没有合适的资源?快使用搜索试试~ 我知道了~
GSM 11.11 version 8.3.0
需积分: 9 9 下载量 143 浏览量
2011-01-27
17:15:23
上传
评论
收藏 920KB PDF 举报
温馨提示
试读
170页
GSM 11.11 version 8.3.0 Release 1999
资源推荐
资源详情
资源评论
ETSI TS 100 977 V8.3.0 (2000-08)
Technical Specification
Digital cellular telecommunications system (Phase 2+);
Specification of the Subscriber Identity Module -
Mobile Equipment (SIM - ME) interface
(GSM 11.11 version 8.3.0 Release 1999)
GLOBAL SYSTEM FOR
MOBILE COMMUNICATIONS
R
ETSI
ETSI TS 100 977 V8.3.0 (2000-08)2(GSM 11.11 version 8.3.0 Release 1999)
Reference
RTS/SMG-091111Q8R1
Keywords
Digital cellular telecommunications system,
Global System for Mobile communications (GSM)
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.:+33492944200 Fax:+33493654716
Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88
Important notice
Individual copies of the present document can be downloaded from:
http://www.etsi.org
The present document may be made available in more than one electronic version or in print. In any case of existing or
perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).
In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network
drive within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at http://www.etsi.org/tb/status/
If you find errors in the present document, send your comment to:
editor@etsi.fr
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 2000.
All rights reserved.
ETSI
ETSI TS 100 977 V8.3.0 (2000-08)3(GSM 11.11 version 8.3.0 Release 1999)
Contents
Intellectual Property Rights................................................................................................................................9
Foreword ............................................................................................................................................................9
1 Scope......................................................................................................................................................10
2 References..............................................................................................................................................10
3 Definitions, abbreviations and symbols.................................................................................................13
3.1 Definitions........................................................................................................................................................13
3.2 Abbreviations ...................................................................................................................................................14
3.3 Symbols............................................................................................................................................................15
4 Physical characteristics..........................................................................................................................16
4.1 Format and layout.............................................................................................................................................16
4.1.1 ID-1 SIM.....................................................................................................................................................16
4.1.2 Plug-in SIM ................................................................................................................................................16
4.2 Temperature range for card operation..............................................................................................................16
4.3 Contacts............................................................................................................................................................16
4.3.1 Provision of contacts...................................................................................................................................16
4.3.2 Activation and deactivation ........................................................................................................................17
4.3.3 Inactive contacts .........................................................................................................................................17
4.3.4 Contact pressure..........................................................................................................................................17
4.4 Precedence........................................................................................................................................................17
4.5 Static Protection ...............................................................................................................................................17
5 Electronic signals and transmission protocols .......................................................................................17
5.1 Supply voltage Vcc (contact C1)......................................................................................................................18
5.2 Reset (RST) (contact C2) .................................................................................................................................18
5.3 Programming voltage Vpp (contact C6)...........................................................................................................18
5.4 Clock CLK (contact C3)...................................................................................................................................19
5.5 I/O (contact C7)................................................................................................................................................19
5.6 States ................................................................................................................................................................19
5.7 Baudrate ...........................................................................................................................................................20
5.8 Answer To Reset (ATR)...................................................................................................................................20
5.8.1 Structure and contents.................................................................................................................................20
5.8.2 PPS procedure ............................................................................................................................................22
5.8.3 Speed enhancement.....................................................................................................................................23
5.9 Bit/character duration and sampling time.........................................................................................................23
5.10 Error handling ..................................................................................................................................................23
6 Logical Model........................................................................................................................................24
6.1 General description...........................................................................................................................................24
6.2 File identifier....................................................................................................................................................24
6.3 Dedicated files..................................................................................................................................................25
6.4 Elementary files................................................................................................................................................25
6.4.1 Transparent EF ...........................................................................................................................................25
6.4.2 Linear fixed EF...........................................................................................................................................25
6.4.3 Cyclic EF ....................................................................................................................................................26
6.5 Methods for selecting a file..............................................................................................................................27
6.6 Reservation of file IDs......................................................................................................................................28
7 Security features.....................................................................................................................................29
7.1 Authentication and cipher key generation procedure .......................................................................................29
7.2 Algorithms and processes.................................................................................................................................29
7.3 File access conditions.......................................................................................................................................29
8 Description of the functions...................................................................................................................30
8.1 SELECT...........................................................................................................................................................31
8.2 STATUS...........................................................................................................................................................31
ETSI
ETSI TS 100 977 V8.3.0 (2000-08)4(GSM 11.11 version 8.3.0 Release 1999)
8.3 READ BINARY...............................................................................................................................................31
8.4 UPDATE BINARY..........................................................................................................................................32
8.5 READ RECORD..............................................................................................................................................32
8.6 UPDATE RECORD.........................................................................................................................................33
8.7 SEEK................................................................................................................................................................33
8.8 INCREASE ......................................................................................................................................................34
8.9 VERIFY CHV..................................................................................................................................................34
8.10 CHANGE CHV................................................................................................................................................35
8.11 DISABLE CHV................................................................................................................................................35
8.12 ENABLE CHV.................................................................................................................................................35
8.13 UNBLOCK CHV .............................................................................................................................................36
8.14 INVALIDATE..................................................................................................................................................36
8.15 REHABILITATE.............................................................................................................................................36
8.16 RUN GSM ALGORITHM...............................................................................................................................37
8.17 SLEEP..............................................................................................................................................................37
8.18 TERMINAL PROFILE ....................................................................................................................................37
8.19 ENVELOPE .....................................................................................................................................................37
8.20 FETCH.............................................................................................................................................................37
8.21 TERMINAL RESPONSE ................................................................................................................................38
9 Description of the commands.................................................................................................................38
9.1 Mapping principles...........................................................................................................................................38
9.2 Coding of the commands..................................................................................................................................41
9.2.1 SELECT......................................................................................................................................................41
9.2.2 STATUS.....................................................................................................................................................44
9.2.3 READ BINARY.........................................................................................................................................44
9.2.4 UPDATE BINARY ....................................................................................................................................44
9.2.5 READ RECORD ........................................................................................................................................44
9.2.6 UPDATE RECORD ...................................................................................................................................44
9.2.7 SEEK..........................................................................................................................................................45
9.2.8 INCREASE.................................................................................................................................................45
9.2.9 VERIFY CHV ............................................................................................................................................46
9.2.10 CHANGE CHV ..........................................................................................................................................46
9.2.11 DISABLE CHV..........................................................................................................................................46
9.2.12 ENABLE CHV...........................................................................................................................................46
9.2.13 UNBLOCK CHV........................................................................................................................................47
9.2.14 INVALIDATE............................................................................................................................................47
9.2.15 REHABILITATE .......................................................................................................................................47
9.2.16 RUN GSM ALGORITHM .........................................................................................................................47
9.2.17 SLEEP ........................................................................................................................................................47
9.2.18 GET RESPONSE .......................................................................................................................................48
9.2.19 TERMINAL PROFILE...............................................................................................................................48
9.2.20 ENVELOPE................................................................................................................................................48
9.2.21 FETCH .......................................................................................................................................................48
9.2.22 TERMINAL RESPONSE...........................................................................................................................49
9.3 Definitions and coding .....................................................................................................................................49
9.4 Status conditions returned by the card..............................................................................................................50
9.4.1 Responses to commands which are correctly executed...............................................................................50
9.4.2 Responses to commands which are postponed............................................................................................51
9.4.3 Memory management..................................................................................................................................51
9.4.4 Referencing management............................................................................................................................51
9.4.5 Security management..................................................................................................................................51
9.4.6 Application independent errors...................................................................................................................51
9.4.7 Commands versus possible status responses...............................................................................................52
10 Contents of the Elementary Files (EF)...................................................................................................52
10.1 Contents of the EFs at the MF level .................................................................................................................53
10.1.1 EF
ICCID
(ICC Identification) .......................................................................................................................53
10.1.2 EF
ELP
(Extended language preference).......................................................................................................54
10.2 DFs at the GSM application level.....................................................................................................................54
10.3 Contents of files at the GSM application level.................................................................................................55
ETSI
ETSI TS 100 977 V8.3.0 (2000-08)5(GSM 11.11 version 8.3.0 Release 1999)
10.3.1 EF
LP
(Language preference) .......................................................................................................................55
10.3.2 EF
IMSI
(IMSI)..............................................................................................................................................55
10.3.3 EF
Kc
(Ciphering key Kc).............................................................................................................................56
10.3.4 EF
PLMNsel
(PLMN selector).........................................................................................................................57
10.3.5 EF
HPLMN
(HPLMN search period)..............................................................................................................57
10.3.6 EF
ACMmax
(ACM maximum value)..............................................................................................................58
10.3.7 EF
SST
(SIM service table) ...........................................................................................................................59
10.3.8 EF
ACM
(Accumulated call meter)................................................................................................................61
10.3.9 EF
GID1
(Group Identifier Level 1)...............................................................................................................62
10.3.10 EF
GID2
(Group Identifier Level 2)...............................................................................................................62
10.3.11 EF
SPN
(Service Provider Name)..................................................................................................................62
10.3.12 EF
PUCT
(Price per unit and currency table) .................................................................................................63
10.3.13 EF
CBMI
(Cell broadcast message identifier selection).................................................................................64
10.3.14 EF
BCCH
(Broadcast control channels) .........................................................................................................65
10.3.15 EF
ACC
(Access control class)......................................................................................................................65
10.3.16 EF
FPLMN
(Forbidden PLMNs).....................................................................................................................66
10.3.17 EF
LOCI
(Location information)....................................................................................................................67
10.3.18 EF
AD
(Administrative data).........................................................................................................................68
10.3.19 EF
Phase
(Phase identification)......................................................................................................................69
10.3.20 EF
VGCS
(Voice Group Call Service)............................................................................................................70
10.3.21 EF
VGCSS
(Voice Group Call Service Status)................................................................................................71
10.3.22 EF
VBS
(Voice Broadcast Service)................................................................................................................72
10.3.23 EF
VBSS
(Voice Broadcast Service Status) ...................................................................................................74
10.3.24 EF
eMLPP
(enhanced Multi Level Pre-emption and Priority) ........................................................................74
10.3.25 EF
AAeM
(Automatic Answer for eMLPP Service).......................................................................................75
10.3.26 EF
CBMID
(Cell Broadcast Message Identifier for Data Download) .............................................................76
10.3.27 EF
ECC
(Emergency Call Codes).................................................................................................................76
10.3.28 EF
CBMIR
(Cell broadcast message identifier range selection)......................................................................77
10.3.29 EF
DCK
De-personalization Control Keys ....................................................................................................78
10.3.30 EF
CNL
(Co-operative Network List)............................................................................................................78
10.3.31 EF
NIA
(Network's Indication of Alerting)....................................................................................................79
10.3.32 EF
KcGPRS
(GPRS Ciphering key KcGPRS).................................................................................................80
10.3.33 EF
LOCIGPRS
(GPRS location information)...................................................................................................80
10.3.34 EF
SUME
(SetUpMenu Elements)..................................................................................................................82
10.3.35 EF
PLMNwACT
(PLMN Selector with Access Technology)............................................................................82
10.3.36 EF
OPLMNwACT
(Operator controlled PLMN Selector with Access Technology)..........................................84
10.3.37 EF
HPLMNACT
(HPLMN Access Technology)...............................................................................................85
10.3.38 EF
CPBCCH
(CPBCCH Information) .............................................................................................................85
10.3.39 EF
InvScan
(Investigation PLMN Scan)..........................................................................................................86
10.4 Contents of DFs at the GSM application level .................................................................................................87
10.4.1 Contents of files at the GSM SoLSA level..................................................................................................87
10.4.1.1 EF
SAI
(SoLSA Access Indicator)...........................................................................................................87
10.4.1.2 EF
SLL
(SoLSA LSA List) ......................................................................................................................88
10.4.1.3 LSA Descriptor files..............................................................................................................................90
10.4.2 Contents of files at the MExE level ............................................................................................................91
10.4.2.1 EF
MExE-ST
(MExE Service table)............................................................................................................91
10.4.2.2 EF
ORPK
(Operator Root Public Key)......................................................................................................92
10.4.2.3 EF
ARPK
(Administrator Root Public Key)..............................................................................................94
10.4.2.4 EF
TPRPK
(Third Party Root Public key) .................................................................................................94
10.4.2.5 Trusted Key/Certificates Data Files ......................................................................................................95
10.5 Contents of files at the telecom level................................................................................................................95
10.5.1 EF
ADN
(Abbreviated dialling numbers).......................................................................................................95
10.5.2 EF
FDN
(Fixed dialling numbers)..................................................................................................................99
10.5.3 EF
SMS
(Short messages)..............................................................................................................................99
10.5.4 Capability configuration parameters.........................................................................................................100
10.5.4.1 EF
CCP
(Capability configuration parameters)......................................................................................100
10.5.4.2 EF
ECCP
(Extended Capability configuration parameters) ....................................................................101
10.5.5 EF
MSISDN
(MSISDN).................................................................................................................................101
10.5.6 EF
SMSP
(Short message service parameters)............................................................................................102
10.5.7 EF
SMSS
(SMS status) .................................................................................................................................103
剩余169页未读,继续阅读
资源评论
shinelee125
- 粉丝: 0
- 资源: 1
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功