Embedded SIM Task Force Requirements and U Cas
1.0
21 Feb 2011
Copyright Notice
含羞草花Copyright © 2011 GSM Association
公正透明Antitrust Notice
良性纤维瘤
The information contain herein is in full compliance wit h the GSM Association’s antitrust compliance policy.
面膜过敏Table of Contents
1Introduction 3
1.1Overview 3
1.2Problem Statement 3个人日志
1.3Approval 4
1.4Scope 4
1.5Definition of Terms 4
1.6Interchange of terms: UICC / USIM 6
1.7Document Cross-References 7 2Assumptions & Principles 8
2.1Assumptions 8
汽车磨合期2.2Principles 9 3eUICC State Model 11
3.1Valid eUICC States 11
3.2State Transition Diagram 12 4Role and Trust Definitions 13
4.1Role Definitions 13
4.2Trust Relationships 13
4.3eUICC Certification 14 5U Cas 16
5.1Vertical U Cas 16
5.1.1Overview of the u cas 16
5.1.2UC1: Provisioning of multiple M2M subscriptions 16
5.1.3UC2: Provision of first subscription with a new connected device 18
5.1.4UC3: Change of subscription for a device 19
5.1.5UC4: Termination of a subscription for a consumer device 19
5.1.6UC5: Subscriber transfers subscription between devices 21
5.2Functional U Cas 22 6Process 23
6.1UC1: Process for (multiple) M2M u cas 23
6.1.1UC1 a) Provisioning an M2M subscription on a new device 23
6.1.2UC1 b) Process for changing a M2M subscription 24
6.1.3UC1 c) Process for fallback to a previous subscription 25
6.2UC2: Provision of first subscription with new device 25
6.2.1UC2 a) Provision of device consumer lects MNO 25
6.2.2UC2 b) Provision of enterpri devices 26
设备标识6.2.3UC2 c) Device with first subscription pre-loaded 27
6.3UC3: Change of Subscription for a Consumer Device 28
6.4UC4: Termination of a Subscription for a Consumer Device 29
6.5UC5: Subscriber transfers subscription between devices 30 7Requirements 31
7.1Lifecycle requirements table 31
7.2Service Management Requirements Table 32
7.3Communications Requirements Table 33
7.4Robustness Requirements Table 33
7.5Liability Requirements Table 33
7.6Market Requirements table 34
7.7Security requirements table 35
7.8Certification Requirements Table 36 8Ongoing Topics 37 9Document Management 38
1Introduction
1.1Overview
The GSMA Embedded SIM Task Force created this document. It develops U Cas and Requirements for the “enhanced, remote management” of a UICC, which is embedded in a communication device, i.e. where the UICC is not easily accessible and replaceable. This type of UICC is compatible with Machine-to-Machine (M2M) applications. The UICC may be embedded at the manufacturing site in advance depending on the country and network operator, and is compatible in a variety of end-ur equipment. In the scenarios, there may be a requirement to change a subscription easily, this is currently achieved by physically changing the UICC.
The purpo for defining the requirements is to provide ea of u and deployment benefits for end urs/consumers and thereby stimulate the M2M device ctor. A further intent is to enable the creation of common standards and process for remote management of subscriptions on UICCs, such that fragmentation across the industry is effectively discouraged and prevented.
The u cas will describe a technical solution for “enhanced remote management” for the future of embedded UICCs. This includes reusing established international standards to maximi acceptance worldwide.
1.2Problem Statement
Since the inception of GSM, the UICC/SIM card has successfully provided Authentication and Authorisation capability to allow ur devices access to networks. This illustrates urs accepting the u of UICC/SIM cards to transfer their network subscriptions from one device to another. The creation of higher capacity cards in terms of memory and processing power, work is underway to increa the scope of the UICC card and to provide additional rvices supported by technologies such as Smart Card Web Server, InterChip USB, and Single Wire Protocol (NFC).
It is noted that new business models and usage scenarios, primarily driven by M2M, struggle when s
upported by the traditional UICC/SIM card. For example:
By installing physical UICC/SIM cards, the ur is connected to a specific network, as the card only provides access to one network. Should the ur wish to (or need to) u another network, then they or the M2M rvice provider has to fit another card in his/her device.
Changing UICC/SIM cards maybe problematic, noting that M2M equipment may be remotely located, and/or hermetically aled. It should be noted that where the UICC/SIM is not intended to be aled and inaccessible, the portability of traditional form factor UICC/SIM cards is perceived to be a ur benefit.
Non-standard provisioning and re-provisioning methods are being defined and ud.
The prent curity implications and a risk of fragmentation within the industry. New remote provisioning / re-provisioning mechanisms are required to support the new business models and usage scenarios.
Fragmentation of solutions leads to additional complexity, further costs within the industry and inhibits ur choice. To prevent fragmentation across the industry the new mechanisms should be standardid by appropriate Standards Developing Organisations. The should comply with and be auditable against relevant curity standards.
The intention of this document is to enable the development of solutions combined with any appropriate standards necessary that will permit remote provisioning and remote re-
provisioning of credentials to a UICC in a cure manner without necessarily having to transport the
UICC back to a cured and accredited physical location.
1.3Approval
情人节套餐This document has been approved by the GSMA Strategy Committee for submission to ETSI SCP.
1.4Scope
The primary intention of the requirements expresd in this document and any solutions that meet them, is to facilitate the M2M and Embedded Mobile (e Definition of Terms) market gments.
The scope of solutions is intended to cover requirements for the complete provisioning ecosystem.
1.5Definition of Terms
Note definitions taken from 3GPP 21.905 V10.2.0. Following the completion of a review, any duplicates with 3GPP 21.905 V10.2.0 shall be removed.