New conditions: temperature, vibration, humidity Country/operator might not be known or might need to be changed afterwards. and adding frictionless connectivity to the next billion devices (e.g. wearables and IoT) required a further evolution from M2M esim to esim for consumer devices. Subscriptions have to be remotely downloaded The UICC has to be included at factory/production time. 5

6 Common specification & Interoperability GSMA Specification Freedom of choice Any esim card should be interoperable with any remote server provided that both are compliant with the GSMA specification. Users should be able to choose any device regardless of the esim provider, device manufacturer or mobile operator. Operators should be able to select and deploy any remote server to manage any esim independently of the supplier. The key requirement is compliancy with GSMA specification.. The whole industry (Operators, SIM Vendors, Device manufactures, Chipset makers) is defining, supporting and endorsing a common specification for esim. A fully interoperable standard is required to ensure an open competitive market place, customer choice and a frictionless customer experience Interoperability 6

7 Telefónica has tested interoperability in 2015 Proof-of-concept (PoC) Architecture GSMA 2.0 compliant architecture Real mobile network for data connections SMSC in laboratory environment Oberthur Technologies server hosted in Paris Valid server hosted in Argentina INTEROPERABLE PROFILE PACKAGE Subscription Manager A set of key industry partners has participated in the PoC 7

8 Demo at MWC 2016 Key messages esim Connecting the next billion devices Telefónica is excited to bring a better connectivity experience to our customers, whilst preserving the trusted role the SIM has played in protecting our customers security and privacy Integrity, security, reliability The physical euicc element together with a strong certification-based authentication schema ensures that esim offers the same levels of trust (security, integrity, privacy) as the SIM today. Interoperability, diversity End-to-end download process of subscriptions to different devices from several vendors. Emulating both point of sales and customer-managed use cases. Subscriptions from different operators around the world: Chile, China, Spain, Peru, Qatar & UK. Remote servers from Giesecke & Devrient, Oberthur Technologies and Valid. esim from Gemalto, Giesecke & Devrient, Oberthur Technologies and Valid. Different types of commercial devices from ALCATEL ONETOUCH, HUAWEI, LG, SAMSUNG and SONY MOBILE. 8

9 Demo at MWC 2016 Use cases 01 Provision and download of profiles This use case is a simulation of the user experience at the point of sales when a new contract is signed and the subscription has to be downloaded to the device. 02 Renewing a device This use-case emulates the process of moving the subscription from one device to another 03 Self-Managing Profiles This use case shows how the user can manage several subscriptions stored inside the esim 04 Telefonica UnicaSIM Card This demo shows how esim can improve the user experience for customers whilst also simplifying the logistics for operators and SIM suppliers 9

10 Demo at MWC 2016 Some details Subscriptions from different Operators China Unicom Ooredoo Qatar Movistar Chile, Movistar Peru, Movistar Spain O2-UK Point-of-Sales emulation Web access to show how subscriptions can be managed Local applications on devices Applications to show how user experience can be enhanced and how subscriptions are locally managed by the user Local Profile Assistant (LPA) at euicc Using Smart Card Web Server functionality as an example to show that euicc is really a powerful element that can perform all the logic required for Remote Subscription Management. 10

11 Gear S2 3G Classic RSP Phase 1 & Phase 2 demos Profiles download managed from both, the device and the SIM RSP Phase 2* RSP Phase Profile is downloaded to the smartphone Platform Platform The smartwatch gets the profile in direct connection with the platform. No additional device is needed. 2.- The smartphone connects and sends the profile to the smartwatch 11 Direct connection between platform and device, brings the capabilities needed to connect the next billion devices

12

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,

More information

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015 MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture

More information

The Importance of Secure Elements in M2M Deployments: An Introduction

The Importance of Secure Elements in M2M Deployments: An Introduction The Importance of Secure Elements in M2M Deployments: An Introduction February 2014 Securing the future of mobile services 2 Contents THE IMPORTANCE OF SECURE ELEMENTS IN M2M DEPLOYMENTS... 3 1. INTRODUCTION...

More information

Mobile Connect & FIDO

Mobile Connect & FIDO Mobile Connect & FIDO About the GSMA The GSMA represents the interests of mobile operators worldwide Spanning more than 220 countries, the GSMA unites nearly 800 of the world s mobile operators, as well

More information

Securing the Growth of IoT and M2M

Securing the Growth of IoT and M2M Securing the Growth of IoT and M2M Svetlana Grant, Director, Future IoT Networks Connected Living Programme, GSMA 9 September 2015 Connected Living - Mobilising the Internet of Things GSMA VISION 2020

More information

3GPP TSG SA WG3 Security S3#30 S3-030534 6-10 October 2003 Povoa de Varzim, Portugal. Abstract

3GPP TSG SA WG3 Security S3#30 S3-030534 6-10 October 2003 Povoa de Varzim, Portugal. Abstract 3GPP TSG SA WG3 Security S3#30 S3-030534 6-10 October 2003 Povoa de Varzim, Portugal Source: Gemplus, Oberthur, Schlumberger Title: Over-The-Air (OTA) technology Document for: Discussion and decision Agenda

More information

White Paper. Bearer Independent Protocol (BIP)

White Paper. Bearer Independent Protocol (BIP) White Paper Bearer Independent Protocol (BIP) - 2 - Contents 1 Executive summary...4 2 Introduction...5 3 Solution description...5 3.1 Standards compliance...5 3.2 Interface architecture...6 3.3 Data carriers...9

More information

M2M Connectivity T: 08456 200 200 W: www.2circles.com

M2M Connectivity T: 08456 200 200 W: www.2circles.com Product Profile M2M Connectivity Number of devices in billions 2 Circles M2M at a glance Partnered with Telefónica, one of the largest mobile network operators in the world, we can offer M2M connectivity

More information

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M Anvay Lonkar, Marketing Manager M2M Solutions & Services Gemalto M2M FORUM, MILAN, 15 May 2013 Gemalto delivers trusted and convenient digital services to billions

More information

M2M without Borders. Why esim is a Game Changer for the International Internet of Things

M2M without Borders. Why esim is a Game Changer for the International Internet of Things M2M without Borders Why esim is a Game Changer for the International Internet of Things When hearing the term, machine-to-machine, most people probably think of the ubiquitous cell phone in one form or

More information

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0 Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International

More information

SIMULITY PRODUCTS & SERVICES OVERVIEW

SIMULITY PRODUCTS & SERVICES OVERVIEW TM simulity SIMULITY PRODUCTS & SERVICES OVERVIEW About Simulity Simulity is an established software company specialising in embedded communications software and related server-based applications. We connect

More information

4G (LTE) Roaming Experience_. Mobile World Congress 2014

4G (LTE) Roaming Experience_. Mobile World Congress 2014 4G (LTE) Roaming Experience_ Mobile World Congress 2014 Telefonica offers to customers of multiple partner operators in more than 15 different countries and during MWC in Barcelona in anticipation of the

More information

Mobile Electronic Payments

Mobile Electronic Payments Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to

More information

The Role of the Trusted Service Manager in Mobile Commerce

The Role of the Trusted Service Manager in Mobile Commerce About the GSMA The GSMA represents the interests of mobile operators worldwide. Spanning more than 220 countries, the GSMA unites nearly 800 of the world s mobile operators with 250 companies in the broader

More information

M2M innovations that will drive the market: Big Data, Cloud and LTE technologies impact?

M2M innovations that will drive the market: Big Data, Cloud and LTE technologies impact? M2M innovations that will drive the market: Big Data, Cloud and LTE technologies impact? M2M + Industry Forum / 13 April 2013 Joachim Dressler Board Member - M2M Alliance e.v. VP EMEA Sales Sierra Wireless

More information

Unleashing the Power of the Internet of Things

Unleashing the Power of the Internet of Things Gemalto M2M Make an M2M wish! Unleashing the Power of the Internet of Things Our M2M portfolio is enabling secure solutions in industries ranging from healthcare, retail services, smart energy, transportation,

More information

Roles of Smart TV in Internet of Things

Roles of Smart TV in Internet of Things Roles of Smart TV in Internet of Things PG Demidov Yaroslavl State University Yaroslavl FRUCT Laboratory Our goal Roles of Smart TV in IoT We analyzed hardware and software which comes with modern Smart

More information

M2M Solutions. Jose Rabello M2M Solution Sales Manager LATAM Gemalto Telecom Forum 2013

M2M Solutions. Jose Rabello M2M Solution Sales Manager LATAM Gemalto Telecom Forum 2013 M2M Solutions Jose Rabello M2M Solution Sales Manager LATAM Gemalto Telecom Forum 2013 Does M2M look complex? 2 Moving from classic to connected machine system NEW INFORMATION = + New business model New

More information

Mobile Payment: The next step of secure payment VDI / VDE-Colloquium. Hans-Jörg Frey Senior Product Manager May 16th, 2013

Mobile Payment: The next step of secure payment VDI / VDE-Colloquium. Hans-Jörg Frey Senior Product Manager May 16th, 2013 Mobile Payment: The next step of secure payment VDI / VDE-Colloquium May 16th, 2013 G&D has been growing through continuous innovation Server software and services Token and embedded security Cards for

More information

Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation

Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation CELTIC Day, Berlin, June 25 th 2014 Gemalto at a glance 2.4bn revenue 2013 2bn+ end-users benefit from our solutions

More information

Benefits Analysis of GSMA Embedded SIM Specification on the Mobile Enabled M2M Industry

Benefits Analysis of GSMA Embedded SIM Specification on the Mobile Enabled M2M Industry September 2014 Benefits Analysis of GSMA Embedded SIM Specification on the Mobile Enabled M2M Industry Researched and Published by Beecham Research Ltd. GLOSSARY AND READING GUIDANCE Benefits Analysis

More information

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

CINTERION The global leader in cellular M2M communication. Cinterion Wireless Modules GmbH 2011, All rights reserved

CINTERION The global leader in cellular M2M communication. Cinterion Wireless Modules GmbH 2011, All rights reserved The global leader in cellular M2M communication Cinterion Wireless Modules GmbH 2011, All rights reserved is a Gemalto company Company History Gemalto The company was founded in 1995 as a business unit

More information

CASQUE SNR Presentation 16 th April 2015

CASQUE SNR Presentation 16 th April 2015 Presentation 16 th April 2015 What is it Distributed Management Systems Innovative Methodology from UK owned company with accompanying Protocol that allows Key Generation, Key Distribution and Key Change

More information

WHITE PAPER Security in M2M Communication What is secure enough?

WHITE PAPER Security in M2M Communication What is secure enough? WHITE PAPER Security in M2M Communication What is secure enough? Motivation Wireless Machine-To-Machine (M2M) communication has grown dramatically over the past decade and is still growing rapidly. In

More information

IoT is an opportunity for the foundation of new businesses in the future connected society.

IoT is an opportunity for the foundation of new businesses in the future connected society. 04 A STARTEGY FOR IOT IoT is an opportunity for the foundation of new businesses in the future connected society. In just a few years, tens of billions of devices will be spread around the world, demanding

More information

Increasing M2M device intelligence drive fast decisions and help new business

Increasing M2M device intelligence drive fast decisions and help new business Increasing M2M device intelligence drive fast decisions and help new business M2M+ Industry Summit / 19-20 May 2014 Joachim Dressler Board Member - M2M Alliance e.v. VP EMEA Sales Sierra Wireless M2M Alliance

More information

Huawei Agile Network FAQ... 2. 1 What is an agile network? What is the relationship between an agile network and SDN?... 2

Huawei Agile Network FAQ... 2. 1 What is an agile network? What is the relationship between an agile network and SDN?... 2 Contents Huawei Agile Network FAQ... 2 1 What is an agile network? What is the relationship between an agile network and SDN?... 2 2 What is an agile campus?... 3 3 What are the benefits of an agile network?...

More information

Network Data Management Protocol (NDMP) White Paper

Network Data Management Protocol (NDMP) White Paper Network Data Management Protocol (NDMP) White Paper Summary What is the primary goal of enterprise storage management? To back up and restore information in an intelligent, secure, timely, cost-effective

More information

Credential Management for Cloud Computing

Credential Management for Cloud Computing Credential Management for Cloud Computing Workshop Cloud Security, 16.07.2014 Dr. Johannes Luyken Page 1 Security breaches increase in their impact by exploiting online access to confidential data that

More information

Reprogrammable SIMs:

Reprogrammable SIMs: Reprogrammable SIMs: Technology, Evolution and Implications Final Report Prepared for: Prepared by: CSMG Descartes House 8 Gate Street London WC2A 3HP United Kingdom www.csmg-global.com 25 September 2012

More information

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org [email protected]

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org info@open-mtc.org OpenMTC M2M Solutions for Smart Cities and the Internet of Things www.open-mtc.org [email protected] 2. March März 2, 2013 Understanding M2M Machine-to-Machine (M2M) is a paradigm in which the end-to-end

More information

Telefonica s Journey to 5G_ Enrique Blanco - Global CTO You choose. We connect_

Telefonica s Journey to 5G_ Enrique Blanco - Global CTO You choose. We connect_ Telefonica s Journey to 5G_ Enrique Blanco - Global CTO You choose. We connect_ We want our Clients to enjoy all the Benefits of the Digital World New Services Demand Higher Speeds and Quality Assurance

More information

Smartcard Web Server Enabler Architecture

Smartcard Web Server Enabler Architecture Smartcard Web Server Enabler Architecture Candidate Version 1.0 09 Feb 2007 Open Mobile Alliance OMA-AD-Smartcard_Web_Server-V1_0-20070209-C OMA-AD-Smartcard_Web_Server-V1_0-20070209-C Page 2 (17) Use

More information

HCE and SIM Secure Element:

HCE and SIM Secure Element: HCE and SIM Secure Element: It s not black and white A Discussion Paper from Consult Hyperion Supported by: Date: June 2014 Authors: Steve Pannifer, Dick Clark, Dave Birch [email protected] Consult

More information

A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies. November 2014

A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies. November 2014 A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies November 2014 Internet-Of-Things Solution Deployment Gains Momentum Among Firms Globally Improved Customer Experience

More information

CHINA UNICOM COMMIT TO MAKE CONNECTED LIVING EASIER

CHINA UNICOM COMMIT TO MAKE CONNECTED LIVING EASIER 2014 年 6 月 CHINA UNICOM COMMIT TO MAKE CONNECTED LIVING EASIER Keduo XIN 10 th June, 2014 Connected Living is becoming true in China Total connections in China-2013 Connected living growing fast in scale

More information

Ingenious Systems. Evolute System's. Mobile Payment. Initiative

Ingenious Systems. Evolute System's. Mobile Payment. Initiative Ingenious Systems Evolute System's Mobile Payment Initiative The Mobile Payment Concept A mobile payment is any payment where a mobile device is used to initiate, authorize and confirm an exchange of financial

More information

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application Introduction Security continues to be a hot topic in all areas of technology, including machine-tomachine (M2M) applications.

More information

IoT Security Platform

IoT Security Platform IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there

More information

Summer projects for Dept. of IT students in the summer 2015

Summer projects for Dept. of IT students in the summer 2015 Summer projects for Dept. of IT students in the summer 2015 Here are 7 possible summer project topics for students. If you are interested in any of them, contact the person associated with the project

More information

M 2 M IWG. Eclipse, M2M and the Internet of Things. Overview. M 2 M Industry WorkGroup! M2M?

M 2 M IWG. Eclipse, M2M and the Internet of Things. Overview. M 2 M Industry WorkGroup! M2M? M 2 M IWG Eclipse, M2M and the Internet of Things Overview M2M? Technology that supports wired or wireless communication between machines. (TechTarget) M2M Market Opportunity Key Trends 1. New connected

More information

WHITEPAPER BEST PRACTICES IN MOBILE APPLICATION TESTING

WHITEPAPER BEST PRACTICES IN MOBILE APPLICATION TESTING WHITEPAPER BEST PRACTICES IN MOBILE APPLICATION TESTING 1 The basic frame of software testers mind-set is attuned to check documentation, functionality, stability, API and performance and make sure that

More information

What is Internet of Things?

What is Internet of Things? Internet of Things What is Internet of Things? It is the ability to interact with more and more objects around us With Non Connected or Reactive Devices And With Connected and Active Devices (Machine to

More information

How much do you pay for your PKI solution?

How much do you pay for your PKI solution? Information Paper Understand the total cost of your PKI How much do you pay for your PKI? A closer look into the real costs associated with building and running your own Public Key Infrastructure and 3SKey.

More information

Key Trends in M2M Alliance Networking

Key Trends in M2M Alliance Networking Overcoming market fragmentation by creating alliances and partnerships across the M2M value chain M2M Africa Summit / 24-26 June 2014 Joachim Dressler Board Member - M2M Alliance e.v. VP EMEA Sales Sierra

More information

Android pay. Frequently asked questions

Android pay. Frequently asked questions Android pay Frequently asked questions June 2015 Android Pay - FAQs In May 2015, Android Pay was announced by Google. Android Pay is Google s payments solution that allows consumers to do in-store and

More information

Maintain Fleet Management Solutions Using Wide Area Wireless Technology

Maintain Fleet Management Solutions Using Wide Area Wireless Technology Maintain Fleet Management Solutions Using Wide Area Wireless Technology Andreas Kohn Sierra Wireless, Inc. August, 2010 1 Introduction Wireless technology can provide a competitive advantage in today s

More information

Simplifying Payment Card Industry Compliance

Simplifying Payment Card Industry Compliance Simplifying Payment Card Industry Compliance 2014 Globalscape, Inc. All Rights Reserved. 1 Simplifying Payment Card Industry Compliance Agenda: What is PCI? Why do I need to worry about this? What changed

More information

WHITE PAPER. SOFTWARE AND FIRMWARE UPDATING Streamlining the Indispensable FOTA in m2m Applications

WHITE PAPER. SOFTWARE AND FIRMWARE UPDATING Streamlining the Indispensable FOTA in m2m Applications SOFTWARE AND FIRMWARE UPDATING Streamlining the Indispensable FOTA in m2m Applications INTRODUCTION Firmware over-the-air (FOTA) updating provides a cost-effective, fast, secure and reliable way for wirelessly

More information

OT PRODUCTS & SOLUTIONS TRANSPORT

OT PRODUCTS & SOLUTIONS TRANSPORT OT PRODUCTS & SOLUTIONS TRANSPORT TOWARDS TRUE MOBILITY TRANSPORT OPERATORS AND TODAY, CONTACTLESS INTEGRATORS ARE FACING TRANSPORT SYSTEMS STRATEGIC CHALLENGES LACK INTEROPERABILITY, WHILST A FULL RANGE

More information

A Secure and Open Solution for Seamless Transit Systems

A Secure and Open Solution for Seamless Transit Systems A Secure and Open Solution for Seamless Transit Systems Today s Proprietary Fare Collection Systems Transit operators must combat growing security threats while identifying new revenue sources and enhancing

More information

M2M For industrial and automotive

M2M For industrial and automotive M2M For industrial and automotive Content ST at a glance... 4 Where to find us... 5 The value chain... 5 Secure MCU... 6 Focus on ST33 secure microcontrollers... 6 M2M fields of application... 7 What is

More information

IoT Potential Risks and Challenges

IoT Potential Risks and Challenges IoT Potential Risks and Challenges GRIFES / GITI / EPFL Alumni Conference, Lausanne, May 7 th, 2015 Stefan Schiller, HP ESP Fortify Solution Architect D/A/CH IoT Potential Risks and Challenges Agenda IDC

More information

A Symantec Connect Document. A Total Cost of Ownership Viewpoint

A Symantec Connect Document. A Total Cost of Ownership Viewpoint A Symantec Connect Document Two-Factor Authentication A Total Cost of Ownership Viewpoint White Paper: Two-Factor Authentication: A TCO Viewpoint Two-Factor Authentication Contents Introduction............................................................................................

More information

How To Understand And Understand The Mobile Nfc Ecosystem

How To Understand And Understand The Mobile Nfc Ecosystem NFC services mobile Version 1.0 February 2007 Disclaimer and Legal Notices Every care has been taken in the preparation of this report to ensure that the information provided is accurate, factual and correct

More information

Design for Success: Designing for the Internet of Things with TiWiConnect

Design for Success: Designing for the Internet of Things with TiWiConnect Design for Success: Designing for the Internet of Things with TiWiConnect Today s presenters Scott Lederer Senior Software Architect Dave Burleton Vice President of Marketing LSR.com Today s Agenda Why

More information

Agile VPN for Carrier/SP Network. ONOS- based SDN Controller for China Unicom MPLS L3VPN Service

Agile VPN for Carrier/SP Network. ONOS- based SDN Controller for China Unicom MPLS L3VPN Service Agile VPN for Carrier/SP Network ONOS- based SDN Controller for China Unicom MPLS L3VPN Service Introduction In order to meet strong service demand on their network and respond to the new competition (who

More information

Use of C-SIM (R-UIM) in Roaming. 2006 3G CDMA Latin America Regional Conference

Use of C-SIM (R-UIM) in Roaming. 2006 3G CDMA Latin America Regional Conference Use of C-SIM (R-UIM) in Roaming 2006 3G CDMA Latin America Regional Conference AGENDA 1 C-SIM role in Roaming 2 CSIM for advanced roaming 3 CSIM beyond roaming The C-SIM Card Security PIN = Secret codes

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication A Total Cost of Ownership Viewpoint CONTENTS + Two-Factor Authentication 3 A Total Cost of Ownership Viewpoint + Introduction 3 + Defining Total Cost of Ownership 3 + VeriSign

More information

User Authentication Platform using Provisioning in Cloud Computing Environment

User Authentication Platform using Provisioning in Cloud Computing Environment User Authentication Platform using Provisioning in Cloud Computing Environment Hyosik Ahn, Hyokyung Chang, Changbok Jang, Euiin Choi Dept. Of Computer Engineering, Hannam University, Daejeon, Korea {hsahn,

More information

YOUR GLOBAL M2M PARTNER

YOUR GLOBAL M2M PARTNER YOUR GLOBAL M2M PARTNER The Global M2M Association (GMA) brings together leading mobile operators to make it easier for enterprises to launch global M2M services. We help enterprises reduce time-to-market,

More information

SECURE MOBILE APP DEVELOPMENT: DIFFERENCES FROM TRADITIONAL APPROACH

SECURE MOBILE APP DEVELOPMENT: DIFFERENCES FROM TRADITIONAL APPROACH SECURE MOBILE APP DEVELOPMENT: DIFFERENCES FROM TRADITIONAL APPROACH Suhas Desai Aujas Information Risk Services Session ID: MBS-T02 Session Classification: Intermediate Agenda Trends in Mobile Technology

More information

Licensing Guide BES12. Version 12.1

Licensing Guide BES12. Version 12.1 Licensing Guide BES12 Version 12.1 Published: 2015-04-02 SWD-20150402115554403 Contents Introduction... 5 About this guide...5 What is BES12?...5 Key features of BES12... 5 About licensing...7 Steps to

More information

Enhancing TAM E-SSO with smart phones, smart cards and other tokens. IBM Tivoli Talk

Enhancing TAM E-SSO with smart phones, smart cards and other tokens. IBM Tivoli Talk Enhancing TAM E-SSO with smart phones, smart cards and other tokens Sven Gossel IBM Tivoli Talk October 7 th, 2011 Charismathics Milestones 2005 2007 2010 Re-inventing PKI middleware Re-inventing Trusted

More information

Calypso Technology. A leader application to build up eticketing systems for modern and smart urban transport systems of the future

Calypso Technology. A leader application to build up eticketing systems for modern and smart urban transport systems of the future Calypso Technology A leader application to build up eticketing systems for modern and smart urban transport systems of the future Ing. Nicolas Generali SNCF 7cke7ng expert Calypso Networks Associa7on (CNA)

More information

NVM memory: A Critical Design Consideration for IoT Applications

NVM memory: A Critical Design Consideration for IoT Applications NVM memory: A Critical Design Consideration for IoT Applications Jim Lipman Sidense Corp. Introduction The Internet of Things (IoT), sometimes called the Internet of Everything (IoE), refers to an evolving

More information

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein INNOVATORS START HERE. EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly growing data

More information

Mobile Near-Field Communications (NFC) Payments

Mobile Near-Field Communications (NFC) Payments Mobile Near-Field Communications (NFC) Payments OCTOBER 2013 GENERAL INFORMATION American Express continues to develop its infrastructure and capabilities to support growing market interest in mobile payments

More information

INSTALLATION GUIDE Netop Mobile for Android

INSTALLATION GUIDE Netop Mobile for Android INSTALLATION GUIDE Netop Mobile for Android Version 10.50 Copyright 1981-2015 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE

FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE The demand for cloud infrastructure is rapidly increasing, the world of information is becoming application and

More information

Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices

Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices A Forrester Consulting Thought Leadership Paper Commissioned By Xively By LogMeIn August 2015 Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices Table

More information

Internet of Things From Idea to Scale

Internet of Things From Idea to Scale PRG Symposium Internet of Things From Idea to Scale September 12, 2014 [email protected] @AlexBlanter You are here today because you are interested in the Internet of Things and so is everybody

More information

Smart Anytime, Safe Anywhere. Climax Home Portal Platform. Envisage and Enable a Connected Future

Smart Anytime, Safe Anywhere. Climax Home Portal Platform. Envisage and Enable a Connected Future Smart Anytime, Safe Anywhere Climax Home Portal Platform Envisage and Enable a Connected Future Climax Home Portal Platform An IP/GPRS-Based Solution to Deliver Smart Home and Mobile Control Services Reliable

More information

Smartcards with Webservice Interface

Smartcards with Webservice Interface Smartcards with Webservice Interface 22. SIT-SmartCard Workshop 8./9. February 2012 Jan Eichholz Agenda Benefits of a Webservice Interface for Smartcards The Service Access Layer out of ISO/IEC 24727 The

More information

Bringing Security & Interoperability to Mobile Transactions. Critical Considerations

Bringing Security & Interoperability to Mobile Transactions. Critical Considerations Bringing Security & Interoperability to Mobile Transactions Critical Considerations April 2012 Transactions 2 Table of Contents 1. Introduction... 3 2. Section 1: Facing up the challenges of a connected

More information

Global M2M Platform vodacom.co.za/business

Global M2M Platform vodacom.co.za/business Vodacom Global M2M Global M2M Platform vodacom.co.za/business Vodacom Global M2M Opening up the potential for a new range of smart M2M services Vodacom Global M2M Services are designed to help you accelerate

More information

IBM WebSphere Premises Server

IBM WebSphere Premises Server Integrate sensor data to create new visibility and drive business process innovation IBM WebSphere Server Highlights Derive actionable insights that support Enable real-time location tracking business

More information

INTRODUCTION AND HISTORY

INTRODUCTION AND HISTORY INTRODUCTION AND HISTORY EMV is actually younger than we all may think as it only became available, as a specification that could be implemented, in 1996. The evolution of EMV can be seen in the development

More information

Seminar: Security Metrics in Cloud Computing (20-00-0577-se)

Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, [email protected]

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

Mobile application testing for the enterprise

Mobile application testing for the enterprise Mobile application testing for the enterprise Accenture brings together deep knowledge of the enterprise, expertise in mobile technologies and strong end-to-end testing practices to help all enterprises

More information

Study of Java Card and its Application 1 Nainesh Rawani, 2 Akhil Patel

Study of Java Card and its Application 1 Nainesh Rawani, 2 Akhil Patel Study of Java Card and its Application 1 Nainesh Rawani, 2 Akhil Patel [email protected] 1,2 Information Technology Department, 1,2 Gujarat Technological University, Gujarat, India. Abstract: Sun Microsystems

More information