throbber

`
`
`
`3GPP TS 11.11 V8.6.0 (2001-12)
`
`Technical Specification
`
`3rd Generation Partnership Project;
`Technical Specification Group Terminals
`Specification of the Subscriber Identity Module -
`Mobile Equipment (SIM - ME) interface
`(Release 1999)
`
`GLOBAL SYSTEM FOR
`MOBILE COMMUNICATIONS
`
`R
`
`
`
`
`
`The present document has been developed within the 3rd Generation Partnership Project (3GPP TM) and may be further elaborated for the purposes of 3GPP.
`
`The present document has not been subject to any approval process by the 3GPP Organisational Partners and shall not be implemented.
`This Specification is provided for future development work within 3GPP only. The Organisational Partners accept no liability for any use of this Specification.
`Specifications and reports for implementation of the 3GPP TM system should be obtained via the 3GPP Organisational Partners' Publications Offices.
`
`
`
`
`
`Dell Inc., Ex. 1022
`
`

`

`
`Release 1999
`
`2
`
`3GPP TS 11.11 V8.6.0 (2001-12)
`
`Keywords
`GSM, SIM, card
`
`3GPP
`
`Postal address
`
`3GPP support office address
`650 Route des Lucioles - Sophia Antipolis
`Valbonne - FRANCE
`Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
`
`Internet
`http://www.3gpp.org
`
`Copyright Notification
`
`No part may be reproduced except as authorized by written permission.
`The copyright and the foregoing restriction extend to reproduction in all media.
`
`© 2002, 3GPP Organizational Partners (ARIB, CWTS, ETSI, T1, TTA, TTC).
`All rights reserved.
`
`3GPP
`
`Dell Inc., Ex. 1022
`
`

`

`
`Release 1999
`
`3
`
`3GPP TS 11.11 V8.6.0 (2001-12)
`
`Contents
`Foreword ............................................................................................................................................................. 9
`1
`Scope ...................................................................................................................................................... 10
`2
`References .............................................................................................................................................. 10
`3
`Definitions, abbreviations and symbols ................................................................................................. 12
`3.1 Definitions................................................................................................................................................................. 12
`3.2 Abbreviations ............................................................................................................................................................ 13
`3.3
`Symbols ..................................................................................................................................................................... 15
`4
`Physical characteristics .......................................................................................................................... 15
`4.1
`Format and layout ..................................................................................................................................................... 15
`4.1.1
`ID-1 SIM ............................................................................................................................................................. 15
`4.1.2
`Plug-in SIM ......................................................................................................................................................... 16
`4.2
`Temperature range for card operation ...................................................................................................................... 16
`4.3 Contacts ..................................................................................................................................................................... 16
`4.3.1
`Provision of contacts ........................................................................................................................................... 16
`4.3.2
`Activation and deactivation ................................................................................................................................ 16
`4.3.3
`Inactive contacts .................................................................................................................................................. 16
`4.3.4
`Contact pressure .................................................................................................................................................. 17
`4.4
`Precedence ................................................................................................................................................................ 17
`4.5
`Static Protection ........................................................................................................................................................ 17
`5
`Electronic signals and transmission protocols ........................................................................................ 17
`5.1
`Supply voltage Vcc (contact C1) ............................................................................................................................. 17
`5.2 Reset (RST) (contact C2) ......................................................................................................................................... 18
`5.3
`Programming voltage Vpp (contact C6) .................................................................................................................. 18
`5.4 Clock CLK (contact C3) ........................................................................................................................................... 18
`5.5
`I/O (contact C7) ........................................................................................................................................................ 18
`5.6
`States ......................................................................................................................................................................... 19
`5.7 Baudrate .................................................................................................................................................................... 19
`5.8 Answer To Reset (ATR) ........................................................................................................................................... 19
`5.8.1
`Structure and contents ......................................................................................................................................... 19
`5.8.2
`PPS procedure ..................................................................................................................................................... 21
`5.8.3
`Speed enhancement ............................................................................................................................................. 22
`5.9 Bit/character duration and sampling time ................................................................................................................ 22
`5.10
`Error handling ..................................................................................................................................................... 22
`6
`Logical Model ........................................................................................................................................ 23
`6.1 General description ................................................................................................................................................... 23
`6.2
`File identifier ............................................................................................................................................................. 23
`6.3 Dedicated files .......................................................................................................................................................... 24
`6.4
`Elementary files ........................................................................................................................................................ 24
`6.4.1
`Transparent EF .................................................................................................................................................... 24
`6.4.2
`Linear fixed EF ................................................................................................................................................... 24
`6.4.3
`Cyclic EF ............................................................................................................................................................. 25
`6.5 Methods for selecting a file ...................................................................................................................................... 26
`6.6 Reservation of file IDs .............................................................................................................................................. 27
`7
`Security features ..................................................................................................................................... 28
`7.1 Authentication and cipher key generation procedure .............................................................................................. 28
`7.2 Algorithms and processes ......................................................................................................................................... 28
`7.3
`File access conditions ............................................................................................................................................... 28
`8
`Description of the functions ................................................................................................................... 29
`8.1
`SELECT .................................................................................................................................................................... 30
`8.2
`STATUS .................................................................................................................................................................... 30
`8.3 READ BINARY ....................................................................................................................................................... 30
`8.4 UPDATE BINARY .................................................................................................................................................. 31
`
`3GPP
`
`Dell Inc., Ex. 1022
`
`

`

`
`Release 1999
`
`4
`
`3GPP TS 11.11 V8.6.0 (2001-12)
`
`8.5 READ RECORD ...................................................................................................................................................... 31
`8.6 UPDATE RECORD ................................................................................................................................................. 32
`8.7
`SEEK ......................................................................................................................................................................... 32
`8.8
`INCREASE ............................................................................................................................................................... 33
`8.9 VERIFY CHV ........................................................................................................................................................... 33
`8.10
`CHANGE CHV ................................................................................................................................................... 34
`8.11
`DISABLE CHV .................................................................................................................................................. 34
`8.12
`ENABLE CHV .................................................................................................................................................... 34
`8.13
`UNBLOCK CHV ................................................................................................................................................ 35
`8.14
`INVALIDATE .................................................................................................................................................... 35
`8.15
`REHABILITATE ................................................................................................................................................ 35
`8.16
`RUN GSM ALGORITHM ................................................................................................................................. 36
`8.17
`SLEEP ................................................................................................................................................................. 36
`8.18
`TERMINAL PROFILE ....................................................................................................................................... 36
`8.19
`ENVELOPE ........................................................................................................................................................ 36
`8.20
`FETCH ................................................................................................................................................................ 36
`8.21
`TERMINAL RESPONSE ................................................................................................................................... 37
`9
`Description of the commands ................................................................................................................. 37
`9.1 Mapping principles ................................................................................................................................................... 37
`9.2 Coding of the commands .......................................................................................................................................... 40
`9.2.1
`SELECT .............................................................................................................................................................. 40
`9.2.2
`STATUS .............................................................................................................................................................. 43
`9.2.3
`READ BINARY.................................................................................................................................................. 43
`9.2.4
`UPDATE BINARY ............................................................................................................................................. 43
`9.2.5
`READ RECORD ................................................................................................................................................. 43
`9.2.6
`UPDATE RECORD ............................................................................................................................................ 43
`9.2.7
`SEEK ................................................................................................................................................................... 44
`9.2.8
`INCREASE ......................................................................................................................................................... 44
`9.2.9
`VERIFY CHV ..................................................................................................................................................... 45
`9.2.10
`CHANGE CHV ................................................................................................................................................... 45
`9.2.11
`DISABLE CHV .................................................................................................................................................. 45
`9.2.12
`ENABLE CHV .................................................................................................................................................... 45
`9.2.13
`UNBLOCK CHV ................................................................................................................................................ 46
`9.2.14
`INVALIDATE .................................................................................................................................................... 46
`9.2.15
`REHABILITATE ................................................................................................................................................ 46
`9.2.16
`RUN GSM ALGORITHM ................................................................................................................................. 46
`9.2.17
`SLEEP ................................................................................................................................................................. 46
`9.2.18
`GET RESPONSE ................................................................................................................................................ 47
`9.2.19
`TERMINAL PROFILE ....................................................................................................................................... 47
`9.2.20
`ENVELOPE ........................................................................................................................................................ 47
`9.2.21
`FETCH ................................................................................................................................................................ 47
`9.2.22
`TERMINAL RESPONSE ................................................................................................................................... 48
`9.3 Definitions and coding ............................................................................................................................................. 48
`9.4
`Status conditions returned by the card ..................................................................................................................... 49
`9.4.1
`Responses to commands which are correctly executed ..................................................................................... 49
`9.4.2
`Responses to commands which are postponed .................................................................................................. 50
`9.4.3
`Memory management ......................................................................................................................................... 50
`9.4.4
`Referencing management ................................................................................................................................... 50
`9.4.5
`Security management .......................................................................................................................................... 50
`9.4.6
`Application independent errors .......................................................................................................................... 50
`9.4.7
`Commands versus possible status responses ...................................................................................................... 51
`10 Contents of the Elementary Files (EF) ................................................................................................... 51
`10.1
`Contents of the EFs at the MF level ................................................................................................................... 52
`10.1.1
`EFICCID (ICC Identification) ............................................................................................................................... 52
`10.1.2
`EFELP (Extended language preference) .............................................................................................................. 53
`10.2
`DFs at the GSM application level....................................................................................................................... 53
`10.3
`Contents of files at the GSM application level .................................................................................................. 54
`10.3.1
`EFLP (Language preference) ............................................................................................................................... 54
`10.3.2
`EFIMSI (IMSI) ...................................................................................................................................................... 54
`
`3GPP
`
`Dell Inc., Ex. 1022
`
`

`

`
`Release 1999
`
`5
`
`3GPP TS 11.11 V8.6.0 (2001-12)
`
`EFKc (Ciphering key Kc) ..................................................................................................................................... 55
`10.3.3
`EFPLMNsel (PLMN selector) ................................................................................................................................. 56
`10.3.4
`EFHPLMN (HPLMN search period) ...................................................................................................................... 56
`10.3.5
`EFACMmax (ACM maximum value) ..................................................................................................................... 57
`10.3.6
`EFSST (SIM service table) ................................................................................................................................... 58
`10.3.7
`EFACM (Accumulated call meter) ........................................................................................................................ 60
`10.3.8
`EFGID1 (Group Identifier Level 1) ...................................................................................................................... 61
`10.3.9
`10.3.10 EFGID2 (Group Identifier Level 2) ...................................................................................................................... 61
`10.3.11 EFSPN (Service Provider Name) .......................................................................................................................... 61
`10.3.12 EFPUCT (Price per unit and currency table)......................................................................................................... 62
`10.3.13 EFCBMI (Cell broadcast message identifier selection) ........................................................................................ 63
`10.3.14 EFBCCH (Broadcast control channels) ................................................................................................................. 64
`10.3.15 EFACC (Access control class) .............................................................................................................................. 64
`10.3.16 EFFPLMN (Forbidden PLMNs) ............................................................................................................................. 65
`10.3.17 EFLOCI (Location information) ........................................................................................................................... 66
`10.3.18 EFAD (Administrative data) ................................................................................................................................. 67
`10.3.19 EFPhase (Phase identification) .............................................................................................................................. 68
`10.3.20 EFVGCS (Voice Group Call Service) ................................................................................................................... 69
`10.3.21 EFVGCSS (Voice Group Call Service Status) ....................................................................................................... 70
`10.3.22 EFVBS (Voice Broadcast Service) ....................................................................................................................... 71
`10.3.23 EFVBSS (Voice Broadcast Service Status) ........................................................................................................... 73
`10.3.24 EFeMLPP (enhanced Multi Level Pre-emption and Priority) ............................................................................... 73
`10.3.25 EFAAeM (Automatic Answer for eMLPP Service) .............................................................................................. 74
`10.3.26 EFCBMID (Cell Broadcast Message Identifier for Data Download) .................................................................... 75
`10.3.27 EFECC (Emergency Call Codes) ........................................................................................................................ 75
`10.3.28 EFCBMIR (Cell broadcast message identifier range selection) ............................................................................ 76
`10.3.29 EFDCK De-personalization Control Keys ............................................................................................................ 77
`10.3.30 EFCNL (Co-operative Network List) ................................................................................................................... 77
`10.3.31 EFNIA (Network's Indication of Alerting) ........................................................................................................... 78
`10.3.32 EFKcGPRS (GPRS Ciphering key KcGPRS) ........................................................................................................ 79
`10.3.33 EFLOCIGPRS (GPRS location information) .......................................................................................................... 79
`10.3.34 EFSUME (SetUpMenu Elements) ......................................................................................................................... 81
`10.3.35 EFPLMNwAcT (User controlled PLMN Selector with Access Technology) ......................................................... 81
`10.3.36 EFOPLMNwAcT (Operator controlled PLMN Selector with Access Technology) ................................................ 83
`10.3.37 EFHPLMNwAcT (HPLMN Selector with Access Technology) .............................................................................. 83
`10.3.38 EFCPBCCH (CPBCCH Information) ..................................................................................................................... 84
`10.3.39 EFInvScan (Investigation Scan) ............................................................................................................................. 85
`10.3.40 EFRPLMNAcT (RPLMN Last used Access Technology) ....................................................................................... 86
`10.4
`Contents of DFs at the GSM application level ................................................................................................... 86
`10.4.1
`Contents of files at the GSM SoLSA level ........................................................................................................ 86
`10.4.1.1
`EFSAI (SoLSA Access Indicator) .................................................................................................................. 86
`10.4.1.2
`EFSLL (SoLSA LSA List) .............................................................................................................................. 87
`10.4.1.3
`LSA Descriptor files...................................................................................................................................... 89
`10.4.2
`Contents of files at the MExE level .................................................................................................................... 90
`10.4.2.1
`EFMExE-ST (MExE Service table) ................................................................................................................... 90
`10.4.2.2
`EFORPK (Operator Root Public Key) ............................................................................................................. 91
`10.4.2.3
`EFARPK (Administrator Root Public Key) ..................................................................................................... 93
`10.4.2.4
`EFTPRPK (Third Party Root Public key) ......................................................................................................... 93
`10.4.2.5
`Trusted Key/Certificates Data Files .............................................................................................................. 94
`10.5
`Contents of files at the telecom level ................................................................................................................. 94
`10.5.1
`EFADN (Abbreviated dialling numbers) .............................................................................................................. 94
`10.5.2
`EFFDN (Fixed dialling numbers) ......................................................................................................................... 98
`10.5.3
`EFSMS (Short messages) ...................................................................................................................................... 98
`10.5.4
`Capability configuration parameters .................................................................................................................. 99
`10.5.4.1
`EFCCP (Capability configuration parameters) ............................................................................................... 99
`10.5.4.2
`EFECCP (Extended Capability configuration parameters) .......................................................................... 100
`10.5.5
`EFMSISDN (MSISDN) ......................................................................................................................................... 100
`10.5.6
`EFSMSP (Short message service parameters) ................................................................................................... 101
`10.5.7
`EFSMSS (SMS status) ......................................................................................................................................... 102
`10.5.8
`EFLND (Last number dialled) ............................................................................................................................. 103
`
`3GPP
`
`Dell Inc., Ex. 1022
`
`

`

`
`Release 1999
`
`6
`
`3GPP TS 11.11 V8.6.0 (2001-12)
`
`EFSDN (Service Dialling Numbers) ................................................................................................................... 104
`10.5.9
`10.5.10 EFEXT1 (Extension1) .......................................................................................................................................... 104
`10.5.11 EFEXT2 (Extension2) .......................................................................................................................................... 106
`10.5.12 EFEXT3 (Extension3) .......................................................................................................................................... 106
`10.5.13 EFBDN (Barred Dialling Numbers) .................................................................................................................... 106
`10.5.14 EFEXT4 (Extension4) .......................................................................................................................................... 107
`10.5.15 EFSMSR (Short message status reports) ............................................................................................................. 107
`10.5.16 EFCMI (Comparison Method Information) ....................................................................................................... 108
`10.6
`DFs at the telecom level .................................................................................................................................... 109
`10.6.1
`Contents of files at the telecom graphics level................................................................................................. 109
`10.6.1.1
`EFIMG (Image) ............................................................................................................................................. 109
`10.6.1.2
`Image Instance Data Files ........................................................................................................................... 111
`10.7
`Files of GSM ..................................................................................................................................................... 111
`11 Application protocol ............................................................................................................................. 113
`11.1
`General procedures ........................................................................................................................................... 115
`11.1.1
`Reading an EF ...............

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket