Machine-to-Machine Communication -- Applications (This site is under construction)

Cellular networks have the advantage of longer range and mobility support, which are lacking in other M2M standards. Optimizing support for Machine-to-Machine (M2M) communications in CDMA and GSM networks will allow operators to penetrate and establish a strong position in this emerging and potentially large market. Enhancements to current cdma2000 1x and HRPD air-interface protocols for optimized M2M support will allow operators to leverage existing network deployments in the near term. This market spans a wide range of applications such as telematics, vendind,POS applications, automation manufacturing and control, telemedicine, etc.
Subscription Management The system should be able to support the following subscription management capabilities: • Subscription management for a large number of terminals • Activation of terminals to a service provider without human intervention, in todays cellular network, activation is cumbersome process that involves in-store or by phone contact followed by over-the-air (OTA) activation. • Ability for remote subscription change for a large number of devices in the field. For example, a chain of photo-copier stores (the photo-copiers have embedded cellular connectivity) wishes to change their service provider. It should not be required that the device(s) be brought back to the service provider outlet. • Dynamic provisioning should be supported for M2M devices.
Security Management The credentials of these M2M devices should be managed securely, including the following: • Appropriate security mechanisms may include a combination of physical and network based methods • The device should not be required to be placed in a physically secure location or even physically locked.
Network-based challenge response mechanisms need to be exploited. This may pose a significant challenge when coupled with other desirable features.
Charging and Accounting - Management Generation of charge records should be possible for a wide variety of applications that include bulk message transfers, high bit rate video monitoring from a few locations, communications from a very large number of very small payload sessions etc.

Friday, May 22, 2009