Upload
truongliem
View
234
Download
0
Embed Size (px)
Citation preview
M A C H I N E - T O - M A C H I N E & e U I C C M A S T E R C L A S S
The Internet of Things (IoT) is currently taking shape and embarking on a huge
growth path towards the future. It truly promises to become the next revolution
after the Internet and the mobile internet. It is estimated that for every person on
the planet there will be at least five connected devices by 2020. One of the enablers
is ubiquitous connectivity. Mobile network operators view the Machine-to-Machine
(M2M) segment of IoT as a huge growth area for them. To enable this growth they are
realizing that they must also facilitate the large-scale remote management of these
devices. This is where the embedded SIM (eUICC) plays an important role. At its core,
eUICC enables remote provisioning of SIM profiles, which means that the Service
Provider (SP) can switch mobile network subscription without a SIM swap. However,
what does this mean for your business? How to leverage the opportunities? What
are the impact to legacy systems, and security threats when implementing a M2M
solution? In order to make an educated decision, you need knowledge.
• Understand the new IoT landscape from
a product and technical perspective
• Identify the need for eUICCs and where
they fit in your plans
• Understand the various routes available
for eUICC and what security aspects are
involved
• Assess the impact of eUICC on your
business and understand the underlying
technical architectures
• Understand the core technical
specifications
W H A T Y O U W I L L L E A R N
• Internet of Things: the landscape for
M2M
• The need for embedded SIM (eUICC)
• Understand the eUICC ecosystem,
architecture and deployment
• Trends and developments
• eUICC high level architecture details
• Testing, Interoperability and security
K E Y T O P I C S
• Employees of companies operating in
the telecoms M2M domain; for example
MNOs, MVNOs, UICC vendors, handset
manufacturers & modem chipset
manufacturers
• Business consultants, business analysts
• Product owners, project and process
managers
• Security officers
• Innovation managers
• Solution architects
W H O S H O U L D A T T E N D ?
Host / System
M A C H I N E - T O - M A C H I N E & e U I C C M A S T E R C L A S S
A G E N D A
General information
Course duration: 2 days
Language: English
Location: Worldwide
Other related courses
We provide in-depth training
courses on other topics
discussed in this Masterclass.
As well as opne, in-class
training courses, we also
provide in-company courses
that are specifically designed
for your needs. These courses
can be hosted at your
premises or at one of UL’s
offices:
• EMV
• Tokenization
• MDES, VEPTS/VTS
• Remote & e-commerce
• HCE & cloud-based
payments
• Security of a mobile payment
application
Registration
Go to ul-ts.com/training to
sign up for training courses.
Internet of Things: the landscape for M2M
• Overview of the context for M2M: IoT trends, identifying the enabling technologies, drivers and barriers
• The different roles in this broad concept are explored as well as the various market domains, security and
interoperability
The need for Embedded SIM (eUICC)
• Enabling the M2M market
• Developments that preceded the embedded SIM as a concept, and the relationship with other initiatives
such as Apple SIM.
• The reasons for embedded SIMs entering the market; what problems Embedded SIMs aim to solve?
Embedded SIM ecosystem, architecture and deployment
• High level architecture overview, identifying target markets and challenges such as Security, interoperability,
service management and identifying the required roles and the key roles for the involved parties
Demo
• Review of UL Mobile Spy logs showing profile loading, switching and deletion. Demos of UL Mobile Card
Test Platform or UL Mobile eUICC Profile Tester
Trends and developments
• Current status and overview of deployments, active players, roadmap for eUICC in the M2M Market incl.
eUICC Version 2.0 proprietary profiles, eUICC Version 3.0 and 3.1, SIMAlliance Interoperable Profile format
SCP03T to secure the SIMAlliance Profile, Move to commercial handset devices, MNO-SP Interface, M2M
device authentication and where do ETSI fit in?
eUICC Specification Overview
• What’s here now and what’s coming in GSMA specs (architecture, interfaces, profiles etc.) and ETSI M2M
specs
Compliance Testing for Interoperability and security
• How GSMA’s eUICC Protection Profile ensures the same levels of security as a standard SIM card, GSMA’s
Security Accreditation Scheme (SAS) for eUICCs, Subscription Manager – Secure Routing (SM-SR) and
Subscription Manager – Data Preparation (SM-DP) and Global Platform’s eUICC Configuration Test Suite
Embedded SIM: How does it work?
• Embedded SIM life-cycle model and Step through use-cases and describe the actions for each element
Embedded SIM Remote Provisioning Architecture
• Overview of the SIM profile and the eUICC architecture, explaining the role of the Subscription Manager –
Secure Routing (SM-SR) and the Subscription Manager – Data Preparation (SM-DP)
Embedded SIM Interfaces
• eUICC Interfaces and Off-Card Interfaces
Embedded SIM Procedures
• How does Remote Provisioning and Management of the eUICC work?
Security Model: Threats Analysis & Risk Assessment Model
• What are the security challenges? • Security Analysis Methodology and The Security Realm Approach
Market certified Embedded SIM Versions
• Embedded SIM 2.1, Embedded SIM 3.0 and 3.1