Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TS 23.048
Security mechanisms for the (U)SIM application toolkit

V5.9.0 (PDF)  2005/06  40 p.
V4.5.0  2005/06  36 p.
GSM Rel-99 v8.9.0  2005/06  35 p.
GSM Rel-98 v7.0.1  1999/06  21 p.
GSM Rel-97 v6.2.0  1999/02  20 p.
Rapporteur:
Mr. Phan, Ly Thanh

essential Table of Contents for  TS 23.048  Word version:  5.9.0

each title, in the "available" or "not available yet" area, links to the equivalent title in the CONTENT
Here   Top

Up   Top

List of Figures and Tables

Figure 1System Overview
Table 1Structure of the Command Packet
Table 2Linear Representation of Command Packet
Figure 5.1.1-1SPI coding - First Octet
Figure 5.1.1-2SPI coding - Second Octet
Figure 5.1.2-1KIc coding
Figure 5.1.3-1KID coding
Table 3Structure of the Response Packet
Table 4Linear Representation of Response Packet
Table 5Response Status Codes
Figure 2Structure of User Data Header in the Short Message Point to Point
Table 6Relationship of Command Packet in UDH for single Short Message Point to Point
Table 7Relationship of Command Packet in UDH for concatenated Short Message Point to Point
Figure 3Example of command split using concatenated point to point SMS
Table 8Relationship of Response Packet in UDH
Table 9Relationship of Command Packet in the first CBS page of an SMS-CB message
Figure 4Example of command split using concatenated CB SMS
Table 10Input Commands
Table 11Output commands
Table 12USIM Input Commands
Table 13USIM Output Commands
Table 14Format of additional response data
Figure 5Loading session sequence of commands
Table 15Applet Management input commands
Table 16Applet Management output commands
Figure A.1.1.4.2.3.2-1APDU Access Domain Data - Byte 1
Figure A.1.1.4.2.3.2-2APDU Access Domain Data - Byte 2
Figure 6Relationship between CAP File components and Load File Blocks

Top