SIMalliance | Security / Identity / Mobility
 
Securing the future of mobile services
sitebanner

White Papers

Registered Users Only
LTE has created a mobile environment rich in both opportunities and challenges for mobile network operators (MNOs). At the heart of this environment sits the LTE UICC; an all new, IP-connected multi-application platform. This brief guide describes how an MNO’s utilisation of the LTE UICC will play a huge part in defining how much control it is able to retain over the delivery of, and authentication to, today’s LTE mobile services, together with those yet to come.



Released on 19.9.2013  Download
 
Registered Users Only
From m-commerce, through m-banking to couponing services, the level of mobile industry enthusiasm for using the mobile as a transactional device is understandably high.

Scratch the service of potential mobile transaction portfolios and it is easy to see why. Whether enabling instant international payments, credit and loan applications, stock trading, NFC retail goods payments or a host of marketing-led loyalty point collection and usage services, the opportunities appear endless.

But while market projections and developing service suites point to an industry worth in excess of $670 billion by 2015 (Juniper Research), translating this from a slideware to the balance sheet is no small task.

The likelihood of success, of course, cannot be questioned; not least because of the commitment (and investment) of the mobile industry to making it happen, or indeed the growing consumer acceptance of the mobile as a payment mechanism - which is as high as 70 percent in some markets. The associated rampant adoption of iOS and Android smartphones in developed markets, the functional possibilities they offer and the increasing market penetration of NFC-enabled handsets are also driving the market.

Consumers love their mobile devices; and there is ample evidence that should transaction services be mobilized in such a way as to offer some kind of differentiation, then consumers will adopt - whether that value is in increasing convenience for the consumer, giving them back more time, offering free ‘stuff’ or reducing the costs of goods and services. Ideally, it will be a combination of all. But the beauty of the mobile device is that it enables impulse online purchasing – from an advert seen in a train carriage or passing billboard. This will, of course, drive data traffic but also increase revenue-share returns between all the members of the mobile value chain – from the retailer right through to the mobile operator.

There are, of course, concerns. These range from the rapid ROI for mobile transaction services, how to assure the consumer adoption above, and how to build the right business models to get the money flowing through the value chain. But perhaps before all of these, we need to look to two key elements without which it will be impossible to build a platform for success; security and interoperability.



Released on 18.4.2012  Download
 
Registered Users Only
While the sources vary, the message is clear; attacks on mobile internet devices and connected smartphones are increasing rapidly. In this paper we look in detail at the issue of mobile internet security, analyze existing authentication methods, and ask whether it is time for the widespread adoption of the Secure Element by the mobile community.

Released on 1.1.2012  Download
 
Registered Users Only
Projected to account for almost a third of mobile payments transactions by 2014 (source: Research and Markets, 2010), mobile Near Field Communication (NFC) promises to revolutionise both device to device communication, and the way consumers engage, interact and transact with brands. These contactless services present a host of opportunities in payment, transportation, access control and data exchange. But addressing the challenges of the NFC world is critical to enable its success from a device, network and service perspective. Once again, the role of the ‘Secure Element’ within the device is paramount in managing authentication and certification; not only to ensure the integrity of financial transactions and data exchange throughout the NFC chain, but to deliver the required levels of interoperability as well. The white paper look at the evolving NFC services market and adresses interoperability issues. It goes a liitle further on from interoperability and touches upon secure application and service lifecycle management and details the specifications and tools SIMalliance has produced over the last ten years to advance interoperability and security in application and service development and deployment.

Released on 21.6.2011  Download
 
Registered Users Only
This paper highlights the need for a change in how security is approached on the connected mobile device. It focuses on the need to create security (and security policy) at the development stage, and highlights the telecoms industry’s unique position of already having a solution to the problem. It discusses why ‘buy in’ is needed from the application development and operating systems communities, and introduces the SIMalliance’s new Open Mobile API workgroup whose task it is to connect the application, operating system and the operator with the Secure Element found in billions of connected devices right across the world.

Released on 6.4.2011  Download
 
Registered Users Only
The SIMalliance believes, without a doubt, that LTE heralds the next major step in the development and delivery of a host of rich new multimedia services and applications. But more than this, by delivering a true broadband experience on the mobile, and through the integration of NFC, LTE will fundamentally change the way consumers communicate and transact, offering a seamless connection between the virtual and contextual worlds for the very first time. SIMalliance believes LTE offers opportunities for mobile operators to retain control of their subscribers (and revenues) against stiff opposition from over-the-top players, and to extend their influence outside of conventional mobile boundaries and into the wider online world. But LTE is also a disruptive force; it will enable greater competition from non-mobile players and increase the commoditization of voice services. Also, by opening the core network to a potentially unsecure IP layer, security will become an increasing issue. The UICC is a mandatory element in LTE as specified by 3GPP. However SIMalliance is recommending operators to adopt a UICC integrating specific features (See SIMalliance UICC Profile for LTE) to reduce the disruptive impact of LTE and to support the creation of a secure, open and interoperable environment where mobile services, and mobile operator revenues, thrive.

Released on 14.2.2011  Download
 
Registered Users Only
The SCWS constitutes the new trend in the evolution of Smart Card technology. First, the SCWS provides a next generation user interface for the end-user, moving from black and white menus to rich a web “look and feel” for its applications. Then, as it is based on Internet languages, the SCWS makes the development of SIM-based applications easier, while facilitating their distribution. Also, the SCWS enhances connectivity with remote web servers to enable client/server applications to take full advantage of the evolution in network speeds. After many years of development and standardization efforts, and with the first handsets now hitting the market, the SCWS is ready to open up a new era for SIM-based Internet applications.

Released on 1.2.2009  Download
 
Social Follow
Copyright © 2014 by SIMalliance Limited registered in the UK company no. 04002122, 29/30 Fitzroy Square, London W1T 6LQ
marketing@simalliance.org
Simalliance RSS Feed   siteforum

SIMalliance | Security / Identity / Mobility > Resources > White Papers