没有合适的资源?快使用搜索试试~ 我知道了~
首页sim卡接口规范ETSI TS 151 011
sim卡接口规范ETSI TS 151 011
5星 · 超过95%的资源 需积分: 5 113 下载量 44 浏览量
更新于2023-03-03
评论
收藏 910KB PDF 举报
Digital cellular telecommunications system (Phase 2+); Specification of the Subscriber Identity Module - Mobile Equipment (SIM-ME) interface (3GPP TS 51.011 version 4.15.0 Release 4)
资源详情
资源评论
资源推荐
ETSI TS 151 011 V4.15.0 (2005-06)
Technical Specification
Digital cellular telecommunications system (Phase 2+);
Specification of the Subscriber Identity Module -
Mobile Equipment (SIM-ME) interface
(3GPP TS 51.011 version 4.15.0 Release 4)
GLOBAL SYSTEM FOR
MOBILE COMMUNICATIONS
R
ETSI
E
TSI TS 151 011 V4.15.0 (2005
-
0
6)
1
3GPP TS 51.011 version 4.15.0 Release 4
Reference
RTS/TSGC-0651011v4f0
Keywords
GSM
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88
Important notice
Individual copies of the present document can be downloaded from:
http://www.etsi.org
The present document may be made available in more than one electronic version or in print. In any case of existing or
perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).
In case of dispute, the reference shall be the printing on ETSI print
e
rs of the PDF version kept on a specific network drive
within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
http://portal.etsi.org/tb/status/status.asp
If you find errors in the present document, please send your comment to one of the following services:
http://portal.etsi.org/chaircor/ETSI_support.asp
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 2005.
All rights reserved.
DECT
TM
, PLUGTESTS
TM
and UMTS
TM
are Trade Marks of ETSI registered for the benefit of its Members.
TIPHON
TM
and the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members.
3GPP
TM
is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners.
ETSI
E
TSI TS 151 011 V4.15.0 (2005
-
0
6)
2
3GPP TS 51.011 version 4.15.0 Release 4
Intellectual Property Rights
IPRs essential or potentially essential to the present document may have been declared to ETSI. The information
pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in
respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web
server (http://webapp.etsi.org/IPR/home.asp
).
Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
server) which are, or may be, or may become, essential to the present document.
Foreword
This Technical Specification (TS) has been produced by ETSI 3rd Generation Partnership Project (3GPP).
The present document may refer to technical specifications or reports using their 3GPP identities, UMTS identities or
GSM identities. These should be interpreted as being references to the corresponding ETSI deliverables.
The cross reference between GSM, UMTS, 3GPP and ETSI identities can be found under
http://webapp.etsi.org/key/queryform.asp
.
ETSI
E
TSI TS 151 011 V4.15.0 (2005
-
0
6)
3
3GPP TS 51.011 version 4.15.0 Release 4
Contents
Intellectual Property Rights................................................................................................................................2
Foreword.............................................................................................................................................................2
Foreword.............................................................................................................................................................9
1 Scope......................................................................................................................................................10
2 References..............................................................................................................................................10
3 Definitions, abbreviations and symbols .................................................................................................12
3.1 Definitions........................................................................................................................................................12
3.2 Abbreviations ...................................................................................................................................................13
3.3 Symbols............................................................................................................................................................15
4 Physical characteristics...........................................................................................................................15
5 Electronic signals and transmission protocols........................................................................................15
5.1 Electrical specifications....................................................................................................................................15
5.2 Initial communication establishment procedures .............................................................................................16
5.2.1 Error handling for speed enhancement .......................................................................................................16
5.3 Transmission protocols.....................................................................................................................................16
5.4 Clock ................................................................................................................................................................16
6 Application and File structure................................................................................................................16
6.1 SIM Application structure................................................................................................................................17
6.2 Void..................................................................................................................................................................17
6.3 Void..................................................................................................................................................................17
6.4 File types ..........................................................................................................................................................17
6.4.1 Dedicated files ............................................................................................................................................17
6.4.2 Elementary files..........................................................................................................................................17
6.4.2.1 Cyclic EF ..............................................................................................................................................18
6.5 Methods for selecting a file..............................................................................................................................18
7 Security features.....................................................................................................................................18
7.1 Authentication and cipher key generation procedure.......................................................................................18
7.2 Algorithms and processes.................................................................................................................................18
7.3 File access conditions.......................................................................................................................................18
8 Void........................................................................................................................................................19
9 Description of the commands.................................................................................................................20
9.1 Mapping principles...........................................................................................................................................20
9.2 Coding of the commands..................................................................................................................................22
9.2.1 SELECT......................................................................................................................................................23
9.2.2 STATUS.....................................................................................................................................................25
9.2.3 READ BINARY.........................................................................................................................................25
9.2.4 UPDATE BINARY ....................................................................................................................................25
9.2.5 READ RECORD ........................................................................................................................................26
9.2.6 UPDATE RECORD ...................................................................................................................................26
9.2.7 SEEK ..........................................................................................................................................................26
9.2.8 INCREASE.................................................................................................................................................27
9.2.9 VERIFY CHV ............................................................................................................................................27
9.2.10 CHANGE CHV ..........................................................................................................................................27
9.2.11 DISABLE CHV..........................................................................................................................................28
9.2.12 ENABLE CHV...........................................................................................................................................28
9.2.13 UNBLOCK CHV........................................................................................................................................28
9.2.14 INVALIDATE............................................................................................................................................28
9.2.15 REHABILITATE .......................................................................................................................................29
9.2.16 RUN GSM ALGORITHM .........................................................................................................................29
9.2.17 SLEEP ........................................................................................................................................................29
ETSI
E
TSI TS 151 011 V4.15.0 (2005
-
0
6)
4
3GPP TS 51.011 version 4.15.0 Release 4
9.2.18 GET RESPONSE........................................................................................................................................29
9.2.19 TERMINAL PROFILE...............................................................................................................................29
9.2.20 ENVELOPE................................................................................................................................................30
9.2.21 FETCH........................................................................................................................................................30
9.2.22 TERMINAL RESPONSE...........................................................................................................................30
9.3 Definitions and coding .....................................................................................................................................30
9.4 Status conditions returned by the card..............................................................................................................31
9.4.1 Responses to commands which are correctly executed ..............................................................................32
9.4.2 Responses to commands which are postponed ...........................................................................................32
9.4.3 Memory management .................................................................................................................................32
9.4.4 Referencing management ...........................................................................................................................32
9.4.5 Security management..................................................................................................................................32
9.4.6 Application independent errors...................................................................................................................33
9.4.7 Commands versus possible status responses ..............................................................................................33
10 Contents of the Elementary Files (EF)...................................................................................................34
10.1 Contents of the EFs at the MF level .................................................................................................................34
10.1.1 EF
ICCID
(ICC Identification) .......................................................................................................................34
10.1.2 EF
PL
(Preferred language)...........................................................................................................................34
10.2 DFs at the GSM application level ....................................................................................................................34
10.3 Contents of files at the GSM application level.................................................................................................35
10.3.1 EF
LP
(Language preference) .......................................................................................................................35
10.3.2 EF
IMSI
(IMSI)..............................................................................................................................................36
10.3.3 EF
Kc
(Ciphering key Kc).............................................................................................................................37
10.3.4 EF
PLMNsel
(PLMN selector).........................................................................................................................37
10.3.5 EF
HPPLMN
(Higher Priority PLMN search period) ......................................................................................38
10.3.6 EF
ACMmax
(ACM maximum value) .............................................................................................................38
10.3.7 EF
SST
(SIM service table) ...........................................................................................................................40
10.3.8 EF
ACM
(Accumulated call meter)................................................................................................................42
10.3.9 EF
GID1
(Group Identifier Level 1)...............................................................................................................43
10.3.10 EF
GID2
(Group Identifier Level 2)...............................................................................................................43
10.3.11 EF
SPN
(Service Provider Name)..................................................................................................................43
10.3.12 EF
PUCT
(Price per unit and currency table) .................................................................................................44
10.3.13 EF
CBMI
(Cell broadcast message identifier selection).................................................................................45
10.3.14 EF
BCCH
(Broadcast control channels) .........................................................................................................46
10.3.15 EF
ACC
(Access control class)......................................................................................................................46
10.3.16 EF
FPLMN
(Forbidden PLMNs).....................................................................................................................47
10.3.17 EF
LOCI
(Location information) ...................................................................................................................47
10.3.18 EF
AD
(Administrative data).........................................................................................................................49
10.3.19 EF
Phase
(Phase identification)......................................................................................................................50
10.3.20 EF
VGCS
(Voice Group Call Service)............................................................................................................51
10.3.21 EF
VGCSS
(Voice Group Call Service Status) ...............................................................................................52
10.3.22 EF
VBS
(Voice Broadcast Service)................................................................................................................53
10.3.23 EF
VBSS
(Voice Broadcast Service Status)....................................................................................................55
10.3.24 EF
eMLPP
(enhanced Multi Level Pre-emption and Priority)........................................................................55
10.3.25 EF
AAeM
(Automatic Answer for eMLPP Service).......................................................................................56
10.3.26 EF
CBMID
(Cell Broadcast Message Identifier for Data Download) .............................................................57
10.3.27 EF
ECC
(Emergency Call Codes)...............................................................................................................58
10.3.28 EF
CBMIR
(Cell broadcast message identifier range selection) .....................................................................59
10.3.29 EF
DCK
De-personalization Control Keys ....................................................................................................59
10.3.30 EF
CNL
(Co-operative Network List)............................................................................................................60
10.3.31 EF
NIA
(Network's Indication of Alerting) ...................................................................................................61
10.3.32 EF
KcGPRS
(GPRS Ciphering key KcGPRS).................................................................................................62
10.3.33 EF
LOCIGPRS
(GPRS location information)...................................................................................................62
10.3.34 EF
SUME
(SetUpMenu Elements) .................................................................................................................63
10.3.35 EF
PLMNwAcT
(User controlled PLMN Selector with Access Technology)...................................................64
10.3.36 EF
OPLMNwAcT
(Operator controlled PLMN Selector with Access Technology) ..........................................66
10.3.37 EF
HPLMNwAcT
(HPLMN Selector with Access Technology)........................................................................66
10.3.38 EF
CPBCCH
(CPBCCH Information) .............................................................................................................67
10.3.39 EF
InvScan
(Investigation Scan) .....................................................................................................................68
10.3.40 Void............................................................................................................................................................69
10.3.41 EF
PNN
(PLMN Network Name) ..................................................................................................................69
剩余172页未读,继续阅读
lhb358
- 粉丝: 0
- 资源: 13
上传资源 快速赚钱
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
会员权益专享
最新资源
- ExcelVBA中的Range和Cells用法说明.pdf
- 基于单片机的电梯控制模型设计.doc
- 主成分分析和因子分析.pptx
- 共享笔记服务系统论文.doc
- 基于数据治理体系的数据中台实践分享.pptx
- 变压器的铭牌和额定值.pptx
- 计算机网络课程设计报告--用winsock设计Ping应用程序.doc
- 高电压技术课件:第03章 液体和固体介质的电气特性.pdf
- Oracle商务智能精华介绍.pptx
- 基于单片机的输液滴速控制系统设计文档.doc
- dw考试题 5套.pdf
- 学生档案管理系统详细设计说明书.doc
- 操作系统PPT课件.pptx
- 智慧路边停车管理系统方案.pptx
- 【企业内控系列】企业内部控制之人力资源管理控制(17页).doc
- 温度传感器分类与特点.pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论13