The SIM, which is an integral part and behind the success of GSM, is also supporting the UTMS/3G network in the form of USIM. This new form carries out the functions of the SIM, enabling the new range of data services in 3G network. The term USIM refers to a software application and not to the smart card device itself, which is actually known as the UICC.
Regarding security, the USIM is in charge of authenticating user to the network and also allows the authentication of the network by the user. USIM uses latest cryptographic technology for the authentication purpose which results in the protection of the users and networks against the mobile phone security attacks stronger than ever.
USIM maintains a phonebook database which can store thousands of entries and each contact can contain email addresses, a second or third phone numbers etc. The contacts are stored much more securely on USIM compared to those stored in phone memory.
Regarding security, the USIM is in charge of authenticating user to the network and also allows the authentication of the network by the user. USIM uses latest cryptographic technology for the authentication purpose which results in the protection of the users and networks against the mobile phone security attacks stronger than ever.
USIM maintains a phonebook database which can store thousands of entries and each contact can contain email addresses, a second or third phone numbers etc. The contacts are stored much more securely on USIM compared to those stored in phone memory.