Feeds

Motorola provides SIM condom for child protection

Sticky-backed censorship

High performance access to file storage

Motorola will be providing wraparound covers for SIMs, enabling parents to control who their children speak to and when at the click of a mouse.

Services managing kids' communications generally rely on a compliant network operator and/or a customised handset, but Motorola reckons it has the technology to apply parental controls to any handset on any network by intercepting communication with the SIM.

Norwegian startup Bipper will provide the service. The company shamelessly flaunts the "think of the children" approach, complete with an insipid backstory about the founder's kids, but completely lacking in technical details.

iSIM in action

The iSIM wraps around the existing SIM, intercepting communications for the protection of ankle biters

Intercepting SIM communications isn't new - circuits of a similar nature have been used for years by hackers and those who just want to squeeze two SIMs into a single handset or play similar games. The concept gained popularity with the launch of the iPhone: a SIM-intercept chip can catch network name requests and assure the iPhone it's on the AT&T network, but these days software unlocks are more popular.

Another SIM-intercept device

Bladox makes all kind of interesting SIM-intercept devices

Motorola's iSIM (intelligent SIM) is an attempt to take the process mainstream, with the promise of adding SIM functionality without having to work with network operators who control SIMs completely.

Bipper is the first application to do this. Just wrap an iSIM around the SIM card and once the service is live you'll get a web interface through which you can set the permitted numbers and times your child will be allowed to call. That configuration is sent to the mobile and intercepted by the iSIM, which blocks calls to other numbers by refusing to authenticate the SIM to the phone.

Enterprising children might try ripping off the protective prophylactic, so it's probably best not to tell them it's installed. To be fair, the Bipper service is aimed at children in the six to 10 range - a demographic not known for its in-depth understanding of GSM SIM authentication procedures.

We're not sure how the handset will react to the iSIM's interference - in our experience it throws up some sort of device-dependent error message. Motorola hasn't yet responded to a request for more information, but it will certainly depend on the handset model and make.

Obviously a service like this would be better placed with the network operator, but that would open the operator to accusations of putting children at risk of deadly cellphone radiation (reality be damned). In the US Disney offered something similar, but the mouse's MVNO* failed and the idea hasn't spread widely.

As a technology the iSIM has potential far beyond controlling the behaviour of children. Network operators have been astoundingly reluctant to do anything interesting with their SIMs, but with Motorola's iSIM third parties can have a shot and hopefully we'll see something more interesting than an unlocked iPhones or a kid who can't make calls in class. ®

*Mobile Virtual Network Operator - all the fun of running a network without the effort required to build one.

SANS - Survey on application security programs

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.