Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 31.900
Word version: 18.0.0
0…
2…
2
References
3
Abbreviations
4
Primary clarifications and definitions
5
Interworking between the ME and the ICC
6
Authentication and key agreement in mixed networks
7
Interworking between a SIM application and a USIM application on a UICC
8
Interworking between USIM applications on a UICC
9
SIM and UICC Interworking on the Card/Terminal Interface
A
Interworking table
B
Features for security interworking
C
SIM/USIM file mapping table
D
CHV mapping
$
Change History
2
References
p. 6
3
Abbreviations
p. 7
4
Primary clarifications and definitions
p. 7
4.1
2G and 3G
p. 7
4.2
SIM, USIM and UICC
p. 8
4.3
Types of ME
p. 8
4.4
Types of VLR/SGSN and HLR/AuC
p. 8
4.5
Security related terms
p. 9
5
Interworking between the ME and the ICC
p. 9
5.1
3G ME and UICC
p. 10
5.2
2G ME and UICC
p. 11
5.2.1
2G ME of Rel-4 (or earlier) without USIM support
p. 11
5.2.2
2G ME of R99 or Rel-4 with USIM support or of Rel-5
p. 11
5.3
3G ME and SIM
p. 11
5.3.1
3G ME of R99 or Rel-4
p. 11
5.3.2
3G ME of Rel-5
p. 11
5.4
2G ME and SIM
p. 11
5.4.1
2G ME of Rel-4 (or earlier)
p. 11
5.4.2
2G ME of Rel-5
p. 12
6
Authentication and key agreement in mixed networks
p. 12
6.1
With 3G ME and UICC
p. 12
6.2
With 2G ME and UICC
p. 15
6.2.1
2G ME of Rel-4 (or earlier) without USIM support
p. 15
6.2.2
2G ME of R99 or Rel-4 with USIM support or of Rel-5
p. 16
6.3
With 3G ME and SIM
p. 18
6.3.1
3G ME of R99 or Rel-4
p. 18
6.3.2
3G ME of Rel-5
p. 20
6.4
With 2G ME and SIM
p. 20
6.4.1
2G ME of Rel-4 (or earlier)
p. 20
6.4.2
2G ME of Rel-5
p. 21
7
Interworking between a SIM application and a USIM application on a UICC
p. 21
7.1
IMSI, secret key and authentication algorithm
p. 22
7.2
File mapping
p. 23
7.3
Access conditions
p. 23
7.4
Secret codes
p. 23
7.5
Activation of 2G and 3G operation modes
p. 24
7.6
Selection of cyclic files
p. 25
7.7
Enabling/disabling procedures for dialling numbers
p. 25
8
Interworking between USIM applications on a UICC
p. 25
9
SIM and UICC Interworking on the Card/Terminal Interface
p. 26
A
Interworking table
p. 27
B
Features for security interworking
p. 31
B.1
Conversion functions
p. 31
B.2
3G algorithm execution modes
p. 31
C
SIM/USIM file mapping table
p. 33
D
CHV mapping
p. 35
D.1
In a single-verification capable UICC
p. 36
D.2
In a multi-verification capable UICC (static mapping)
p. 36
D.3
In a multi-verification capable UICC (dynamic mapping)
p. 36
$
Change History
p. 38