|By PR Newswire||
|December 24, 2012 07:13 AM EST||
NEW YORK, Dec. 24, 2012 /PRNewswire/ -- Reportlinker.com announces that a new market research report is available in its catalogue:
The mobile telecommunications industry undergoes permanent dynamic development and evolution. Speeds are increasing, value-added services expand revenue sources, prime costs are being reduced, and many other aspects are being optimized.
The SIM card, one of the core features of mobile telecommunications industry is also subject to the optimization process. Evolving from bank card size, to plug-in, micro- and nano-SIM cards, the subscriber identity module is expected to be reduced even more changing from a removable physical form factor to an embedded one.
Performances of secure transactions industry players allow further miniaturization of SIM cards, while ensuring the best level of security. Embedding SIM card into mobile communication device completely coincides with current trends of smooth look and enhanced functionality of high profile mobile handsets.
Not only mobile embedded SIM (or eUICC) is expected to free valuable space in popular communication devices, it will also ensure more flexible control and handling of key communication and additional services. Remote management of secure identity module bids fair to bring more business opportunities to the whole value chain.
Indeed, machine-to-machine (M2M) market, which has already adopted embedded M2M form factor (MFF2), clearly shows the advantages that soldered subscriber identity module brings to the ecosystem stakeholders. In the M2M ecosystem, the MFF2 benefits all affected parties, including the supply chain, mobile network operators and companies that opt for M2M technology.
However, mobile eUICC adoption is not going to pass easily as it is set to reshape the current removable SIM ecosystem. While being a lot similar to the actual SIM in terms of functions, the eUICC will change the structure and the way SIM card vendors and mobile telecommunication industry players, third parties and, finally, end users interact with each other. Moreover, such a reshape prescribes the introduction of new roles and the arrival of new entrants as well.
The new embedded form factor also raises diverse technical and legal questions, with security and ownership rights issues being among them. Depending on how these issues will be tackled, there will be different operating modes of eUICC ecosystem with new roles and new players to gamble their material wellbeing on the matter.
Undoubtedly, controversy on new business models that will rely on eUICC hurdles straightforward standardization and implementation of the technology. Taking into account the strengths and weaknesses of major players, Smart Insights has defined four scenarios that the industry may undergo. The probability of each scenario described in the report depends on key business advantages that each stakeholder anticipates from the eUICC adoption. In addition, the same stakeholders, fearing the shift of power coming with the eUICC adoption, may be tempted to build upon their current situation to hinder the implementation of the technology.
MNOs are believed to resist the transition from removable SIM to an embedded module, which eventually may negatively impact their core business. However, our field research found that some MNOs do believe in business opportunities that come with eUICC adoption and thus come out for its implementation. Handset makers alike other third parties are also expected to take advantage of the eUICC opportunity.
Nonetheless, Smart Insights forecasts that adjusted removable SIM card shipments will continue to grow at a CAGR of 6%-12% depending on different eUICC adoption scenarios analyzed in the report. The wide adoption of eUICC is not foreseen in the scope of the covered period, but rather in the long-term future. The report provides forecasts on eUICC shipments and adjusted removable SIM card shipments in volume.
The analysis was conducted based on primary and secondary research, the technical and business expertise of semiconductor and SIM card manufacturers, mobile network operators and handset makers, as well as industry associations and standardization bodies that were interviewed anonymously for the purpose of this report.
Table of Contents
Executive Summary 5
Table of contents 7
Table of Illustrations 11
1 Removable UICC 15
1.1 Overview 17
1.2 UICC roles 17
1.3 SIM / UICC Architecture 18
1.4 SIM functions 20
1.5 SIM card contains 21
1.6 SIM card form factors 22
1.7 GSM network architecture 23
1.8 Removable SIM advantages 24
1.8.1 For end-user 25
1.8.2 For MNOs 26
1.8.3 For supply chain 27
1.9 Customer Care 28
1.10 UICC / USIM standards 29
1.10.1 Core specifications 29
1.10.2 Test specifications 29
1.11 SIM card shipments 30
1.12 Market description 33
1.12.1 SIM Manufacturers 33
1.12.2 MNOs 34
1.12.3 Mobile Handsets Manufacturers 36
2 M2M eUICC 41
2.1 Overview 43
2.2 M2M SIM vs. mobile SIM 46
2.3 eUICC notion 47
2.4 M2M eUICC advantages 48
2.4.1 For end-user 48
2.4.2 For MNOs 48
2.4.3 For supply chain 49
2.5 M2M eUICC remote subscription management 49
2.5.1 M2M SIM provisioning use cases 49
2.5.2 M2M SIM subscription management 50
2.5.3 M2M eUICC remote subscription management 51
188.8.131.52 Connected consumer electronics 51
184.108.40.206 M2M communications identity module concept 52
3 Mobile eUICC 55
3.1 Overview 57
3.2 eUICC architecture 59
3.3 Mobile eUICC functions 62
3.4 Mobile eUICC advantages 63
3.4.1 For end-user 63
3.4.2 For MNOs 63
3.4.3 For eUICC supply chain 65
3.4.4 For handset manufacturers 66
3.4.5 For service providers 66
3.5 Mobile eUICC disadvantages 66
3.5.1 For end user 66
3.5.2 For MNOs 67
3.5.3 For eUICC supply chain 67
3.5.4 For handset manufacturers 68
3.6 Mobile eUICC issues 68
3.6.1 Challenges for eUICC 69
3.6.2 Challenges for eUICC ecosystem 71
220.127.116.11 Multiple operators access 71
18.104.22.168 Standardization 72
22.214.171.124 Certification 73
126.96.36.199 OTA interoperability 73
188.8.131.52 End user relationship 73
3.6.3 Security issues 74
3.6.4 Owner rights issues 74
3.6.5 GSMA eUICC requirements 75
3.6.6 ETSI use cases 76
3.6.7 SIMalliance recommendations 77
3.7 Mobile eUICC ecosystem potential players 77
3.8 Mobile eUICC remote subscription management 81
3.8.1 Current mobile UICC subscription provisioning 81
3.8.2 Mobile eUICC lifecycle states 82
3.8.3 Remote subscription management 82
184.108.40.206 Dynamic SIM allocation 82
220.127.116.11 Remote eUICC subscription management 86
3.8.4 Authentication key provisioning 88
3.8.5 LTE OTA platform 89
3.8.6 Benefits of remote subscription management 90
3.9 eUICC adoption scenarios 91
3.9.1 Scenario #1 – MNOs control eUICC 91
3.9.2 Scenario #2 – handset makers push eUICC 95
3.9.3 Scenario #3 – Android OS maker pushes eUICC 100
3.9.4 Scenario #4 – third parties push eUICC 103
3.9.5 Possible provisioning models 108
3.10 Customer Care 109
3.10.1 Customer care in mobile eUICC ecosystem 110
3.10.2 Remote mobile device management 111
4 Hypothetic scenario – UICC dematerialization 113
4.1 Soft SIM 115
4.2 Trusted execution environment 115
5 Regulatory aspects 117
5.1 Overview 119
5.2 ETSI 120
5.3 GlobalPlatform 121
5.4 GSMA 122
5.5 SIMalliance 123
Table of acronyms 125
Table of Illustrations
Illustration 1 Removable UICC advantages 18
Illustration 2 Functional architecture of mono-application card vs. multi-application platform 19
Illustration 3 SIM form factors comparison 22
Illustration 4 GSM network architecture 23
Illustration 5 Volumes of SIM card shipments 30
Illustration 6 SIM card shipments by region, 2011 31
Illustration 7 SIM card shipments by form factor, 2011 31
Illustration 8 Number of network subscribers worldwide, 2009-2015 32
Illustration 9 Top ten MNOs by subscriptions number 35
Illustration 10 Top ten mobile handset manufacturers, 2011 36
Illustration 11 Top ten mobile handset manufacturers, 2011 (#2) 37
Illustration 12 Mobile handset shipments, 2010-2011 (#3) 37
Illustration 13 Top five smartphone manufacturers, by global sales, 2011 (#1) 38
Illustration 14 Top three smartphone manufacturers, by global sales, 2011 (#2) 38
Illustration 15 Top five smartphone markets, by country, 2011-2012 and 2016 39
Illustration 16 Connected devices number, 2011 43
Illustration 17 Connected devices number, 2020 44
Illustration 18 Connected devices revenue opportunity, 2020 44
Illustration 19 M2M market CAGR 45
Illustration 20 Wireless M2M market, 2015 45
Illustration 21 M2M UICC vs. mobile UICC 46
Illustration 22 Current M2M UICC deployment mode 50
Illustration 23 New M2M eUICC deployment mode 51
Illustration 24 Remote personalization of CCE 51
Illustration 25 Logistics and provisioning processes for eUICC 52
Illustration 26 UICC vs. eUICC main differences 58
Illustration 27 Potential eUICC architecture, #1 59
Illustration 28 Potential eUICC architecture, #2 60
Illustration 29 G&D eUICC 'proof-of-the-concept' 61
Illustration 30 G&D approach to eUICC subscription management 62
Illustration 31 SIM supply chain 65
Illustration 32 Challenges for eUICC ecosystem 71
Illustration 33 Standardization roadmap 72
Illustration 34 Current mobile eUICC subscription provisioning model 81
Illustration 35 Mobile eUICC lifecycle states 82
Illustration 36 Evolving Systems financial results 83
Illustration 37 Evolving Systems DSA solution components and interfaces 85
Illustration 38 Profile management use cases 86
Illustration 39 Profile provisioning with eUICC 86
Illustration 40 Profile changing with eUICC 87
Illustration 41 Remote subscription management roles 88
Illustration 42 Potential regional network evolution, 2020 90
Illustration 43 Remote subscription management (MNO & end user) 92
Illustration 44 eUICC value chain 93
Illustration 45 eUICC shipments, scenario #1 94
Illustration 46 Vodafone financial results 95
Illustration 47 Nokia distribution channels, 2006 96
Illustration 48 Remote subscription management (DV & end user) 97
Illustration 49 Apple financial results 98
Illustration 50 eUICC shipments, scenario #2 99
Illustration 51 Worldwide smartphone shipments by OS, 2011 100
Illustration 52 Google financial results 102
Illustration 53 eUICC shipments, scenario #3 102
Illustration 54 Remote subscription management (SM & EU) 103
Illustration 55 Facebook financial results 104
Illustration 56 Amazon financial results 106
Illustration 57 Groupon financial results 106
Illustration 58 eUICC shipments, scenario #4 107
Illustration 59 Main possible provisioning models of eUICC 108
Illustration 60 End-user customer care poll 110
Illustration 61 Remote mobile device management 112
Illustration 62 Reasons why standardize (MNO point of view) 119
Illustration 63 Reasons why standardize (eUICC manufacturer point of view) 120
Contact Nicolas: [email protected]
Intl: +1 805-652-2626
The Open Connectivity Foundation (OCF), sponsor of the IoTivity open source project, and AllSeen Alliance, which provides the AllJoyn® open source IoT framework, today announced that the two organizations’ boards have approved a merger under the OCF name and bylaws. This merger will advance interoperability between connected devices from both groups, enabling the full operating potential of IoT and representing a significant step towards a connected ecosystem.
Oct. 27, 2016 06:15 PM EDT Reads: 1,313
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...
Oct. 27, 2016 05:45 PM EDT Reads: 1,174
SYS-CON Events announced today that Embotics, the cloud automation company, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Embotics is the cloud automation company for IT organizations and service providers that need to improve provisioning or enable self-service capabilities. With a relentless focus on delivering a premier user experience and unmatched customer support, Embotics is the fas...
Oct. 27, 2016 05:00 PM EDT Reads: 1,055
Intelligent machines are here. Robots, self-driving cars, drones, bots and many IoT devices are becoming smarter with Machine Learning. In her session at @ThingsExpo, Sudha Jamthe, CEO of IoTDisruptions.com, will discuss the next wave of business disruption at the junction of IoT and AI, impacting many industries and set to change our lives, work and world as we know it.
Oct. 27, 2016 04:30 PM EDT Reads: 440
SYS-CON Events announced today that Cloudbric, a leading website security provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Cloudbric is an elite full service website protection solution specifically designed for IT novices, entrepreneurs, and small and medium businesses. First launched in 2015, Cloudbric is based on the enterprise level Web Application Firewall by Penta Security Sys...
Oct. 27, 2016 04:30 PM EDT Reads: 1,334
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
Oct. 27, 2016 04:15 PM EDT Reads: 3,271
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Oct. 27, 2016 02:17 PM EDT Reads: 240
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Oct. 27, 2016 01:45 PM EDT Reads: 3,995
SYS-CON Events announced today that MathFreeOn will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MathFreeOn is Software as a Service (SaaS) used in Engineering and Math education. Write scripts and solve math problems online. MathFreeOn provides online courses for beginners or amateurs who have difficulties in writing scripts. In accordance with various mathematical topics, there are more tha...
Oct. 27, 2016 01:45 PM EDT Reads: 1,159
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, will draw together recent research and lessons learned from emerging and established ...
Oct. 27, 2016 01:45 PM EDT Reads: 1,608
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, will discuss how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team a...
Oct. 27, 2016 01:15 PM EDT Reads: 854
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service.
Oct. 27, 2016 01:15 PM EDT Reads: 1,209
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
Oct. 27, 2016 01:15 PM EDT Reads: 5,089
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
Oct. 27, 2016 01:00 PM EDT Reads: 8,620
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Oct. 27, 2016 11:45 AM EDT Reads: 1,271
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Oct. 27, 2016 11:30 AM EDT Reads: 1,916
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
Oct. 27, 2016 11:00 AM EDT Reads: 1,173
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, discussed the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filterin...
Oct. 27, 2016 11:00 AM EDT Reads: 3,067
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Oct. 27, 2016 10:15 AM EDT Reads: 1,447
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Oct. 27, 2016 10:15 AM EDT Reads: 3,258