Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 31.103
Word version: 18.1.0
0…
4…
4
Files
4.1
Contents of the EFs at the MF level
4.2
Contents of files at the ISIM ADF (Application DF) level
4.3
ISIM file structure
4.4
Contents of EFs at the TELECOM level
4.5
Contents of DFs at the TELECOM level
5
Application protocol
5.1
ISIM management procedures
5.2
ISIM security related procedures
5.3
Subscription related procedures
5.4
MCS related procedures
5.5
WebRTC related procedures
5.6
IMS DC Establishment indication procedures
6
Security features
7
ISIM Commands
7.1
AUTHENTICATE
7.2
GET CHALLENGE
A
EF changes via Data Download or USAT applications
B
Tags defined in 31.103
C
Suggested contents of the EFs at pre-personalization
D
List of SFI Values
E
ISIM Application Session Activation / Termination
$
Change History
4
Files
p. 11
4.1
Contents of the EFs at the MF level
p. 11
4.2
Contents of files at the ISIM ADF (Application DF) level
p. 11
4.2.1
Void
4.2.2
EF
IMPI
(IMS private user identity)
p. 11
4.2.3
EF
DOMAIN
(Home Network Domain Name)
p. 12
4.2.4
EF
IMPU
(IMS public user identity)
p. 12
4.2.5
EF
AD
(Administrative Data)
p. 13
4.2.6
EF
ARR
(Access Rule Reference)
p. 14
4.2.7
EF
IST
(ISIM Service Table)
|R6|
p. 14
4.2.8
EF
P-CSCF
(P-CSCF Address)
|R6|
p. 16
4.2.9
EF
GBABP
(GBA Bootstrapping parameters)
|R6|
p. 17
4.2.10
EF
GBANL
(GBA NAF List)
|R6|
p. 18
4.2.11
EF
NAFKCA
(NAF Key Centre Address)
|R7|
p. 18
4.2.12
EF
SMS
(Short messages)
|R8|
p. 19
4.2.13
EF
SMSS
(SMS status)
|R8|
p. 20
4.2.14
EF
SMSR
(Short message status reports)
|R8|
p. 21
4.2.15
EF
SMSP
(Short message service parameters)
|R8|
p. 22
4.2.16
EF
UICCIARI
(UICC IARI)
|R10|
p. 23
4.2.17
EF
FromPreferred
(From Preferred)
|R14|
p. 24
4.2.18
EF
IMSConfigData
(IMS Configuration Data)
|R14|
p. 24
4.2.19
EF
XCAPConfigData
(XCAP Configuration Data)
|R14|
p. 26
4.2.20
EF
WebRTCURI
(WebRTC URI)
|R15|
p. 30
4.2.21
EF
MuDMiDConfigData
(MuD and MiD Configuration Data)
|R16|
p. 30
4.2.22
EF
AC_GBAUAPI
(Access Control to GBA_U_API)
|R18|
p. 31
4.2.23
EF
IMSDCI
(IMS Data Channel Indication)
|R18|
p. 32
4.3
ISIM file structure
p. 33
4.4
Contents of EFs at the TELECOM level
|R8|
p. 33
4.4.1
EF
PSISMSC
(Public Service Identity of the SM-SC)
p. 33
4.5
Contents of DFs at the TELECOM level
|R13|
p. 33
4.5.1
Contents of files at the DF
MCS
level
p. 34
5
Application protocol
p. 34
5.1
ISIM management procedures
p. 34
5.1.1
Initialisation
p. 34
5.1.1.1
ISIM application selection
p. 34
5.1.1.2
ISIM initialisation
p. 34
5.1.2
ISIM Session termination
p. 35
5.1.3
ISIM application closure
p. 35
5.1.4
UICC presence detection
p. 35
5.1.5
Administrative information request
p. 35
5.2
ISIM security related procedures
p. 35
5.2.1
Authentication procedure
p. 35
5.2.2
IMPI request
p. 35
5.2.3
IMPU request
p. 35
5.2.4
SIP Domain request
p. 36
5.2.5
Void
5.2.6
ISIM Service Table request
|R6|
p. 36
5.2.7
P-CSCF address request
|R6|
p. 36
5.2.8
Generic Bootstrapping architecture (Bootstrap)
|R6|
p. 36
5.2.9
Generic Bootstrapping architecture (NAF Derivation)
|R6|
p. 36
5.2.10
HTTP-Digest security request
|R6|
p. 36
5.2.11
NAF Key Centre Address request
|R7|
p. 36
5.3
Subscription related procedures
|R8|
p. 36
5.3.1
SM-over-IP
p. 36
5.3.2
Communication Control for IMS by ISIM
|R10|
p. 37
5.3.3
UICC access to IMS
|R10|
p. 37
5.3.4
From Preferred related procedures
|R14|
p. 37
5.3.5
IMS Configuration Data related procedures
|R14|
p. 37
5.3.6
XCAP Configuration Data related procedures
|R14|
p. 37
5.4
MCS related procedures
|R13|
p. 37
5.5
WebRTC related procedures
|R15|
p. 37
5.6
IMS DC Establishment indication procedures
|R18|
p. 38
5.6.1
IMS DC Establishment indication procedure
p. 38
6
Security features
p. 38
6.1
User verification and file access conditions
p. 38
7
ISIM Commands
p. 38
7.1
AUTHENTICATE
p. 38
7.1.1
Command description
p. 38
7.1.1.1
IMS AKA security context
p. 39
7.1.1.2
GBA security context (Bootstrapping Mode)
|R6|
p. 39
7.1.1.3
GBA security context (NAF Derivation Mode)
|R6|
p. 40
7.1.1.4
HTTP-Digest security context
|R6|
p. 40
7.1.1.5
Local Key Establishment security context (Key Derivation mode)
|R7|
p. 41
7.1.1.6
Local Key Establishment security context (Key Availability Check mode)
|R7|
p. 41
7.1.2
Command parameters and data
p. 42
7.1.2.1
IMS AKA security context
|R6|
p. 43
7.1.2.2
HTTP Digest security context
|R6|
p. 44
7.1.2.3
GBA security context (Bootstrapping Mode)
|R6|
p. 44
7.1.2.4
GBA security context (NAF Derivation Mode)
|R6|
p. 45
7.1.2.5
Local Key Establishment security context (All Modes)
|R7|
p. 45
7.1.2.5.1
Local Key Establishment security context (Key Derivation mode)
p. 45
7.1.2.5.2
Local Key Establishment security context (Key Availability Check mode)
p. 47
7.1.3
Status Conditions Returned by the ISIM
p. 48
7.1.3.1
Security management
p. 48
7.1.3.2
Status Words of the Commands
p. 49
7.2
GET CHALLENGE
p. 49
8
Void
A
EF changes via Data Download or USAT applications
p. 50
B
Tags defined in 31.103
p. 51
C
Suggested contents of the EFs at pre-personalization
p. 52
D
List of SFI Values
p. 53
D.1
List of SFI Values at the ISIM ADF Level
p. 53
E
ISIM Application Session Activation / Termination
p. 54
$
Change History
p. 55