OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE
MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT, CONNECTED DEVICES TO REDUCE OPERATIONAL COSTS, IMPROVE USABILITY AND TACKLE THE CHALLENGE OF SUSTAINABLE DEVELOPMENT: CARS ARE TRANSFORMED WITH TELEMATICS, INFOTAINMENT AND EMERGENCY CALL SERVICES, INCREASING THE SAFETY AND CONVENIENCE FOR DRIVERS AND PASSENGERS. AS THE WORLD IS HEADING TOWARD CLEANER AND MORE EFFICIENT ENERGY USE, ADVANCED METERING INFRASTRUCTURES ARE BEING INCREASINGLY CONNECTED TO CELLULAR NETWORKS. CONNECTED CONSUMER ELECTRONIC DEVICES ARE ALSO FLOURISHING, TRANSFORMING THE CONSUMER EXPERIENCE AND HOW THE DEVICES ARE USED FOR EXAMPLE WEARABLES LIKE CONNECTED WATCHES AND GLASSES. BUILDING OR HOME SECURITY SURVEILLANCE, AND REMOTE HEALTH MONITORING ARE ALSO IMPROVED BY CONNECTED DEVICES. CONNECT A PLETHORA OF DEVICES ACROSS THE WORLD For connectivity providers such as mobile operators, one of the main challenges of Machine-to-Machine (M2M) and Internet-of-Things (IoT) markets is to provide optimized global connectivity to Original Equipment Manufacturers (OEM) who are distributing their connected devices worldwide. This means having the ability to activate connectivity only for devices being used, benefing always from local tariff plans, and ensuring usage of the best network. Business-critical or security-related connected objects require demanding Service Level Agreements from connectivity providers. Mobile operators will need new ways to monitor the quality of the service and to prevent service failures traditional tools being no longer adapted to the requirements of M2M and IoT. BRING TRUST IN M2M AND IOT With more and more devices connected to back-end applications, through the public Internet or through mobile networks, new security concerns emerge about confidentiality, integrity and control of data. 80% of Internet connected devices have potential security flaws. Hacking of these devices does not only A HIGHLY SUCCESSFUL MARKET The global Machine-to-Machine and Internet-of-Things market is predicted to reach $8.9 trillion dollars by 2020. represent a financial risk but may also involve a threat to human safety. One of the first challenges, given there is no human involvement, is to securely authenticate the devices before transmitting data. Confidentiality and integrity of the information collected is crucial in the development of M2M and IoT. Nobody wants information about their business or how they live to fall in the wrong hands, or to be altered by unauthorized parties. TRANSFORM PRODUCTS WITH SERVICES, IN EVERY VERTICAL BUSINESS At the end of the day, connected devices are only the tip of the Iceberg. Manufacturers are moving from selling products to selling services. Intelligence is in the cloud and in the specific applications developed to optimize operations, to improve product usage and related services, and to analyze customers behavior. There is a need for data collection, application development and device management capabilities that cover not only a given vertical, but also a broader horizontal approach.
14 BILLION CONNECTED M2M DEVICES IN 2020 END-USER BENEFITS OT invents products and solutions that match with end-user needs 27% OF GLOBAL DATA WILL BE PRODUCED BY CONNECTED DEVICES IN 2020 CONNECTIVITY Get the optimum mobile data connectivity for all machines and devices. TRUST Be assured that devices are not being hacked and that stored or transmitted data is not compromised. SERVICES Enjoy better experience of the products through real-time monitoring, support and maintenance, get products better adapted to the needs. TRUST OT FOR SECURE M2M AND IOT CONNECTIVITY OT s comprehensive offer helps the different ecosystem players to tackle the challenges and seize the full benefits of the IoT and M2M market, while covering the very important security aspects related to it. OT s proposition is to bring the highest level of physical resilience and logical security in and around the connected device. OT's dedicated secure elements protect the access to network resources and cloud-based services. They provide the safest possible place to store secret information and execute sensitive M2M and IoT applications. As a provider of digital security solutions and secure elements, one of OT s natural objectives is to streamline M2M and IoT connectivity and subscription management for mobile operators. OT is actively involved in GSMA and other standardization initiatives. MOVE UP THE M2M AND IoT VALUE CHAIN WITH OT Beyond answering these fundamental security and connectivity requirements, OT is positioned as a horizontal M2M and IoT solution provider. Our secure element offering is complemented by a rich panel of solutions, applications and services covering the connectivity management, monitoring for quality of service, and device management for both mobile operators and OEMs. On top of that, OT s portfolio also includes a turnkey solution that allows OEMs and mobile operators to collect, store and analyze data from any device. This solution enables the rapid development of applications tailored to their own business needs or those of their partners. ECOSYSTEM BENEFITS MOBILE OPERATORS / CONNECTIVITY PROVIDERS Capture additional revenue through connectivity services adapted to M2M and IoT, while preserving full security of subscription credentials Move-up the M2M and IoT value chain from connectivity to device management and application enablement Optimize network resources to respond efficiently to the growing demand of M2M and IoT ORIGINAL EQUIPMENT MANUFACTURERS Optimize production chains, stocks, logistics and distributions for connected devices Transform their business from selling products to selling services improving the usage and usability of the products Collect marketing data to better adapt their offering to consumer behavior
OT TRANSFORMING M2M AND IoT OT ANSWERS THE SPECIFIC CONNECTIVITY AND LIFECYCLE MANAGEMENT REQUIREMENTS OF M2M AND IoT COVERING THE NEEDS OF MOBILE OPERATORS, OEMS AND ENTERPRISES. OT S HORIZONTAL OFFER INCLUDES SECURE ELEMENTS AND SOLUTIONS TO MANAGE THE CONNECTIVITY OF DEVICES, REMOTELY CONTROL AND AUTOMATE THEIR MANAGEMENT, MONITOR THE NETWORK QUALITY AND THE CONTINUITY OF SERVICE, SECURE THE END-TO-END COMMUNICATION BETWEEN DEVICES AND APPLICATIONS, AS WELL AS TO COLLECT AND ANALYZE DATA FROM ANY DEVICE, WITH THE ABILITY TO RAPIDLY DEVELOP VERTICAL-SPECIFIC APPLICATIONS. DIM DIM DAKOTA PEARL BY OT OT s DIM is a rich dedicated range of embedded and removable M2M and IoT SIM cards for demanding environments in industrial applications, automotive applications, and consumer electronic devices. DIM are built from the ground up to be compliant within harsh stress conditions typically found in M2M and IoT environments, and designed to provide the extended lifetime and remote monitoring required by more and more M2M and IoT applications. OT s DakOTa is a new range of Remotely Provisionable SIM for the IoT market available in both soldered and plug form factors. Compliant to the GSMA Embedded SIM specifications, these euicc enable mobile operators to download, activate and change their profile over-the-air and thus simplify the assembly and supply chain for device manufacturers and vendors. PEARL BY OT is an advanced secure element which offers a Trusted Execution Environment. PEARL BY OT protects valuable keys and data applications against software and hardware attacks. The security capabilities of PEARL BY OT ensure that M2M and IoT devices can be strongly authenticated and that information exchanged over networks remain protected. M-CONNECT M-MONITOR M-TRUST M-SENSE OT s M-Connect solution enables mobile operators to securely and remotely provision a subscription in a connected device when it is used the first time and, if needed, to change the subscription during the lifecycle of the device. Compliant to the GSMA Embedded SIM specifications, this solution allows OEMs to produce devices independent of the destination country and network, while ensuring privacy and security of mobile operator credentials. OT s M-Monitor solution helps mobile operators prevent and deal with quality issues and service interruptions, relying on very detailed quality and continuity of service reports. It allows them to get an accurate picture of M2M and IoT devices coverage in real time and to receive early warning about the DIM end of life or an abnormal usage. OT s M-Trust solution provides the end-to-end security between connected devices and application servers, ensuring secure authentication of the connected devices as well as confidentiality and integrity of the data transmitted. Regardless of the communication network used, M-Trust ensures that the device and server exchanging data are properly identified and that the data is encrypted so it will not be tampered or read by unauthorized parties. OT s M-Sense solution makes it easy to collect data from different devices with multiple data protocols and connected to various networks. It enables enterprises to get actionable information and to remotely control their assets, thanks to its existing business rules and device management capabilities. With M-Sense, enterprises can also develop vertical applications to fit their business-specific needs in a timely manner.
WWW.OBERTHUR.COM OBERTHUR TECHNOLOGIES HAS A UNIQUE EXPERIENCE TO PROVIDE MACHINE-TO-MACHINE SOLUTIONS AN INNOVATION-ORIENTED PARTNER A LEADER IN THE PAYMENT MARKET AN INTERNATIONAL TELECOM EXPERT A MAJOR ACTOR IN THE IDENTITY MARKET OVER 10 YEARS TRANSPORT SUPPLY EXPERIENCE A SOLUTION DEVELOPMENT AND MANAGED SERVICES EXPERT A LEADER IN SECURED PERSONALIZATION GLOBAL AND LOCAL SUPPORT CAPABILITIES Expert in Smart Transactions, Digital Payments, Machine-to-Machine, Digital Identity and Transport & Access Control A portfolio of more than 500 patents with an average validity of 15 years 700 engineers in 11 R&D centers Participation to industry and open standards (ETSI, GP, 3GPP, GSMA, OMA, FIDO Alliance ) Trusted partner of over 2,000 banks and financial institutions An EMV pioneer in the U.S. Securing payments with international and local schemes such as MasterCard, Visa, Discover, Amex, CB, CUP Expert in security (EAL4+, MasterCard, Visa) Technology trusted by over 400 telecom customers including 8 of the world s top 10 operators Leader in the secure elements market for device manufacturers (OEM) Ecosystem facilitator in mobile payment and major transport projects worldwide Ranked number one in contactless market by ABI Research and recognized for being the first to achieve significant wins for embedded Secure Elements as well as fostering high-level partnerships End-to-end offer enabling and securing Machine-to-Machine and Internet-of-Things services Over 60 core MNO solution references, leveraging a global OTA offer compliant to LTE and HTTP Over 100 Identity references Over 350 million highly secure Identity documents currently deployed and used on the field 20+ years experience in electronic chip development, cryptography and biometric standards Broad variety of digital security systems to closely assist administrative authorities and companies 50 references worldwide A leading supplier of MIFARE, Calypso and CIPURSE A founding member of the OSPT Alliance Solutions operated from secured and certified OT data centers or deployed in-house High availability service and 24/7 support and maintenance Software development expert in UNIX, C, C++ and Java environments Trusted partner for hosting sensitive information Unique global tool for all kinds of personalization of all smart card products Over 6,000 employees worldwide 5 manufacturing hubs (Europe, North America, South America, Asia and Middle East Africa) A network of almost 40 service centers Flash this code to download the document www.oberthur.com/ot/ot_m2m.pdf DISCOVER THE M WORLD our magazine available on tablets and smartphones www.oberthur.com/themworld LEARN MORE ABOUT OT OBERTHUR.COM TWITTER LINKEDIN YOUTUBE 2015 Oberthur Technologies. All rights reserved. Specifications and information subject to change without notice. The products described in this document are subject to continuous development and improvement. All trademarks and service marks referred to herein, whether registered or not in specific countries, are the property of their respective owners. Oberthur Technologies respects the environment. The number of printed brochures produced by the company has been significantly reduced to save paper. Printed documents are produced on FSC-certified paper using aqueous inks to reduce environmental impact. Oberthur Technologies is certified ISO 9001 : 2008