Foreword
1 Scope
2 Normative references
3 Definitions, symbols and abbreviations
3.1 Definitions
3.2 Symbols
3.3 Abbreviations
4 Physical characteristics
5 Electronic signals and transmission protocols
6 Logical model
7 Security services and facilities
7.1 Authentication key
7.2 Algorithms and processes
7.3 File access conditions
7.4 Function access condition
7.5 Identification, keying and algorithm
information
8 Description of the functions
9 Description of the commands
10 Contents of the EFs
11 Application protocol
11.1 General procedures
11.2 PIM management procedures
11.3 CHV related procedures
11.4 UPT security related procedures
11.5 Telecommunication procedures
11.6 General information procedures
Annex A (normative): Plug-in UPT card
Annex B (normative): Implementation Conformance
Statement (ICS) for the PIM2
Annex C (normative): Implementation Conformance
Statement (ICS) for the CADUPT
History