5G Security
Applications

5G Security

5G - Secure Storage, Management & Processing of Subscription Credentials

Security is a driving factor in how 5G networks are built and operated - every element of a 5G network is required to have security controls in place for the purpose of delivering confidentiality, integrity and availability so that the network provides users with a secure communications platform.

The 5G security architecture depends on keeping many pieces of information private (e.g., subscriber credentials and encryption keys). Most of the security mechanisms are based on secure protocols and underlying cryptographic algorithms that all rest on the reliability to securely store secret keys. Operations that need to have access to these keys should always be executed within, and never outside of a secure hardware component*.

For user equipment, which could be any device used directly by an end-user to communicate; a solution for Authentication and Key Agreement (AKA) is a requirement.

Utimaco’s HSM-protected 5G creates a secure operational environment, supporting all relevant 3G, 4G and 5G Subscriber Authentication and Key Agreement (AKA) protocols.

*(ETSI TS 133 501 , Clause 5.2.4)

Business value

Business value

Icon

Industry grade HSM-based root of trust.

  • Provides easy extension to support future versions of SIDF Profiles and AKA protocols, or even future quantum- safe algorithms
  • Customizable to specific requirements of Mobile Network Operators
Icon

Secure, scalable open 5G environment

  • Provides a unique product combination of a secure environment and integration API 
  • Provides a scalable and customizable solution for subscriber authentication and key agreement in mobile networks.
  • Provides easy integration through a dedicated interface for authentication and key agreement (AKA) use cases.
  • A solution especially designed to meet the needs of network element provider for subscriber identity de-concealing and authentication and key agreement in mobile networks
Icon

Compliance with security standards across industries

  • Provides easy integration through dedicated interfaces for AKA use cases.
  • Provides a secure environment that protects against physical attacks as required in 3GPP Technical Specification 33.501 “Security architecture and procedures for 5G System
  • Assures security and compliance with FIPS 140-2, PCI HSM and Common Criteria proven Hardware Security Module and cryptographic algorithms
  • Support of all relevant 3G, 4 and 5G Subscriber Authentication and Key Agreement (AKA) protocols
Icon

Secure & Centralized Key Management

  • Processes subscriber data and generates keys within a secure and tamper-protected environment at unprecedented speed
  • Provides a FIPS & PCI-PIN Certified Policy based key life cycle management including distribution control of keys
  • A solution designed to unify an organization's existing HSM key management landscape by enabling consistent, centralized key lifecycle management
  • Allows remote HSM operation & management of existing and additional HSMs
  • Provides a single, easy to use interface, allowing organizations to generate, import and export keys both quickly and efficiently
  • Provides effective audit and logging such as date and timestamp, user IDs, function performed, POS terminal details, key serial number and pass or fail status
Icon

Remote Access

  • Extensive mechanisms for remote administration
  • Efficient key management and firmware updates via remote access
  • Automation of remote diagnosis via SNMP (Simple Network Management Protocol)
Icon

Software Simulator included

Included simulator allowing for the mobile TrustServer evaluation and integration testing to benchmark the best possible solution for each specific case

Deployment options

Deployment options

Icon

On Premise

  • Useful for centralized use cases without a requirement of scalability or remote accessibility and existing legacy infrastructure
  • Defined total cost of ownership
  • Complete control on hardware and software, including configuration and upgrades
  • Secured uptime in areas with insatiable internet connectivity
  • Preferred choice in industry-segments where regulation imposes restrictions
Icon

In the Cloud

  • Strategic architectural fit & risk management for your high value assets
  • Provides flexibility, scalability and availability of HSM-as-a-service
  • Ideal for a multi-cloud strategy, supporting multi-cloud deployments & allows for migration flexibility
  • Allows you to seamlessly work with any Cloud Service Provider
  • Easy-to-use remote management and on-site key ceremony service option
  • Full control over data through encryption key life-cycle and key administration
  • Secured data privacy through Bring-Your-Own-Key procedures

Contact us

We look forward to answering your questions.

Nehmen Sie Kontakt auf

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Ihnen helfen kann.