This page contains a Flash digital edition of a book.
ISSUE 05 2014


LTE UICCs


21


Faced with the current, and future, threat from OTT players, it is critical that MNOs now know how to optimise and configure their LTE UICC’s new features


Inevitably, an increase in the number of applications present on an LTE UICC, together with its extended functionality, will generate more requirements for remote updates to be administered. Fortunately, since 4G is an all-IP environment, over-the-air UICC updates can now be executed via HTTPs, the architecture used to build the web. Taking advantage of this new capability will make a huge difference to the time and cost required to administer each UICC update, speeding up the process of applying content and application upgrades and also raising overall success rates of each.


mobile boundaries, through the provision of IP-based identity authentication services in the wider online world. This will be particularly relevant to service providers who demand the highest levels of control and security in their deployments. SIMalliance contends that as the market for secure 4G services evolves, this positioning and partnering with OTT players will become of critical strategic importance for MNOs globally.


The smooth operation of a 4G network can also be impacted by the configuration of the LTE UICC. MNOs have, for example, the potential to store LTE location information on the LTE UICC, allowing for future enhancements of roaming applications and services. When appropriately configured, the LTE UICC also enables users to securely ‘roam’ onto preferred visited networks, greatly reducing the volumes of data being passed via the inappropriate mobile network and also enabling many operators to continue to utilise their existing network infrastructure. This will reduce costs and increase service availability and average revenue per user as a result.


Inter-network user authentication can also be enhanced, providing a basis upon which MNOs can develop advanced UICC-based roaming applications that significantly improve user experience.


Technical details of these and other powerful new features are explored in the SIMalliance LTE UICC Profile, a recommendations document available for download without charge from the SIMalliance website. The profile has been written for both the technical and marketing teams within MNOs, with a view to providing guidance on optimal UICC support for LTE network and IMS services deployment. LTE


About SIMalliance (Security, Identity, Mobility) SIMalliance is the global, non-profit industry association which simplifies secure element (SE) implementation to drive the creation, deployment and management of secure mobile services. The organisation promotes the essential role of the SE in delivering secure mobile applications and services across all devices that can access wireless networks. By identifying and addressing SE-related technical issues, and both clarifying and recommending existing technical standards relevant to SE implementation, the SIMalliance aims to promote an open SE ecosystem to facilitate and accelerate delivery of secure mobile applications globally.


SIMalliance members represent approximately 86 per cent of the global SIM card market. As such, the SIMalliance’s membership is responsible for delivering the most widely distributed secure application delivery platform in the world (UICC/SIM/USIM).


SIMalliance members are Eastcompeace, Fundamenture, Gemalto, Giesecke & Devrient, Incard, Kona I, Morpho, Oasis Smart SIM, Oberthur Technologies, VALID, Watchdata and Wuhan Tianyu. SIMalliance Strategic Partners are Comprion, Linxens and Movenda.


For more information visit www.simalliance.org


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52