Mobile Networks
The scalable and customizable solution for subscriber authentication and key agreement in mobile networks*

Mobile Network TrustServer

Available as: Hardware on-premise

Mobile Network TrustServer - The solution for mobile subscriber authentication and key agreement in mobile networks

Delivery time about 2-4 weeks
Cryptoserver
  • Compliant with the latest 3GPP security requirements to ensure a secure operational environment
  • Safeguard against physical attacks through tamper protection and response mechanisms
  • For subscriber identity de-concealing, authentication and key agreement (AKA) in mobile networks
  • Easy integration through dedicated interface for AKA use case
Key Benefits

Key Benefits

Icon

Unique product combination

Mobile Network TrustServer provides the ideal product combination of a certified secure environment and comprehensive integration interfaces.

Icon

Developed for network element provider

Specially designed to meet the needs of network element provider for subscriber identity de-concealing and authentication and key agreement in mobile networks.

Icon

Unprecedented Speed

Process subscriber data and generate keys within a secure and tamper-protected environment at unprecedented speed.

Details

Details

Utimaco’s HSM solution specially designed to meet the needs of network element providers in mobile networks.

As a network solution vendor your solutions must comply with 3GPP security requirements as defined in Technical Specification 33.501. Therefore, your security architecture as well as related procedures for network elements must foresee a secure environment that protects long-term keys K and Home Network Private keys from physical attacks. Functions which process sensitive subscriber data, i.e., subscriber identity de-concealing as well as authentication and key agreement, must also be executed in this secure environment.

Mobile Network TrustServer is an ideal solution to meet these requirements as it provides the unique combination of a certified secure environment and an integration API dedicated to subscriber identity de-concealing, authentication and key agreement.

Mobile Network TrustServer is suitable for decryption of concealed subscriber identities in 5G mobile networks, and for key generation according to Authentication and Key Agreement (AKA) protocols in 2G, 3G, 4G and 5G mobile networks.

New high performance model

To provide you with the solution that exactly fits the processing requirements of networks with multi-million subscribers, Mobile Network TrustServer is now also available on our high-performing u.trust Anchor HSM platform.

Mobile Network TrustServer ensures an easy implementation into an existing environment and effectively handles tasks related to subscriber identity de-concealing, authentication and key agreement efficiently; even without in-depth crypto knowledge.

Mobile network Trustserver Chart


 

LAN-Box

 

Features

Unique product combination

  • Provides a unique combination of a certified secure environment and integration API dedicated to subscriber identity de-concealing, authentication and key agreement

Developed for network element provider

  • Specially designed to meet the needs for subscriber identity de-concealing and authentication and key agreement in mobile net-works
  • Process subscriber data and key generation within a secure and tamper-protected environment

Unprecedented Speed and High Availability

  • Processes subscriber data and generates authentication vectors at unprecedented speed
  • High availability when running authentication and agreement protocols in a redundant system setup

Scalability and Customizability

  • Easy extension to support future versions of SIDF Profiles and AKA protocols, including future quantum-safe algorithms
  • Customizable to specific requirements of Mobile Network Operators
  • Ensures the best fit for existing and future requirements, guaranteeing long-term investment security

For each network size

  • Available in three performance options
  • From the entry level model for mobile networks with low numbers of subscribers and limited dynamics to a high-performance option for large networks with millions of subscribers

Technical Specifications

Compliant with latest requirements

  • Secure environment that protects against physical attacks as required in 3GPP Technical Specification 33.501 “Security architecture and procedures for 5G System”
  • FIPS 140-2, PCI HSM and Common Criteria proven Hardware Security Module and cryptographic algorithms

Subscriber identity de-concealing function (SIDF)

  • Decrypts the Subscriber Concealed Identifier (SUCI) with Subscriber Identity De-concealing Function (SIDF) in the home network
  • Secures storage and usage of the Home Network Private Key to ensure privacy of the permanent identifier SUPI.
  • Deconceals the SUCI inside the tamper protected HSM according to Profile A and Profile B.

Key Generation according to AKA protocols

  • Support of all relevant 2G, 3G, 4G and 5G Subscriber Authentication and Key Agreement (AKA) protocols
  • Derives the key material from the subscriber’s unique key K inside the tamper protected HSM.

Comprehensive API

  • MNAUTH API, the C-style application programming interface (API) dedicated for Mobile Network security use cases. Available for C and Java.
  • Easy Integration into mobile network functions by using MNAUTH API

 

On-premise

Our on-premise options allow hosting the product directly on-site in your own network or data center.

  • LAN Appliance

Related to this product

Add-ons

u.trust 360

The centralized management and remote monitoring solution for Atalla AT1000, CryptoServer LAN V5 and u.trust Anchor HSMs.

Find more details

 

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more. 

      Downloads

       

      0