没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论
ETSI TS 102 221 V6.4.0 (2004-03)
Technical Specification
Smart cards;
UICC-Terminal interface;
Physical and logical characteristics
(Release 6)
ETSI
E
TSI TS 102 221 V6.4.0 (2004
-
0
3)
2
Release 6
Reference
RTS/SCP-010265r4
Keywords
smart card
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88
Important notice
Individual copies of the present document can be downloaded from:
http://www.etsi.org
The present document may be made available in more than one electronic version or in print. In any case of existing or
perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).
In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive
within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
http://portal.etsi.org/tb/status/status.asp
If you find errors in the present document, send your comment to:
editor@etsi.org
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 2004.
All rights reserved.
DECT
TM
, PLUGTESTS
TM
and UMTS
TM
are Trade Marks of ETSI registered for the benefit of its Members.
TIPHON
TM
and the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members.
3GPP
TM
is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners.
ETSI
E
TSI TS 102 221 V6.4.0 (2004
-
0
3)
3
Release 6
Contents
Intellectual Property Rights..............................................................................................................................10
Foreword...........................................................................................................................................................10
Introduction ......................................................................................................................................................10
1 Scope......................................................................................................................................................11
2 References..............................................................................................................................................11
3 Definitions, symbols, abbreviations and coding conventions ................................................................12
3.1 Definitions........................................................................................................................................................12
3.2 Symbols............................................................................................................................................................14
3.3 Abbreviations ...................................................................................................................................................14
3.4 Coding conventions..........................................................................................................................................16
4 Physical characteristics...........................................................................................................................16
4.1 ID-1 UICC........................................................................................................................................................16
4.2 Plug-in UICC....................................................................................................................................................16
4.3 Mini-UICC.......................................................................................................................................................17
4.4 Temperature range for card operation ..............................................................................................................18
4.5 Contacts............................................................................................................................................................18
4.5.1 Provision of contacts...................................................................................................................................18
4.5.1.1 Terminal................................................................................................................................................18
4.5.1.2 UICC.....................................................................................................................................................18
4.5.2 Contact activation and deactivation............................................................................................................19
4.5.3 Inactive contacts .........................................................................................................................................19
4.5.4 Contact pressure..........................................................................................................................................19
5 Electrical specifications of the UICC - Terminal interface....................................................................19
5.1 Class A operating conditions............................................................................................................................20
5.1.1 Supply voltage Vcc (contact C1)................................................................................................................20
5.1.2 Reset (RST) (contact C2)............................................................................................................................20
5.1.3 Programming voltage Vpp (contact C6).....................................................................................................20
5.1.4 Clock CLK (contact C3).............................................................................................................................21
5.1.5 I/O (contact C7)..........................................................................................................................................21
5.2 Class B operating conditions............................................................................................................................21
5.2.1 Supply voltage Vcc (contact C1)................................................................................................................21
5.2.2 Reset (RST) (contact C2)............................................................................................................................22
5.2.3 Clock CLK (contact C3).............................................................................................................................22
5.2.4 I/O (contact C7)..........................................................................................................................................23
5.3 Class C operating conditions............................................................................................................................23
5.3.1 Supply voltage Vcc (contact C1)................................................................................................................23
5.3.2 Reset (RST) (contact C2)............................................................................................................................23
5.3.3 Clock CLK (contact C3).............................................................................................................................24
5.3.4 I/O (contact C7)..........................................................................................................................................24
6 Initial communication establishment procedures...................................................................................24
6.1 UICC activation and deactivation.....................................................................................................................24
6.2 Supply voltage switching .................................................................................................................................25
6.2.1 Supply voltage classes ................................................................................................................................25
6.2.2 Power consumption of the UICC during ATR............................................................................................25
6.2.3 Application related electrical parameters....................................................................................................26
6.3 Answer To Reset content .................................................................................................................................26
6.3.1 Coding of historical bytes...........................................................................................................................27
6.3.2 Speed enhancement.....................................................................................................................................27
6.4 PPS procedure..................................................................................................................................................27
6.5 Reset procedures ..............................................................................................................................................27
6.5.1 Cold reset....................................................................................................................................................28
6.5.2 Warm reset..................................................................................................................................................28
ETSI
E
TSI TS 102 221 V6.4.0 (2004
-
0
3)
4
Release 6
6.5.3 Reaction to resets........................................................................................................................................28
6.6 Clock stop mode...............................................................................................................................................28
6.7 Bit/character duration and sampling time.........................................................................................................28
6.8 Error handling ..................................................................................................................................................28
6.9 Compatibility....................................................................................................................................................29
7 Transmission protocols...........................................................................................................................29
7.1 Physical layer ...................................................................................................................................................30
7.2 Data link layer..................................................................................................................................................30
7.2.1 Character frame ..........................................................................................................................................30
7.2.2 Transmission protocol T=0.........................................................................................................................31
7.2.2.1 Timing and specific options for characters in T=0................................................................................31
7.2.2.2 Command header ..................................................................................................................................31
7.2.2.3 Command processing............................................................................................................................31
7.2.2.3.1 Procedure bytes ...............................................................................................................................31
7.2.2.3.2 Status bytes......................................................................................................................................32
7.2.2.4 Error detection and correction...............................................................................................................32
7.2.3 Transmission protocol T=1.........................................................................................................................33
7.2.3.1 Timing and specific options for blocks sent with T=1..........................................................................33
7.2.3.1.1 Information field size ......................................................................................................................33
7.2.3.1.2 Character waiting integer.................................................................................................................33
7.2.3.1.3 Character waiting time ....................................................................................................................33
7.2.3.1.4 Block waiting time ..........................................................................................................................33
7.2.3.1.5 Block guard time .............................................................................................................................34
7.2.3.1.6 Waiting time extension....................................................................................................................34
7.2.3.1.7 Error detection code ........................................................................................................................34
7.2.3.2 Block frame structure............................................................................................................................34
7.2.3.2.1 Prologue field ..................................................................................................................................34
7.2.3.2.2 Epilogue field ..................................................................................................................................36
7.2.3.2.3 Block notations................................................................................................................................36
7.2.3.3 Error free operation...............................................................................................................................37
7.2.3.4 Error handling for T=1..........................................................................................................................37
7.2.3.4.1 Protocol initialization ......................................................................................................................37
7.2.3.4.2 Block dependent errors....................................................................................................................38
7.2.3.5 Chaining................................................................................................................................................38
7.2.3.5.1 Rules for chaining............................................................................................................................38
7.3 Transport layer .................................................................................................................................................39
7.3.1 Transportation of an APDU using T=0.......................................................................................................39
7.3.1.1 Mapping of APDUs to TPDUs..............................................................................................................39
7.3.1.1.1 Case 1 ..............................................................................................................................................39
7.3.1.1.2 Case 2 ..............................................................................................................................................40
7.3.1.1.3 Case 3 ..............................................................................................................................................40
7.3.1.1.4 Case 4 ..............................................................................................................................................41
7.3.1.1.5 Use of procedure bytes '61xx' and '6Cxx'........................................................................................42
7.3.2 Transportation of a APDU using T=1.........................................................................................................43
7.3.2.1 Case 1....................................................................................................................................................43
7.3.2.2 Case 2....................................................................................................................................................43
7.3.2.3 Case 3....................................................................................................................................................44
7.3.2.4 Case 4....................................................................................................................................................44
7.4 Application layer..............................................................................................................................................44
7.4.1 Exchange of APDUs...................................................................................................................................45
7.4.2 CAT layer ...................................................................................................................................................45
7.4.2.1 Proactive command...............................................................................................................................45
7.4.2.2 ENVELOPE Commands.......................................................................................................................45
8 Application and file structure.................................................................................................................47
8.1 UICC application structure...............................................................................................................................47
8.2 File types..........................................................................................................................................................47
8.2.1 Dedicated files ............................................................................................................................................47
8.2.2 Elementary files..........................................................................................................................................48
8.2.2.1 Transparent EF......................................................................................................................................48
8.2.2.2 Linear fixed EF .....................................................................................................................................48
ETSI
E
TSI TS 102 221 V6.4.0 (2004
-
0
3)
5
Release 6
8.2.2.3 Cyclic EF ..............................................................................................................................................48
8.3 File referencing ................................................................................................................................................49
8.4 Methods for selecting a file..............................................................................................................................49
8.4.1 SELECT by File IDentifier referencing......................................................................................................49
8.4.2 SELECT by path referencing......................................................................................................................51
8.4.3 Short File Identifier.....................................................................................................................................51
8.5 Application characteristics ...............................................................................................................................52
8.5.1 Explicit application selection......................................................................................................................52
8.5.1.1 SELECT by DF name ...........................................................................................................................52
8.5.1.2 SELECT by partial DF name................................................................................................................52
8.5.2 Application session activation ....................................................................................................................52
8.5.3 Application session termination..................................................................................................................53
8.5.4 Application session reset ............................................................................................................................53
8.5.5 GSM/USIM application interaction and restrictions...................................................................................53
8.6 Reservation of file IDs .....................................................................................................................................54
8.7 Logical channels...............................................................................................................................................55
8.8 Shareable versus not-shareable files.................................................................................................................55
9 Security features.....................................................................................................................................56
9.1 Supported security features ..............................................................................................................................56
9.2 Security architecture.........................................................................................................................................57
9.2.1 Security attributes .......................................................................................................................................57
9.2.2 Access mode...............................................................................................................................................57
9.2.3 Security condition.......................................................................................................................................57
9.2.4 Access rules ................................................................................................................................................57
9.2.5 Compact format ..........................................................................................................................................58
9.2.6 Expanded format.........................................................................................................................................58
9.2.7 Access rule referencing...............................................................................................................................59
9.3 Security environment .......................................................................................................................................59
9.3.1 Definition of the security environment.......................................................................................................60
9.3.2 Logical Channels and Security Environment..............................................................................................60
9.4 PIN definitions .................................................................................................................................................60
9.4.1 Universal PIN .............................................................................................................................................61
9.4.2 Application PIN..........................................................................................................................................61
9.4.3 Local PIN....................................................................................................................................................61
9.4.4 PINs and logical channels...........................................................................................................................61
9.5 PIN and key reference relation ship .................................................................................................................61
9.5.1 Access condition mapping..........................................................................................................................62
9.5.2 PIN status indication...................................................................................................................................64
10 Structure of commands and responses ...................................................................................................65
10.1 Command APDU structure...............................................................................................................................65
10.1.1 Coding of Class Byte..................................................................................................................................65
10.1.2 Coding of Instruction Byte .........................................................................................................................66
10.1.3 Coding of parameter bytes..........................................................................................................................66
10.1.4 Coding of Lc byte .......................................................................................................................................67
10.1.5 Coding of data part .....................................................................................................................................67
10.1.6 Coding of Le byte .......................................................................................................................................67
10.2 Response APDU structure................................................................................................................................67
10.2.1 Status conditions returned by the UICC .....................................................................................................67
10.2.1.1 Normal processing ................................................................................................................................67
10.2.1.2 Postponed processing............................................................................................................................67
10.2.1.3 Warnings...............................................................................................................................................68
10.2.1.4 Execution errors....................................................................................................................................68
10.2.1.5 Checking errors.....................................................................................................................................68
10.2.1.5.1 Functions in CLA not supported .....................................................................................................68
10.2.1.5.2 Command not allowed.....................................................................................................................69
10.2.1.5.3 Wrong parameters ...........................................................................................................................69
10.2.1.6 Application errors .................................................................................................................................69
10.2.2 Status words of the commands ...................................................................................................................70
10.3 Logical channels...............................................................................................................................................71
11 Commands..............................................................................................................................................71
剩余136页未读,继续阅读
资源评论
- liumengmei19872014-08-26东西很丰富,不太懂
jonny841121
- 粉丝: 0
- 资源: 4
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功