ebook img

TS 121 111 - V11.0.1 - Universal Mobile Telecommunications System (UMTS); LTE; USIM and IC card requirements (3GPP TS 21.111 version 11.0.1 Release 11) PDF

0.11 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview TS 121 111 - V11.0.1 - Universal Mobile Telecommunications System (UMTS); LTE; USIM and IC card requirements (3GPP TS 21.111 version 11.0.1 Release 11)

ETSI TS 121 111 V11.0.1 (2013-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; USIM and IC card requirements (3GPP TS 21.111 version 11.0.1 Release 11) 3GPP TS 21.111 version 11.0.1 Release 11 1 ETSI TS 121 111 V11.0.1 (2013-01) Reference RTS/TSGC-0621111vb01 Keywords LTE,UMTS ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. © European Telecommunications Standards Institute 2013. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTM and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE™ are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI 3GPP TS 21.111 version 11.0.1 Release 11 2 ETSI TS 121 111 V11.0.1 (2013-01) Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http://ipr.etsi.org). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) has been produced by ETSI 3rd Generation Partnership Project (3GPP). The present document may refer to technical specifications or reports using their 3GPP identities, UMTS identities or GSM identities. These should be interpreted as being references to the corresponding ETSI deliverables. The cross reference between GSM, UMTS, 3GPP and ETSI identities can be found under http://webapp.etsi.org/key/queryform.asp. ETSI 3GPP TS 21.111 version 11.0.1 Release 11 3 ETSI TS 121 111 V11.0.1 (2013-01) Contents Intellectual Property Rights ................................................................................................................................ 2 Foreword ............................................................................................................................................................. 2 Foreword ............................................................................................................................................................. 5 1 Scope ........................................................................................................................................................ 6 2 References ................................................................................................................................................ 6 2.1 Normative references ......................................................................................................................................... 6 2.2 Void .................................................................................................................................................................... 7 3 Definitions, symbols and abbreviations ................................................................................................... 7 3.1 Definitions .......................................................................................................................................................... 7 3.2 Void .................................................................................................................................................................... 7 3.3 Abbreviations ..................................................................................................................................................... 7 4 General requirements ............................................................................................................................... 7 5 Security requirements ............................................................................................................................... 7 5.1 File access conditions ......................................................................................................................................... 8 5.2 User authentication ............................................................................................................................................. 8 5.3 User data stored in ME ....................................................................................................................................... 8 5.4 Authentication .................................................................................................................................................... 8 5.5 Data integrity of signalling elements .................................................................................................................. 9 5.6 User identity confidentiality ............................................................................................................................... 9 5.7 Length of security parameters ............................................................................................................................ 9 6 Logical issues ........................................................................................................................................... 9 6.1 Application selection .......................................................................................................................................... 9 6.2 Simultaneous access ........................................................................................................................................... 9 7 Service Requirements ............................................................................................................................... 9 7.1 Void .................................................................................................................................................................... 9 7.2 Data transfer ....................................................................................................................................................... 9 7.3 Application execution environment ................................................................................................................. 10 7.4 Profile exchange ............................................................................................................................................... 10 7.5 Version identification ....................................................................................................................................... 10 8 Physical Characteristics .......................................................................................................................... 10 8.1 Void .................................................................................................................................................................. 10 8.2 Void .................................................................................................................................................................. 10 9 Electrical characteristics and transmission protocols ............................................................................. 10 9.1 Void .................................................................................................................................................................. 11 10 Contents of the Elementary Files ........................................................................................................... 11 10.1 USIM information storage requirements .......................................................................................................... 11 10.2 Phone Book ...................................................................................................................................................... 11 10.2.1 Support of two name fields per entry .......................................................................................................... 12 10.2.2 Support of multiple phone numbers per entry............................................................................................. 12 10.2.3 Support of email address ............................................................................................................................. 12 10.2.4 Support of user definable groupings ........................................................................................................... 12 10.2.5 Support of hidden entries ............................................................................................................................ 12 10.2.6 Number of entries ....................................................................................................................................... 12 10.2.7 Void ............................................................................................................................................................ 12 10.3 Storage of call details ....................................................................................................................................... 12 10.4 Void .................................................................................................................................................................. 13 11 3G/GSM interworking ............................................................................................................................ 13 11.1 Void .................................................................................................................................................................. 13 11.2 3G subscribers in a GSM network .................................................................................................................... 13 ETSI 3GPP TS 21.111 version 11.0.1 Release 11 4 ETSI TS 121 111 V11.0.1 (2013-01) 12 Contact Manager .................................................................................................................................... 13 Annex A (informative): Change history ............................................................................................... 16 History .............................................................................................................................................................. 17 ETSI 3GPP TS 21.111 version 11.0.1 Release 11 5 ETSI TS 121 111 V11.0.1 (2013-01) Foreword This Technical Specification has been produced by the 3GPP. The contents of the present document are subject to continuing work within the TSG and may change following formal TSG approval. Should the TSG modify the contents of this TS, it will be re-released by the TSG with an identifying change of release date and an increase in version number as follows: Version x.y.z where: x the first digit: 1 presented to TSG for information; 2 presented to TSG for approval; 3 or greater indicates TSG approved document under change control. y the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections, updates, etc. z the third digit is incremented when editorial only changes have been incorporated in the document. ETSI 3GPP TS 21.111 version 11.0.1 Release 11 6 ETSI TS 121 111 V11.0.1 (2013-01) 1 Scope This document defines the requirements of the USIM (Universal Subscriber Identity Module) and the IC card for 3G (UICC). These are derived from the service and security requirements defined in TS 22.100 [1] and TS 22.101 [2]. The USIM is a 3G application on an IC card. It inter-operates with a 3G terminal and provides access to 3G services. This document is intended to serve as a basis for the detailed specification of the USIM and the UICC, and the interface to the 3G terminal. 2 References 2.1 Normative references The following documents contain provisions which, through reference in this text, constitute provisions of the present document. - References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific. - For a specific reference, subsequent revisions do not apply. - For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document. [1] 3GPP TS 22.100 v3.x.x: "UMTS phase 1" (Release 99). [2] 3GPP TS 22.101: "Service principles". [3] 3GPP TS 31.101: "UICC-Terminal Interface; Physical and Logical Characteristics". [4] Void. [5] ETSI TS 101 220: "ETSI Numbering System for AIDs". [6] 3GPP TS 31.111: "USIM Application Toolkit (USAT)". [7] 3GPP TS 33.102: "3G Security: Security Architecture". [8] 3GPP TS 51.011, Rel-4: "Specification of the Subscriber Identity Module - Mobile Equipment (SIM - ME) interface". [9] Void. [10] Void. [11] ISO/IEC 7816-3: "Information technology - Identification cards - Integrated circuit(s) cards with contacts - Part 3: Electronic signals and transmission protocols". [12] ISO/IEC 7816-4: "Identification cards - Integrated circuit cards, Part 4: Organization, security and commands for interchange". [13] Void. ETSI 3GPP TS 21.111 version 11.0.1 Release 11 7 ETSI TS 121 111 V11.0.1 (2013-01) 2.2 Void 3 Definitions, symbols and abbreviations 3.1 Definitions For the purposes of the present document, the following definitions apply: 3.2 Void 3.3 Abbreviations For the purposes of the present document, the following abbreviations apply: ADN Abbreviated Dialling Number ATR Answer To Reset DF Dedicated File EF Elementary File ICC Integrated Circuit Card IK Integrity Key IMSI International Mobile Subscriber Identity ME Mobile Equipment MF Master File PIN Personal Identification Number PPS Protocol and Parameter Selection SIM Subscriber Identity Module USIM Universal Subscriber Identity Module 4 General requirements The UICC shall be a removable hardware module. The USIM on a UICC shall contain an identity which unambiguously identifies a subscriber. For access to 3G services, a UICC containing a valid USIM shall be present at all times, other than for emergency calls. The specifications shall support the security requirements as defined in 3GPP TS 33.102 [7]. The USIM shall provide storage for subscription and subscriber related information. The UICC/USIM may also contain applications which use the features defined in the USIM Application Toolkit specification 3GPP TS 31.111 [6]. 5 Security requirements The USIM shall be used to provide security features. If the UICC is removed from the 3G terminal, the service shall be terminated immediately. The functions of the USIM include authenticating itself to the network and vice versa, authenticating the user and providing additional security functions as defined in 3GPP TS 33.102 [7]. The USIM shall be unambiguously identified. Means shall be provided to prevent fraudulent use of stolen UICCs. It shall not be possible to access data intended for USIM internal use, e.g. authentication keys. ETSI 3GPP TS 21.111 version 11.0.1 Release 11 8 ETSI TS 121 111 V11.0.1 (2013-01) Further details of the following requirements are given in 3GPP TS 33.102 [7]. 5.1 File access conditions Actions, such as READ, UPDATE on UICC data shall be controlled by access conditions. These shall be satisfied prior to the action being performed. Since a UICC may contain multiple (3G and non-3G) applications, a flexible method of controlling file access shall be provided. 5.2 User authentication The USIM shall support means to authenticate the user, to provide, for example, protection against the use of stolen cards. For the USIM, authentication shall be performed by the verification of a numeric PIN of four (4) to eight (8) decimal digits. A function to disable user authentication may exist which may be inhibited by the application provider, in which case the user shall always use the PIN. Otherwise, the user may decide whether or not to make use of the user authentication function. If disabled, the user authentication function remains disabled until the user specifically re-enables it. Following correct PIN presentation, the ME may perform functions and actions on USIM data, which are protected by the relevant access condition. If an incorrect PIN is entered, an indication shall be given to the user. After three (3) consecutive incorrect entries the relevant PIN is blocked, i.e. functions and actions on data protected by the access condition shall no longer be possible, even if between attempts the UICC has been removed, the USIM has been deselected or the ME has been switched off. Once a PIN is blocked, further PIN verifications shall be denied. The USIM shall support a mechanism for unblocking a blocked PIN. Unblocking of a PIN is performed by using the relevant PIN Unblocking Key. PINs, but not Unblock PINs, shall be changeable by the user following correct entry of either the current PIN or Unblock PIN. The Unblock PIN shall consist of eight (8) decimal digits and shall not be changeable by the user. If an incorrect Unblock PIN is presented, an indication shall be given to the user. After ten (10) consecutive incorrect entries, the Unblock PIN shall be blocked, even if between attempts the UICC has been removed, the USIM has been deselected or the ME has been switched off. Unblocking of a blocked PIN shall not be possible. It shall not be possible to read PINs or Unblock PINs. 5.3 User data stored in ME Subject to the exception below, all user related information transferred into the ME during network operations shall be deleted from the ME after removal of the UICC, deselection of the USIM, deactivation of the ME, or following an electrical reset of the UICC. This includes any data that was transferred to the ME by USIM Application Toolkit commands. User related security codes such as PIN and Unblock PIN may only be stored by the ME during the procedures involving such a code and shall be discarded by the ME immediately after completion of the procedure. Optionally, an ME may retain some less security-sensitive data at UICC removal, USIM deselection or ME switch-off. Such data are e.g. SMS, ADN/SSC, FDN/SSC, LND. These data, when stored in the ME, shall only be readable/retrievable if the same USIM is reactivated (as determined by the IMSI). If the IMSI is retained in the ME for this purpose, it shall be stored securely and shall not be able to be read out. 5.4 Authentication A means shall be specified to mutually authenticate the USIM and the network by showing knowledge of a secret key K which is shared between and available only to the USIM and in the user's Home Environment. The method is composed ETSI 3GPP TS 21.111 version 11.0.1 Release 11 9 ETSI TS 121 111 V11.0.1 (2013-01) of a challenge/response and key establishment protocol combined with a sequence number-based one-pass protocol for network authentication. 5.5 Data integrity of signalling elements Some signalling information elements are considered sensitive and must be integrity protected. An integrity function shall be applied on certain signalling information elements transmitted between the ME and the network. The 3GPP Integrity Algorithm (UIA) is used with an Integrity Key (IK) to compute a message authentication code for a given message. The setting of IK is triggered by the authentication procedure. IK shall be stored on the USIM. 5.6 User identity confidentiality A mechanism shall be specified to provide user identity confidentiality by means of a temporary identity. 5.7 Length of security parameters In order to allow for enhancements of the security level in 3G, the following requirements shall be covered: - all security-related parameters for 3G shall be accompanied by a length indicator; - the USIM shall support variable-length security parameters. If the USIM supports the GSM security mechanisms in addition to 3G security, fixed length security parameters according to 3GPP TS 51.011 [8] shall be supported in addition. 6 Logical issues 6.1 Application selection In a multiapplication environment, a flexible application selection method is required. The application identifier defined in ETSI TS 101 220 [5] should be used for application selection. Direct application selection, including selection by partial DF name and the EF concept of ISO/IEC 7816-4 [12] shall be followed. In particular, a mechanism for the DIR ME and the UICC shall be specified in order to allow the user, when the ME is in idle mode, to select and activate one application amongst those which are available and supported by the ME (this will permit the user to choose, for instance, between 2 different USIM applications). At switch on, the last active USIM shall be automatically selected. The last active USIM shall be stored on the UICC. By default if there is no last active USIM defined in the UICC, the user shall be able to select the active USIM amongst those available on the UICC. 6.2 Simultaneous access A mechanism shall be specified for simultaneous access to several files or applications. 7 Service Requirements 7.1 Void 7.2 Data transfer A mechanism allowing highly secure transfer of applications and/or associated data to/from the UICC/USIM shall be specified in line with the requirements in 3GPP TS 22.101 [2]. This requires a secure transfer mechanism. ETSI

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.