ebook img

TS 131 102 - V3.11.0 - Universal Mobile Telecommunications System (UMTS); Characteristics of the USIM Application (3GPP TS 31.102 version 3.11.0 Release 1999) PDF

129 Pages·0.75 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview TS 131 102 - V3.11.0 - Universal Mobile Telecommunications System (UMTS); Characteristics of the USIM Application (3GPP TS 31.102 version 3.11.0 Release 1999)

ETSI TS 131 102 V3.11.0 (2002-12) Technical Specification Universal Mobile Telecommunications System (UMTS); Characteristics of the USIM Application (3GPP TS 31.102 version 3.11.0 Release 1999) 3GPP TS 31.102 version 3.11.0 Release 1999 1 ETSI TS 131 102 V3.11.0 (2002-12) Reference RTS/TSGT-0331102v3b0 Keywords UMTS ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, send your comment to: [email protected] Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. © European Telecommunications Standards Institute 2002. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTM and the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI 3GPP TS 31.102 version 3.11.0 Release 1999 2 ETSI TS 131 102 V3.11.0 (2002-12) Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http://webapp.etsi.org/IPR/home.asp). All published ETSI deliverables shall include information which directs the reader to the above source of information. Foreword This Technical Specification (TS) has been produced by ETSI 3rd Generation Partnership Project (3GPP). The present document may refer to technical specifications or reports using their 3GPP identities, UMTS identities or GSM identities. These should be interpreted as being references to the corresponding ETSI deliverables. The cross reference between GSM, UMTS, 3GPP and ETSI identities can be found under http://webapp.etsi.org/key/queryform.asp . ETSI 3GPP TS 31.102 version 3.11.0 Release 1999 3 ETSI TS 131 102 V3.11.0 (2002-12) Contents Intellectual Property Rights................................................................................................................................2 Foreword.............................................................................................................................................................2 Foreword.............................................................................................................................................................8 Introduction........................................................................................................................................................8 1 Scope........................................................................................................................................................9 2 References................................................................................................................................................9 3 Definitions, symbols, abbreviations and coding conventions................................................................10 3.1 Definitions........................................................................................................................................................10 3.2 Symbols............................................................................................................................................................11 3.3 Abbreviations...................................................................................................................................................11 3.4 Coding Conventions.........................................................................................................................................12 4 Contents of the Files...............................................................................................................................12 4.1 Contents of the EFs at the MF level.................................................................................................................13 4.1.1 EF ...........................................................................................................................................................13 DIR 4.1.2 EF (ICC Identity).................................................................................................................................13 ICCID 4.1.3 EF (Preferred Languages)........................................................................................................................13 PL 4.1.4 EF (Access Rule Reference)..................................................................................................................14 ARR 4.2 Contents of files at the USIM ADF (Application DF) level.............................................................................14 4.2.1 EF (Language Indication).........................................................................................................................14 LI 4.2.2 EF (IMSI)..............................................................................................................................................15 IMSI 4.2.3 EF (Ciphering and Integrity Keys)........................................................................................................16 Keys 4.2.4 EF (Ciphering and Integrity Keys for Packet Switched domain).......................................................16 KeysPS 4.2.5 EF (User controlled PLMN selector with Access Technology)....................................................17 PLMNwAcT 4.2.6 EF (HPLMN search period)...............................................................................................................18 HPLMN 4.2.7 EF (ACM maximum value)..............................................................................................................18 ACMmax 4.2.8 EF (USIM Service Table)......................................................................................................................20 UST 4.2.9 EF (Accumulated Call Meter)...............................................................................................................22 ACM 4.2.10 EF (Group Identifier Level 1)...............................................................................................................22 GID1 4.2.11 EF (Group Identifier Level 2)...............................................................................................................23 GID2 4.2.12 EF (Service Provider Name)..................................................................................................................23 SPN 4.2.13 EF (Price per Unit and Currency Table)...............................................................................................24 PUCT 4.2.14 EF (Cell Broadcast Message identifier selection)................................................................................25 CBMI 4.2.15 EF (Access Control Class).....................................................................................................................25 ACC 4.2.16 EF (Forbidden PLMNs).....................................................................................................................26 FPLMN 4.2.17 EF (Location Information)....................................................................................................................27 LOCI 4.2.18 EF (Administrative Data)........................................................................................................................28 AD 4.2.19 void.............................................................................................................................................................29 4.2.20 EF (Cell Broadcast Message Identifier for Data Download)..............................................................29 CBMID 4.2.21 EF (Emergency Call Codes)..................................................................................................................30 ECC 4.2.22 EF (Cell Broadcast Message Identifier Range selection)...................................................................31 CBMIR 4.2.23 EF (Packet Switched location information)......................................................................................32 PSLOCI 4.2.24 EF (Fixed Dialling Numbers)................................................................................................................33 FDN 4.2.25 EF (Short messages)..............................................................................................................................33 SMS 4.2.26 EF (MSISDN)...................................................................................................................................35 MSISDN 4.2.27 EF (Short message service parameters)................................................................................................35 SMSP 4.2.28 EF (SMS status)...................................................................................................................................37 SMSS 4.2.29 EF (Service Dialling Numbers)..............................................................................................................37 SDN 4.2.30 EF (Extension2)....................................................................................................................................38 EXT2 4.2.31 EF (Extension3)....................................................................................................................................38 EXT3 4.2.32 EF (Short message status reports)........................................................................................................39 SMSR 4.2.33 EF (Incoming Call Information)..............................................................................................................39 ICI 4.2.34 EF (Outgoing Call Information).............................................................................................................43 OCI 4.2.35 EF (Incoming Call Timer)......................................................................................................................43 ICT ETSI 3GPP TS 31.102 version 3.11.0 Release 1999 4 ETSI TS 131 102 V3.11.0 (2002-12) 4.2.36 EF (Outgoing Call Timer).....................................................................................................................44 OCT 4.2.37 EF (Extension5)....................................................................................................................................45 EXT5 4.2.38 EF (Capability Configuration Parameters 2)........................................................................................45 CCP2 4.2.39 EF (enhanced Multi Level Precedence and Pre-emption)...................................................................46 eMLPP 4.2.40 EF (Automatic Answer for eMLPP Service).......................................................................................47 AAeM 4.2.41 EF (Group Identity)..............................................................................................................................47 GMSI 4.2.42 EF (Key for hidden phone book entries).........................................................................................48 Hiddenkey 4.2.43 void.............................................................................................................................................................48 4.2.44 EF (Barred Dialling Numbers)..............................................................................................................48 BDN 4.2.45 EF (Extension4)....................................................................................................................................49 EXT4 4.2.46 EF (Comparison Method Information)..................................................................................................49 CMI 4.2.47 EF (Enabled Services Table)..................................................................................................................50 EST 4.2.48 EF (Access Point Name Control List)...................................................................................................50 ACL 4.2.49 EF (Depersonalisation Control Keys)...................................................................................................51 DCK 4.2.50 EF (Co-operative Network List)............................................................................................................51 CNL 4.2.51 EF (Initialisation values for Hyperframe number)........................................................................53 START-HFN 4.2.52 EF (Maximum value of START).................................................................................................53 THRESHOLD 4.2.53 EF (Operator controlled PLMN selector with Access Technology)...........................................53 OPLMNwACT 4.2.54 EF (HPLMN selector with Access Technology).........................................................................54 HPLMNwAcT 4.2.55 EF (Access Rule Reference)..................................................................................................................55 ARR 4.2.56 EF (RPLMN Last used Access Technology)................................................................................55 RPLMNAcT 4.2.57 EF (Network Parameters).................................................................................................................56 NETPAR 4.3 DFs at the USIM ADF (Application DF) Level...............................................................................................58 4.4 Contents of DFs at the USIM ADF (Application DF) level.............................................................................58 4.4.1 Contents of files at the DF SoLSA level.....................................................................................................58 4.4.1.1 EF (SoLSA Access Indicator)...........................................................................................................59 SAI 4.4.1.2 EF (SoLSA LSA List)......................................................................................................................59 SLL 4.4.1.3 LSA Descriptor files.............................................................................................................................59 4.4.2 Contents of files at the DF PHONEBOOK level........................................................................................59 4.4.2.1 EF (Phone Book Reference file)......................................................................................................59 PBR 4.4.2.2 EF (Index Administration Phone book)............................................................................................61 IAP 4.4.2.3 EF (Abbreviated dialling numbers).................................................................................................62 ADN 4.4.2.4 EF (Extension1)..............................................................................................................................65 EXT1 4.4.2.5 EF (Phone Book Control).................................................................................................................66 PBC 4.4.2.6 EF (Grouping file)............................................................................................................................67 GRP 4.4.2.7 EF (Additional number Alpha String)..............................................................................................68 AAS 4.4.2.8 EF (Grouping information Alpha String).........................................................................................69 GAS 4.4.2.9 EF (Additional Number)..................................................................................................................69 ANR 4.4.2.10 EF (Second Name Entry)..................................................................................................................71 SNE 4.4.2.11 EF (Capability Configuration Parameters 1)...................................................................................72 CCP1 4.4.2.12 Phone Book Synchronisation................................................................................................................73 4.4.2.12.1 EF (Unique Identifier).................................................................................................................73 UID 4.4.2.12.2 EF (Phone book Synchronisation Counter).................................................................................74 PSC 4.4.2.12.3 EF (Change Counter)...................................................................................................................75 CC 4.4.2.12.4 EF (Previous Unique Identifier)................................................................................................75 PUID 4.4.2.13 EF (e-mail address).......................................................................................................................76 EMAIL 4.4.2.14 Phonebook restrictions..........................................................................................................................77 4.4.3 Contents of files at the DF GSM-ACCESS level (Files required for GSM Access)..................................77 4.4.3.1 EF (GSM Ciphering key Kc).............................................................................................................78 Kc 4.4.3.2 EF (GPRS Ciphering key KcGPRS)............................................................................................78 KcGPRS 4.4.3.3 Void.......................................................................................................................................................79 4.4.3.4 EF (CPBCCH Information)........................................................................................................79 CPBCCH 4.4.3.5 EF (Investigation Scan)................................................................................................................80 InvScan 4.4.4 Contents of files at the MExE level......................................................................................................80 4.4.4.1 EF (MExE Service table)......................................................................................................80 MExE-ST 4.4.4.2 EF (Operator Root Public Key)................................................................................................81 ORPK 4.4.4.3 EF (Administrator Root Public Key)........................................................................................83 ARPK 4.4.4.4 EF (Third Party Root Public Key)...........................................................................................83 TPRPK 4.4.4.5 EF (Trusted Key/Certificates Data Files)................................................................................84 TKCDF 4.5 Contents of EFs at the TELECOM level..........................................................................................................84 4.5.1 EF (Abbreviated dialling numbers).......................................................................................................84 ADN 4.5.2 EF (Extension1)....................................................................................................................................84 EXT1 ETSI 3GPP TS 31.102 version 3.11.0 Release 1999 5 ETSI TS 131 102 V3.11.0 (2002-12) 4.5.3 EF (Extended Capability Configuration Parameter).............................................................................84 ECCP 4.5.4 EF (SetUpMenu Elements)..................................................................................................................85 SUME 4.5.5 EF (Access Rule Reference)..................................................................................................................85 ARR 4.6 Contents of DFs at the TELECOM level..........................................................................................................86 4.6.1 Contents of files at the DF level.....................................................................................................86 GRAPHICS 4.6.1.1 EF (Image).......................................................................................................................................86 IMG 4.6.1.2 Image Instance Data Files.....................................................................................................................88 4.6.2 Contents of files at the DF under the DF ........................................................................88 PHONEBOOK TELECOM 4.7 Files of USIM...................................................................................................................................................89 5 Application protocol...............................................................................................................................91 5.1 USIM management procedures........................................................................................................................91 5.1.1 Initialisation................................................................................................................................................91 5.1.1.1 USIM application selection...................................................................................................................91 5.1.1.2 USIM initialisation................................................................................................................................92 5.1.1.3 GSM related initialisation procedures...................................................................................................93 5.1.2 Session termination.....................................................................................................................................93 5.1.2.1 3G session termination..........................................................................................................................93 5.1.2.2 GSM termination procedures................................................................................................................93 5.1.3 USIM application closure...........................................................................................................................93 5.1.4 Emergency call codes.................................................................................................................................93 5.1.5 Language indication....................................................................................................................................94 5.1.6 Administrative information request............................................................................................................94 5.1.7 USIM service table request.........................................................................................................................94 5.1.8 Spare...........................................................................................................................................................94 5.1.9 UICC presence detection............................................................................................................................94 5.2 USIM security related procedures....................................................................................................................94 5.2.1 Authentication algorithms computation......................................................................................................94 5.2.2 IMSI request...............................................................................................................................................94 5.2.3 Access control information request............................................................................................................94 5.2.4 HPLMN search period request....................................................................................................................94 5.2.5 Location information..................................................................................................................................94 5.2.6 Cipher and Integrity key.............................................................................................................................94 5.2.7 Forbidden PLMN........................................................................................................................................95 5.2.8 LSA information.........................................................................................................................................95 5.2.9 User Identity Request..................................................................................................................................95 5.2.10 GSM Cipher key.........................................................................................................................................95 5.2.11 GPRS Cipher key........................................................................................................................................95 5.2.12 Initialisation value for Hyperframe number................................................................................................95 5.2.13 Maximum value of START........................................................................................................................95 5.2.14 HPLMN selector with Access Technology request....................................................................................95 5.2.15 Packet Switched Location information.......................................................................................................95 5.2.16 Cipher and Integrity key for Packet Switched domain...............................................................................95 5.3 Subscription related procedures.......................................................................................................................96 5.3.1 Phone book procedures...............................................................................................................................96 5.3.1.1 Initialisation..........................................................................................................................................96 5.3.1.2 Creation/Deletion of information..........................................................................................................96 5.3.1.3 Hidden phone book entries....................................................................................................................96 5.3.2 Dialling numbers........................................................................................................................................96 5.3.3 Short messages............................................................................................................................................98 5.3.4 Advice of charge.........................................................................................................................................98 5.3.5 Capability configuration parameters...........................................................................................................99 5.3.6 User controlled PLMN selector with Access Technology..........................................................................99 5.3.7 Cell broadcast message identifier...............................................................................................................99 5.3.8 Group identifier level 1...............................................................................................................................99 5.3.9 Group identifier level 2...............................................................................................................................99 5.3.10 Service provider name................................................................................................................................99 5.3.11 Enhanced multi level precedence and pre-emption service......................................................................100 5.3.12 Cell broadcast message identifier ranges..................................................................................................100 5.3.13 Short message status report.......................................................................................................................100 5.3.14 APN Control List......................................................................................................................................100 5.3.15 Depersonalisation Control Keys...............................................................................................................101 ETSI 3GPP TS 31.102 version 3.11.0 Release 1999 6 ETSI TS 131 102 V3.11.0 (2002-12) 5.3.16 Co-operative Network List.......................................................................................................................101 5.3.17 CPBCCH information...............................................................................................................................101 5.3.18 Investigation Scan.....................................................................................................................................101 5.3.19 Enabled Services Table Request...............................................................................................................101 5.3.20 Operator controlled PLMN selector with Access Technology.................................................................101 5.3.21 HPLMN selector with Access Technology...............................................................................................101 5.3.22 RPLMN last used Access Technology......................................................................................................101 5.3.23 Network Parameter information...............................................................................................................102 5.4 USAT related procedures...............................................................................................................................102 5.4.1 Data Download via SMS-PP.....................................................................................................................102 5.4.2 Image Request..........................................................................................................................................102 5.4.3 Data Download via SMS-CB....................................................................................................................102 5.4.4 Call Control by USIM...............................................................................................................................102 5.4.5 MO-SMS control by USIM......................................................................................................................102 5.5 MExE related procedures...............................................................................................................................102 5.5.1 MExE ST..................................................................................................................................................103 5.5.2 Operator root public key...........................................................................................................................103 5.5.3 Administrator root public key...................................................................................................................103 5.5.4 Third Party root public key(s)...................................................................................................................103 5.5.5 Trusted Key/Certificates Data Files..........................................................................................................103 6 Security features...................................................................................................................................103 6.1 Authentication and key agreement procedure................................................................................................103 6.2 Cryptographic Functions................................................................................................................................104 6.3 GSM Conversion Functions...........................................................................................................................104 6.4 User verification and file access conditions...................................................................................................104 7 USIM Commands.................................................................................................................................105 7.1 AUTHENTICATE.........................................................................................................................................105 7.1.1 Command description...............................................................................................................................105 7.1.1.1 3G security context.............................................................................................................................106 7.1.1.2 GSM security context..........................................................................................................................106 7.1.2 Command parameters and data.................................................................................................................107 7.2 Void................................................................................................................................................................108 7.3 Status Conditions Returned by the UICC.......................................................................................................108 7.3.1 Security management................................................................................................................................109 7.3.2 Status Words of the Commands................................................................................................................109 7.4 VERIFY command.........................................................................................................................................110 8 UICC Characteristics............................................................................................................................110 8.1 Voltage classes...............................................................................................................................................110 8.2 File Control Parameters (FCP).......................................................................................................................110 8.2.1 Minimum application clock frequency.....................................................................................................110 Annex A (informative): EF changes via Data Download or USAT applications....................................111 Annex B (normative): Image Coding Schemes..........................................................................................113 B.1 Basic Image Coding Scheme................................................................................................................113 B.2 Colour Image Coding Scheme.............................................................................................................114 Annex C (informative): Structure of the Network parameters TLV objects..........................................116 Annex D (informative): Tags defined in TS 31.102...................................................................................117 Annex E (informative): Suggested contents of the EFs at pre-personalization......................................118 Annex F (informative): Examples of coding of LSA Descriptor files for SoLSA...................................120 Annex G (informative): Phonebook Example............................................................................................121 Annex H (normative): List of SFI Values...................................................................................................124 H.1 List of SFI Values at the USIM ADF Level.........................................................................................124 ETSI 3GPP TS 31.102 version 3.11.0 Release 1999 7 ETSI TS 131 102 V3.11.0 (2002-12) H.2 List of SFI Values at the DF GSM-ACCESS Level.............................................................................124 Annex I (informative): USIM Application Session Activation/Termination...........................................125 Annex J (informative): Change history......................................................................................................126 History............................................................................................................................................................128 ETSI 3GPP TS 31.102 version 3.11.0 Release 1999 8 ETSI TS 131 102 V3.11.0 (2002-12) Foreword This Technical Specification (TS) has been produced by the 3rd Generation Partnership Project (3GPP). The contents of the present document are subject to continuing work within the TSG and may change following formal TSG approval. Should the TSG modify the contents of the present document, it will be re-released by the TSG with an identifying change of release date and an increase in version number as follows: Version x.y.z where: x the first digit: 1 presented to TSG for information; 2 presented to TSG for approval; 3 or greater indicates TSG approved document under change control. y the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections, updates, etc. z the third digit is incremented when editorial only changes have been incorporated in the document. Introduction The present document defines the Universal Subscriber Identity Module (USIM) application. This application resides on the UICC, an IC card specified in TS 31.101 [11]. In particular, TS 31.101 [11] specifies the application independent properties of the UICC/terminal interface such as the physical characteristics and the logical structure. ETSI 3GPP TS 31.102 version 3.11.0 Release 1999 9 ETSI TS 131 102 V3.11.0 (2002-12) 1 Scope The present document defines the USIM application for 3G telecom network operation. The present document specifies: - specific command parameters; - file structures; - contents of EFs (Elementary Files); - security functions; - application protocol to be used on the interface between UICC (USIM) and ME. This is to ensure interoperability between a USIM and an ME independently of the respective manufacturer, card issuer or operator. The present document does not define any aspects related to the administrative management phase of the USIM. Any internal technical realisation of either the USIM or the ME is only specified where these are reflected over the interface. The present document does not specify any of the security algorithms which may be used. 2 References The following documents contain provisions which, through reference in this text, constitute provisions of the present document. • References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific. • For a specific reference, subsequent revisions do not apply. • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document. [1] 3GPP TS 21.111: "USIM and IC Card Requirements". [2] 3GPP TS 22.011: "Service accessibility". [3] 3GPP TS 22.024: "Description of Charge Advice Information (CAI)". [4] 3GPP TS 22.030: "Man-Machine Interface (MMI) of the User Equipment (UE)". [5] 3GPP TS 23.038: "Alphabets and language". [6] 3GPP TS 23.040: "Technical realization of the Short Message Service (SMS) Point-to-Point (PP)". [7] 3GPP TS 23.060: "General Packet Radio Service (GPRS); Service description; Stage 2". [8] 3GPP TS 22.067: "enhanced Multi Level Precedence and Pre-emption service (eMLPP) - Stage 1". [9] 3GPP TS 24.008: "Mobile Radio Interface Layer 3 specification; Core Network Protocols; Stage 3". [10] 3GPP TS 24.011: "Point-to-Point (PP) Short Message Service (SMS) support on mobile radio interface". [11] 3GPP TS 31.101: "UICC-Terminal Interface, Physical and Logical Characteristics". [12] 3GPP TS 31.111: "USIM Application Toolkit (USAT)". ETSI

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.