Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)

Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Subscriber Identity Module (SIM) full report
Post: #1

.doc  SIM.doc (Size: 242.5 KB / Downloads: 189)


A SIM (subscriber Identity Module) is a removable smart card for mobile phones. It contains subscriber information, such as the IMSI (International Mobile Subscriber Identity). It can also be used to store user-defined information such as phonebook entries.
The use of SIM card is mandatory in GSM world. There are two types of SIM operating system – Native and Java card. The SIM card is activated in an environment using five stage process called, authentication process.


The Subscriber Identity Module (SIM) is a small smart card which contains both programming and information. The A3 and A8 algorithms are implemented in the Subscriber Identity Module (SIM). Subscriber information, such as the IMSI (International Mobile Subscriber Identity), is stored in the Subscriber Identity Module (SIM). The Subscriber Identity Module (SIM) can be used to store user-defined information such as phonebook entries.
One of the advantages of the GSM architecture is that the SIM may be moved from one Mobile Station to another. This makes upgrades very simple for the GSM telephone user.


1. Importance
SIM card is a mandatory in the GSM world.SIM card is the basic component of GSM mobiles. They act as an interface between the handset and the connectivity. It gives an unique identification to each devices both internally and externally. Nowadays they have been added with more data storage capacity.

2. Installation
The SIM card allows users to change phones by simply removing the SIM card from one mobile phone and inserting it into another mobile phone.

3. Cost & Memory
The typical low cost SIM card has little memory, 2-3 KB as described. Such data storage is used by the phone directly. This memory may not be sufficient nowadays. The market segment of low cost SIM is falling down.
There are also Large Memory SIMs, on the order of 128-1024 megabytes.Because of the insufficient memory, new market comes with large memory. In future we can expect SIM cards having megabytes of capacity.

4. Types
SIM cards are available in two standard sizes:
 The first is the size of a credit card(85.60 mm x 53.98 mm x 0.76 mm)
 The newer, more popular miniature-version has a width of 25 mm, a height of 15 mm and a thickness of 0.76 mm.


SIM operating systems come in two main types: Native and Java Card.

1. Native SIMs:

Native SIMs are based on proprietary, vendor specific software .
A native sim is fixed and cant be replaced by other vendors SIM. It cant be used in other vendors cellphone also. It is designed for a particular hardware type.

2.. Java Card :

Java Card SIMs are based on standards, particularly Java
Card which is a subset of the Java programming language specifically targeted for small embedded devices.Java Card allows the SIM to contain programs that are hardware independent .


SIM cards store network specific information used to authenticate and identify subscribers on the Network, the most important of these are the ICCID, IMSI, Authentication Key (Ki), Local Area Identity (LAI) and Operator-Specific Emergency Number.
The SIM also stores other carrier specific data such as the SMSC (Short Message Service Center) number, Service Provider Name (SPN), Service Dialing Numbers (SDN), Advice-Of-Charge parameters and Value Added Service (VAS) applications.

ICC-ID (Integrated Circuit Card - ID)
Each SIM is Internationally identified by its ICC-ID. ICC-IDs are stored in the SIM cards and are also engraved or printed on the SIM card body during a process called personalization.

IMSI( International Mobile Subscriber Identity)
SIM cards are identified on their individual operator networks by holding a unique International Mobile Subscriber Identity. Mobile operators connect mobile phone calls and communicate with their market SIM cards using their IMSI.

Authentication key (Ki)
The Ki is a 128-bit value used in authenticating the SIMs on the mobile network. Each SIM holds a unique Ki assigned to it by the operator during the personalization process. The Ki is also stored on a database (known as Home Location Register or HLR) on the carrier’s network.
The SIM card is designed so that the Ki cannot be obtained using the smart-card interface. Instead, the SIM card provides a function, "RUN GSM ALGORITHM", that allows the phone to pass data to the SIM card to be signed with the Ki. This, by design, makes usage of the SIM card mandatory unless the Ki can be extracted from the SIM card, or the carrier is willing to reveal the Ki. In practice, the GSM "crypto" algorithm for computing SRES_2 from the Ki has a weak point. This allows the extraction of the Ki from a SIM card and the making of a duplicate SIM card.

Authentication process
1. When the Mobile Equipment starts up, it obtains the IMSI from the SIM card, and passes this to the mobile operator requesting access and authentication. The Mobile Equipment may have to pass a PIN to the SIM card before the SIM card will reveal this information
2. The operator network searches its database for the incoming IMSI and its associated Ki.
3. The operator network then generates a Random Number (RAND) and signs it with the Ki associated with the IMSI (and stored on the SIM card), computing another number known as Signed Response (SRES_1).
4. The operator network then sends the RAND to the Mobile Equipment, which passes it to the SIM card. The SIM card signs it with its Ki, producing SRES_2 which it gives to the Mobile Equipment along with encryption key Kc. The Mobile Equipment passes SRES_2 on to the operator network.
5. The operator network then compares its computed SRES_1 with the computed SRES_2 that the Mobile Equipment returned. If the two numbers match the SIM is authenticated and the Mobile Equipment granted access to the operator's network. Kc is used to encrypt all further communications between the Mobile Equipment and the network.

Location area identity
The SIM stores network state information which is broadcast to it from the network, such as the Location Area Identity (LAI). Operator networks are divided into Location Areas, each having a unique LAI number. When the Mobile changes its location from one Location Area to another it stores its new LAI in SIM and sends it to the operator network to inform network with its new location. If the handset is turned off and back on again it will take data off the SIM and search for the LAI it was in. This saves time by avoiding having to search the whole list of frequencies that the telephone normally would.

It is an application for UMTS mobile telephony running on a UICC smart card which is inserted in a 3G mobile phone. There is a common misconception to call the UICC card itself a USIM, but the USIM is merely a logical entity on the physical card.
It stores user subscriber information, authentication information and provides storage space for text messages and phone book contacts. The phone book on a UICC has been greatly enhanced.
For authentication purposes, the USIM stores a long-term preshared secret key K, which is shared with the Authentication Center (AuC) in the network. The USIM also verifies a sequence number that must be within a range using a window mechanism to avoid replay attacks.


SIM is a smart card which forms an unavoidable part in GSM mobile phones. It stores several user-defined information such as phonebook entries and other subscriber information like IMSI. SIM may be moved from one Mobile Station to another which forms an advantage for the GSM architecture. This makes upgrades very simple for the GSM telephone user.

Post: #2
Subscriber identification module (SIM)

Subscriber identification module (SIM) is an integrated circuit that securely stores the service subscriber key used to identify a subscriber on mobile telephony. A sim is held on a removable sim card which can be transferred between different mobile devices.
It was made in 1991 by Munich smart card maker Giesecke and Devient. The three operating voltage of sim card is 1.8 V, 3V and 5V. It is programmed by using the JAVA programming language.

The above figure shows the construction of a sim card. The location and identity of a subscriber is identified by using a key number which is known as International mobile subscriber identity number (IMSI). The sim card also contains the two security numbers one is PIN for usual use and PUK for unlocking.
The sim cards are also used in the satellite’s like Iridium, Thuraya and Inmarsat’s BGAN for the identification.

Marked Categories : seminor topic sim, t l charger simfull repport com, subscriber identity module sim card ppt, seminar on sim identification module, subscriber identity module abstract, seminar of sim card, subscriber identity module technology doc, seminar topic on sim card, sim subscriber identity module electronics, seminar topics sim, topics for seminar sim, seminar project for gsm sim card, presentation seminar on sim, seminar on sim, seminar report on sim card, complete information about subscriber identity module, the importance of subscriber identification module in telephony, subscriber identity module function, sminar topic for gsm sim card, module, seminar on sim card,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  seminar report on zettabyte file system Guest 0 0 06-12-2018 09:30 AM
Last Post: Guest
  GREEN COMPUTING A SEMINAR REPORT email2ktr 17 37,466,486 04-12-2018 08:51 AM
Last Post: bpatrickmshtozey2048
  sendriya sheti full information in marathi pdf philes Guest 0 0 03-12-2018 11:36 AM
Last Post: Guest
  11 commerce o c m project report of seasonal goods Guest 0 0 19-11-2018 12:39 PM
Last Post: Guest
  a report on procedure of winding up partnership firm project pdf Guest 3 0 14-11-2018 12:45 AM
Last Post: Prathamesh Sanap
  project report on solenoid engine Guest 0 0 05-11-2018 07:09 PM
Last Post: Guest
  hydraulic vise project report Guest 0 0 20-10-2018 02:31 AM
Last Post: Guest
  data mining full report project report tiger 35 232,946,025 13-10-2018 05:10 PM
Last Post: banattivanovy4591
  double piston single connecting rod mini project report Guest 5 1,794 29-09-2018 10:00 AM
Last Post: Guest
  android financial notifier project documentation report Guest 6 890 26-09-2018 03:43 PM
Last Post: Guest
This Page May Contain What is Subscriber Identity Module (SIM) full report And Latest Information/News About Subscriber Identity Module (SIM) full report,If Not ...Use Search to get more info about Subscriber Identity Module (SIM) full report Or Ask Here