SIM/eSIM
THREATS OF USING MOBILE COMMUNICATION
Insufficient connection security
In 2G-3G networks in the telephone - base station section, insufficiently strong encryption is provided. There are methods that allow almost in real time to crack the encryption key and listen to conversations and messages.
The possibility of hacking on the side of operators
Today, methods of attacks on the operator's network infrastructure using SS7 (SS-7) protocols are known in order to redirect traffic to attackers' servers. Thanks to the development of new attack technologies through the core network, they are increasingly becoming successful.
Unprotected traffic landing
Messages or a data packet (including voice traffic) can leave the operator's network and then be sent to an unprotected segment of a communication channel (VoIP) in unencrypted form.
PERSONAL SIM CARD / SIM CHIP

All formats
The supported form factors are 2FF / 3FF / 4FF (conventional SIM, micro and nano-SIM) and the industrial standard MFF2.
Technology
Java applet PMC installed on the UICC performs the function of switching the profiles of mobile network operators.
Connection by air
It provides communication with the RSP platform via IP (Wi-Fi) and SMS channels.
Security
Independent management and data encryption with decoding in Sim / e-Sim.
Open platform
It does not use proprietary technologies and is able to interact with conventional Java cards that form the basis of the modern fleet of SIM cards.
Safety
eSIM are designed to work in the temperature range from -40 to +110 degrees.
PERSONAL SMARTPHONE
App for iOS and Android
Simple (Plug & Play) management of operator profiles, tariffs, recharge and support in a convenient application.
Payment transparency
The balance is displayed in real time and replenished through the WORLD, VISA, Mastercard.
Saving
The application is implemented to write-off funds in megabyte / minute and batch mode.
© 2018 PMC
SOLUTIONS
ABOut us