____________________

Do-It-Yourself

Remote eSIM Provisioning

__________

 

achelos enables players in the mobile ecosystem to fully harness the power of eSIM by hosting and operating services in their own preferred environment.

 

We offer a complete range of telco-grade solutions - from off-the-shelf, GSMA compliant Remote eSIM Provisioning to Profile Content Management and IoT Connectivity Orchestration.

 

As one of the leading software houses in this domain we can also rapidly develop customised extensions as well as fully bespoke systems to fulfil your specific requirements.

 

get in touch

 

 

 

The digital transformation of the plastic SIM into eSIM creates broad opportunities for innovative players.

With our solutions you take full control!

 

 

Benefit #1

commercial

INDEPENDENCE

 

 

Benefit #2

technical

AUTONOMY

 

 

Benefit #3

operational

SOVEREIGNTY

 

 

The early use of embedded chips in M2M devices created the need for remote profile provisioning, laying the foundation of eSIM technology.

eSIM then found its way into an ever growing amount of consumer devices, enabling a fully digital user experience.

For modern IoT devices, eSIM provides maximum efficiency, especially when implemented in the integrated iSIM form factor.

 

Whatever your use case, we provide the right component allowing you to build this crucial technology into your solution stack.

 

 

Use-Case #1

eSIM for CONSUMER

Telco Solution Providers can extend their existing portfolio with eSIM Management capabilities, while Mobile Operators, especially on a group level, can run the eSIM provisioning service in-network without 3rd party involvement.

We have designed our SM-DP+ with integrated SM-DS component to be efficiently deployed into your preferred environment, whether private, public, or hybrid cloud.

Beside the standard ES2+ interface the extensive REST API of our solution allows easy integration with external systems and processes.

 

 

 

 

Use-Case #2

eSIM for IoT

The cost-sensitive nature of IoT makes eSIM management a valuable asset for MNOs, MVNOs, Service & Solution Providers as well as Chipset and Device manufacturers.

With SGP.32 a modern standard is becoming available based on SM-DP+ and SM-DS, introducing eIM (eSIM Remote IoT Manager) to support constraint devices in a flexible way. For management of devices compliant with the earlier M2M standard SGP.02 we offer SM-SR and SM-DP.

To facilitate complex procedures that go beyond GSMA's atomic operations we offer the IoT Connectivity Orchestrator. It acts as a middleware layer that effortlessly integrates external systems for event-triggered profile life cycle workflows.

 

 

 

Use-Case #3

eSIM for PRIVATE NETWORK

Enterprises and organisations are increasingly choosing to deploy private LTE and 5G networks, often coupled with the demand to have full control over data storage and processing.

For this particular application we offer an 'eSIM Management-in-a-box' solution with minimum footprint based on our telco-grade SM-DP+ solution. It guarantees the isolation of critical network access keys in security sensitive environments.

 

 

 

 



 

Our solutions have been developed from day one to be cloud-ready, no matter if public, private or hybrid cloud.

Today, with multiple deployments around the world, our software powers the services of several leading players in a configuration that exactly fits their specific needs.

 

 

Key-Feature #1

containerised

MICROSERVICES

 

Key-Feature #2

tested

COMPLIANCE

 

Key-Feature #3

proven

PERFORMANCE

 

 

With public cloud service providers certifying their datacentre services in accordance with GSMA SAS

our approach starts to unfold its obvious benefits:

 

 

Rapid setup of PoC or trial systems

get familiar with eSIM RSP and to try it out with your processes and backend systems

 

 

Quick and easy setup of instances in new locations

shorten your time-to-market for the introduction of new services

 

 

Multi-site, hybrid and fully custom configurations

that can be built without changing even one line of code

 

 



 

 

 

 

____________________

building your eSIM RSP Service

in 3 steps

__________

 

 

 

Step #1

INFRASTRUCTURE

 

By closely collaborating with you we develop a deep comprehension of your underlying business drivers, which we see as an essential condition for long-term success.

Whether on premises or cloud, based on your preferences and requirements we jointly scope the solution to minimise Total-Cost-of-Ownership while meeting your business needs.

Solution Design

A central component of the solution is the Hardware Security Module (HSM) for key storage and crypto operations. With our industry network we can support you to select the right solution that perfectly fits your business objectives.

From the very beginning our experts will take the specific requirements of the mandated SAS-SM security audit into account to make your certification process as efficient as possible and shorten time to go-live.

 

 

 

 

Step #2

IMPLEMENTATION

 

With the infrastructure in place, we deploy and configure the eSIM Management solution to work seamlessly with your selected systems.

The staging system is a vital element during this phase as well as later during service operation because it remains accessible from outside your High Security Area (HSA) in contrast to the final production system.

If the solution encompasses M2M SGP.02 components, additional integrations may be required, for example with SMS-C and external SM-SR or SM-DP.

Another important element of the solution is the MNO profile containing network and subscriber specific information for the eSIM download.

We can support you with the development of the profile template as well as data generation processes as part of the agreed project scope.

 

 

 

Step #3

SECURITY AUDIT

 

Certification of the eSIM Management service in compliance with SAS-SM (Security Accreditation Scheme for Subscription Management) is a mandatory step when you are hosting the service. It is a substantial task and can be complex if your organisation is not familiar with the specifics of Security Audit procedures and documentation requirements.

As digital security experts we have extensive experience in security audits and can help you along the way to be appropriately prepared when it comes to the audit. The audit covers all processes of GSMA specified components (SM-SR, SM-DP/DP+, SM-DS) with each component involving specific assets that must be protected.

You have to meet certain requirements to consider processes as being secure, covering the following areas:

  • Policy, strategy, and documentation
  • Organisation and responsibility
  • Information
  • Personnel security
  • Physical security
  • Certificate and key management
  • Sensitive process data management
  • SM-DP, SM-SR, SM-DP+, and SM-DS service management
  • Computer and network management

Once you have passed the audit the different system certificates can be ordered from the GSMA CI partner and subsequently be installed - your eSIM Management system is ready for live operation.