1、 ETSI EN 300 812-3 V2.3.1 (2005-12)European Standard (Telecommunications series) Terrestrial Trunked Radio (TETRA);Subscriber Identity Module toMobile Equipment (SIM-ME) interface;Part 3: Integrated Circuit (IC);Physical, logical and TSIM application characteristicsETSI ETSI EN 300 812-3 V2.3.1 (200
2、5-12) 2 Reference REN/TETRA-03149 Keywords card, security, SIM, TETRA ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 78
3、03/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference ver
4、sion is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of st
5、atus. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notific
6、ation No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2005. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered fo
7、r the benefit of its Members. TIPHONTMand the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI EN 300 812-3 V2.3.1 (2005-12) 3 Con
8、tent Intellectual Property Rights8 Foreword.8 1 Scope 9 2 References 9 3 Definitions, symbols and abbreviations .11 3.1 Definitions11 3.2 Symbols13 3.3 Abbreviations .13 4 SIM characteristics.15 4.1 Format and layout.15 4.1.1 SIM .15 4.1.2 Plug-in SIM 15 4.2 Temperature range for card operation 15 4
9、.3 Contacts15 4.3.1 Provision of contacts.15 4.3.2 Activation and deactivation 16 4.3.3 Inactive contacts (contact conditions in the ME switched-off state).16 4.3.4 Contact pressure16 4.4 Precedence (multiple SIM operation).16 4.5 Static protection17 5 Electronic signals and transmission protocols17
10、 5.1 Supply voltage Vcc (contact C1)17 5.1.1 5 V technology SIM17 5.1.2 3 V technology SIM17 5.1.3 3 V technology SIM identification .17 5.1.4 3 V technology ME.17 5.1.5 3 V Only ME 18 5.1.6 Activation and deactivation of 3 V technology SIM 18 5.1.7 Supply voltage switching18 5.1.8 Cross compatibili
11、ty.18 5.1.9 Technology outlook 18 5.2 Reset (RST) (contact C2) .18 5.3 Programming voltage Vpp (contact C6).18 5.4 Clock CLK (contact C3).19 5.5 Input/Output (I/O) (contact C7)19 5.6 States 19 5.7 Baud rate 19 5.8 Answer To Reset (ATR).19 5.9 Bit/character duration and sampling time.19 5.10 Error ha
12、ndling 20 6 Logical model.20 6.1 General description.20 6.2 File identifier 20 6.3 Dedicated Files (DF) 21 6.4 Elementary Files (EF) 21 6.4.1 Transparent EF21 6.4.2 Linear fixed EF .22 6.4.3 Key EF22 6.4.4 Cyclic EF 23 6.5 Methods for selecting a file 23 6.6 Reservation of file IDs .24 7 Security fe
13、atures.25 7.1 Authentication and cipher key generation procedure .25 ETSI ETSI EN 300 812-3 V2.3.1 (2005-12) 4 7.2 Support of Over The Air Re-keying (OTAR) distribution of cipher keys26 7.3 Support of SIM-ME enhanced security26 7.4 File access conditions.26 7.5 Storage of DCK27 8 Description of the
14、functions .28 8.1 SELECT .28 8.2 STATUS.28 8.3 READ BINARY.29 8.4 UPDATE BINARY29 8.5 READ RECORD29 8.6 READ KEY30 8.7 UPDATE RECORD.30 8.8 SEEK31 8.9 VERIFY CHV 31 8.10 CHANGE CHV32 8.11 DISABLE CHV32 8.12 ENABLE CHV.33 8.13 UNBLOCK CHV .33 8.14 INVALIDATE .33 8.15 REHABILITATE .33 8.16 TETRA authe
15、ntication algorithms .34 8.16.1 GET RANDOM34 8.16.2 TA11/TA12 ALGORITHM34 8.16.3 TA21/TA22 ALGORITHM34 8.16.4 TB4/TE ALGORITHM 35 8.17 OTAR algorithms.35 8.17.1 TA32 ALGORITHM 35 8.17.2 TA41/TA82 ALGORITHM35 8.17.3 TA41/TA52 ALGORITHM36 8.17.4 TA71/TE ALGORITHM 36 8.17.5 TB7/TA52 ALGORITHM36 8.17.6
16、TA41/TA92 ALGORITHM36 8.17.7 TB7/TA52 ALGORITHM37 9 Description of the commands.37 9.1 Mapping principles.37 9.2 Coding of the commands39 9.2.1 SELECT40 9.2.2 STATUS .41 9.2.3 READ BINARY .42 9.2.4 UPDATE BINARY 42 9.2.5 READ RECORD 42 9.2.6 UPDATE RECORD .42 9.2.7 READ KEY 43 9.2.8 SEEK 43 9.2.9 VE
17、RIFY CHV 43 9.2.10 CHANGE CHV 44 9.2.11 DISABLE CHV 44 9.2.12 ENABLE CHV .44 9.2.13 UNBLOCK CHV44 9.2.14 INVALIDATE45 9.2.15 REHABILITATE .45 9.2.16 GET RANDOM45 9.2.17 TA11/TA12 ALGORITHM45 9.2.18 TA21/TA22 ALGORITHM45 9.2.19 TB4/TE ALGORITHM 46 9.2.20 TA32 ALGORITHM 46 9.2.21 TA41/TA82 ALGORITHM46
18、 9.2.22 TA41/TA52 ALGORITHM46 9.2.23 TA71/TE ALGORITHM 47 9.2.24 GET RESPONSE47 ETSI ETSI EN 300 812-3 V2.3.1 (2005-12) 5 9.2.25 TB7/TA52 ALGORITHM47 9.2.26 TA41/TA92 ALGORITHM47 9.2.27 TB7/TA82 ALGORITHM48 9.3 Definitions and coding .48 9.4 Status conditions returned by the card49 9.4.1 Responses t
19、o commands which are correctly executed 49 9.4.2 Memory management .49 9.4.3 Referencing management .50 9.4.4 Security management50 9.4.5 Application independent errors.50 9.4.6 Commands versus possible status responses 51 10 Contents of the EFs 51 10.1 General requirements .51 10.2 Contents of the
20、EFs at the MF level .52 10.2.1 EFICCID(Card Identification).52 10.2.2 EFDIR(Application directory) .53 10.2.3 EFLP(Language Preference) .54 10.3 Contents of the EFs at the TETRA application level .54 10.3.1 EFSST(SIM Service Table) .54 10.3.2 EFITSI(Individual Tetra Subscriber Identity) 57 10.3.3 EF
21、ITSIDIS(ITSI Disabled).59 10.3.4 EFUNAME(Username) 59 10.3.5 EFSCT(Subscriber Class Table).60 10.3.6 EFPHASE(Phase identification) 61 10.3.7 EFCCK(Common Cipher Key) 61 10.3.8 EFCCKLOC(CCK location areas) 63 10.3.9 EFSCK(Static Cipher Keys).67 10.3.10 EFGSSIS(Static GSSIs).68 10.3.11 EFGRDS(Group re
22、lated data for static GSSIs) .70 10.3.12 EFGSSID(Dynamic GSSIs).71 10.3.13 EFGRDD(Group related data for dynamic GSSIs)71 10.3.14 EFGCK(Group Cipher Keys) .72 10.3.15 Void 74 10.3.16 EFGINFO(Users group information) 74 10.3.17 EFSEC(Security settings).76 10.3.18 EFFORBID(Forbidden networks).76 10.3.
23、19 EFPREF(Preferred networks) .78 10.3.20 EFSPN(Service Provider Name) 79 10.3.21 Void 79 10.3.22 EFDNWRK(Broadcast network information).79 10.3.23 EFNWT(Network table) .80 10.3.24 EFGWT(Gateway table) .81 10.3.25 EFCMT(Call Modifier Table).83 10.3.26 EFADNGWT(Abbreviated Dialling Number with Gatewa
24、ys) 85 10.3.27 EFGWTEXT1(Gateway Extension1).87 10.3.28 EFADNTETRA(Abbreviated dialling numbers for TETRA network) .87 10.3.29 EFEXTA(Extension A) .89 10.3.30 EFFDNGWT(Fixed dialling numbers with Gateways) .89 10.3.31 EFGWTEXT2(Gateway Extension2).90 10.3.32 EFFDNTETRA(Fixed dialling numbers for TET
25、RA network) 91 10.3.33 EFEXTB(Extension B)91 10.3.34 EFLNDGWT(Last number dialled with Gateways) 92 10.3.35 EFLNDTETRA(Last numbers dialled for TETRA network)92 10.3.36 EFSDNGWT(Service Dialling Numbers with gateway) .93 10.3.37 EFGWTEXT3(Gateway Extension3).93 10.3.38 EFSDNTETRA (Service Dialling N
26、umbers for TETRA network)94 10.3.39 EFSTXT(Status message texts).94 10.3.40 EFMSGTXT(SDS-1 message texts)95 10.3.41 EFSDS123(Status and SDS type 1, 2 and 3 message storage) .96 10.3.42 EFSDS4(SDS type 4 message storage).98 10.3.43 EFMSGEXT(Message Extension).104 ETSI ETSI EN 300 812-3 V2.3.1 (2005-1
27、2) 6 10.3.44 EFEADDR(Emergency addresses).105 10.3.45 EFEINFO(Emergency call information)107 10.3.46 EFDMOCh(DMO radio channel information) .108 10.3.47 EFMSCh(MS allocation of DMO channels) .109 10.3.48 EFKH(List of Key Holders).110 10.3.49 EFREPGATE(DMO repeater and gateway list) 111 10.3.50 EFAD(
28、Administrative data).112 10.3.51 EFPREF_LA(Preferred location areas) .112 10.3.52 EFLNDComp(Composite LND file)113 10.3.53 EFDFLTSTSGT(Status Default Target)114 10.3.54 EFSDSMEM_STATUS(SDS Memory Status) .117 10.3.55 EFWELCOME(Welcome Message).118 10.3.56 EFSDSR(SDS delivery report)118 10.3.57 EFSDS
29、P(SDS parameters) 119 10.3.58 EFDIALSC(Dialling schemes for TETRA network)120 10.3.59 EFAPN(APN table) 121 10.3.60 Void 122 10.3.61 EFPNI(Private Number Information).122 10.3.62 EFSCAN(Scan list files)123 10.3.63 EFSCAND(Scan list data)123 10.3.64 EFDMO_GSSIS(DMO pre-programmed group numbers)124 10.
30、3.65 EFDMO_GRDS(Group related data for DMO static GSSIs)125 10.3.66 EFGTMO_GDMO(TMO - DMO selected group association) .126 10.3.67 EFGDMO_GTMO(DMO - TMO selected group association) .126 10.3.68 EFDMO_DEP(Default encryption parameters) .127 10.3.69 EFGSKO( Group Session Key) .128 10.4 Contents of the
31、 EFs at the Telecom level .130 10.4.1 EFADN(Abbreviated dialling numbers).130 10.4.2 EFFDN(Fixed dialling numbers)133 10.4.3 EFMSISDN(MSISDN) .133 10.4.4 EFLND(Last number dialled).134 10.4.5 EFSDN(Service Dialling Numbers) .134 10.4.6 EFEXT1(Extension1)135 10.4.7 EFEXT2(Extension2)136 10.4.8 EFEXT3
32、(Extension3)137 10.5 Files of TETRA137 11 Application protocol.139 11.1 General procedures.140 11.1.1 Reading an EF.140 11.1.2 Updating an EF .141 11.1.3 Invalidating an EF.141 11.2 SIM management procedures.141 11.2.1 SIM initialization 141 11.2.2 TETRA session initialization141 11.2.3 TETRA sessio
33、n termination142 11.2.4 Language preference request 142 11.2.5 Administrative information request 142 11.2.6 SIM service table request142 11.2.7 SIM phase request.142 11.2.8 SIM presence detection.142 11.2.9 SIM card number request142 11.2.10 Common Cipher Key request142 11.3 CHV related procedures
34、.143 11.3.1 CHV verification 143 11.3.2 CHV value substitution.143 11.3.3 CHV disabling 143 11.3.4 CHV enabling .144 11.3.5 CHV unblocking.144 11.4 TETRA security related procedures .144 11.4.1 Authentication procedures and generation of DCK 145 11.4.1.1 Mutual authentication requirement request.145
35、 ETSI ETSI EN 300 812-3 V2.3.1 (2005-12) 7 11.4.1.2 SIM authentication145 11.4.1.3 SwMI authentication .145 11.4.2 TETRA OTAR key computation (CCK, GCK, SCK) 145 11.4.2.1 CCK distribution.145 11.4.2.2 CCK changeover .145 11.4.2.3 GCK distribution.145 11.4.2.4 SCK distribution .146 11.4.3 ITSI reques
36、t 146 11.4.4 ITSI disabling/re-enabling 146 11.5 Subscription related procedures .146 11.5.1 Username request146 11.5.2 ITSI temporarily disabled enquiry146 11.5.3 Subscriber class request 147 11.5.4 Void 147 11.5.5 Group identity information .147 11.5.5.1 Static Group identity information .147 11.5
37、.5.2 Dynamic Group identity information147 11.5.6 Group related data.147 11.5.7 Users group information 147 11.5.8 Call modifiers .148 11.5.9 Service Provider Name .148 11.5.10 DMO channel procedures .148 11.5.11 Emergency addresses148 11.5.12 Interrupted emergency call request.148 11.6 Network rela
38、ted procedures148 11.6.1 Forbidden networks 149 11.6.2 Preferred networks149 11.7 Dialling number related procedures .149 11.7.1 Dialling numbers under DFTETRA149 11.7.2 Dialling numbers under DFTELECOM150 11.7.3 FDNGWT specific procedures .152 11.7.3.1 FDNGWT capability request 152 11.7.3.2 FDNGWT
39、disabling152 11.7.3.3 FDNGWT enabling.152 11.8 Status and short data message procedures152 11.8.1 Display of status message texts.153 11.8.2 Display of SDS1 message texts 153 11.8.3 Storage of status and SDS messages types 1, 2 and 3.153 11.8.4 Storage of SDS messages type 4.153 11.8.5 SDS delivery
40、report 154 11.8.6 Default Status Target 154 Annex A (normative): Plug-in SIM.155 Annex B (informative): FDN Procedures.156 Annex C (informative): Suggested contents of EFs at pre-personalization.157 C.1 Contents of the EFs at the MF level.157 C.2 Contents of the EFs at the TETRA application level .1
41、57 C.3 Contents of the EFs at the Telecom Level159 Annex D (normative): Database structure for group IDs and phone books .160 Annex E (informative): Emergency call facilities and procedures.162 Annex F (informative): Composite List of Last Dialled Numbers. 164 Annex G (informative): Bibliography.165
42、 Annex H (informative): Change requests.166 History 167 ETSI ETSI EN 300 812-3 V2.3.1 (2005-12) 8 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly avail
43、able for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web serve
44、r (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be,
45、 or may become, essential to the present document. Foreword This European Standard (Telecommunications series) has been produced by ETSI Technical Committee Terrestrial Trunked Radio (TETRA). It was originally published as EN 300 812 (V2.1.1) and then converted into a sub-part EN 300 812-3 to suppor
46、t technology defined in the present document. The other parts of this series are currently published in TS and ES formats: The present document is part 3 of a multi-part deliverable covering the Subscriber Identity Module to Mobile Equipment (SIM-ME) interface, as identified below: ES 200 812-1: “Un
47、iversal Integrated Circuit Card (UICC); Physical and logical characteristics“; ES 200 812-2: “Universal Integrated Circuit Card (UICC); Characteristics of the TSIM application“; EN 200 812-3: “Integrated Circuit (IC); Physical, logical and TSIM application characteristics“. NOTE: Part 3 was original
48、ly published as EN 300 812 and defines different technology than part 1 and part 2. National transposition dates Date of adoption of this EN: 16 December 2005 Date of latest announcement of this EN (doa): 31 March 2006 Date of latest publication of new National Standard or endorsement of this EN (do
49、p/e): 30 September 2006 Date of withdrawal of any conflicting National Standard (dow): 30 September 2006 ETSI ETSI EN 300 812-3 V2.3.1 (2005-12) 9 1 Scope The present document defines the interface between the Subscriber Identity Module (SIM) and the Mobile Equipment (ME) for use during the network operation phase of TETRA as well as those aspects of the internal organization of the SIM which are related to the network operation phase. This is to ensure interoperability between a SIM and a ME independently of the respective manufacturers and operators. The concept of a split o
copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1