Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TS 31.102
Characteristics of the
Universal Subscriber Identity Module (USIM)
Application

V19.2.0 (Wzip)2025/06  416 p.
V18.9.0 (PDF)2025/06  399 p.
V17.16.0  2025/03  372 p.
V16.15.0  2025/03  336 p.
V15.12.0  2022/09  327 p.
V14.8.0  2019/06  298 p.
V13.9.1  2017/12  283 p.
V12.13.0  2017/12  264 p.
V11.12.0  2017/12  238 p.
V10.15.0  2017/12  235 p.
V9.19.0  2017/12  223 p.
V8.22.0  2017/12  216 p.
V7.17.0  2012/12  188 p.
V6.23.0  2012/12  181 p.
V5.15.0  2012/09  154 p.
V4.15.0  2005/06  156 p.
V3.18.0  2005/06  141 p.
Rapporteur:
Mr. Espi, Sergi
G+D MS

Universal Subscriber Identity Module (USIM) application (that resides on the UICC) according to 3GPP TS 31.102

essential Table of Contents for  TS 31.102  Word version:  19.2.0

each title, in the "available" or "not available yet" area, links to the equivalent title in the CONTENT
Here   Top

Up   Top

List of Figures and Tables

Table 4.2.5.1Coding of the E-UTRAN
Table 4.2.5.2Coding of the GSM
Table 4.1Phone Book Reference file Constructed Tags
Table 4.2Tag definitions for the phone book kind of file
Table 4.3Presence of files as type
Table 4.4Extended BCD coding
Figure 4.1File identifiers and directory structures of UICC
Figure 4.2File identifiers and directory structures of USIM
Table 7.1.2-1Coding of the reference control P2
Table 7.1.2-2Coding of the reference control P2
Table 3Coding of the Local Key Establishment Control TLV
Table 4Coding of the Key Derivation Data Object
Table 5Coding of the Key Derivation Operation Response Data Object
Table 6Coding of the Key Availability Check Data Object
Table 7Coding of the Key Availability Check Operation Response Data Object
Table 7.5.2-1Coding of the reference control P2
Table G.1Structure of EFs inside DFPHONEBOOK
Table G.2Contents of EFPBR
Table G.3Structure of the 254 first entries in the phonebook
Table G.4Structure of phone book entries 255 to 508 (Rec 1-254)
Figure G.1Structure and Relations of the Example Phone Book
Figure I.1USIM Application Session Activation procedure
Figure I.2USIM Application Session Termination procedure

Top