• TS 131 113 : 8.0.0

    Current The latest, up-to-date edition.

    UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; UNIVERSAL SUBSCRIBER IDENTITY MODULE APPLICATION TOOLKIT (USAT) INTERPRETER BYTE CODES

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date: 

    Publisher:  European Telecommunications Standards Institute

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Intellectual Property Rights
    Foreword
    Foreword
    1 Scope
    2 References
    3 Definitions, abbreviations and symbols
       3.1 Definitions
       3.2 Abbreviations
       3.3 Symbols
    4 Model of computation
       4.1 Navigation
       4.2 Communication with the external system entity
       4.3 Terminal response handler mechanism
       4.4 Activation
       4.5 Page format overview
       4.6 History list
    5 TLV Format
       5.1 Coding of the tag byte
       5.2 Attributes in TLVs
       5.3 Coding of attribute bytes
    6 Variables
       6.1 Usage areas
       6.2 Variable values
       6.3 Variable substitution
    7 Used USAT Interpreter data structures
       7.1 Page
       7.2 Navigation Unit
       7.3 Anchor Reference
       7.4 Variable Identifier List
       7.5 Inline Value
       7.6 Inline Value 2
       7.7 Input List
       7.8 Ordered TLV List
       7.9 Page Reference
       7.10 Submit
    8 USAT Interpreter byte codes
       8.1 Set Variable
       8.2 Assign and Branch
       8.3 Extract
       8.4 Go Back
       8.5 Branch On Variable Value
       8.6 Exit
       8.7 Execute USAT Command
       8.8 Execute Native Command
       8.9 Get Length
       8.10 Get TLV Value
       8.11 Display Text
       8.12 Get Input
    9 Native Commands
       9.1 Security Plug-ins
    10 End to End Security
       10.1 Encrypt
       10.2 Decrypt
    11 Modes of operation
       11.1 Pull
       11.2 Push/Cell Broadcast
    12 Error handling and coding
       12.1 Setting of the environment variable "error code"
       12.2 User notification of the execution
       12.3 Error coding
    13 Tag Values
    Annex A (informative): Terminal Response Handler Flow Charts
    Annex B (informative): Example of Accessing USAT Interpreter
            Functionality in Wireless Mark-up Language
          B.1 Introduction
          B.2 Namespace
          B.3 WML
          B.4 Implicit calls using WML syntax
          B.5 Explicit calls using WML syntax
          B.6 Access to Special Features
          B.7 References
    Annex C (informative): Terminal Response Handler Modifier
            examples
          C.1 Replace Operation
          C.2 Add/Append Operation
          C.3 Remove Operation
          C.4 Restore Operation
          C.5 Special case: Empty text for user notification
          C.6 Special case: No text for user notification
          C.7 Special case: Modify a single exception case
    Annex D (normative): PKI Plug-ins Implementation Specification
          D.1 P7
          D.2 FP
          D.3 AD
          D.4 Non-functional Requirements
    Annex E (normative): PIN Management Plug-ins Implementation
            Specification
          E.1 CP
          E.2 RP
          E.3 Non-functional Requirements
    Annex F (normative): Triple DES Plug-ins Implementation
            Specification
          F.1 DE
          F.2 DD
          F.3 DS
          F.4 DU
          F.5 Non-functional Requirements
    Annex G (informative): Change History
    History

    Abstract - (Show below) - (Hide below)

    Defines the byte codes that are recognised by an USAT Interpreter. The byte codes primary purpose is to provide efficient programmatic access to the SIM Application Toolkit commands.

    General Product Information - (Show below) - (Hide below)

    Committee 3GPP CT 6
    Document Type Standard
    Publisher European Telecommunications Standards Institute
    Status Current

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 7816-6:2016 Identification cards — Integrated circuit cards — Part 6: Interindustry data elements for interchange
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective