Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index

ETSI (SCP) TS 102 221
Smart Cards – UICC-Terminal Interface –
Physical and Logical Characteristics

V18.2.0 (PDF)  2024/06  205 p.

UICC Master file, and EFs defined in ETSI TS 102 221

essential Table of Contents for  ETSI TS 102 221   PDF version:  18.2.0

each title links to the equivalent title in the CONTENT
Here   Top

Up   Top

List of Figures and Tables

Figure 4.1Plug-in UICC
Figure 4.2Mini-UICC
Figure 4.34FF
Table 4.1Temperature range for full operational use and storage for specific UICC environmental conditions
Table 5.1Electrical characteristics of Vcc under normal operating conditions
Table 5.2Electrical characteristics of RST under normal operating conditions
Table 5.3Electrical characteristics of CLK under normal operating conditions
Table 5.4Electrical characteristics of I/O under normal operating conditions
Table 5.5Electrical characteristics of Vcc under normal operating conditions
Table 5.6Electrical characteristics of RESET (RST) under normal operating conditions
Table 5.7Electrical characteristics of Clock (CLK) under normal operating conditions
Table 5.8Electrical characteristics of I/O under normal operating conditions
Table 5.9Electrical characteristics of Vcc under normal operating conditions
Table 5.10Electrical characteristics of RESET (RST) under normal operating conditions
Table 5.11Electrical characteristics of Clock (CLK) under normal operating conditions
Table 5.12Electrical characteristics of I/O under normal operating conditions
Table 5.13Electrical characteristics of Vcc under normal operating conditions
Table 5.14Electrical characteristics of RESET (RST) under normal operating conditions
Table 5.15Electrical characteristics of Clock (CLK) under normal operating conditions
Table 5.16Electrical characteristics of I/O under normal operating conditions
Table 6.1Supply voltage classes indicated in ATR
Table 6.2Void
Table 6.3Maximum power consumption of the UICC during the UICC session
Table 6.4Minimum power supply by the terminal during the UICC session
Table 6.5Void
Table 6.6Complement to the I/O characteristics under normal operating conditions when Di = 64 is supported
Table 6.7Coding of the first tB
Figure 6.1Reaction to resets
Figure 7.1Layers
Figure 7.2Character frame
Table 7.1Procedure byte coding
Table 7.2Status byte coding
Figure 7.3Character waiting time
Figure 7.4Block waiting time
Figure 7.5Block guard time
Table 7.3Block frame structure
Table 7.4Node address byte
Table 7.4aLSI number encoding
Table 7.5Coding of PCB for an I-block
Table 7.6Coding of PCB for an R-block
Table 7.7Bit b4 to b1 in the PCB for the R-block
Table 7.8Coding of PCB for an S-block
Table 7.9Bits b5 to b1 of PCB for an S-block
Table 7.10Information field
Figure 7.6
Figure 7.7
Figure 7.8
Figure 7.9
Figure 7.10
Figure 7.11
Figure 7.12
Figure 7.13
Table 7.11Definition of cases for data in APDUs
Figure 7.14
Figure 7.15
Figure 7.16
Figure 7.16a
Figure 7.16b
Table 7.12Minimum time-out value for execution of commands
Figure 8.1Example of an application structure
Figure 8.2Structure of a linear fixed file
Figure 8.3Structure of a cyclic file
Figure 8.4Example of a logical structure
Table 8.1File selection
Table 8.2Examples of file selection by path
Table 8.3
Table 9.0a
Table 9.0b
Table 9.0c
Table 9.0d
Table 9.1PIN mapping into SE
Table 9.2Access condition level coding
Table 9.3PIN mapping into key references
Table 9.4Usage qualifier coding for PS_DO
Table 9.5PS Template DO structure
Table 9.6PS Template DO structure when PS_DO usage qualifier is used
Table 10.1Contents of command APDU
Table 10.2Cases of C-APDUs
Table 10.3Coding of class byte for standard logical channels
Table 10.4Coding of Secure Messaging Indication for standard logical channels
Table 10.4aCoding of class byte for extended logical channels
Table 10.4bCoding of Secure Messaging Indication for extended logical channels
Table 10.5Coding of Instruction Byte of the Commands
Table 10.6Contents of Response APDU
Table 10.7Status byte coding - normal processing
Table 10.8Status byte coding - postponed processing
Table 10.9Status byte coding - warnings
Table 10.10Status byte coding - execution errors
Table 10.11Status byte coding - checking errors
Table 10.12Status byte coding - functions in CLA not supported
Table 10.13Status byte coding - command not allowed
Table 10.14Status byte coding - wrong parameters
Table 10.15Status byte coding - application errors
Table 10.16Commands and status words
Table 11.1Coding of P1
Table 11.2Coding of P2
Table 11.3Response for MF, DF or ADF with FCP template
Table 11.4Response for an EF with FCP template
Table 11.5File descriptor byte
Table 11.6UICC characteristics byte
Table 11.7aSpecific UICC environmental conditions byte
Table 11.7a1Coding of test configuration state
Table 11.7a2Coding of criterion type IDs
Table 11.7bCoding of life cycle status integer
Table 11.8Coding of P1
Table 11.9Coding of P2
Table 11.10Coding of P1
Table 11.11Coding of P2
Table 11.12Coding of P2
Table 11.13Coding of the first byte of the search indication for enhanced search mode
Table 11.14Coding of P1
Table 11.15Coding of P2
Table 11.16Coding of P1
Table 11.17Coding of P1
Table 11.18Coding of P2
Table 11.18aCoding of P1
Table 11.19Coding of P1
Table 11.20Coding of P2
Table 11.20aCoding of additional interfaces
Table 11.20bTerminal capabilities for eUICC as defined in GSMA SGP.22 [33]
Table 11.20cTerminal capabilities for eUICC as defined in GSMA SGP.32 [35]
Table 11.21aCoding of P1
Table 11.21bCoding of P2
Table 11.22Response Retrieve UICC endpoints
Table 11.23Coding of Data
Table 11.24Coding of Response Data
Table 11.25Coding of Data
Table 11.26Coding of the response data
Table 11.27Coding of the data
Table 11.28Coding of the response data
Table 11.29Coding of the data
Table 11.30Coding of P1 - Session control
Table 11.31Coding of P2 - Block Management
Table 11.32Coding of transmitted data
Table 11.33SW2 of '92 XX'
Table 11.34Void
Table 11.34aCoding of P1
Table 11.34bCoding of P2
Table 11.34cCoding of P1
Table 11.34dCoding LSI options
Table 11.35Coding of P2
Table 12.1Parameters for GET RESPONSE
Table 13.1EF
Table 13.2Coding of an application template entry
Table 13.3EF
Table 13.4EF
Table 13.5EF
Table 13.6EF
Table 13.7EF
Table 13.8EF
Figure B.1UICC states
Table F.1Access rule references for files located at the MF level
Table G.1Application Access Rule References
Table G.2DF Telecom Access Rule References
Figure I.1Modes of operation of a "Type 1 UICC"
Figure I.2Modes of operation of a "Type 2 UICC"
Figure J.1
Figure J.2
Figure K.1Example of multi verification capable UICC
Table L.1SET DATA with interruption, good case
Table L.2SET DATA with interruption, error case
Table L.3RETRIEVE DATA with interruption, good case
Table L.4RETRIEVE DATA with interruption, good case
Table L.5RETRIEVE DATA, short object
Table M.1ODD AUTHENTICATE with short data
Table M.2ODD AUTHENTICATE with extended data
Table M.3ODD AUTHENTICATE with short data
Table M.4ODD AUTHENTICATE with extended data
Table N.1Test configuration state transitions on a test UICC
Figure N.1State transitions of test configuration state on a UICC with a test configuration
Table O.1Example of NAA data in a test configuration criterion

Top