SIM-C

SEAL Identity Management Client

Security
Introduced in Rel-16
A functional component within a device that acts as the client in the SEAL identity management framework. It interacts with the SIM-S server to provision, manage, and authenticate identities for secure edge applications. It enables devices to obtain and use verifiable credentials in distributed edge computing scenarios.

Description

The SEAL Identity Management Client (SIM-C) is a defined functional entity within the 3GPP SEAL (Service Enabler Architecture Layer) framework, specifically for the Identity Management Enabler. It resides within the User Equipment (UE) or an edge application client. The SIM-C is responsible for initiating and participating in protocols to manage decentralized identities and verifiable credentials as specified by the SEAL architecture. It works in conjunction with the SEAL Identity Management Server (SIM-S) to fulfill identity-related operations.

Architecturally, the SIM-C implements the client-side logic of the SEAL Identity Management protocols. Its key functions include generating or receiving Decentralized Identifiers (DIDs), formulating requests for verifiable credentials, and securely storing received credentials. It interacts with the SIM-S, which often acts as an intermediary or a holder of trust anchors (like a DID resolver or a verifiable data registry). The communication between SIM-C and SIM-S typically uses RESTful APIs over secure transport layers (e.g., TLS), as defined in the relevant 3GPP specifications. The SIM-C may also interface with local secure elements (like a USIM or a hardware security module) to safeguard private keys associated with its DIDs.

How it works involves several key processes. First, for identity provisioning, the SIM-C can request the issuance of a verifiable credential from an issuer, potentially via the SIM-S. This could involve presenting proofs of existing attributes. Second, for authentication or access to a SEAL service, the SIM-C may be challenged to present a verifiable credential. It retrieves the appropriate credential from its secure storage, potentially creates a verifiable presentation (which might involve generating a cryptographic proof), and sends this to the verifier (which could be the SIM-S or another SEAL component). The SIM-C handles the cryptographic operations required for creating and verifying these presentations, leveraging keys bound to its DID. Its role is crucial in enabling a user or device to prove certain attributes (e.g., subscription status, role, age) to edge applications in a privacy-preserving and decentralized manner, without always needing direct interaction with the mobile core network for authentication.

Purpose & Motivation

SIM-C was created to address the identity and access management challenges inherent in distributed edge computing and service enabler architectures like SEAL. Traditional mobile network authentication (e.g., via USIM/AKA) is centralized around the core network and is primarily for network access. However, edge applications and third-party services require more flexible, application-layer identity mechanisms that can attest to specific user/device attributes without always traversing the core.

The problem it solves is providing a standardized, secure client-side component that can participate in modern, decentralized identity paradigms (like those based on W3C Verifiable Credentials and DIDs) within the telecom ecosystem. Prior approaches either relied on bespoke, non-interoperable application-level authentication or funneled all identity checks back to the home operator's core, which is inefficient for low-latency edge services. SIM-C, as part of the SEAL framework, allows devices to obtain and use verifiable credentials that can be independently verified by edge nodes, enabling trusted interactions in multi-domain, multi-vendor edge environments.

Its creation was motivated by the need to bridge telecom-grade security with the flexibility of web-based identity models. It allows service providers at the edge to leverage trust derived from the mobile subscription (e.g., a credential issued by the operator) while enabling user-centric and privacy-enhancing features like selective disclosure. This facilitates new business models for edge services, secure IoT device onboarding, and seamless cross-service authentication in 5G and beyond networks.

Key Features

  • Client-side implementation of SEAL Identity Management protocols for decentralized identity
  • Management of Decentralized Identifiers (DIDs) and associated cryptographic key material
  • Secure storage and handling of Verifiable Credentials received from issuers
  • Ability to create Verifiable Presentations for proving claims to relying parties/verifiers
  • Interfaces with the SEAL Identity Management Server (SIM-S) using standardized APIs
  • Can leverage underlying device security (e.g., binding to UICC/USIM) for key protection

Evolution Across Releases

Rel-16 Initial

Introduced as a new functional component within the SEAL (Service Enabler Architecture Layer) framework for 5G. The SIM-C was defined as the client entity for the Identity Management Enabler, specifying its role in managing decentralized identities and verifiable credentials to support secure service access at the edge. Initial architecture and protocols for interaction with the SIM-S server were established.

Defining Specifications

SpecificationTitle
TS 24.547 3GPP TS 24.547
TS 33.434 3GPP TR 33.434