`
`
`
`3GPP TS 11.11 V8.6.0 (2001-12)
`
`Technical Specification
`
`3rd Generation Partnership Project;
`Technical Specification Group Terminals
`Specification of the Subscriber Identity Module -
`Mobile Equipment (SIM - ME) interface
`(Release 1999)
`
`GLOBAL SYSTEM FOR
`MOBILE COMMUNICATIONS
`
`R
`
`
`
`
`
`The present document has been developed within the 3rd Generation Partnership Project (3GPP TM) and may be further elaborated for the purposes of 3GPP.
`
`The present document has not been subject to any approval process by the 3GPP Organisational Partners and shall not be implemented.
`This Specification is provided for future development work within 3GPP only. The Organisational Partners accept no liability for any use of this Specification.
`Specifications and reports for implementation of the 3GPP TM system should be obtained via the 3GPP Organisational Partners' Publications Offices.
`
`
`
`
`
`Dell Inc., Ex. 1022
`
`
`
`
`Release 1999
`
`2
`
`3GPP TS 11.11 V8.6.0 (2001-12)
`
`Keywords
`GSM, SIM, card
`
`3GPP
`
`Postal address
`
`3GPP support office address
`650 Route des Lucioles - Sophia Antipolis
`Valbonne - FRANCE
`Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
`
`Internet
`http://www.3gpp.org
`
`Copyright Notification
`
`No part may be reproduced except as authorized by written permission.
`The copyright and the foregoing restriction extend to reproduction in all media.
`
`© 2002, 3GPP Organizational Partners (ARIB, CWTS, ETSI, T1, TTA, TTC).
`All rights reserved.
`
`3GPP
`
`Dell Inc., Ex. 1022
`
`
`
`
`Release 1999
`
`3
`
`3GPP TS 11.11 V8.6.0 (2001-12)
`
`Contents
`Foreword ............................................................................................................................................................. 9
`1
`Scope ...................................................................................................................................................... 10
`2
`References .............................................................................................................................................. 10
`3
`Definitions, abbreviations and symbols ................................................................................................. 12
`3.1 Definitions................................................................................................................................................................. 12
`3.2 Abbreviations ............................................................................................................................................................ 13
`3.3
`Symbols ..................................................................................................................................................................... 15
`4
`Physical characteristics .......................................................................................................................... 15
`4.1
`Format and layout ..................................................................................................................................................... 15
`4.1.1
`ID-1 SIM ............................................................................................................................................................. 15
`4.1.2
`Plug-in SIM ......................................................................................................................................................... 16
`4.2
`Temperature range for card operation ...................................................................................................................... 16
`4.3 Contacts ..................................................................................................................................................................... 16
`4.3.1
`Provision of contacts ........................................................................................................................................... 16
`4.3.2
`Activation and deactivation ................................................................................................................................ 16
`4.3.3
`Inactive contacts .................................................................................................................................................. 16
`4.3.4
`Contact pressure .................................................................................................................................................. 17
`4.4
`Precedence ................................................................................................................................................................ 17
`4.5
`Static Protection ........................................................................................................................................................ 17
`5
`Electronic signals and transmission protocols ........................................................................................ 17
`5.1
`Supply voltage Vcc (contact C1) ............................................................................................................................. 17
`5.2 Reset (RST) (contact C2) ......................................................................................................................................... 18
`5.3
`Programming voltage Vpp (contact C6) .................................................................................................................. 18
`5.4 Clock CLK (contact C3) ........................................................................................................................................... 18
`5.5
`I/O (contact C7) ........................................................................................................................................................ 18
`5.6
`States ......................................................................................................................................................................... 19
`5.7 Baudrate .................................................................................................................................................................... 19
`5.8 Answer To Reset (ATR) ........................................................................................................................................... 19
`5.8.1
`Structure and contents ......................................................................................................................................... 19
`5.8.2
`PPS procedure ..................................................................................................................................................... 21
`5.8.3
`Speed enhancement ............................................................................................................................................. 22
`5.9 Bit/character duration and sampling time ................................................................................................................ 22
`5.10
`Error handling ..................................................................................................................................................... 22
`6
`Logical Model ........................................................................................................................................ 23
`6.1 General description ................................................................................................................................................... 23
`6.2
`File identifier ............................................................................................................................................................. 23
`6.3 Dedicated files .......................................................................................................................................................... 24
`6.4
`Elementary files ........................................................................................................................................................ 24
`6.4.1
`Transparent EF .................................................................................................................................................... 24
`6.4.2
`Linear fixed EF ................................................................................................................................................... 24
`6.4.3
`Cyclic EF ............................................................................................................................................................. 25
`6.5 Methods for selecting a file ...................................................................................................................................... 26
`6.6 Reservation of file IDs .............................................................................................................................................. 27
`7
`Security features ..................................................................................................................................... 28
`7.1 Authentication and cipher key generation procedure .............................................................................................. 28
`7.2 Algorithms and processes ......................................................................................................................................... 28
`7.3
`File access conditions ............................................................................................................................................... 28
`8
`Description of the functions ................................................................................................................... 29
`8.1
`SELECT .................................................................................................................................................................... 30
`8.2
`STATUS .................................................................................................................................................................... 30
`8.3 READ BINARY ....................................................................................................................................................... 30
`8.4 UPDATE BINARY .................................................................................................................................................. 31
`
`3GPP
`
`Dell Inc., Ex. 1022
`
`
`
`
`Release 1999
`
`4
`
`3GPP TS 11.11 V8.6.0 (2001-12)
`
`8.5 READ RECORD ...................................................................................................................................................... 31
`8.6 UPDATE RECORD ................................................................................................................................................. 32
`8.7
`SEEK ......................................................................................................................................................................... 32
`8.8
`INCREASE ............................................................................................................................................................... 33
`8.9 VERIFY CHV ........................................................................................................................................................... 33
`8.10
`CHANGE CHV ................................................................................................................................................... 34
`8.11
`DISABLE CHV .................................................................................................................................................. 34
`8.12
`ENABLE CHV .................................................................................................................................................... 34
`8.13
`UNBLOCK CHV ................................................................................................................................................ 35
`8.14
`INVALIDATE .................................................................................................................................................... 35
`8.15
`REHABILITATE ................................................................................................................................................ 35
`8.16
`RUN GSM ALGORITHM ................................................................................................................................. 36
`8.17
`SLEEP ................................................................................................................................................................. 36
`8.18
`TERMINAL PROFILE ....................................................................................................................................... 36
`8.19
`ENVELOPE ........................................................................................................................................................ 36
`8.20
`FETCH ................................................................................................................................................................ 36
`8.21
`TERMINAL RESPONSE ................................................................................................................................... 37
`9
`Description of the commands ................................................................................................................. 37
`9.1 Mapping principles ................................................................................................................................................... 37
`9.2 Coding of the commands .......................................................................................................................................... 40
`9.2.1
`SELECT .............................................................................................................................................................. 40
`9.2.2
`STATUS .............................................................................................................................................................. 43
`9.2.3
`READ BINARY.................................................................................................................................................. 43
`9.2.4
`UPDATE BINARY ............................................................................................................................................. 43
`9.2.5
`READ RECORD ................................................................................................................................................. 43
`9.2.6
`UPDATE RECORD ............................................................................................................................................ 43
`9.2.7
`SEEK ................................................................................................................................................................... 44
`9.2.8
`INCREASE ......................................................................................................................................................... 44
`9.2.9
`VERIFY CHV ..................................................................................................................................................... 45
`9.2.10
`CHANGE CHV ................................................................................................................................................... 45
`9.2.11
`DISABLE CHV .................................................................................................................................................. 45
`9.2.12
`ENABLE CHV .................................................................................................................................................... 45
`9.2.13
`UNBLOCK CHV ................................................................................................................................................ 46
`9.2.14
`INVALIDATE .................................................................................................................................................... 46
`9.2.15
`REHABILITATE ................................................................................................................................................ 46
`9.2.16
`RUN GSM ALGORITHM ................................................................................................................................. 46
`9.2.17
`SLEEP ................................................................................................................................................................. 46
`9.2.18
`GET RESPONSE ................................................................................................................................................ 47
`9.2.19
`TERMINAL PROFILE ....................................................................................................................................... 47
`9.2.20
`ENVELOPE ........................................................................................................................................................ 47
`9.2.21
`FETCH ................................................................................................................................................................ 47
`9.2.22
`TERMINAL RESPONSE ................................................................................................................................... 48
`9.3 Definitions and coding ............................................................................................................................................. 48
`9.4
`Status conditions returned by the card ..................................................................................................................... 49
`9.4.1
`Responses to commands which are correctly executed ..................................................................................... 49
`9.4.2
`Responses to commands which are postponed .................................................................................................. 50
`9.4.3
`Memory management ......................................................................................................................................... 50
`9.4.4
`Referencing management ................................................................................................................................... 50
`9.4.5
`Security management .......................................................................................................................................... 50
`9.4.6
`Application independent errors .......................................................................................................................... 50
`9.4.7
`Commands versus possible status responses ...................................................................................................... 51
`10 Contents of the Elementary Files (EF) ................................................................................................... 51
`10.1
`Contents of the EFs at the MF level ................................................................................................................... 52
`10.1.1
`EFICCID (ICC Identification) ............................................................................................................................... 52
`10.1.2
`EFELP (Extended language preference) .............................................................................................................. 53
`10.2
`DFs at the GSM application level....................................................................................................................... 53
`10.3
`Contents of files at the GSM application level .................................................................................................. 54
`10.3.1
`EFLP (Language preference) ............................................................................................................................... 54
`10.3.2
`EFIMSI (IMSI) ...................................................................................................................................................... 54
`
`3GPP
`
`Dell Inc., Ex. 1022
`
`
`
`
`Release 1999
`
`5
`
`3GPP TS 11.11 V8.6.0 (2001-12)
`
`EFKc (Ciphering key Kc) ..................................................................................................................................... 55
`10.3.3
`EFPLMNsel (PLMN selector) ................................................................................................................................. 56
`10.3.4
`EFHPLMN (HPLMN search period) ...................................................................................................................... 56
`10.3.5
`EFACMmax (ACM maximum value) ..................................................................................................................... 57
`10.3.6
`EFSST (SIM service table) ................................................................................................................................... 58
`10.3.7
`EFACM (Accumulated call meter) ........................................................................................................................ 60
`10.3.8
`EFGID1 (Group Identifier Level 1) ...................................................................................................................... 61
`10.3.9
`10.3.10 EFGID2 (Group Identifier Level 2) ...................................................................................................................... 61
`10.3.11 EFSPN (Service Provider Name) .......................................................................................................................... 61
`10.3.12 EFPUCT (Price per unit and currency table)......................................................................................................... 62
`10.3.13 EFCBMI (Cell broadcast message identifier selection) ........................................................................................ 63
`10.3.14 EFBCCH (Broadcast control channels) ................................................................................................................. 64
`10.3.15 EFACC (Access control class) .............................................................................................................................. 64
`10.3.16 EFFPLMN (Forbidden PLMNs) ............................................................................................................................. 65
`10.3.17 EFLOCI (Location information) ........................................................................................................................... 66
`10.3.18 EFAD (Administrative data) ................................................................................................................................. 67
`10.3.19 EFPhase (Phase identification) .............................................................................................................................. 68
`10.3.20 EFVGCS (Voice Group Call Service) ................................................................................................................... 69
`10.3.21 EFVGCSS (Voice Group Call Service Status) ....................................................................................................... 70
`10.3.22 EFVBS (Voice Broadcast Service) ....................................................................................................................... 71
`10.3.23 EFVBSS (Voice Broadcast Service Status) ........................................................................................................... 73
`10.3.24 EFeMLPP (enhanced Multi Level Pre-emption and Priority) ............................................................................... 73
`10.3.25 EFAAeM (Automatic Answer for eMLPP Service) .............................................................................................. 74
`10.3.26 EFCBMID (Cell Broadcast Message Identifier for Data Download) .................................................................... 75
`10.3.27 EFECC (Emergency Call Codes) ........................................................................................................................ 75
`10.3.28 EFCBMIR (Cell broadcast message identifier range selection) ............................................................................ 76
`10.3.29 EFDCK De-personalization Control Keys ............................................................................................................ 77
`10.3.30 EFCNL (Co-operative Network List) ................................................................................................................... 77
`10.3.31 EFNIA (Network's Indication of Alerting) ........................................................................................................... 78
`10.3.32 EFKcGPRS (GPRS Ciphering key KcGPRS) ........................................................................................................ 79
`10.3.33 EFLOCIGPRS (GPRS location information) .......................................................................................................... 79
`10.3.34 EFSUME (SetUpMenu Elements) ......................................................................................................................... 81
`10.3.35 EFPLMNwAcT (User controlled PLMN Selector with Access Technology) ......................................................... 81
`10.3.36 EFOPLMNwAcT (Operator controlled PLMN Selector with Access Technology) ................................................ 83
`10.3.37 EFHPLMNwAcT (HPLMN Selector with Access Technology) .............................................................................. 83
`10.3.38 EFCPBCCH (CPBCCH Information) ..................................................................................................................... 84
`10.3.39 EFInvScan (Investigation Scan) ............................................................................................................................. 85
`10.3.40 EFRPLMNAcT (RPLMN Last used Access Technology) ....................................................................................... 86
`10.4
`Contents of DFs at the GSM application level ................................................................................................... 86
`10.4.1
`Contents of files at the GSM SoLSA level ........................................................................................................ 86
`10.4.1.1
`EFSAI (SoLSA Access Indicator) .................................................................................................................. 86
`10.4.1.2
`EFSLL (SoLSA LSA List) .............................................................................................................................. 87
`10.4.1.3
`LSA Descriptor files...................................................................................................................................... 89
`10.4.2
`Contents of files at the MExE level .................................................................................................................... 90
`10.4.2.1
`EFMExE-ST (MExE Service table) ................................................................................................................... 90
`10.4.2.2
`EFORPK (Operator Root Public Key) ............................................................................................................. 91
`10.4.2.3
`EFARPK (Administrator Root Public Key) ..................................................................................................... 93
`10.4.2.4
`EFTPRPK (Third Party Root Public key) ......................................................................................................... 93
`10.4.2.5
`Trusted Key/Certificates Data Files .............................................................................................................. 94
`10.5
`Contents of files at the telecom level ................................................................................................................. 94
`10.5.1
`EFADN (Abbreviated dialling numbers) .............................................................................................................. 94
`10.5.2
`EFFDN (Fixed dialling numbers) ......................................................................................................................... 98
`10.5.3
`EFSMS (Short messages) ...................................................................................................................................... 98
`10.5.4
`Capability configuration parameters .................................................................................................................. 99
`10.5.4.1
`EFCCP (Capability configuration parameters) ............................................................................................... 99
`10.5.4.2
`EFECCP (Extended Capability configuration parameters) .......................................................................... 100
`10.5.5
`EFMSISDN (MSISDN) ......................................................................................................................................... 100
`10.5.6
`EFSMSP (Short message service parameters) ................................................................................................... 101
`10.5.7
`EFSMSS (SMS status) ......................................................................................................................................... 102
`10.5.8
`EFLND (Last number dialled) ............................................................................................................................. 103
`
`3GPP
`
`Dell Inc., Ex. 1022
`
`
`
`
`Release 1999
`
`6
`
`3GPP TS 11.11 V8.6.0 (2001-12)
`
`EFSDN (Service Dialling Numbers) ................................................................................................................... 104
`10.5.9
`10.5.10 EFEXT1 (Extension1) .......................................................................................................................................... 104
`10.5.11 EFEXT2 (Extension2) .......................................................................................................................................... 106
`10.5.12 EFEXT3 (Extension3) .......................................................................................................................................... 106
`10.5.13 EFBDN (Barred Dialling Numbers) .................................................................................................................... 106
`10.5.14 EFEXT4 (Extension4) .......................................................................................................................................... 107
`10.5.15 EFSMSR (Short message status reports) ............................................................................................................. 107
`10.5.16 EFCMI (Comparison Method Information) ....................................................................................................... 108
`10.6
`DFs at the telecom level .................................................................................................................................... 109
`10.6.1
`Contents of files at the telecom graphics level................................................................................................. 109
`10.6.1.1
`EFIMG (Image) ............................................................................................................................................. 109
`10.6.1.2
`Image Instance Data Files ........................................................................................................................... 111
`10.7
`Files of GSM ..................................................................................................................................................... 111
`11 Application protocol ............................................................................................................................. 113
`11.1
`General procedures ........................................................................................................................................... 115
`11.1.1
`Reading an EF ...............