Terrestrial Trunked Radio (TETRA); Subscriber Identity Module to Mobile Equipment (SIM-ME) interface; Part 3: Integrated Circuit (IC); Physical, logical and TSIM application characteristics

The present document defines the interface between the Subscriber Identity Module (SIM) and the Mobile Equipment
(ME) for use during the network operation phase of TETRA as well as those aspects of the internal organization of the
SIM which are related to the network operation phase. This is to ensure interoperability between a SIM and a ME independently of the respective manufacturers and operators. The concept of a split of the MS into these elements as well as the distinction between the TETRA network operation phase, which is also called TETRA operations, and the administrative management phase is described in the User Requirement Specification ETR 295 [6].
The present document defines:
• the requirements for the physical characteristics of the SIM, the electrical signals and the transmission protocols;
• the model which shall be used as a basis for the design of the logical structure of the SIM;
• the security features; This edition of the standard covers the security mechanisms for ITSI based services including authentication and OTAR for keys addressed to an ITSI;
• the interface functions;
• the commands;
• the contents of the files required for the TETRA application;
• the application protocol.
The present document does not specify any aspects related to the administrative management phase. Any internal technical realization of either the SIM or the ME are only specified where these reflect over the interface. The present document does not specify any of the security algorithms which may be used.
The physical SIM described in the present document is a removable Integrated Circuit (IC) card. The SIM is an optional device within TETRA MSs. The present document does not preclude the implementation of fully functional MSs without a SIM. All references to mobile equipment in the present document are to be taken to mean mobile equipment which have been designed to operate with a SIM.
The present document deals with all aspects of trunked mode MS operation. For direct mode MS operation key user operation is supported by the SIM but not key holder or key generator operation. Furthermore, storage of information for direct mode MS operation in repeater and gateway mode are supported, but any extra storage required in the direct mode repeater or direct mode gateway terminals themselves is not supported.

Prizemni snopovni radio (TETRA) - Vmesnik med naročniško identifikacijsko kartico in mobilno opremo (SIM-ME) - 3. del: Integrirano vezje (IC) - Fizične, logične in TSIM aplikacijske karakteristike

General Information

Status
Published
Publication Date
31-Mar-2006
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
01-Apr-2006
Due Date
01-Apr-2006
Completion Date
01-Apr-2006
Standard
SIST EN 300 812-3 V2.2.1:2006
English language
175 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)


SLOVENSKI STANDARD
01-april-2006
3UL]HPQLVQRSRYQLUDGLR 7(75$ 9PHVQLNPHGQDURþQLãNRLGHQWLILNDFLMVNR
NDUWLFRLQPRELOQRRSUHPR 6,00( GHO,QWHJULUDQRYH]MH ,& )L]LþQHORJLþQH
LQ76,0DSOLNDFLMVNHNDUDNWHULVWLNH
Terrestrial Trunked Radio (TETRA); Subscriber Identity Module to Mobile Equipment
(SIM-ME) interface; Part 3: Integrated Circuit (IC); Physical, logical and TSIM application
characteristics
Ta slovenski standard je istoveten z: EN 300 812-3 Version 2.2.1
ICS:
33.070.10 Prizemni snopovni radio Terrestrial Trunked Radio
(TETRA) (TETRA)
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

European Standard (Telecommunications series)

Terrestrial Trunked Radio (TETRA);
Subscriber Identity Module to
Mobile Equipment (SIM-ME) interface;
Part 3: Integrated Circuit (IC);
Physical, logical and TSIM application characteristics

2 ETSI EN 300 812-3 V2.2.1 (2004-02)

Reference
REN/TETRA-03102
Keywords
card, security, SIM, TETRA
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00  Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88

Important notice
Individual copies of the present document can be downloaded from:
http://www.etsi.org
The present document may be made available in more than one electronic version or in print. In any case of existing or
perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).
In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive
within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
http://portal.etsi.org/tb/status/status.asp
If you find errors in the present document, send your comment to:
editor@etsi.org
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.

© European Telecommunications Standards Institute 2004.
All rights reserved.
TM TM TM
DECT , PLUGTESTS and UMTS are Trade Marks of ETSI registered for the benefit of its Members.
TM
TIPHON and the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members.
TM
3GPP is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners.
ETSI
3 ETSI EN 300 812-3 V2.2.1 (2004-02)
Content
Intellectual Property Rights.8
Foreword.8
1 Scope.9
2 References.9
3 Definitions, symbols and abbreviations .11
3.1 Definitions.11
3.2 Symbols.13
3.3 Abbreviations.13
4 SIM characteristics.15
4.1 Format and layout.15
4.1.1 SIM.15
4.1.2 Plug-in SIM.15
4.2 Temperature range for card operation .15
4.3 Contacts.15
4.3.1 Provision of contacts.15
4.3.2 Activation and deactivation .16
4.3.3 Inactive contacts (contact conditions in the ME switched-off state).16
4.3.4 Contact pressure.16
4.4 Precedence (multiple SIM operation).16
4.5 Static protection.17
5 Electronic signals and transmission protocols.17
5.1 Supply voltage Vcc (contact C1).17
5.1.1 5 V technology SIM.17
5.1.2 3 V technology SIM.17
5.1.3 3 V technology SIM identification .17
5.1.4 3 V technology ME.17
5.1.5 3 V Only ME .18
5.1.6 Activation and deactivation of 3 V technology SIM .18
5.1.7 Supply voltage switching.18
5.1.8 Cross compatibility.18
5.1.9 Technology outlook.18
5.2 Reset (RST) (contact C2) .18
5.3 Programming voltage Vpp (contact C6).18
5.4 Clock CLK (contact C3).18
5.5 Input/Output (I/O) (contact C7).19
5.6 States.19
5.7 Baud rate.19
5.8 Answer To Reset (ATR).19
5.9 Bit/character duration and sampling time.19
5.10 Error handling.19
6 Logical model.20
6.1 General description.20
6.2 File identifier.20
6.3 Dedicated Files (DF) .21
6.4 Elementary Files (EF) .21
6.4.1 Transparent EF.21
6.4.2 Linear fixed EF .21
6.4.3 Key EF.22
6.4.4 Cyclic EF.23
6.5 Methods for selecting a file .23
6.6 Reservation of file IDs .24
7 Security features.25
7.1 Authentication and cipher key generation procedure .25
ETSI
4 ETSI EN 300 812-3 V2.2.1 (2004-02)
7.2 Support of Over The Air Re-keying (OTAR) distribution of cipher keys.26
7.3 Support of SIM-ME enhanced security .26
7.4 File access conditions.26
7.5 Storage of DCK.27
8 Description of the functions .27
8.1 SELECT.28
8.2 STATUS.28
8.3 READ BINARY.28
8.4 UPDATE BINARY.29
8.5 READ RECORD.29
8.6 READ KEY.30
8.7 UPDATE RECORD.30
8.8 SEEK.31
8.9 VERIFY CHV.31
8.10 CHANGE CHV.32
8.11 DISABLE CHV.32
8.12 ENABLE CHV.32
8.13 UNBLOCK CHV.33
8.14 INVALIDATE.33
8.15 REHABILITATE.33
8.16 TETRA authentication algorithms .33
8.16.1 GET RANDOM.34
8.16.2 TA11/TA12 ALGORITHM.34
8.16.3 TA21/TA22 ALGORITHM.34
8.16.4 TB4/TE ALGORITHM.34
8.17 OTAR algorithms.35
8.17.1 TA32 ALGORITHM.35
8.17.2 TA41/TA82 ALGORITHM.35
8.17.3 TA41/TA52 ALGORITHM.35
8.17.4 TA71/TE ALGORITHM.36
8.17.5 TB7/TA52 ALGORITHM.36
8.17.6 TA41/TA92 ALGORITHM.36
8.17.7 TB7/TA52 ALGORITHM.36
9 Description of the commands.37
9.1 Mapping principles.37
9.2 Coding of the commands.39
9.2.1 SELECT.40
9.2.2 STATUS.42
9.2.3 READ BINARY.42
9.2.4 UPDATE BINARY.42
9.2.5 READ RECORD.42
9.2.6 UPDATE RECORD.43
9.2.7 READ KEY.43
9.2.8 SEEK.43
9.2.9 VERIFY CHV.44
9.2.10 CHANGE CHV.44
9.2.11 DISABLE CHV.44
9.2.12 ENABLE CHV.44
9.2.13 UNBLOCK CHV.45
9.2.14 INVALIDATE.45
9.2.15 REHABILITATE.45
9.2.16 GET RANDOM.45
9.2.17 TA11/TA12 ALGORITHM.45
9.2.18 TA21/TA22 ALGORITHM.46
9.2.19 TB4/TE ALGORITHM.46
9.2.20 TA32 ALGORITHM.46
9.2.21 TA41/TA82 ALGORITHM.47
9.2.22 TA41/TA52 ALGORITHM.47
9.2.23 TA71/TE ALGORITHM.47
9.2.24 GET RESPONSE.47
9.2.25 TB7/TA52 ALGORITHM.48
ETSI
5 ETSI EN 300 812-3 V2.2.1 (2004-02)
9.2.26 TA41/TA92 ALGORITHM.48
9.2.27 TB7/TA82 ALGORITHM.48
9.3 Definitions and coding .48
9.4 Status conditions returned by the card.50
9.4.1 Responses to commands which are correctly executed .50
9.4.2 Memory management.50
9.4.3 Referencing management.50
9.4.4 Security management.50
9.4.5 Application independent errors.51
9.4.6 Commands versus possible status responses .51
10 Contents of the EFs .52
10.1 General requirements.52
10.2 Contents of the EFs at the MF level .52
10.2.1 EF (Card Identification).52
ICCID
10.2.2 EF (Application directory) .53
DIR
10.2.3 EF (Language Preference) .54
LP
10.3 Contents of the EFs at the TETRA application level .54
10.3.1 EF (SIM Service Table) .54
SST
10.3.2 EF (Individual Tetra Subscriber Identity) .57
ITSI
10.3.3 EF (ITSI Disabled).59
ITSIDIS
10.3.4 EF (Username) .60
UNAME
10.3.5 EF (Subscriber Class Table).60
SCT
10.3.6 EF (Phase identification) .62
PHASE
10.3.7 EF (Common Cipher Key) .62
CCK
10.3.8 EF (CCK location areas) .64
CCKLOC
10.3.9 EF (Static Cipher Keys).68
SCK
10.3.10 EF (Static GSSIs).70
GSSIS
10.3.11 EF (Group related data for static GSSIs) .71
GRDS
10.3.12 EF (Dynamic GSSIs).73
GSSID
10.3.13 EF (Group related data for dynamic GSSIs).73
GRDD
10.3.14 EF (Group Cipher Keys) .74
GCK
10.3.15 Void.76
10.3.16 EF (User's group information) .76
GINFO
10.3.17 EF (Security settings).78
SEC
10.3.18 EF (Forbidden networks).79
FORBID
10.3.19 EF (Preferred networks) .80
PREF
10.3.20 EF (Service Provider Name) .82
SPN
10.3.21 Void.83
10.3.22 EF (Broadcast network information).83
DNWRK
10.3.23 EF (Network table) .84
NWT
10.3.24 EF (Gateway table) .85
GWT
10.3.25 EF (Call Modifier Table).87
CMT
10.3.26 EF (Abbreviated Dialling Number with Gateways) .90
ADNGWT
10.3.27 EF (Gateway Extension1).92
GWTEXT1
10.3.28 EF (Abbreviated dialling numbers for TETRA network) .92
ADNTETRA
10.3.29 EF (Extension A) .94
EXTA
10.3.30 EF (Fixed dialling numbers with Gateways) .94
FDNGWT
10.3.31 EF (Gateway Extension2).95
GWTEXT2
10.3.32 EF (Fixed dialling numbers for TETRA network) .96
FDNTETRA
10.3.33 EF (Extension B).96
EXTB
10.3.34 EF (Last number dialled with Gateways) .97
LNDGWT
10.3.35 EF (Last numbers dialled for TETRA network).97
LNDTETRA
10.3.36 EF (Service Dialling Numbers with gateway) .98
SDNGWT
10.3.37 EF (Gateway Extension3).98
GWTEXT3
10.3.38 EF (Service Dialling Numbers for TETRA network).99
SDNTETRA
10.3.39 EF (Status message texts).99
STXT
10.3.40 EF (SDS-1 message texts).100
MSGTXT
10.3.41 EF (Status and SDS type 1, 2 and 3 message storage) .101
SDS123
10.3.42 EF (SDS type 4 message storage).103
SDS4
10.3.43 EF (Message Extension).110
MSGEXT
10.3.44 EF (Emergency addresses).110
EADDR
ETSI
6 ETSI EN 300 812-3 V2.2.1 (2004-02)
10.3.45 EF (Emergency call information).112
EINFO
10.3.46 EF (DMO radio channel information) .113
DMOCh
10.3.47 EF (MS allocation of DMO channels) .114
MSCh
10.3.48 EF (List of Key Holders).115
KH
10.3.49 EF (DMO repeater and gateway list) .116
REPGATE
10.3.50 EF (Administrative data).117
AD
10.3.51 EF (Preferred location areas) .117
PREF_LA
10.3.52 EF (Composite LND file).118
LNDComp
10.3.53 EF (Status Default Target).119
DFLTSTSGT
10.3.54 EF (SDS Memory Status) .122
SDSMEM_STATUS
10.3.55 EF (Welcome Message).124
WELCOME
10.3.56 EF (SDS delivery report).124
SDSR
10.3.57 EF (SDS parameters) .125
SDSP
10.3.58 EF (Dialling schemes for TETRA network).126
DIALSC
10.3.59 EF (APN table) .127
APN
10.3.60 Void.128
10.3.61 EF (Private Number Information).128
PNI
10.3.62 EF (Scan list files).129
SCAN
10.3.63 EF (Scan list data).130
SCAND
10.3.64 EF (DMO pre-programmed group numbers).131
DMO_GSSIS
10.3.65 EF (Group related data for DMO static GSSIs).131
DMO_GRDS
10.3.66 EF (TMO - DMO selected group association) .132
GTMO_GDMO
10.3.67 EF (DMO - TMO selected group association) .133
GDMO_GTMO
10.3.68 EF (Default encryption parameters) .133
DMO_DEP
10.3.69 EF ( Group Session Key) .135
GSKO
10.4 Contents of the EFs at the Telecom level .136
10.4.1 EF (Abbreviated dialling numbers).136
ADN
10.4.2 EF (Fixed dialling numbers).140
FDN
10.4.3 EF (MSISDN) .140
MSISDN
10.4.4 EF (Last number dialled).141
LND
10.4.5 EF (Service Dialling Numbers) .141
SDN
10.4.6 EF (Extension1).142
EXT1
10.4.7 EF (Extension2).143
EXT2
10.4.8 EF (Extension3).144
EXT3
10.5 Files of TETRA.144
11 Application protocol.146
11.1 General procedures.147
11.1.1 Reading an EF.147
11.1.2 Updating an EF .147
11.1.3 Invalidating an EF.148
11.2 SIM management procedures.148
11.2.1 SIM initialization.148
11.2.2 TETRA session initialization.148
11.2.3 TETRA session termination.149
11.2.4 Language preference request .149
11.2.5 Administrative information request .149
11.2.6 SIM service table request.149
11.2.7 SIM phase request.149
11.2.8 SIM presence detection.149
11.2.9 SIM card number request.149
11.2.10 Common Cipher Key request.149
11.3 CHV related procedures .150
11.3.1 CHV verification.150
11.3.2 CHV value substitution.150
11.3.3 CHV disabling.150
11.3.4 CHV enabling.151
11.3.5 CHV unblocking.151
11.4 TETRA security related procedures .151
11.4.1 Authentication procedures and generation of DCK .152
11.4.1.1 Mutual authentication requirement request.152
11.4.1.2 SIM authentication.152
ETSI
7 ETSI EN 300 812-3 V2.2.1 (2004-02)
11.4.1.3 SwMI authentication.152
11.4.2 TETRA OTAR key computation (CCK, GCK, SCK) .152
11.4.2.1 CCK distribution.152
11.4.2.2 Void.152
11.4.2.3 GCK distribution.152
11.4.2.4 SCK distribution.153
11.4.3 ITSI request.153
11.4.4 ITSI disabling/re-enabling.153
11.5 Subscription related procedures .153
11.5.1 Username request.153
11.5.2 ITSI temporarily disabled enquiry .153
11.5.3 Subscriber class request .154
11.5.4 Void.154
11.5.5 Group identity information .154
11.5.5.1 Static Group identity information .154
11.5.5.2 Dynamic Group identity information.154
11.5.6 Group related data.154
11.5.7 User's group information .154
11.5.8 Call modifiers.155
11.5.9 Service Provider Name .155
11.5.10 DMO channel procedures .155
11.5.11 Emergency addresses.155
11.5.12 Interrupted emergency call request.155
11.6 Network related procedures.155
11.6.1 Forbidden networks.156
11.6.2 Preferred networks.156
11.7 Dialling number related procedures .
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...