Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 31.111
Word version: 18.6.0
1…
4…
6…
6.5…
6.8…
7…
7.5…
8…
8.50…
8.100…
9…
L…
9
Tag values
10
Allowed Type of command and Device identity combinations
11
Security requirements
A
Support of USAT by Mobile Equipment
B
Example of DISPLAY TEXT Proactive UICC Command
C
Structure of USAT communications
D
ME display in proactive UICC session
E
Help information feature processing
F
Monitoring of events
G
Support of Multiple Card Operation
H
Multiple Card proactive command examples
I
Bearer independent protocol proactive command examples
J
WAP References
K
Use of USAT Bearer independent protocol for local links Bluetooth case
9
Tag values
p. 142
9.1
BER-TLV tags in ME to UICC direction
p. 143
9.2
BER-TLV tags in UICC TO ME direction
p. 143
9.3
COMPREHENSION-TLV tags in both directions
p. 144
9.4
Type of Command and Next Action Indicator
p. 146
10
Allowed Type of command and Device identity combinations
p. 146
11
Security requirements
p. 147
A
(Normative) Support of USAT by Mobile Equipment
p. 148
B
Example of DISPLAY TEXT Proactive UICC Command
p. 150
C
(Normative) Structure of USAT communications
p. 151
D
ME display in proactive UICC session
p. 152
E
Help information feature processing
p. 153
F
Monitoring of events
p. 154
G
(Normative) Support of Multiple Card Operation
p. 155
H
Multiple Card proactive command examples
p. 156
I
Bearer independent protocol proactive command examples
p. 157
J
WAP References
p. 158
K
Use of USAT Bearer independent protocol for local links Bluetooth case
p. 159