EN 300 812 : 2.1.1
Current
The latest, up-to-date edition.
TERRESTRIAL TRUNKED RADIO (TETRA); SECURITY ASPECTS; SUBSCRIBER IDENTITY MODULE TO MOBILE EQUIPMENT (SIM-ME) INTERFACE
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions, symbols and abbreviations
3.1 Definitions
3.2 Symbols
3.3 Abbreviations
4 SIM characteristics
4.1 Format and layout
4.1.1 SIM
4.1.2 Plug-in SIM
4.2 Temperature range for card operation
4.3 Contacts
4.3.1 Provision of contacts
4.3.2 Activation and deactivation
4.3.3 Inactive contacts (contact conditions in the
ME switched-off state)
4.3.4 Contact pressure
4.4 Precedence (multiple SIM operation)
4.5 Static protection
5 Electronic signals and transmission protocols
5.1 Supply voltage Vcc (contact C1)
5.1.1 5 V technology SIM
5.1.2 3 V technology SIM
5.1.3 3 V technology SIM identification
5.1.4 3 V technology ME
5.1.5 3 V Only ME
5.1.6 Activation and deactivation of 3 V technology SIM
5.1.7 Supply voltage switch
5.1.8 Cross compatibility
5.1.9 Technology outlook
5.2 Reset (RST) (contact C2)
5.3 Programming voltage Vpp (contact C6)
5.4 Clock CLK (contact C3)
5.5 Input/Output (I/O) (contact C7)
5.6 States
5.7 Baud rate
5.8 Answer To Reset (ATR)
5.9 Bit/character duration and sampling time
5.10 Error handling
6 Logical model
6.1 General description
6.2 File identifier
6.3 Dedicated Files (DF)
6.4 Elementary Files (EF)
6.4.1 Transparent EF
6.4.2 Linear fixed EF
6.4.3 Key EF
6.4.4 Cyclic EF
6.5 Methods for selecting a file
6.6 Reservation of file IDs
7 Security features
7.1 Authentication and cipher key generation procedure
7.2 Support of Over The Air Re-keying (OTAR) distribution
of cipher keys
7.3 Support of SIM-ME enhanced security
7.4 File access conditions
7.5 Storage of DCK
8 Description of the functions
8.1 SELECT
8.2 STATUS
8.3 READ BINARY
8.4 UPDATE BINARY
8.5 READ RECORD
8.6 READ KEY
8.7 UPDATE RECORD
8.8 SEEK
8.9 VERIFY CHV
8.10 CHANGE CHV
8.11 DISABLE CHV
8.12 ENABLE CHV
8.13 UNBLOCK CHV
8.14 INVALIDATE
8.15 REHABILITATE
8.16 TETRA authentication algorithms
8.16.1 GET RANDOM
8.16.2 TA11/TA12 ALGORITHM
8.16.3 TA21/TA22 ALGORITHM
8.16.4 TB4/TE ALGORITHM
8.17 OTAR algorithms
8.17.1 TA32 ALGORITHM
8.17.2 TA41/TA82 ALGORITHM
8.17.3 TA41/TA52 ALGORITHM
8.17.4 TA71 ALGORITHM
9 Description of the commands
9.1 Mapping principles
9.2 Coding of the commands
9.2.1 SELECT
9.2.2 STATUS
9.2.3 READ BINARY
9.2.4 UPDATE BINARY
9.2.5 READ RECORD
9.2.6 UPDATE RECORD
9.2.7 READ KEY
9.2.8 SEEK
9.2.9 VERIFY CHV
9.2.10 CHANGE CHV
9.2.11 DISABLE CHV
9.2.12 ENABLE CHV
9.2.13 UNBLOCK CHV
9.2.14 INVALIDATE
9.2.15 REHABILITATE
9.2.16 GET RANDOM
9.2.17 TA11/TA12 ALGORITHM
9.2.18 TA21/TA22 ALGORITHM
9.2.19 TB4/TE ALGORITHM
9.2.20 TA32 ALGORITHM
9.2.21 TA41/TA82 ALGORITHM
9.2.22 TA41/TA52 ALGORITHM
9.2.23 TA71 ALGORITHM
9.2.24 GET RESPONSE
9.3 Definitions and coding
9.4 Status conditions returned by the card
9.4.1 Responses to commands which are correctly executed
9.4.2 Memory management
9.4.3 Referencing management
9.4.4 Security management
9.4.5 Application independent errors
9.4.6 Commands versus possible status responses
10 Contents of the EFs
10.1 Void
10.2 Contents of the EFs at the MF level
10.2.1 EFICCID (Card Identification)
10.2.2 EFDIR (Application directory)
10.2.3 EFLP (Language Preference)
10.3 Contents of the EFs at the TETRA application level
10.3.1 EFSST (SIM Service Table)
10.3.2 EFITSI (Individual Tetra Subscriber Identity)
10.3.3 EFITSIDIS (ITSI Disabled)
10.3.4 EFUNAME (Username)
10.3.5 EFSCT (Subscriber Class Table)
10.3.6 EFPHASE (Phase identification)
10.3.7 EFCCK (Common Cipher Key)
10.3.8 EFCCKLOC (CCK location areas)
10.3.9 EFSCK (Static Cipher Keys)
10.3.10 EFGSSIS (Static GSSIs)
10.3.11 EFGRDS (Group related data for static GSSIs)
10.3.12 EFGSSID (Dynamic GSSIs)
10.3.13 EFGRDD (Group related data for dynamic GSSIs)
10.3.14 EFGCK (Group Cipher Keys)
10.3.15 EFMGCK (Modified Group Cipher Keys)
10.3.16 EFGINFO (User's group information)
10.3.17 EFSEC (Security settings)
10.3.18 EFFORBID (Forbidden networks)
10.3.19 EFPREF (Preferred networks)
10.3.20 EFSPN (Service Provider Name)
10.3.21 EFLOCI (Location information)
10.3.22 EFDNWRK (Broadcast network information)
10.3.23 EFNWT (Network table)
10.3.24 EFGWT (Gateway table)
10.3.25 EFCMT (Call Modifier Table)
10.3.26 EFADNGWT (Abbreviated Dialling Number with
Gateways)
10.3.27 EFGWTEXT1 (Gateway Extension1)
10.3.28 EFADNTETRA (Abbreviated dialling numbers for
TETRA network)
10.3.29 EFEXTA (Extension A)
10.3.30 EFFDNGWT (Fixed dialling numbers with Gateways)
10.3.31 EFGWTEXT2 (Gateway Extension2)
10.3.32 EFFDNTETRA (Fixed dialling numbers for TETRA
network)
10.3.33 EFEXTB (Extension B)
10.3.34 EFLNDGWT (Last number dialled with Gateways)
10.3.35 EFLNDTETRA (Last numbers dialled for TETRA
network)
10.3.36 EFSDNGWT (Service Dialling Numbers with gateway)
10.3.37 EFGWTEXT3 (Gateway Extension3)
10.3.38 EFSDNTETRA (Service Dialling Numbers for TETRA
network)
10.3.39 EFSTXT (Status message texts)
10.3.40 EFMSGTXT (SDS-1 message texts)
10.3.41 EFSDS123 (Status and SDS type 1, 2 and 3 message
storage)
10.3.42 EFSDS4 (SDS type 4 message storage)
10.3.43 EFMSGEXT (Message Extension)
10.3.44 EFEADDR (Emergency addresses)
10.3.45 EFEINFO (Emergency call information)
10.3.46 EFDMOCh (DMO channel information)
10.3.47 EFMSCh (MS allocation of DMO channels)
10.3.48 EFKH (List of Key Holders)
10.3.49 EFREPGATE (DMO repeater and gateway list)
10.3.50 EFAD (Administrative data)
10.3.51 EFPREF_LA (Preferred location areas)
10.3.52 EFLNDComp (Composite LND file)
10.3.53 EF DFLTSTSTGT (Status Default Target)
10.3.54 EFSDSMEM_STATUS (SDS Memory Status)
10.3.55 EFWELCOME (Welcome Message)
10.3.56 EFSDSR (SDS delivery report)
10.3.57 EFSDSP (SDS parameters)
10.3.58 EFDIALSC (Dialling schemes for TETRA network)
10.3.59 EFAPN (APN table)
10.3.60 EFPNI (Private Number Information)
10.4 Contents of the EFs at the Telecom level
10.4.1 EFADN (Abbreviated dialling numbers)
10.4.2 EFFDN (Fixed dialling numbers)
10.4.3 EFMSISDN (MSISDN)
10.4.4 EFLND (Last number dialled)
10.4.5 EFSDN (Service Dialling Numbers)
10.4.6 EFEXT1 (Extension1)
10.4.7 EFEXT2 (Extension2)
10.4.8 EFEXT3 (Extension3)
10.5 Files of TETRA
11 Application protocol
11.1 General procedures
11.1.1 Reading an EF
11.1.2 Updating an EF
11.1.3 Invalidating an EF
11.2 SIM management procedures
11.2.1 SIM initialization
11.2.2 TETRA session initialization
11.2.3 TETRA session termination
11.2.4 Language preference request
11.2.5 Administrative information request
11.2.6 SIM service table request
11.2.7 SIM phase request
11.2.8 SIM presence detect
11.2.9 SIM card number request
11.2.10 Common Cipher Key request
11.3 CHV related procedures
11.3.1 CHV verification
11.3.2 CHV value substitution
11.3.3 CHV disabling
11.3.4 CHV enabling
11.3.5 CHV unblocking
11.4 TETRA security related procedures
11.4.1 Authentication procedures and generation of DCK
11.4.1.1 Mutual authentication requirement
request
11.4.1.2 SIM authentication
11.4.1.3 SwMI authentication
11.4.2 TETRA OTAR key computation (CCK, GCK, SCK)
11.4.2.1 CCK distribution
11.4.2.2 CCK changeover
11.4.2.3 GCK distribution
11.4.2.4 SCK distribution
11.4.3 ITSI request
11.4.4 ITSI disabling/re-enabling
11.5 Subscription related procedures
11.5.1 Username request
11.5.2 ITSI temporarily disabled enquiry
11.5.3 Subscriber class request
11.5.4 Void
11.5.5 Group identity information
11.5.5.1 Static Group identity information
11.5.5.2 Dynamic Group identity information
11.5.6 Group related data
11.5.7 User's group information
11.5.8 Call modifiers
11.5.9 Service Provider Name
11.5.10 DMO channel procedures
11.5.11 Emergency addresses
11.5.12 Interrupted emergency call request
11.6 Network related procedures
11.6.1 Forbidden networks
11.6.2 Preferred networks
11.7 Dialling number related procedures
11.7.1 Dialling numbers under DFTETRA
11.7.2 Dialling numbers under DFTELECOM
11.7.3 FDNGWT specific procedures
11.7.3.1 FDNGWT capability request
11.7.3.2 FDNGWT disabling
11.7.3.3 FDNGWT enabling
11.8 Status and short data message procedures
11.8.1 Display of status message texts
11.8.2 Display of SDS1 message texts
11.8.3 Storage of status and SDS messages types
1, 2 and 3
11.8.4 Storage of SDS messages type 4
11.8.5 SDS delivery report
11.8.6 Default Status Target
Annex A (normative): Plug-in SIM
Annex B (informative): FDN Procedures
Annex C (informative): Suggested contents of EFs at
pre-personalization
C.1 Contents of the EFs at the MF level
C.2 Contents of the EFs at the TETRA application level
C.3 Contents of the EFs at the Telecom Level
Annex D (normative): Database structure for group IDs and
phone books
Annex E (informative): Emergency call facilities and procedures
Annex F (informative): Composite List of Last Dialled Numbers
Annex G (informative): Bibliography
History
Describes the interface between the Subscriber Identity Module (SIM) and the Mobile Equipment (ME) for use during the network operation phase of TETRA as well as those aspects of the internal organization of the SIM, which are related to the network operation phase.
Committee |
TETRA 7
|
DocumentType |
Standard
|
Pages |
156
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
Standards | Relationship |
NBN EN 300 812 : 2002 | Identical |
DIN EN 300812:2002-12 | Identical |
PN EN 300 812 : 2005 | Identical |
NEN EN 300812 : 2001 | Identical |
ES 200 812-2 : 2.4.2 | TERRESTRIAL TRUNKED RADIO (TETRA); SUBSCRIBER IDENTITY MODULE TO MOBILE EQUIPMENT (TSIM-ME) INTERFACE; PART 2: UNIVERSAL INTEGRATED CIRCUIT CARD (UICC); CHARACTERISTICS OF THE TSIM APPLICATION |
TS 100 812-2 : 2.4.1 | TERRESTRIAL TRUNKED RADIO (TETRA); SUBSCRIBER IDENTITY MODULE TO MOBILE EQUIPMENT (TSIM-ME) INTERFACE; PART 2: UNIVERSAL INTEGRATED CIRCUIT CARD (UICC); CHARACTERISTICS OF THE TSIM APPLICATION |
TR 102 300-5 : 1.4.1 | TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); DESIGNERS' GUIDE; PART 5: GUIDANCE ON NUMBERING AND ADDRESSING |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.