Don’t be confused with eSIM, because this is iSIM “The next evolution of telecommunications technology

Tram Ho

What is eSIM, iSIM? What are their advantages over current physical card SIMs?

The most modern smartphones still support traditional SIM card technology, but some – including iPhone XS, XS Max products in the Chinese market – are gradually supporting the new SIM standard called eSIM. Not only that, in a short time we will have another standard called iSIM.

Earlier this year, ARM announced the iSIM standard – integrating SIM directly into the device’s SoC, along with available components such as CPU, GPU, 4G or 5G network modem. Although the difference with eSIM is not large, iSIM is likely to become the standard of future smartphones and Internet of Things products.

Compare eSIM and iSIM

eSIM and iSIM have many similarities, as both are new standards to replace regular replacement SIM cards, which are integrated directly into smartphones, tablets and other devices. This method has a great advantage, which is saving the area inside the device, thereby allowing carriers to make them thinner, lighter. Both of these standards support changing networks and packages by registering directly at the service provider instead of changing a physical SIM card.

Compare the size of all available SIM types and iSIM

In the future, eSIM and iSIM can also help users register multiple networks with just one device, and vice versa, use a package at multiple devices to simplify the registration and payment process.

The biggest difference between eSIM and iSIM lies in the integrated hardware component. eSIM has a separate chip, connected to SoC, and iSIM is a component within the SoC so it is even smaller in size. iSIM is integrated inside SoC – a highly secure component, so it can store user information more securely.

So what are the benefits of iSIM?

iSIM is designed to fit the GSMA standard for Internet of Things smart devices, with the biggest advantage being the high security mentioned. Thanks to PSA encryption standard of products from ARM, iSIM is much more difficult to penetrate than traditional SIM and eSIM.

Furthermore, iSIM is integrated with ARM’s TrustZone, CryptoIsland and Kigen OS operating systems to protect user information, encrypt data right at SoC without having to send to other components in the machine. User information is stored in encrypted software, the hardware is also tightly encoded. With IoT devices, integrating many components into a SoC chip is also an advantage, helping to reduce the size and reduce costs.

But this standard will certainly be applied to smartphones to replace physical SIM, bringing its advantages from IoT devices to devices that everyone is using every day. More and more smartphones store more important information of users such as fingerprints, bank passwords, so having a type of SIM with high security is essential.

Perspective on the connection between all devices

Technology developers are aiming for a future where users’ cities, factories and electronic devices can all connect smartly, so now we have to develop a platform. to manage them, and the Kigen OS cloud operating system is a worthwhile candidate. And also in the near future, users can manage their devices in the cloud using iSIM technology.

Currently users want to use multiple devices connected to the network will have to buy many different packages, but in the future, all devices will be on an account for easy control. We can also register for a family account, with one main account that can add or remove different devices.

Not stopping there, iSIM can also be applied to payments and purchases. Currently these tasks are done with biometric security (fingerprint sensor, iris, face), but if iSIM has high security, users can use it in shopping. or manage bank accounts.

Google has also stepped up to increase the security of hardware to help this scenario come true soon. A good example is the Strongbox module, which has a separate CPU and security key to store sensitive information.

This standard of Google differs from other coding standards, and may not be included in the future. However, this is not a disadvantage, because the more security layers there are, the better the application and the different platforms, the greater the security of the information.

Can we trust Internet ID technology?

Sooner or later, these technologies will also lead to a destination called ‘Internet ID’ – network identity. Internet ID helps users manage all their activities, from social networking accounts, messages, calls to shopping and banking information.

Internet ID also helps users manage real-life services, such as gym registration with iSIM and NFC cards, for example. You can also store your driver’s license, personal identification documents on your smartphone, greatly simplifying your life. However, currently, the security of hardware is not high, so many people are not convinced by this technology.

But technology is developing rapidly, and in the future each person’s identity will certainly depend on technology, especially handheld devices like smartphones with iSIM and Internet ID technology.

Maybe you want to see:

AI has been so powerful that it can predict the time of human death!
Research: Indian Coder is better than Chinese coder, but very far from American coder
Share the news now

Source : ictnewsCó thể bạn muốn xem: .ua4470d386d8e5473cf514867ba6cb477 { padding:0px; margin: 0; padding-top:1em!important; padding-bottom:1em!important; width:100%; display: block; font-weight:bold; background-color:#eaeaea; border:0!important; border-left:4px solid #34495E!important; text-decoration:none; } .ua4470d386d8e5473cf514867ba6cb477:active, .ua4470d386d8e5473cf514867ba6cb477:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; text-decoration:none; } .ua4470d386d8e5473cf514867ba6cb477 { transition: background-color 250ms; webkit-transition: background-color 250ms; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; } .ua4470d386d8e5473cf514867ba6cb477 .ctaText { font-weight:bold; color:inherit; text-decoration:none; font-size: 16px; } .ua4470d386d8e5473cf514867ba6cb477 .postTitle { color:#000000; text-decoration: underline!important; font-size: 16px; } .ua4470d386d8e5473cf514867ba6cb477:hover .postTitle { text-decoration: underline!important; } AI đã mạnh mẽ đến mức có thể dự đoán thời điểm chết của con người! .u6885b97b88df82390398ee22277eb571 { padding:0px; margin: 0; padding-top:1em!important; padding-bottom:1em!important; width:100%; display: block; font-weight:bold; background-color:#eaeaea; border:0!important; border-left:4px solid #34495E!important; text-decoration:none; } .u6885b97b88df82390398ee22277eb571:active, .u6885b97b88df82390398ee22277eb571:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; text-decoration:none; } .u6885b97b88df82390398ee22277eb571 { transition: background-color 250ms; webkit-transition: background-color 250ms; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; } .u6885b97b88df82390398ee22277eb571 .ctaText { font-weight:bold; color:inherit; text-decoration:none; font-size: 16px; } .u6885b97b88df82390398ee22277eb571 .postTitle { color:#000000; text-decoration: underline!important; font-size: 16px; } .u6885b97b88df82390398ee22277eb571:hover .postTitle { text-decoration: underline!important; } Nghiên cứu: Coder Ấn giỏi hơn coder Trung, nhưng kém rất xa coder Mỹ