Send Message
Shenzhen Olax Technology CO.,Ltd
products
Cases
Home >

China Shenzhen Olax Technology CO.,Ltd Company Cases

USIM in 5G (NR) system (1)

1.UE and UICC In the mobile communication system defined by 3GPP (3rd Generation Partnership Project), the user's terminal (UE) device is composed of: ME (mobile equipment) + UICC (Universal Integrated Circuit Card); where UICC is a Physical cards that are tamper-proof and resistant to software and hardware attacks. 2. UICC and USIM UICC can contain multiple applications, one of which is USIM; USIM securely stores and processes all sensitive data related to the user and home network. USIM is under the control of the home network operator; the operator selects the data to be configured in the USIM before issuance and remotely manages the USIM in the user's device through the OTA (over-the-air) mechanism. 3.USIM in 5G 3GPP defines USIM for the 5G system in Rel-15 for access and use in 3GPP and non-3GPP networks, allowing UE (user equipment) external data networks. USIM is defined in Rel-16 as network slice specific authentication. 4.First-time authentication is a mandatory procedure to allow UE (user equipment) to access 3GPP or non-3GPP networks. EAP-AKA' or 5G-AKA are the only authentication methods that allow primary authentication and the subscription credentials are always stored in the USIM when the terminal supports 3GPP access functionality. For primary authentication based on AKA, the mutual authentication performed in the USIM and the generation of the key material (integrity key IK and confidentiality key CK) sent by the USIM to the ME remain unchanged compared to 3G, 4G and Meets 3GPP TS 33.102 specification [3]. Changes in 5G Primary Authentication USIM include storing new security context and additional keying material in USIM (depending on the USIM's configuration). 4.1 5G support If the USIM supports storing 5G parameters, the ME will store the new 5G security context and the new keys defined for the 5G key hierarchy (i.e. KAUSF, KSEAF and KAMF) in the USIM. USIM can store a 5G security context for 3GPP access networks and a 5G security context for non-3GPP access networks. Storing the security context and key material in the USIM ensures faster reconnection when roaming (UICC moves from one ME to another). 4.2 NPN support Authentication in private networks (called independent non-public networks) can rely on the EAP framework supported by the 5G system; user equipment and service networks can support 5G AKA, EAP-AKA' or any other key generation EAP authentication method, where: ·When using AKA-based authentication methods, clause 6.1 of 3PPTS 33501[1] applies. ·When selecting an EAP authentication method other than EAP-AKA', the selected method determines the credentials required in the UE and network. How these credentials for EAP methods other than EAPAKA' are stored and processed within the UE is beyond the scope. But to ensure a high level of security for access to private networks, private network operators may decide to require the presence and use of a UICC containing USIM applications in order to securely store and process subscription credentials for EAP methods such as EAP-AKA' or EAP-TLS . 5. Secondary authentication This is an optional authentication based on EAP, conducted between UE (user equipment) and DN (external data network). Although the choice of EAP authentication method and credentials is beyond the scope of 3GPP, external data networks may decide to protect access to their DN by performing strong authentication thanks to the EAP-AKA' or EAP-TLS authentication method, UICC in the user device The presence of USIM on the DN securely stores and processes the credentials used to access the DN. Network Slice Specific Authentication Using network slice specific authentication between the user device and the AAA (Authentication, Authorization and Accounting) server to access the network slice is optional. Network slice specific authentication is based on the EAP framework and its user ID and credentials are different from the 3GPP subscription credentials. It follows the mandatory primary certification. Stakeholders deploying slices may decide to install USIM on the UICC of user devices to ensure a high level of security to access their slices and prevent the emergence of unauthorized users.

SIM Technology Innovation: An In-Depth Look at eSIM and vSIM

01.eSIM   eSIM, known as Embedded-SIM, or Embedded SIM, is a programmable, electronic SIM card technology whose main feature is that it does not require a physical slot, but rather an embedded chip that is integrated directly into the device's circuit board or inside other devices. Hardware part_     Integrated Circuit (IC) Chip: At the heart of the eSIM is a small IC chip that is built into the device's motherboard, similar to a physical SIM card. It contains the necessary hardware (CPU, ROM, RAM, EEPROM and serial communication unit) for storing and processing SIM data.   Software part_     Operating System (OS): The eSIM chip runs a dedicated operating system, often referred to as eUICC (Embedded Universal Integrated Circuit Card), which manages the SIM's functions, including data storage, secure processing and communication.     eSIM Production Process   ① Chip Manufacturing ② Chip testing ③ Integration into devices ④ Embedded software loading ⑤ Functional testing and verification   Virtual SIM (vSIM) is a SIM card technology without a physical form factor that allows devices to realize communication functions through software, including SoftSIM, CloudSIM, and others.   02.Virtual SIM (vSIM)   Virtual SIM (vSIM) is a SIM card technology without a physical form factor that allows devices to realize communication functions through software, including SoftSIM, CloudSIM, and others.   SoftSIM controls the information written to SoftSIM through the terminal provider, and the user purchases and uses communication services directly through the software without the intervention of the operator, which cuts off the direct connection between the user and the operator.   CloudSIM is a kind of SIM card function realized based on cloud computing technology, where users use network services on their devices through cloud services.   03.SIM service activation process   CloudSIM integrates the traffic resources of each operator into the cloud, selects operators according to the signal and network quality of different regions, and pushes them to the terminals to provide users with the best network services. The inclusion of multiple operators facilitates users to flexibly choose more favorable packages.       Do you want to learn more about SIM cards and other communication topics? We will continue to share more about this! See you in the next issue!

Low-altitude economy theme: satellite communications

As we all know. Our daily life has been closely connected to the Internet All kinds of network devices are connected to each other Together, they build a convenient and efficient network for our lives. So much so that we seldom wonder Are communication networks really everywhere?   Oceans, deserts, jungles, ice fields, etc., are places not covered by mobile communication networks. On the one hand, there are engineering and technical difficulties in the construction and maintenance of base stations, and on the other hand, the construction capital is expensive and the utilization rate and return are too low.   How should the communication needs of these forgotten fringe areas be met? How to build a communication network with global coverage that is not limited by the terrestrial environment? Is there such a program? Perhaps “satellite communications” will give us an answer.   01.Meaning of satellite communications   Satellite communications are communications between radio communication stations on Earth (both on the ground and in the lower atmosphere) using satellites as relays. Compared with traditional cellular network communications, the wireless signals of satellite communications are relayed by satellites, and a single node can cover a larger service area. After completing the laying of the satellite network, communication satellites can complete the process of signal forwarding within the orbit, relaying the information between cellular phones and satellite base stations in a relay manner.   For reasons of time delay, interference and cost, modern civil satellite communications are mainly based on low-orbit satellites.   Compared with communication satellites in other orbits, low-orbit communication satellites have short transmission delays and small path losses, and constellations composed of multiple satellites can realize truly global coverage and more effective frequency reuse; together with point-beam, multiple-access and other technologies, they also provide technical guarantees for mobile communications by low-orbit satellites. Therefore, low-orbit communication satellites are considered to be one of the satellite mobile communication technologies with the most promising applications.   02.Principles of satellite communications   The satellite communication system consists of three parts: the satellite side, the ground side and the user side.   1.Satellite terminal   In the air to play the role of relay station, that is, the ground station sends up the electromagnetic wave amplification and then sent back to another ground station.   2.Ground terminal   It is the interface between the satellite system and the terrestrial public network, and terrestrial users can also form links to and from the satellite system through ground stations.   3.User terminal   That is, they are various user terminals such as computers, cell phones, modems, etc. They communicate with satellite communication systems through ground stations to exchange information at different locations on Earth.   Together, the above three components form a satellite communication system that realizes the purpose of communication via satellite between multiple earth stations.   As users, how do we access the satellite network, other than using a cell phone that can connect to the satellite?   Nowadays, it is mostly through the introduction of a terrestrial receiving device, like the old TV “pot”, to receive communications from the satellite band. After the signals from the satellite are received by the “pot”, they are converted into WiFi signals through a wireless router, and the cell phone can access the Internet through the WiFi signals!   03.Applications and development trends of satellite communications   Satellite communication has the advantages of wide coverage, long transmission distance and strong anti-interference ability, and is widely used in various fields:   Broadcasting and television: Satellite communication is the main means of realizing the dissemination of global broadcasting and television programs, such as CCTV's Spring Festival Gala and the live broadcast of the Olympic Games.   Mobile communications: Satellite communications enable mobile communications on a global scale, such as maritime communications and aeronautical communications.   Military communications: Satellite communications play an important role in the military field and can realize functions such as remote command and battlefield intelligence collection. Internet access: Satellite communications can provide Internet access to remote areas and narrow the digital divide. Disaster rescue: In emergencies such as natural disasters, satellite communications can quickly restore communication facilities and provide strong support for rescue work.     In April 2020, the National Development and Reform Commission (NDRC) for the first time included satellite Internet as a network infrastructure in the scope of “new infrastructure”. 2021, the Ministry of Industry and Information Technology (MIIT) pointed out in the “14th Five-Year Plan” for the development of the information and communications industry that there are shortcomings and weaknesses in China's information and communications industry, such as the imperfect global layout of international submarine cables and satellite communications networks. The Ministry of Industry and Information Technology pointed out in the “14th Five-Year Plan” that there are shortcomings and weaknesses in China's information and communications industry, such as the imperfect globalization layout of international submarine cables and satellite communications networks. According to the plan, by 2025, China's satellite communication network will provide global information network services for all kinds of users on land, at sea, in the air and in the sky.   It is expected that by 2030, broadband satellite communication will form a comprehensive link of high speed and high user density with the sea, land and air, and extend to the Earth-Moon space to support the business link of the whole scenario, realize the real-time response and processing of space information, and form a satellite communication information highway. By then, human cyberspace will leap to a new dimension!      
1