MIIT Archives - TechGoing https://www.techgoing.com/tag/miit/ Technology News and Reviews Thu, 02 Mar 2023 02:45:26 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.4 MIIT: China built the world’s largest Mobile Internet of Things https://www.techgoing.com/miit-china-built-the-worlds-largest-mobile-internet-of-things/ Thu, 02 Mar 2023 02:45:25 +0000 https://www.techgoing.com/?p=75109 In the State Information Office yesterday held a series of “authoritative departments to talk about the opening” press conference, the Ministry of Industry and Information Technology chief engineer, spokesman Tian Yulong said, in various departments, the joint efforts of local, 5G, gigabit optical network and mobile Internet of things as the representative of the new […]

The post MIIT: China built the world’s largest Mobile Internet of Things appeared first on TechGoing.

]]>
In the State Information Office yesterday held a series of “authoritative departments to talk about the opening” press conference, the Ministry of Industry and Information Technology chief engineer, spokesman Tian Yulong said, in various departments, the joint efforts of local, 5G, gigabit optical network and mobile Internet of things as the representative of the new infrastructure construction continues to accelerate and has achieved remarkable results.

The 5G network facilities construction has built the world’s largest and most technologically advanced 5G network. 5G base stations exceed 2.31 million, and the 5G network covers all prefecture-level cities and urban areas in all counties. 5G network supply capacity has been continuously improved with the continuous improvement of applications and facilities and has played a major leading role in building a complete industrial chain covering systems, chips and terminals. “During the 14th Five-Year Plan period, we will continue to improve the depth and breadth of 5G network coverage, further deepen network construction and sharing, and vigorously promote the integration of 5G technology applications and product applications into all sectors of the economy and society. In particular, we will promote the development of “5G + Industrial Internet” in the direction of in-depth integration in the manufacturing industry, expand to all aspects of production, and enhance the overall level of digitalization, networking and intelligence in the manufacturing industry.

In terms of gigabit optical network construction, the country has already achieved “city-to-city gigabit”, “village-to-village broadband” and “county-to-county 5G”. Gigabit optical network has the ability to cover more than 500 million households, which is also leading in the world. The “East Data and West Computing” project has been fully launched, gradually building an integrated computing infrastructure application system of “computing, storage and transportation”. The total scale of data center racks in use in China has exceeded 6.5 million standard racks, with more than 20 million servers and the second-largest scale of computing power in the world. Subsequently, we will carry out the “light chasing action” of gigabit optical network, strengthen cross-industry, cross-enterprise and cross-region network collaboration and innovation, and support traditional industries to digitalization, networking and intelligent transformation. Small and medium-sized cities and rural remote areas to achieve coordinated and balanced development of information and communication networks, promote the “broadband frontier”, small and medium-sized cities, and cloud network construction, so that modern information technology benefits the majority of the people. At the same time, we should increase support for computing infrastructure and strong computing empowerment, to create a cloud-network integration, computing network network network architecture and computing power supply system.

Mobile Internet of things, China has built the world’s largest mobile Internet of things, with 1.845 billion connections, accounting for more than 70% of the world’s total number of connections, becoming the first major economies in the world to achieve the “superhero of things” countries. Mobile Internet of things should be said in the digital city construction, intelligent manufacturing, intelligent transportation, mobile payment and other fields to achieve large-scale applications, which we all have a deep experience, facilitate our lives, and change our way of life.

The State Office of the new website was informed that Tian Yulong said the follow-up will be in accordance with the “network first, application traction, market-led, policy-driven” work ideas, in-depth development of mobile Internet of things, continue to consolidate the leading edge of network capacity, to build support for the integration of solid mobile, a wide and narrow combination of IOT access capabilities. Continue to carry out mobile Internet of things application scenario expansion, deep into various industries and fields, so that the integration of the Internet of things and various industries to further deepens, to support the construction of our digital China and our smart city construction, more of our information infrastructure to benefit the masses of people, benefit our social development.

The post MIIT: China built the world’s largest Mobile Internet of Things appeared first on TechGoing.

]]>
Feifan F7 range exposure: dual motor version up to 600km, peak total power 400kW https://www.techgoing.com/feifan-f7-range-exposure-dual-motor-version-up-to-600km-peak-total-power-400kw/ Sun, 01 Jan 2023 12:36:52 +0000 https://www.techgoing.com/?p=60037 The latest Ministry of Industry and Information Technology “road motor vehicle production enterprises and products” (366th batch), “new energy vehicles to promote the application of the recommended model directory” (2022 batch 12) appeared in the figure of SAIC Feifan F7. This new vehicle includes at least four versions, supporting power exchange, with a range of […]

The post Feifan F7 range exposure: dual motor version up to 600km, peak total power 400kW appeared first on TechGoing.

]]>
The latest Ministry of Industry and Information Technology “road motor vehicle production enterprises and products” (366th batch), “new energy vehicles to promote the application of the recommended model directory” (2022 batch 12) appeared in the figure of SAIC Feifan F7.

This new vehicle includes at least four versions, supporting power exchange, with a range of 500 km for the single-motor version, using lithium iron phosphate batteries; 600 km for the dual-motor version, using ternary lithium batteries; 216 kW peak motor power for the single-motor version; and 400 kW peak total motor power for the dual-motor version.

This model appeared in the Ministry of Industry and Information Technology declaration list as early as September last year. The new car is positioned as a medium to the large pure electric sedan, with a length of 5 meters and a wheelbase of 3 meters, and offers a choice of a switchable version with a maximum drive motor power of 250kW and a 90kWh ternary lithium battery pack.

The post Feifan F7 range exposure: dual motor version up to 600km, peak total power 400kW appeared first on TechGoing.

]]>
MIIT: The app should be easy to uninstall, and shall not maliciously obstruct https://www.techgoing.com/miit-the-app-should-be-easy-to-uninstall-and-shall-not-maliciously-obstruct/ Tue, 27 Dec 2022 20:42:36 +0000 https://www.techgoing.com/?p=58242 The Ministry of Industry and Information Technology (MIIT) today publicly solicited comments on the “Notice of the Ministry of Industry and Information Technology on Further Improving the Service Capability of Mobile Internet Applications (Draft for Comments). Source Pexels It is mentioned that the recommended downloading behavior of web pages should be regulated. When users browse […]

The post MIIT: The app should be easy to uninstall, and shall not maliciously obstruct appeared first on TechGoing.

]]>
The Ministry of Industry and Information Technology (MIIT) today publicly solicited comments on the “Notice of the Ministry of Industry and Information Technology on Further Improving the Service Capability of Mobile Internet Applications (Draft for Comments).

Source Pexels

It is mentioned that the recommended downloading behavior of web pages should be regulated. When users browse the content of the page, without the user’s consent or active choice, shall not automatically or forcibly download the App, or force the user to download or open the App by folding display, active pop-up window, frequent prompts, etc., affecting the user’s normal browsing information. Without reasonable and justifiable reasons, users shall not be required not to download the App, or not to read the full text. Easy uninstallation. Except for the basic functional software, the App should be easily uninstalled and should not maliciously obstruct users from uninstalling by blank names, transparent icons, hidden in the background, etc.

Ministry of Industry and Information Technology Notice on Further Improving Mobile Internet Application Service Capability (Draft for Comments)

In recent years, the Ministry has vigorously promoted the improvement of mobile Internet application service quality, effectively safeguarding the legitimate rights and interests of users, and achieving positive social results, but some enterprise’s service behavior is not standardized, the implementation of the relevant links of responsibility is not in place, the problem still occurs from time to time. In order to optimize service supply, improve user experience, maintain a good information consumption environment, and promote the high-quality development of the industry, according to the “Personal Information Protection Law” “Telecommunications Regulations” “regulate the Internet information services market order of some provisions” “telecommunications and Internet users personal information protection regulations” and other relevant laws and regulations is hereby notified of the following matters.

First, to enhance the whole process of service perception, to protect the legitimate rights and interests of users
(A) regulate the installation and uninstallation behavior

  1. Ensure informed consent for installation. Recommend to users to download App should follow the principle of openness and transparency, true, accurate, and complete disclosure of developer information, product features, privacy policies, permission lists, and other necessary information, and synchronize the provision of obvious “cancel” option, the user to confirm consent before downloading and installation, to effectively protect the user’s right to know, the right to choose. Do not deceive and mislead users to download and install by “stealing”, “forced bundling”, “silent download” and other ways.
  2. Standardize the recommended downloading behavior of web pages. When the user browses the content of the page, without the user’s consent or active choice, do not automatically or forcibly download the App, or force the user to download and open the App by folding the display, active pop-up windows, frequent prompts, etc., affecting the user’s normal browsing information. Without reasonable and justifiable reasons, do not require users not to download the App will not be given to see, or not to read the full text.
  3. Realize convenient uninstallation. In addition to the basic functions of the software, the App should be easy to uninstall, and not to blank name, transparent icon, a background is hidden or other ways to maliciously obstruct the user uninstallation.

(B) Optimize service experience

  1. Window closure is optional for users. Provide clear and effective close buttons for open screen and pop-up information windows, and do not frequently interfere with the normal use of pop-up windows, or use “full-screen heat map”, highly sensitive “shake” and other methods that may cause mistriggering to induce users to operate.
  2. Advance notice of service matters. Clearly expressing the product features and rights and tariff levels, there are additional conditions for opening membership, fees, etc., which should be significantly prompted. Without express, not in the process of providing product services without adding restrictive conditions, and as a reason to terminate the user’s normal use of product features and services, or reduce the service experience.
  3. Start running scenarios reasonably. When not necessary for the service or without reasonable scenarios, the company shall not start other apps or make wake-up calls, calls, updates, etc.
  4. A timely reminder of service renewal. If the service is provided in the form of auto-renewal or auto-renewal, the user’s consent shall be obtained, and no default checkbox or mandatory bundle shall be opened. In the auto-renewal, auto-renewal 5 days before the user’s attention by SMS and other prominent ways to remind the service period to provide a convenient way to unsubscribe at any time and auto-renewal, auto-renewal cancellation.

(III) Strengthen the protection of personal information

  1. Adhere to the principle of legal and legitimate necessity. Engaged in personal information processing activities, should have a clear and reasonable purpose, not only for service experience, product development, algorithm recommendations, risk control, etc., illegal collection of personal information, or mandatory user consent to collect personal information unrelated to the service scenario. When the user refuses to provide personal information that is not necessary for the current service, it shall not affect the user’s use of the basic functions of the service.
  2. Explicit personal information handling rules. Users are informed of the personal information processing rules in a concise, clear and understandable manner, highlighting the purpose, manner and scope of handling sensitive personal information, establishing a list of collected personal information, and not using default checkboxes, reduced text, lengthy text, etc. to induce users to agree to the personal information processing rules.
  3. Reasonable application for permission to use. When corresponding business functions are launched, dynamically apply for the required permissions, and do not require users to agree to open multiple non-essential permissions in one package. When invoking permissions such as photo album, address book, location, etc. of the terminal, inform the user of the purpose of applying for such permissions simultaneously. The permission status set by the user shall not be changed without the user’s consent.

(D) Respond to user requests

  1. Establish a customer service hotline. Encourage Internet enterprises to establish customer service hotlines, and major Internet enterprises to prominently display the phone numbers of customer service hotlines on their websites and apps to simplify the manual service transfer procedures. Encourage the improvement of customer service hotline capacity, the average monthly response time limit of up to 30 seconds, and the response rate of manual services exceeding 85%.
  2. Properly handle user complaints. Publish effective contact information and accept user complaints. Respond to complaints on the Internet information service complaint platform in accordance with the standard requirements, ensure completion of processing within 15 days, and improve the satisfaction rate of complaint processing. Encourage the setting of user satisfaction assessment links in the App to guide users to participate in the assessment.

Second, improve the whole chain of management capabilities to create a healthy service ecology
(A) implement the main responsibility of App developers and operators

  1. Improve the internal management mechanism. Identify the leading management department and person in charge of user services and rights protection, establish a full life-cycle personal information protection mechanism, improve the assessment and accountability system, implement relevant regulations and policies into all aspects of product development, promotion and operation, and continuously improve the level of compliance. Regularly conduct independent audits of personal information protection measures and implementation, etc. to effectively prevent potential risks.
  2. Enhance technical security capabilities. Adopt security technical measures such as access control, technical encryption, de-identification, etc. to strengthen front-end and back-end security protection. Proactively monitor the discovery of personal information leakage, theft, tampering, destruction, loss, illegal use and other risk threats, and respond to disposal requirements in a timely manner.
  3. Strengthen the use of software development tools (SDK) management. Before using the SDK to assess their ability to protect personal information, through contracts and other forms of clear agreement on their rights and obligations to ensure that the handling of personal information is in accordance with the law. Centrally display and timely update the names and functions of all embedded SDKs and their rules for handling personal information. Joint processing of user personal information, and infringement of user rights and interests resulting in damage, shall be jointly and severally liable in accordance with the law.

(2) Strengthen platform distribution management

  1. Strictly review App uploads. Accurately register and verify the real identity and contact information of the App developer and operator, the main functions and uses of the App and other basic information, and conduct technical testing of the App to be listed. The relevant audit should be clearly responsible for, and keep audit log records, and do not meet the requirements of the shelves. The full amount of the App on the shelf should be publicized, and the App name, developer and operator, version number, the list of user terminal permissions to be obtained and their uses, and the rules for handling personal information should be prominently displayed. If you have not yet established a clear interface for distribution, you should link App downloads to application stores and guide users to download the distributed App from regular channels.
  2. Strengthen the inspection of the App on the shelf. Strengthen the dynamic inspection of the App to ensure that the public information is true and accurate. For a non-compliant App that is inconsistent with the published information, or uses “hot update, hot cut” and other ways to change the main functions of the App, the permissions applied, the scene and scope of personal information collection and use, should stop providing services.
  3. Improve the distribution management mechanism. Establish credit evaluation and risk alert mechanisms for App developers and operators, encourage electronic signature authentication for App distribution, and realize the traceability of the whole process of application and distribution behavior on the shelves. Strengthen the linkage with the public service platform for mobile Internet application testing and certification, with the regulatory authorities to do a good job of data reporting, monitoring and tracing, information sharing, and response disposal.

(C) standardize the SDK application services

  1. Establish an information disclosure mechanism. Publicly express the SDK name, developer, version number, main functions, instructions for use, and other basic information, as well as personal information handling rules. SDK independent collection, transmission, and storage of personal information should be made separately 6 out of the description. Encourage the role of SDK management services platform to guide App development operators to use compliant SDKs.
  2. Optimize functional configuration. Follow the principle of minimum necessary, according to different application scenarios or uses, to clarify the scope of SDK functions and corresponding personal information collection.
  1. Strengthen service collaboration. During the whole lifecycle of product use, we take the initiative to provide compliance guidelines to App developers and operators in a clear and easy-to-understand manner to guide App developers and operators to use it correctly and reasonably and improve the level of compliance together. When the rules for handling personal information change or risks are discovered, we will update and inform App developers and operators in a timely manner.

(D) Build a firm terminal security defense line

  1. Strengthen App operation management. Provide users with the functions of closing App self-launch and associated launch, as well as the convenient option of resetting the device identification code, strengthening monitoring of App silent download and hot update, and preventing private download and installation without users’ consent.
  2. Strengthen the reminder of App behavior records. Enhance the ability to record permission invocation behavior, and provide convenience for users to inquire about permission invocation. Establish obvious alert mechanisms for the use of permissions such as address book, microphone, camera, location, clipboard, etc. to ensure that users know the collection status of personal information timely and accurately.
  3. Improve App risk warning capability. Promote the development of App electronic signature certification, and provide early warning alerts to users to improve the identification of counterfeit, undesirable, illegal and other risky App.

(E) consolidate the responsibility of access enterprises

  1. Accurate registration information. In the App, SDK provides network access services, registration and verification of the App, SDK development and operation of the real identity, contact information, and other information to improve traceability.
  2. Ensure effective disposal. In accordance with the requirements of telecommunications regulators, take necessary measures to stop access to non-compliant App, and SDK, and effectively stop its violation of user rights.

III. Work requirements
(A) grasp the organization to implement. All units should adhere to the people-centered development thinking, raise the political stance, strengthen responsibility, refine the decomposition of tasks, and carefully grasp the requirements of the organization and implementation to ensure effective results. The relevant enterprises should implement the main responsibility to carry out self-examination and self-correction against the requirements of this notice, and effectively safeguard the legitimate rights and interests of users. At the same time, improve the long-term mechanism, innovative models and methods, and constantly improve the level of mobile Internet application services, so that the majority of users have a greater sense of access, happiness and security.

(B) strengthen supervision and guidance. Ministry of Industry and Information Technology to improve the measurement, notification, ranking, and public mechanism to promote the work in a solid and orderly manner, and timely summary and promotion of excellent cases and experience and practices. The local communications authority to strengthen supervision and inspection, guidance and supervision of local enterprises to implement the requirements of this notice. The implementation is not in place or irregularities, according to the law to take a deadline for rectification, public announcements, organizations off the shelves, suspension of services, administrative penalties and other measures, serious accountability investigation and punishment.

(C) strengthen the technical means. China Academy of Information and Communication Research to organize industrial forces, the comprehensive use of artificial intelligence, big data and other new technologies and new means to upgrade the national testing and certification of mobile Internet applications for the public service platform, continue to improve the platform function, do a good job of technical testing, monitoring services and regulatory support. Actively promote the application of electronic signature authentication and other traceable technical means to promote improved service management capabilities.

(D) promote industry self-regulation. Encourage industry associations and related institutions to develop industry self-regulatory conventions, and technical standards, and strengthen the assessment of certification and talent training. Further open channels to listen to the views of the public promote the exchange and interaction of all parties, guide enterprises to operate in accordance with the law, and constantly optimize and improve services, create a good environment for excellence and mutual promotion, and promote high-quality development with high-quality services

The post MIIT: The app should be easy to uninstall, and shall not maliciously obstruct appeared first on TechGoing.

]]>
MIIT: Blockchain international standardization work has won new breakthrough https://www.techgoing.com/miit-blockchain-international-standardization-work-has-won-new-breakthrough/ Thu, 10 Nov 2022 14:16:25 +0000 https://www.techgoing.com/?p=44555 According to the Ministry of Industry and Information Technology website, from November 2 to 8, the International Organization for Standardization Blockchain and Distributed Ledger Technology Committee (ISO / TC 307) held its 11th plenary session online. At the meeting, the Chinese delegation promoted the establishment of a research group on distributed bookkeeping technology and carbon […]

The post MIIT: Blockchain international standardization work has won new breakthrough appeared first on TechGoing.

]]>
According to the Ministry of Industry and Information Technology website, from November 2 to 8, the International Organization for Standardization Blockchain and Distributed Ledger Technology Committee (ISO / TC 307) held its 11th plenary session online. At the meeting, the Chinese delegation promoted the establishment of a research group on distributed bookkeeping technology and carbon markets and successfully established a research project on blockchain testing standards.

So far, ISO / TC 307 has 6 working groups and 3 research groups on foundation, smart contracts, and governance, and has issued 2 international standards on terminology and reference architecture, 2 technical specifications on classification and ontology and governance, and 4 technical reports on privacy and identity management.

The Research Group on Distributed Ledger Technology and Carbon Market was established to promote the technical research and application of the “Blockchain + Carbon Market” in various countries. The blockchain testing standards research project aims to carry out research on the scope of blockchain testing, testing methods, technical requirements and other aspects, which has important reference value for the construction and application of blockchain systems.

The Ministry of Industry said that the next step, the Information Technology Development Department will continue to guide the National Blockchain and Distributed Ledger Technology Standardization Technical Committee (TC590), do a good job of ISO / TC 307 domestic technical focal point work, strengthen international exchange and cooperation, improve the level of standardization and openness to the outside world, promote the development of domestic and international standardization synergy, to promote global blockchain technology applications and industrial To contribute to the development of global blockchain technology application and industry in China.

The post MIIT: Blockchain international standardization work has won new breakthrough appeared first on TechGoing.

]]>
MIIT issued a network product security vulnerability collection platform https://www.techgoing.com/miit-issued-a-network-product-security-vulnerability-collection-platform/ Sun, 30 Oct 2022 06:14:44 +0000 https://www.techgoing.com/?p=41196 According to the Ministry of Industry website, the Ministry of Industry has now issued a notice on the issuance of a “network product security vulnerability collection platform for the record management” (hereinafter referred to as “Measures”). The “Measures” clearly, the so-called network product security vulnerability collection platform (hereinafter referred to as the vulnerability collection platform), […]

The post MIIT issued a network product security vulnerability collection platform appeared first on TechGoing.

]]>
According to the Ministry of Industry website, the Ministry of Industry has now issued a notice on the issuance of a “network product security vulnerability collection platform for the record management” (hereinafter referred to as “Measures”).

The “Measures” clearly, the so-called network product security vulnerability collection platform (hereinafter referred to as the vulnerability collection platform), refers to the relevant organizations or individuals set up to collect non-self network product security vulnerabilities of the public Internet platform, except for the sole purpose of repairing their own network products, networks and system security vulnerabilities.

The Measures” points out that the vulnerability collection platform for the record through the Ministry of Industry and Information Technology network security threats and vulnerabilities information sharing platform, using online filing. The organization or individual who intends to set up a vulnerability collection platform should fill in the record registration information of the network product security vulnerability collection platform through the Ministry of Industry and Information Technology’s network security threat and vulnerability information sharing platform faithfully.

In addition, the vulnerability collection platform should be completed before going online for the record, and the vulnerability collection platform that is already running online should be filed within 10 working days from the date of implementation of the “Measures”. The Measures shall come into force on January 1, 2023.

The post MIIT issued a network product security vulnerability collection platform appeared first on TechGoing.

]]>
Will Regular SIM cards be completely replaced with e-SIM? https://www.techgoing.com/will-regular-sim-cards-be-completely-replaced-with-e-sim/ Tue, 11 Oct 2022 05:37:20 +0000 https://www.techgoing.com/?p=36036 “Relevant units are being organized to study and promote the application of eSIM technology on tablet computers, portable computers and smartphone devices, and to expand the application of eSIM technology when conditions are ripe.” Recently, the Ministry of Industry and Information Technology (MIIT) talked about eSIM in its reply to a question from netizens, which […]

The post Will Regular SIM cards be completely replaced with e-SIM? appeared first on TechGoing.

]]>
“Relevant units are being organized to study and promote the application of eSIM technology on tablet computers, portable computers and smartphone devices, and to expand the application of eSIM technology when conditions are ripe.” Recently, the Ministry of Industry and Information Technology (MIIT) talked about eSIM in its reply to a question from netizens, which sparked concern. What exactly is this eSIM, which does not require a slot to be opened and inserted in the phone, but is directly integrated inside the phone? What are the advantages? Will it completely replace SIM cards in the future?

What benefits does eSIM bring?

eSIM is actually an electronic SIM card, a data file that can be downloaded to mobile terminals through the network. With it, various electronic terminals can connect to the internet, receive calls, send text messages, etc., and are functionally the same as a regular SIM card.

Screenshot from the website of the Ministry of Industry and Information Technology

The highly integrated eSIM solution can, first of all, solve the problem of the SIM card slot taking up a lot of space on the phone. Although the Nano SIM card is now very small, the space saved by the card slot can lead to more innovation for the already thin and light mobile phones, where space is at a premium.

The history of the SIM card has been one of constant evolution to “smaller”, from SIM cards to mini SIM cards, to Micro SIM cards, and finally to the now familiar Nano SIM cards, each time with a reduction in size.

A white paper published by China Unicom in 2019 shows that the eSIM solution, integrated into the hardware, takes up 1/3 of the space of a Nano SIM and will evolve to a smaller size.

In addition, the SIM card slot affects the waterproof performance of the phone. The eSIM is integrated inside the phone and does not require a slot in the body, which can improve the waterproof rating of the phone.

The eSIM is easy to replace, with an online application, eliminating the need to go to a physical offline sales office and the hassle of mailing the SIM card. This method has been described by some analysts as “over-the-air card writing”.

In addition, eSIM makes it easy to use dual SIMs. For example, according to an early introduction on Apple’s website, users can install eight or more eSIMs on one iPhone and use two phone numbers at the same time, or even use separate numbers for voice and data.

A research report by a securities company points out that eSIM has the characteristics of low power consumption, high energy-efficiency ratio networking capability, stable operation, strong anti-interference capability, and low cost in IoT applications, and it is expected that eSIM will still be further enhanced in IoT industry applications.

Will eSIM completely replace SIM cards?

Many people may have questions, with so many benefits, will eSIM replace the traditional SIM card? Why is it that after so many years of development, although eSIM is widely used in various IoT devices, it is still slow to take over the mobile phone market?

“The core challenge at the mobile phone end of eSIM is operator interoperability. eSIM can be remotely configured through ‘over-the-air card writing’, allowing for batch opening, flexible change of sign-up and change of operator. However, for operators, the threshold for user switching is lowered and control over users is reduced.” A recent research report issued by Huaxi Securities pointed out.

However, previously, the approval issued by the Ministry of Industry and Information Technology on the three major operators to carry out eSIM technology application services in the Internet of Things and other fields mentioned that effective measures should be taken to ensure the management right of the eSIM platform and the writing right of the eSIM terminal, and other enterprises should not be authorized in any form to open relevant rights and functions.

The reporter notes that some operators are currently pushing super SIM cards, a solution that can integrate security, payment and other functions together to provide a one-card solution. For example, it can act as a school meal card, traffic card, access card, car key, bank U shield, electronic signature, etc.

Fu Liang, an independent telecom analyst, told CNA that eSIM will not completely replace the physical SIM card in a short time, and the super SIM card will not completely replace the traditional SIM card.

There are also views that eSIM is feared to have a huge impact on the mobile phone market. the US version of the iPhone 14 series to be released in 2022 will no longer have a reserved SIM slot and will be replaced by eSIM, which is the first time the iPhone has completely removed the physical card slot from some models. However, Fu Liang believes that Apple will not force iPhones without physical card slots in the Chinese market, after all, the standard is not something that a particular handset manufacturer can decide.

A recent research report released by Huaxi Securities points out that eSIM is developing rapidly in the field of the Internet of Things, but the mobile phone side still needs the cooperation of multiple parties. In particular, as a stock consumer market, eSIM policy promotion on the mobile phone side still requires policy and industry synergy compared to IoT applications.

According to Counterpoint Research, the annual shipments of eSIM devices will reach 6 billion by 2025. Among them, 45% of the eSIM devices will be shipped on the mobile phone side.

The post Will Regular SIM cards be completely replaced with e-SIM? appeared first on TechGoing.

]]>
MIIT study to promote eSIM phones, physical card to become history? https://www.techgoing.com/miit-study-to-promote-esim-phones-physical-card-to-become-history/ Tue, 27 Sep 2022 04:05:22 +0000 https://www.techgoing.com/?p=30674 With the development of smartphones, the precision of components is getting higher and higher, and the space inside the body is inching up. Since its birth, the SIM card has also been slimmed down – from the area of a bank card to the size of a fingernail cover and continues to do so for […]

The post MIIT study to promote eSIM phones, physical card to become history? appeared first on TechGoing.

]]>
With the development of smartphones, the precision of components is getting higher and higher, and the space inside the body is inching up. Since its birth, the SIM card has also been slimmed down – from the area of a bank card to the size of a fingernail cover and continues to do so for many years.

However, with the release of the iPhone 14 series, the stable physical SIM card may become a “thing of the past” like the TF card. -This is also the first time Apple released an iPhone that only supports eSIM.

At present, mainstream smartphone manufacturers represented by Huawei, OPPO and Xiaomi are vigorously promoting the eSIM function on various smart wearable devices, especially smart watches, in the domestic market, while there has been no substantial progress in the huge volume of cell phone terminals. A senior brokerage analyst, who did not want to be named, told the Daily Economic News online that eSIM (not yet popular in China) is not for technical reasons, but for other factors because it is easy for users to switch networks after adopting eSIM.

However, the good news is that the Ministry of Industry and Information Technology recently said in a reply to a question from netizens that it is studying to promote the application of eSIM technology on tablet computers, portable computers and smartphone devices. When conditions are ripe, the scope of application of the technology will be expanded.

“In terms of policy, when the time is ripe, the country will definitely liberalize the application of eSIM cards in cell phones in the future. And the whole cell phone industry chain will also respond positively to promote the application of eSIM card on the ground.” Guo Tianxiang, the senior analyst of IDC China, recently told reporters online.

eSIM technology is more convenient

In the 1990s, Germany’s Jetter developed the world’s first SIM card, which stored information such as authentication and encryption, and algorithms. Over the next 30 years, the size of SIM cards has continued to shrink, from the original bank card-sized “standard SIM” in 1991 to the “Nano SIM” in 2011.

With the increasing integration of cell phones, especially for wearable smart devices (smartwatches, sports bracelets, smart glasses), even the size of Nano SIM is still too large. eSIM was officially born in 2016 when the GSM Association released the eSIM specification for smartphones.

The full name of eSIM is Embedded-SIM, which means embedded SIM card. Unlike the traditional plug-in SIM card, eSIM is directly embedded into the device chip. Although invisible and inaccessible, eSIM loads user information such as card numbers directly into the interior of the cell phone, which can activate traditional services such as calling and texting, and can also quickly connect terminal devices to local networks globally.

In fact, compared to traditional SIM cards, eSIM cards excel in several attributes, including configuration, size, flexibility, security, and customer experience.

Removable traditional SIM cards are often prone to wear and tear in use, such as changing and cutting cards, resulting in a short life span and taking up physical space on the device. In contrast, the volume of eSIM is only 10% of that of traditional SIM cards, and it is more resistant to vibration, high temperature and reliability, and more adaptable to harsh working environments.

From the process point of view, an eSIM card saves users from the opening procedure of going to the business office and can be freely activated over the air. At the same time, three years after the implementation of the portable number transfer policy, devices using eSIM cards can change operators remotely without changing cards, which is one more choice for users and will prompt competition among operators.

The reporter noticed that many overseas users have already shared tutorials on how to open an eSIM card on social media platforms. If you want to transfer the number on the old phone with a physical card to the new phone, you only need to place the two phones close to each other and click the cellular network in the new phone to add an eSIM card, transfer from the nearby iPhone and wait for a while, the signal will be transferred from the old phone to the new phone, and the original SIM card will be invalid.

There is no need to pull out the card, it takes about two minutes, and there is no need to go to the business office. And the eSIM service provided by iPhone 14 can support up to 8 carriers (only two numbers can be on standby at the same time).

In addition, the traditional SIM card has problems such as the card slot affecting water resistance and the reliability of contact connection between SIM card and terminal is poor. While eSIM is integrated inside the phone and does not require a slot in the body, which can improve the waterproof level of the phone.

The core challenge is carrier interoperability

In fact, eSIM is not a new technology. 4 years ago, Apple started to support eSIM technology in iPhone XR, and outside of Apple, Google also supports eSIM, and has included the Pixel 2 with eSIM as part of “Project Fi”.

Then after several years of development, why eSIM is still not popularly used in China? The difficulty of promotion does not lie in cell phone terminal manufacturers, but in operators.

The aforementioned senior brokerage analyst said: “At present, Asia generally has dual cards, i.e. one SIM and one eSIM, and the domestic eSIM is not popularized not because of technical reasons but because of operators’ willingness. Apple pushes eSIM in the hope that users can buy local packages to any country and region and switch directly so that operators’ roaming charges are reduced.”

In a recently released research report, Huaxi Securities also said that the core challenge at the cell phone end of eSIM is operator interoperability. “eSIM realizes remote configuration through ‘over-the-air card writing’, which allows batch opening, flexible change of contract and change of operators. However, for operators, the threshold of user switching is lowered and the control over users is reduced. Especially at present, as a partial stock consumer market, eSIM policy promotion on the cell phone side still needs policy and industry multi-party collaboration compared to IoT application.”

eSIM technology enables users to switch between different operators’ networks and no longer be bound to a particular operator, which brings convenience and more choices to users but also brings many challenges to operators.

For operators, the increase of user autonomy means their own passivity. Operators used to realize precise “control” of users through SIM cards, but now eSIM can realize remote configuration through “over-the-air card writing”, and can open in batch, change contracts and change operators flexibly. Now, eSIM can be remotely configured through “over-the-air card writing”, and it can be opened in batch, change the contract and change operators flexibly.

At the same time, the business process change brought by the card change also increases the staff training cost and time, the business hall traffic will continue to be lost, and the incidental in-store business when users do card will also disappear.

“The mode of plugging and unplugging SIM card is already very mature, and operators need to develop a series of new processes if they want to eSIM on the cell phone side, including security, account opening process, portable number transfer, etc.. The operator invests a lot of energy, but the benefit itself is not obvious. In addition, there is no trend of miniaturization of cell phone now, and the volume impact of SIM card is getting smaller and smaller under the large screen cell phone, which does not bring particularly obvious benefits to the user level.” Independent telecom analyst Fu Liang said in a recent interview with reporters online.

In addition, there are also views that the process of eSIM writing profiles over the air through OTA is not in a fully controllable state like handling cell phone cards in business halls, and the profiles are distributed through the public network, which can easily bring hidden risks of information security. If the card profile is held hostage and tampered with during the transmission process, the wrongdoers can easily get the cell phone SIM card of others.

In this regard, Guo Tianxiang said, “In addition to the difficulty of supervision for telecommunication fraud and the increased difficulty of real-name system supervision, there will also be the risk of data leakage during the process of data transmission and collection using eSIM card, and the supervision will still be cautious until the technology is independently controllable.”

He also pointed out, “When replacing cell phones, the entity card only needs to change the card to the new phone to use, while the eSIM card may need to wait for the operator to reactivate the number card, which is more troublesome, especially in emergency situations. Upstream traditional SIM card manufacturers will also form resistance when iterating the industry chain.”

In contrast, operators prefer to upgrade their SIM cards and continuously integrate functions to retain customers. 2020 saw the launch of “super SIM cards” by three major operators, which integrate SIM card and storage functions and have a capacity of up to 100G.

On NFC-enabled cell phones, the super SIM card can also be used as a public transportation card. In Wuhan, Hubei, the mobile operator announced that it will integrate functions such as digital RMB wallets and electronic ID cards in the future, and apply them to various scenarios such as medical services, travel, accommodation, etc.

The development of eSIM is late, but not absent. Recently, a netizen left a message on the official website of the Ministry of Industry and Information Technology (MIIT) asking whether there is a plan to promote eSIM cell phone cards in China, as the use of eSIM cards has recently caused more discussion.

In response, the Ministry of Industry and Information Technology responded: “The Ministry attaches great importance to protecting the legitimate rights and interests of consumers and insists on actively promoting the application and promotion of new technologies and equipment on the basis of ensuring the legitimate rights and interests of users and information security. At present, the Ministry is organizing relevant units to study and promote the application of eSIM technology on tablet computers, portable computers and smartphone devices, and expand the application of eSIM technology when the conditions are mature.”

Once eSIM technology is liberalized in China, what impact is expected to be brought to operators? Are they worried about the decrease in stickiness with users? In this regard, the reporter recently contacted the three major operators to understand the situation, but no response has been received as of press time.

Will reshape the role of operators in the industry chain

From the policy point of view, as early as 2018, the three major operators started the pilot and layout of the eSIM business, and in October 2020, all three operators have been approved to provide eSIM technology application services in the field of the Internet of Things. Among them, China Unicom was the first operator to make efforts in the field of consumer electronics, and its first batch of open eSIM functions cooperated with Apple Apple Watch3.

In fact, Unicom has been carrying out an eSIM wearable independent number and No. 1 dual business pilot in seven cities in six provinces since March 2018 and has opened an eSIM wearable independent number business nationwide since March 29, 2019.

While Xiaomi, Huawei and other watches already support the eSIM function, Unicom also started to implement the “eSIM One Dual Terminal” service, which means users can add an eSIM subsidiary terminal card under the account and package of the main cell phone number, sharing one cell phone number and package. In other words, when the main number calls, both terminals will vibrate at the same time, and any terminal can make calls, breaking the constraint of a cell phone as the only mobile communication carrier.

At the same time, using the eSIM solution, each mobile terminal can independently use a mobile network to access the Internet. Smartwatches, bracelets and other devices will no longer become “bricks” without WiFi. Research firm Counterpoint said in its eSIM device market outlook report that eSIM hardware device shipments will exceed 350 million units in 2021, driven by smartphones, IoT and other areas. And there will be cumulative shipments of more than 14 billion eSIM devices from 2021-2030.

According to Fu Liang, “Smart devices equipped with eSIM cards can obtain more stable and secure communication services than WiFi, and also allow the devices themselves to have independent networking capability and more functions.”

eSIM has the characteristics of low power consumption, high energy-efficiency ratio networking ability, stable operation, strong anti-interference ability and low cost in IoT applications, which makes IoT eSIM is being widely used in various fields such as wearable devices, vehicle networking, industrial internet and smart city.

However, even though domestic mainstream telecom operators are now actively promoting and laying out eSIM to strengthen their service capability in this field, they are all focusing on IoT terminals, and there is always no substantial progress in the cell phone terminals with huge volumes.

However, judging from Apple’s ability to define product standards in the industry very simply, eSIM technology may usher in an inflection point of development under the leadership of the iPhone 14 series.

At the same time, eSIM will also reshape the roles of ICs, OEMs and operators in the industry chain. In fact, compared with traditional SIM cards, the core of eSIM is the introduction of a remote SIM configuration (RSP) platform. In the past, operators controlled the customization and issuance of SIM cards, but now some terminal customers can simplify the process of interfacing with operators and even find chip manufacturers directly.

At present, China’s layout SIM card chip manufacturers mainly include Ziguang Guomei (SZ002049, share price 146.52 yuan, market value 124.48 billion yuan), Datang Microelectronics and CEC Huada Electronics, etc. Among them, Ziguang Guomei occupies up to 60%-70% share in the domestic SIM card chip market, “Super eSIM ” supports all GSMA standards from 3G to 5G, as well as the highest international security level CC EAL6+ certification and State Secrets Level 2 certification, and its subsidiary Ziguang Tongxin has won the eSIM wafer procurement large order for many times, while Datang Microelectronics has the ability from chip design, COS development and terminal product design, and had successfully developed China’s first GSM cell phone dedicated SIM card.

From the upstream, midstream and downstream of the industry chain, the upstream is mainly CA certification authority, eSIM chip maker and terminal chip maker, the midstream includes eSIM platform supplier, telecom operator, eSIM terminal and module maker, and the downstream is mainly enterprise users and consumers.

In addition, the reporter noticed that many listed companies laying out eSIM in A-share have disclosed their progress in eSIM one after another recently. Among them, Chengtianweiye (SZ300689) said that the company has eSIM production capacity and can provide eSIM core data processing, data writing and personalized processing services to customers; Tianyu Information (SZ300205) said that the company is providing eSIM products and related services to telecom operators, IOT industry and other customers; Hengbao (SZ002104) (S002104) said that the company has achieved batch supply of eSIM cards.

Looking ahead, Huaxi Securities believes that with the cooperation of the industry chain and relevant policy bodies taking the lead in research, eSIM terminal application is expected to be promoted continuously, and the breakthrough from IoT devices to tablet PCs, portable computers and smartphone devices is expected to be completed in the future.

The post MIIT study to promote eSIM phones, physical card to become history? appeared first on TechGoing.

]]>