tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

Top          in Index          Prev          Next

TS 33.259 (SA3)
Key establishment between a UICC hosting device and a remote device

|   ToC   |   3GPP‑Page   |   ETSI‑search   |   Help   |

(P) V14.0.0    2017/03    30 p.
(P) V13.0.0    2016/01    30 p.
(P) V12.0.0    2014/09    29 p.
(P) V11.0.0    2012/09    30 p.
(P) V10.0.0    2011/04    30 p.
(P) V9.0.0    2009/12    29 p.
(P) V8.2.0    2008/12    29 p.
(P) V7.2.0    2007/12    30 p.


Rapporteur:  Mr. Lehtovirta, Vesa
See also:  –


The need to establish a secure channel between a UICC Hosting Device and a Remote Device connected via a local interface has been identified by the Personal Network Management work (see TS 22.259), in order to protect the communication between the UICC Hosting Device and the Remote Device.

This document describes the security features and mechanisms to provision a shared key between a UICC Hosting Device and a Remote Device connected via a local interface. The shared secret is then intended to be used to secure the interface between the Remote Device and the UICC hosting device. Candidate applications to use this key establishment mechanism include but are not restricted to Personal Network Management (see TS 22.259).

The scope of this specification includes an architecture overview and the detailed procedure how to establish the shared key between the UICC Hosting Device and the Remote Device. This is different from the Technical Specification TS 33.110 that describes an architecture overview and the detailed procedure how to establish the shared key between the UICC itself and the terminal hosting the UICC. The use cases utilizing the mechanisms described in this specification are seen to be different to the use cases where "Key establishment between a UICC and a terminal", PSK TLS as specified in TS 33.310, is utilized.

The solution described in this document is built on the existing infrastructure defined in "GBA", TS 33.220.


 

Here          Top

 

 

1   Scope   PDF-p. 6
2   References
3   Definitions and abbreviations   PDF-p. 7
4   Key Establishment between a UICC Hosting Device and a Remote Device
A  (Normative)   Key Derivation Function definition   PDF-p. 17
B  (Normative)   HTTP based key request procedure   PDF-p. 18
C   Signalling flows for key request procedure   PDF-p. 20
D  (Normative)   XML schema for Key Request and Key Response   PDF-p. 23
E  (Normative)   TLS profiles   PDF-p. 25
F   Application specific key (Ks_local_device_appl)   PDF-p. 26
G   Application specific key (Ks_local_device_appl): Key Derivation Function definition   PDF-p. 27
H   Change history   PDF-p. 28

Up          Top