Share this
What is a SIM (Subscriber Identity Module) Card?
by Christopher Trick on Nov 15, 2022 1:38:13 PM
As the amount of available data increases and devices become more interconnected, networks must deal with an increasing number of users, all of which must be properly identified and connected to these networks.
In this blog, you'll learn more about what a SIM card is, how it works, the various types of SIM cards, and how it works with 5G technology.
What is a SIM card?
How does a SIM card work?
Each SIM card holds an IMSI (International Mobile Subscriber Identity) and an ICCID (Integrated Circuit Card Identifier). This is information used to identify a user.
The most important part of the card is a small integrated chip that contains a unique identification number and other data specific to the user.
The IMSI is stored as a 64-bit number inside the chip, and it both verifies and protects the user.
When first connecting a device to a service network, the IMSI and an authentication key are sent to the service provider to verify that the attached device belongs to the user.
If both the IMSI and authentication key match the provider's records, the device is given access to the service network; if not, then the device is not given access to the network.
The ICCID is an 18-to-22-digit code usually found on the back of a SIM card. It works as the card's ID, and it cannot be duplicated.
The digits of an ICCID are a string of numbers that classify a SIM card's designated industry, country, service provider network, and unique ID.
After buying and activating a SIM card, the ICCID lets mobile network operators (MNOs) know which network to connect a SIM card and associated device to.
Each SIM card holds unique information known as an IMSI (International Mobile Subscriber Identity) and an ICCID (Integrated Circuit Card Identifier), which are used for identification purposes.
What are the types of SIM cards?
There are five main types of SIM cards: Full, or Standard, SIM, Mini SIM, Micro SIM, Nano SIM, and Embedded SIM (eSIM). Each physical SIM card increases in form factor (FF).
Let's take a look at each:
Full, or Standard, SIM
Released in 1991, this is the original SIM card, and it is also the largest type of SIM card. Full SIM cards are usually found in older cellphone models from the early to mid-1990s. (Dimensions: 85 mm x 53 mm, 1FF)
Mini SIM
Released in 1996, this type of SIM card cuts down the length of the SIM card from three inches to one inch.
Mini SIM cards essentially contain all of a phone, so if users need to switch to a new phone, all they need is to take the SIM card out and put it in the new phone.
This type of SIM card makes upgrades much easier, and they are usually found in cellphone models from the late 1990s to the early 2000s. (Dimensions: 25 mm x 15 mm, 2FF)
Micro SIM
Released in 2003, this type of SIM card cuts down the length of the SIM from one inch to just half an inch length.
At the time of its release, the purpose of Micro SIM cards was to provide a smaller alternative if a device was too small to fit a Mini SIM and work with input generated by an older version of the SIM, all without loss of performance.
This type of SIM card is usually found in cellphone models from the early to mid-2010s. (Dimensions: 15 mm x 12 mm, 3FF)
Nano SIM
Released in 2012, this type of SIM card further cuts down the length of the SIM card to just under half an inch.
Though it is now current SIM card technology, Nano SIM cards made those upgrading to new phones get this card at the time of its release.
This type of SIM card is commonly found in cellphones used today. (Dimensions: 12.3 mm x 8.8 mm, 4FF)
Embedded SIM (eSIM)
Released in 2016, this type of SIM card is the most recent SIM card model, and it is the first entirely digital card type.
eSIM cards are completely software-based and built into a mobile device, allowing users to switch operators/service plans easily without having to swap a physical SIM card.
This type of SIM card is found in the latest iPhones--iPhone 14, iPhone XS, and everything after. (Dimensions: 6 mm x 5 mm)
How do you remove or insert a SIM card?
Where a SIM card is located depends upon the device. It may be stored behind a battery, accessible through a panel in the back, but it may also be accessible on the side of a phone or mobile device.
A lot of devices will come with instructions on removing or interesting SIM cards. Sometimes SIM cards need be popped out with a sharp object, while others may need to be removed by hand.
How are SIM cards different from SD cards?
What are the advantages and disadvantages of SIM cards?
There are advantages and disadvantages of using SIM cards. Let's take a look at each:
Advantages
Ease of use
This really stems from the fact that a SIM card can be separated from a mobile device.
For example, users taking a mobile device to a different area may not be able to use the SIM card they currently have, so they may need to purchase another SIM card from a carrier that operates in the area they are going to.
But that is all they will need to do, and it is much less costly than to purchase a new device. Plus, when they return, they can simply put the old SIM card back into their device.
Easy installation and removal
A SIM card can easily be removed and installed into another device, and vice versa.
For example, say a mobile device dies, but the user needs to receive an important message, they can simply take the SIM card and place it into another device to receive the message.
Disadvantages
Potentially high costs
If users keep their original SIM card in their mobile devices when traveling aboard, this may lead to roaming and data charges. Since different areas have different rates, this may increase costs even more if international service plans are not set up beforehand.
Increased vulnerability to cyberattacks
Other than the SIM card, there is really no way for providers to detect whether a physical device actually belongs to an account holder.
This opens the door to SIM swapping--when a hacker convinces a mobile carrier that he or she is an existing user and asks for the user's account to be transferred to a new SIM card that the hacker purchased.
SIM swapping usually starts with a hacker contacting a mobile carrier and impersonating a user. The hacker will claim that he or she has a new SIM card to activate for the user's account because the original SIM card was lost, stolen, or destroyed.
The mobile carrier will request some identity verification information such as a PIN number or security questions, but hackers have ways of obtaining the information they need through information available online or obtained in previous hacks, so they will be able to convince the carrier that they are the user.
Once the hacker is able to get through, he or she can transfer a user's information to the new SIM card and can reset or manipulate a user's account security settings, email, payments, and more; additionally, users will not be able to use their mobile devices to receive and/or send messages.
What is the future of SIM cards?
SIM cards will be a major part of mobile communications going forward, especially with users who have accounts with more than one provider.
Some devices will let users have two carriers or have a primary provider that is connected to an eSIM and multiple SIMs for travel purposes.
It is possible that eSIMs can become the dominant SIM card, as they are completely virtual and can be quickly upgraded. Users will not have to worry about losing SIM cards and reconfiguring their account with their service provider.
What role do SIM cards play in 5G?
A lot of SIM cards in circulation are 4G SIM cards. But with 5G technology becoming increasingly important, having SIM cards that are compatible with 5G is essential.
4G SIM cards are forwards compatible, meaning they will work on a 5G device, but they will not allow users to access a 5G network.
In order to access a 5G network, users need 5G coverage, a 5G mobile device, a 5G tariff (a fee to be paid), and a 5G SIM card.
Let's take a look at some of the benefits of a 5G SIM card:
- Subscriber identity privacy: Network operators can make user data anonymous thanks to IMSI encryption, which is made possible by the customizable identity encryption capabilities built within 5G SIM cards.
- Cybersecurity and resiliency: Network operators can securely and remotely switch the authentication algorithm contained in 5G SIM cards in seconds, which is made possible by key rotation management. This, in turn, creates a trusted environment.
- Tailored enterprise and private network confidentiality: Network authentication mechanisms allow network operators to bring higher integrity and confidentiality levels for enterprise 5G services and private networks. Operators can provide tailored security authentication and authorization for each network slice.
- Seamless 5G roaming: 5G SIM cards enable network operators to offer seamless, optimized 5G roaming--the ability to communicate and access information outside of a provider's coverage area.
In order to access a 5G network, users need 5G coverage, a 5G mobile device, a 5G tariff (a fee to be paid), and a 5G SIM card.
SIM cards and Trenton Systems
Trenton Systems' high-performance computing solutions, in rack mount and small form factor, connect to the RRU or 4G/5G gateway that houses licensed or unlicensed SIM cards.
We can also work with various SIM/eSIM providers such as Thales to preserve operational integrity at the highest level.
Powered by 5G technology, our systems can enhance data analysis and connectivity between networks and user equipment, providing virtualized, low-latency networking in the harshest of environments.
Final thoughts
SIM cards play a pivotal role in helping identify and connect proper users with a network which, in turn, helps ensure secure and reliable communication.
In a variety of form factors, SIM cards be easily installed and removed, offering users the flexibility and portability they need to operate in a variety of settings.
Additionally, SIM cards can be equipped with 5G technology to enhance connectivity at the edge.
Want to learn more about how we can help you craft a custom, 5G-powered solution architected to support the most advanced SIM cards? Reach out us anytime here.
Team Trenton is at your service. 🇺🇸
Interested in learning more about 5G? Check out some other key 5G technologies that enhance compute architectures here.
Sources:Share this
- High-performance computers (42)
- Military computers (38)
- Rugged computers (32)
- Cybersecurity (25)
- Industrial computers (25)
- Military servers (24)
- MIL-SPEC (20)
- Rugged servers (19)
- Press Release (17)
- Industrial servers (16)
- MIL-STD-810 (16)
- 5G Technology (14)
- Intel (13)
- Rack mount servers (12)
- processing (12)
- Computer hardware (11)
- Edge computing (11)
- Rugged workstations (11)
- Made in USA (10)
- Partnerships (9)
- Rugged computing (9)
- Sales, Marketing, and Business Development (9)
- Trenton Systems (9)
- networking (9)
- Peripheral Component Interconnect Express (PCIe) (7)
- Encryption (6)
- Federal Information Processing Standards (FIPS) (6)
- GPUs (6)
- IPU (6)
- Joint All-Domain Command and Control (JADC2) (6)
- Server motherboards (6)
- artificial intelligence (6)
- Computer stress tests (5)
- Cross domain solutions (5)
- Mission-critical servers (5)
- Rugged mini PCs (5)
- AI (4)
- BIOS (4)
- CPU (4)
- Defense (4)
- Military primes (4)
- Mission-critical systems (4)
- Platform Firmware Resilience (PFR) (4)
- Rugged blade servers (4)
- containerization (4)
- data protection (4)
- virtualization (4)
- Counterfeit electronic parts (3)
- DO-160 (3)
- Edge servers (3)
- Firmware (3)
- HPC (3)
- Just a Bunch of Disks (JBOD) (3)
- Leadership (3)
- Navy (3)
- O-RAN (3)
- RAID (3)
- RAM (3)
- Revision control (3)
- Ruggedization (3)
- SATCOM (3)
- Storage servers (3)
- Supply chain (3)
- Tactical Advanced Computer (TAC) (3)
- Wide-temp computers (3)
- computers made in the USA (3)
- data transfer (3)
- deep learning (3)
- embedded computers (3)
- embedded systems (3)
- firmware security (3)
- machine learning (3)
- Automatic test equipment (ATE) (2)
- C6ISR (2)
- COTS (2)
- COVID-19 (2)
- Compliance (2)
- Compute Express Link (CXL) (2)
- Computer networking (2)
- Controlled Unclassified Information (CUI) (2)
- DDR (2)
- DDR4 (2)
- DPU (2)
- Dual CPU motherboards (2)
- EW (2)
- I/O (2)
- Military standards (2)
- NVIDIA (2)
- NVMe SSDs (2)
- PCIe (2)
- PCIe 4.0 (2)
- PCIe 5.0 (2)
- RAN (2)
- SIGINT (2)
- SWaP-C (2)
- Software Guard Extensions (SGX) (2)
- Submarines (2)
- Supply chain security (2)
- TAA compliance (2)
- airborne (2)
- as9100d (2)
- chassis (2)
- data diode (2)
- end-to-end solution (2)
- hardware security (2)
- hardware virtualization (2)
- integrated combat system (2)
- manufacturing reps (2)
- memory (2)
- mission computers (2)
- private 5G (2)
- protection (2)
- secure by design (2)
- small form factor (2)
- software security (2)
- vRAN (2)
- zero trust (2)
- zero trust architecture (2)
- 3U BAM Server (1)
- 4G (1)
- 4U (1)
- 5G Frequencies (1)
- 5G Frequency Bands (1)
- AI/ML/DL (1)
- Access CDS (1)
- Aegis Combat System (1)
- Armed Forces (1)
- Asymmetric encryption (1)
- C-RAN (1)
- COMINT (1)
- CPUs (1)
- Cloud-based CDS (1)
- Coast Guard (1)
- Compliance testing (1)
- Computer life cycle (1)
- Containers (1)
- D-RAN (1)
- DART (1)
- DDR5 (1)
- DMEA (1)
- Data Center Modular Hardware System (DC-MHS) (1)
- Data Plane Development Kit (DPDK) (1)
- Defense Advanced Research Projects (DARP) (1)
- ELINT (1)
- EMI (1)
- EO/IR (1)
- Electromagnetic Interference (1)
- Electronic Warfare (EW) (1)
- FIPS 140-2 (1)
- FIPS 140-3 (1)
- Field Programmable Gate Array (FPGA) (1)
- Ground Control Stations (GCS) (1)
- Hardware-based CDS (1)
- Hybrid CDS (1)
- IES.5G (1)
- ION Mini PC (1)
- IP Ratings (1)
- IPMI (1)
- Industrial Internet of Things (IIoT) (1)
- Industry news (1)
- Integrated Base Defense (IBD) (1)
- LAN ports (1)
- LTE (1)
- Life cycle management (1)
- Lockheed Martin (1)
- MIL-S-901 (1)
- MIL-STD-167-1 (1)
- MIL-STD-461 (1)
- MIL-STD-464 (1)
- MOSA (1)
- Multi-Access Edge Computing (1)
- NASA (1)
- NIC (1)
- NIC Card (1)
- NVMe (1)
- O-RAN compliant (1)
- Oil and Gas (1)
- Open Compute Project (OCP) (1)
- OpenRAN (1)
- P4 (1)
- PCIe card (1)
- PCIe lane (1)
- PCIe slot (1)
- Precision timestamping (1)
- Product life cycle (1)
- ROM (1)
- Raytheon (1)
- Remotely piloted aircraft (RPA) (1)
- Rugged computing glossary (1)
- SEDs (1)
- SIM Card (1)
- Secure boot (1)
- Sensor Open Systems Architecture (SOSA) (1)
- Small form-factor pluggable (SFP) (1)
- Smart Edge (1)
- Smart NIC (1)
- SmartNIC (1)
- Software-based CDS (1)
- Symmetric encryption (1)
- System hardening (1)
- System hardening best practices (1)
- TME (1)
- Tech Partners (1)
- Total Memory Encryption (TME) (1)
- Transfer CDS (1)
- USB ports (1)
- VMEbus International Trade Association (VITA) (1)
- Vertical Lift Consortium (VLC) (1)
- Virtual machines (1)
- What are embedded systems? (1)
- Wired access backhaul (1)
- Wireless access backhaul (1)
- accredidation (1)
- aerospace (1)
- air gaps (1)
- airborne computers (1)
- asteroid (1)
- authentication (1)
- autonomous (1)
- certification (1)
- cognitive software-defined radios (CDRS) (1)
- command and control (C2) (1)
- communications (1)
- cores (1)
- custom (1)
- customer service (1)
- customer support (1)
- data linking (1)
- data recording (1)
- ethernet (1)
- full disk encryption (1)
- hardware monitoring (1)
- heat sink (1)
- hypervisor (1)
- in-house technical support (1)
- input (1)
- integrated edge solution (1)
- international business (1)
- licensed spectrum (1)
- liquid cooling (1)
- mCOTS (1)
- microelectronics (1)
- missile defense (1)
- mixed criticality (1)
- moving (1)
- multi-factor authentication (1)
- network slicing (1)
- neural networks (1)
- new headquarters (1)
- next generation interceptor (1)
- non-volatile memory (1)
- operating system (1)
- output (1)
- outsourced technical support (1)
- post-boot (1)
- pre-boot (1)
- private networks (1)
- public networks (1)
- radio access network (RAN) (1)
- reconnaissance (1)
- secure flash (1)
- security (1)
- self-encrypting drives (SEDs) (1)
- sff (1)
- software (1)
- software-defined radios (SDRs) (1)
- speeds and feeds (1)
- standalone (1)
- storage (1)
- systems (1)
- tactical wide area networks (1)
- technical support (1)
- technology (1)
- third-party motherboards (1)
- troposcatter communication (1)
- unlicensed spectrum (1)
- volatile memory (1)
- vpx (1)
- zero trust network (1)
- November 2024 (1)
- October 2024 (1)
- August 2024 (1)
- July 2024 (1)
- May 2024 (1)
- April 2024 (3)
- February 2024 (1)
- November 2023 (1)
- October 2023 (1)
- July 2023 (1)
- June 2023 (3)
- May 2023 (7)
- April 2023 (5)
- March 2023 (7)
- December 2022 (2)
- November 2022 (6)
- October 2022 (7)
- September 2022 (8)
- August 2022 (3)
- July 2022 (4)
- June 2022 (13)
- May 2022 (10)
- April 2022 (4)
- March 2022 (11)
- February 2022 (4)
- January 2022 (4)
- December 2021 (1)
- November 2021 (4)
- September 2021 (2)
- August 2021 (1)
- July 2021 (2)
- June 2021 (3)
- May 2021 (4)
- April 2021 (3)
- March 2021 (3)
- February 2021 (8)
- January 2021 (4)
- December 2020 (5)
- November 2020 (5)
- October 2020 (4)
- September 2020 (4)
- August 2020 (6)
- July 2020 (9)
- June 2020 (11)
- May 2020 (13)
- April 2020 (8)
- February 2020 (1)
- January 2020 (1)
- October 2019 (1)
- August 2019 (2)
- July 2019 (2)
- March 2019 (1)
- January 2019 (2)
- December 2018 (1)
- November 2018 (2)
- October 2018 (5)
- September 2018 (3)
- July 2018 (1)
- April 2018 (2)
- March 2018 (1)
- February 2018 (9)
- January 2018 (27)
- December 2017 (1)
- November 2017 (2)
- October 2017 (3)
No Comments Yet
Let us know what you think