20
LTE UICCs
ISSUE 05 2014
including, but not limited to, NFC mobile payments, personal identification and authentication services and subscription based HD video streaming.
As the gateway to IP-based commercial opportunities opens up to MNOs however, they face a significant new challenge: increasing competition from new players simultaneously entering the mobile world. In an LTE environment, mobile service provision is no longer the exclusive domain of the MNO. The network is shared with IP-centric OTT players, many of whom are looking at 4G as an opening into the mobile channel for their legacy IP-based services. The threat to MNOs is real; OTT players have already intensified competition for mobile voice and messaging services by introducing low-to-no cost services delivered over IP. Now there is a further threat posed relative to the delivery of VoLTE services.
Historically, MNOs have controlled the identification/ authentication of their subscribers and the introduction of new services on the mobile network using the SIM (and later, the UICC). Faced with the current, and future, threat from OTT players, it is critical that MNOs now know how to optimise and configure their LTE UICC’s new features in order to retain control over the delivery of, and authentication to, existing and future LTE mobile services and enhance the delivery of NFC mobile services over the LTE network.
One critical success factor is the ability of a MNO to position the LTE UICC as the ‘network endpoint’, where subscriber credentials needed to authorise the actions of secure LTE services are stored. With this positioning, MNOs will be able to maximise the quality and security of their subscribers’ LTE service experience, by only allowing access to high quality and commercially favourable services. Without it, OTT players may succeed in positioning the mobile device as the network endpoint, thereby reducing MNO control and revenue potential and forcing them to make service concessions that will jeopardise the end-user’s LTE service experience and the security of their confidential data. MNOs that get this right have an opportunity to extend their role beyond conventional
In the LTE environment, where the worlds of mobile and IP converge, the SIM has metamorphosed into an IP-connected, multi-application platform, which continues to provide an unrivalled environment for secure authentication
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52