Posts

Showing posts from March, 2023

How SIM Connect to the Network

Image
  A mobile phone need tobe authenticated first to the network so it can use the services from Mobile Network Operator (MNO) like voice, SMS, and data. When the mobile phone first switched on with SIM card inside, then the authentication process in GSM network starts when the base station (BS) sending out random challenge (RAND) to the mobile phone. Authentication and service request from the MNO following the process below : ·          When a mobile phone first switched on it will send a unique subscriber authentication key (IMSI) to the network. IMSI is programmed on every SIM card. ·          The authentication center (AuC) has a list which maps Ki number with the IMSI. It is a secure database. ·          When a SIM card requests for a service, a 128 bit random number (RAND) is instantaneously generated by the AuC and transmitted to the SIM card. · ...

Proactive SIM

Image
  SIM card has the ability to interact with outside entities like device or network. With regards of SIM capability to initiate command to the device, it is conducted with proactive command. When the SIM initiate proactive command it means the SIM is in proactive mode. Some example of this proactive commands are DISPLAY TEXT, SETUP MENU, POWER ON CARD, POWER OFF CARD, etc. Some files will be required for SIM / UICC to handle the proactive command. •        EF SUME (Setup Menu Element). This file contains values related to menu title tobe used by SIM / UICC when execute Setup Menu command. •        EF RMA (Remote Management Action). This file contains record with values of proactive command used in remote management.

EUICC Architecture

Image
  There are some components involved   in Remote SIM Provisioning (RSP) in order to provide eSIM services. These components must be integrated with Mobile Network Operator (MNO) system and eUICC Manufacturer (EUM). Inside the eSIM, the eUICC holds some components contain values, keyset, and profile of eSIM. This is for both M2M and Consumer architecture. According to Global Platform Certifitation (GPC), card architecture contain Security Domain (SD) and Application. Each can come from controlling authorities, application provider, and card issuer.   In eSIM / eUICC Security Domain plays significant roles. It contains connectivity and security variables of eSIM to run the services.  During the integration between the RSP and MNO system these components must be clearly defined. They are ISD-R, ISD-P, and ECASD. 1.        ISD-R (Issuer Security Domain- Root), representation of off-card entity SM-SR. •     ...