Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TS 31.103  Word version:  17.0.0

Top   Top   None   None   Next
0…   4…

 

0  Introductionp. 6

The present document defines the IM Services Identity Module (ISIM) application. This application resides on the UICC, an IC card specified in TS 31.101. In particular, TS 31.101 specifies the application independent properties of the UICC/terminal interface such as the physical characteristics and the logical structure.
TS 31.101 is one of the core documents for this specification and is therefore referenced in many places in the present document.
Up

1  Scopep. 7

The present document defines the ISIM application for access to IMS services.
The present document specifies:
  • specific command parameters;
  • file structures;
  • contents of EFs (Elementary Files);
  • security functions;
  • application protocol to be used on the interface between UICC (ISIM) and Terminal.
This is to ensure interoperability between an ISIM and Terminal independently of the respective manufacturer, card issuer or operator.
The present document does not define any aspects related to the administrative management phase of the ISIM. Any internal technical realisation of either the ISIM or the Terminal is only specified where these are reflected over the interface. The present document does not specify any of the security algorithms that may be used.
Up

2  Referencesp. 7

The following documents contain provisions that, through reference in this text, constitute provisions of the present document.
  • References are either specific (identified by date of publication and/or edition number or version number) or non-specific.
  • For a specific reference, subsequent revisions do not apply.
  • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1]
TS 21.111: "USIM and IC Card Requirements".
[2]
TS 31.102: "Characteristics of the USIM Application".
[3]
TS 31.101: "UICC-Terminal Interface, Physical and Logical Characteristics".
[4]
TS 33.102: "3G Security; Security Architecture".
[5]
TS 33.103: "3G Security; Integration Guidelines".
[6]
ISO/IEC 7816-4: "Identification cards - Integrated circuit cards,Part 4: Organization, security and commands for interchange".
[7]  Void.
[8]  Void.
[9]
TS 23.003: "Numbering, Addressing and Identification".
[10]  Void.
[11]  Void.
[12]
TS 25.101: "UE Radio Transmission and Reception (FDD)".
[13]
TS 23.228: "IP Multimedia Subsystem (IMS); Stage 2".
[14]
TS 33.203: "3G security; Access security for IP-based services".
[15]
TS 24.228: "Signalling flows for the IP multimedia call control based on SIP and SDP; Stage 3".
[16]
RFC 3261:  "SIP: Session Initiation Protocol".
[17]
TS 23.038: "Alphabets and language-specific information".
[18]  Void
[19]
TS 51.011: Release 4: "Specification of the Subscriber Identity Module - Mobile Equipment (SIM-ME) interface".
[20]
ISO/IEC 8825-1 (2008): "Information technology - ASN.1 encoding rules : Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)".
[21]
TS 22.101: "Service aspects; Service principles".
[22]  Void.
[23]
ETSI TS 101 220: "Smart cards; ETSI numbering system for telecommunication application providers".
[24]
RFC 2486:  "The Network Access Identifier".
[25]
TS 33.220: "Generic Authentication Architecture (GAA); Generic bootstrapping architecture".
[26]
RFC 2617:  "HTTP Authentication: Basic and Digest Access Authentication". (http://www.ietf.org/rfc/rfc2617.txt)
[27]
RFC 3629  (2003): "UTF-8, a transformation format of ISO 10646".
[28]
TS 33.110: "Key establishment between a Universal Integrated Circuit Card (UICC) and a terminal".
[29]
TS 23.040: "Technical realization of the Short Message Service (SMS)".
[30]
TS 24.011: "Point-to-Point (PP) Short Message Service (SMS) support on mobile radio interface".
[31]
TS 31.111: "USIM Application Toolkit (USAT)".
[32]
TS 24.229: "IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); Stage 3".
[33]  Void
[34]
TS 24.607: "Originating Identification Presentation (OIP) and Originating Identification Restriction (OIR) using IP Multimedia (IM) Core Network (CN) subsystem; Protocol specification".
[35]
TS 24.167: "3GPP IMS Management Object (MO); Stage 3".
[36]
TS 24.341: "Support of SMS over IP networks; Stage 3".
[37]
OMA-DDS-DM_ConnMO_3GPPPS-V1_0-20081024-A: " Standardized Connectivity Management Objects 3GPP Packet Switched Bearer Paramaters".
[38]
OMA-DDS-DM_ConnMO-V1_0-20081107-A: " Standardized Connectivity Management Objects".
[39]
TS 24.424: "Management Object (MO) for Extensible Markup Language (XML) Configuration Access Protocol (XCAP) over the Ut interface for Manipulating Supplementary Services (SS)".
[40]
TS 24.623: "Extensible Markup Language (XML) Configuration Access Protocol (XCAP) over the Ut interface for Manipulating Supplementary Services".
[41]
OMA OMA-TS-XDM_MO-V1_1-20080627-A: "OMA Management Object for XML Document Management".
[42]  Void.
[43]
TS 24.483: "Mission Critical Services(MCS) Management Object (MO)".
[44]
TS 24.175: "Management Object (MO) for Multi-Device and Multi-Identity in IMS".
[45]
TS 24.174: "Support of Multi-Device and Multi-Identity in IMS; Stage 3".
Up

3  Definitions, symbols, abbreviations and coding conventionsp. 9

3.1  Definitionsp. 9

For the purposes of the present document, the following terms and definitions apply:
ISIM:
application residing on the UICC, an IC card specified in TS 31.101
In particular, TS 31.101 specifies the application independent properties of the UICC/terminal interface such as the physical characteristics and the logical structure
The AID of ISIM is defined in ETSI TS 101 220 [23] and is stored in EFDIR.
ADM:
access condition to an EF which is under the control of the authority which creates this file
Up

3.2  Symbolsp. 9

For the purposes of the present document, the following symbols apply:
||
Concatenation
Exclusive or
f1
Message authentication function used to compute MAC
f1*
A message authentication code (MAC) function with the property that no valuable information can be inferred from the function values of f1* about those of f1, ... , f5 and vice versa
f2
Message authentication function used to compute RES and XRES
f3
Key generating function used to compute CK
f4
Key generating function used to compute IK
f5
Key generating function used to compute AK
Up

3.3  Abbreviationsp. 9

For the purposes of the present document, the following abbreviations apply:
3GPP
3rd Generation Partnership Project
AC
Access Condition
ADF
Application Dedicated File
AID
Application IDentifier
AK
Anonymity Key
AKA
Authentication and Key Agreement
ALW
ALWays
AMF
Authentication Management Field
ASN.1
Abstract Syntax Notation One
AuC
Authentication Centre
AUTN
AUthentication TokeN
BER-TLV
Basic Encoding Rule - TLV
B-TID
Bootstrapping Transaction IDentifier
CK
Cipher Key
DF
Dedicated File
EF
Elementary File
FFS
For Further Study
FQDN
Fully Qualified Domain Name
HE
Home Environment
HN
Home Network
IARI
IMS Application Reference Identifier
ICC
Integrated Circuit Card
ID
IDentifier
IK
Integrity Key
IM
IP Multimedia
IMPI
IM Private Identity
IMPU
IM PUblic identity
IMS
IP Multimedia Subsystem
ISIM
IM Services Identity Module
K
long-term secret Key shared between the ISIM and the AuC
KSI
Key Set Identifier
LI
Language Indication
LSB
Least Significant Bit
MAC
Message Authentication Code
MCData
Mission Critical Data
MCPTT
Mission Critical Push To Talk
MCS
Mission Critical Services
MCVideo
Mission Critical Video
MF
Master File
MiD
Multi-iDentity
MSB
Most Significant Bit
MuD
Multi-Device
NAI
Network Access Identifier
NEV
NEVer
PIN
Personal Identification Number
PL
Preferred Languages
PS_DO
PIN Status Data Object
RAND
RANDom challenge
RES
user RESponse
RFU
Reserved for Future Use
RST
ReSeT
SDP
Session Description Protocol
SFI
Short EF Identifier
SIP
Session Initiation Protocol
SQN
SeQuence Number
SW
Status Word
TLV
Tag Length Value
UE
User Equipment
WebRTC
Web Real-Time Communication
WWSF
WebRTC Web Server Function
XRES
eXpected user RESponse
Up

3.4  Coding Conventionsp. 10

The following coding conventions apply to the present document.
All lengths are presented in bytes, unless otherwise stated. Each byte is represented by bits b8 to b1, where b8 is the most significant bit (MSB) and b1 is the least significant bit (LSB). In each representation, the leftmost bit is the MSB.
The coding of Data Objects in the present document is according to TS 31.101.
'XX':
Single quotes indicate hexadecimal values. Valid elements for hexadecimal values are the numbers '0' to '9' and 'A' to 'F'.
Up

Up   Top   ToC