____________________

enabling you to HOST & OPERATE

your own eSIM RSP Service

__________

 

 

 

 

Benefit #1

commercial

AUTONOMY

 

 

Benefit #2

technical

INDEPENDENCE

 

 

Benefit #3

operational

SOVEREIGNTY

 

 

 

 

Use-Case #1

eSIM for CONSUMER

Telco Solution Providers can extend their existing portfolio with eSIM Management capabilities, while Mobile Operators, especially on a group level, can run the eSIM provisioning service in-network without 3rd party involvement.

We have designed our SM-DP+ with integrated SM-DS component to be efficiently deployed into your preferred environment, whether private, public, or hybrid cloud.

Beside the standard ES2+ interface the extensive REST API of our solution allows easy integration with external systems and processes.

 

 

 

 

Use-Case #2

eSIM for IoT

The cost-sensitive nature of IoT makes eSIM management a valuable asset for MNOs, MVNOs, Service & Solution Providers as well as Chipset and Device manufacturers.

With SGP.32 a modern standard is becoming available based on SM-DP+ and SM-DS, introducing eIM (eSIM Remote IoT Manager) to support constraint devices in a flexible way. For management of devices compliant with the earlier M2M standard SGP.02 we offer SM-SR and SM-DP.

To facilitate complex procedures that go beyond GSMA's atomic operations we offer the IoT Connectivity Orchestrator. It acts as a middleware layer that effortlessly integrates external systems for event-triggered profile life cycle workflows.

 

 

 

Use-Case #3

eSIM for PRIVATE NETWORK

Enterprises and organisations are increasingly choosing to deploy private LTE and 5G networks, often coupled with the demand to have full control over data storage and processing.

For this particular application we offer an 'eSIM Management-in-a-box' solution with minimum footprint based on our telco-grade SM-DP+ solution. It guarantees the isolation of critical network access keys in security sensitive environments.

 

 

 

 



Key-Feature #1

containerised

MICROSERVICES

 

Key-Feature #2

proven

PERFORMANCE

 

Key-Feature #3

high

AVAILABILITY

 



 

 

 

 

____________________

building your eSIM RSP Service

in 3 steps

__________

 

 

 

Step #1

INFRASTRUCTURE

 

By closely collaborating with you we develop a deep comprehension of your underlying business drivers, which we see as an essential condition for long-term success.

Whether on premises or cloud, based on your preferences and requirements we jointly scope the solution to minimise Total-Cost-of-Ownership while meeting your business needs.

Solution Design

A central component of the solution is the Hardware Security Module (HSM) for key storage and crypto operations. With our industry network we can support you to select the right solution that perfectly fits your business objectives.

From the very beginning our experts will take the specific requirements of the mandated SAS-SM security audit into account to make your certification process as efficient as possible and shorten time to go-live.

 

 

 

 

Step #2

IMPLEMENTATION

 

With the infrastructure in place, we deploy and configure the eSIM Management solution to work seamlessly with your selected systems.

The staging system is a vital element during this phase as well as later during service operation because it remains accessible from outside your High Security Area (HSA) in contrast to the final production system.

If the solution encompasses M2M SGP.02 components, additional integrations may be required, for example with SMS-C and external SM-SR or SM-DP.

Another important element of the solution is the MNO profile containing network and subscriber specific information for the eSIM download.

We can support you with the development of the profile template as well as data generation processes as part of the agreed project scope.

 

 

 

Step #3

SECURITY AUDIT

 

Certification of the eSIM Management service in compliance with SAS-SM (Security Accreditation Scheme for Subscription Management) is a mandatory step when you are hosting the service. It is a substantial task and can be complex if your organisation is not familiar with the specifics of Security Audit procedures and documentation requirements.

As digital security experts we have extensive experience in security audits and can help you along the way to be appropriately prepared when it comes to the audit. The audit covers all processes of GSMA specified components (SM-SR, SM-DP/DP+, SM-DS) with each component involving specific assets that must be protected.

You have to meet certain requirements to consider processes as being secure, covering the following areas:

  • Policy, strategy, and documentation
  • Organisation and responsibility
  • Information
  • Personnel security
  • Physical security
  • Certificate and key management
  • Sensitive process data management
  • SM-DP, SM-SR, SM-DP+, and SM-DS service management
  • Computer and network management

Once you have passed the audit the different system certificates can be ordered from the GSMA CI partner and subsequently be installed - your eSIM Management system is ready for live operation.