Removable User Identity Module for Spread Spectrum Systems



Similar documents
3GPP TS V ( )

3GPP TSG SA WG3 Security S3#20 S November, 2001 Sophia Antipolis, France

ETSI TS V ( ) Technical Specification

HRPD Support for Emergency Services

ETSI TS V8.0.1 ( ) Technical Specification

All-IP Network Emergency Call Support

3GPP V1.1.0 ( ) Third Generation Partnership Project (3GPP); USIM and IC Card Requirements TSGT3#1(99)032

ETSI TS V ( )

Protocol of the Communication between SIM and mobile phone

Technical Specifications (GPGPU)

GSM v. CDMA: Technical Comparison of M2M Technologies

Global System for Mobile Communication Technology

ETSI TS V9.0.0 ( ) Technical Specification. Smart Cards; Card Application Toolkit (CAT) (Release 9)

SIM Card Security. Sheng He Seminar Work. Chair for Communication Security Prof. Dr.-Ing. Christof Paar

3GPP TS V8.0.0 ( )

Authentication and Security in Mobile Phones

Short Message Service (SMS) for Wideband Spread Spectrum Systems

ARIB STD-T64-C.S0042 v1.0 Circuit-Switched Video Conferencing Services

3GPP TSG SA WG3 Security S3#30 S October 2003 Povoa de Varzim, Portugal. Abstract

An Example of Mobile Forensics

Security Evaluation of CDMA2000

Configuring connection settings

3GPP TSG CN Plenary Meeting #16 5 th - 7 th June Marco Island, USA. 3GPP TSG-CN1 Meeting #24 Tdoc N Budapest, Hungary,

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

ETSI TS V9.2.0 ( ) Technical Specification. Smart Cards; Remote APDU structure for UICC based applications (Release 9)

Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem

GSM and UMTS security

Mobile Wireless Overview

Nokia E61i Configuring connection settings

Review of Cell Phone Technology

Packet Switched Voice (over IP) and Video Telephony Services End-to-end System Design Technical Report

ETSI TS V (2016

Device Implementation Guidelines

TS V1.3.1 ( )

Ch GSM PENN. Magda El Zarki - Tcom Spring 98

Technical Notes TN 1 - ETG FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?

HRPD/1XRTT and 3GPP E-UTRAN (LTE) Interworking and Inter-Technology Handoff

ETSI TS V1.2.1 ( )

Smartcard Web Server Enabler Architecture

Cellebrite UFED Physical Pro Cell Phone Extraction Guide

ETSI TS V6.5.0 ( )

ARIB STD-T V Codec for Enhanced Voice Services (EVS); Voice Activity Detection (VAD) (Release 12)

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements

Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Mobility and cellular networks

How To Use An Adh8012 Gsm Gprs Module With A Gsm (Gsm) Gpros (Gsp) Gpls (Geo) Gsp (Gpl) Gs

Network Support for MDN-Based Message Centers

3GPP TR V3.1.0 ( )

CIBER Records,MEID and EUIMID

AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev October Document information

CS Cellular and Mobile Network Security: GSM - In Detail

Process Control and Automation using Modbus Protocol

ETSI TS V3.1.1 ( ) Technical Specification

Mobile Communications TCS 455

EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server

Measurement and Analysis Introduction of ISO7816 (Smart Card)

Chapters 1-21 Introduction to Wireless Communication Systems

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions

ETSI TS V9.0.0 ( ) Technical Specification

INTERNATIONAL TELECOMMUNICATION UNION

Error and Confirmation Codes

Contents. Preface. Acknowledgement. About the Author. Part I UMTS Networks

ETSI ETR 363 TECHNICAL January 1997 REPORT

GSM services over wireless LAN

TS-3GB-S.R0048-Av1.0 3G Mobile Equipment Identifier (MEIA)

EUROPEAN pr ETS TELECOMMUNICATION January 1997 STANDARD

UMTS security. Helsinki University of Technology S Security of Communication Protocols

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

GSM Databases. Virginia Location Area HLR Vienna Cell Virginia BSC. Virginia MSC VLR

The GSM and GPRS network T /301

Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Wireless Cellular Networks: 1G and 2G

Wireless Technologies for the 450 MHz band

! encor e networks TM

ODOT Surveyor s Conference

GSM System Architecture

Over the PSTN... 2 Over Wireless Networks Network Architecture... 3

TECHNICAL REPORT End to End Network Architectures (E2NA); Location of Transcoders for voice and video communications

NeoConnect Home Suite

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( ' 3 ' Giuseppe Bianchi

Type 2 Tag Operation Specification. Technical Specification T2TOP 1.1 NFC Forum TM NFCForum-TS-Type-2-Tag_

Security considerations for IMS access independence

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, GSM Location System Syslog XP 3.

Delivery of Voice and Text Messages over LTE

Mifare DESFire Specification

3GPP TS V ( )

White Paper ON Dual Mode Phone (GSM & Wi-Fi)

Global System for Mobile Communications (GSM)

Interoperability Specification (IOS) for CDMA 2000 Access Network Interfaces Part 3 Features

Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

SD Specifications Part 1 NFC (Near Field Communication) Interface Simplified Addendum

Mobile Office Security Requirements for the Mobile Office

Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments

Transcription:

GPP C.S00-C Version.0 Date: October, 00 Removable User Identity Module for Spread Spectrum Systems COPYRIGHT GPP and its Organizational Partners claim copyright in this document and individual Organizational Partners may copyright and issue documents or standards publications in individual Organizational Partner s name based on this document. Requests for reproduction of this document should be directed to the GPP Secretariat at secretariat@gpp.org. Requests to reproduce individual Organizational Partner s documents should be directed to that Organizational Partner. See www.gpp.org for more information.

CONTENTS GENERAL...-. Terms...- Physical, Electrical, and Logical Interfaces...-. Physical Interface...-. Electrical Interface...-. Logical Interface...-. Security Features...-.. G Authentication and Key Generation Procedure...-.. Algorithms and Processes...-.. File Access Conditions...-.. G AKA (Authentication and Key Agreement) Procedure and Function...-. Function Description...-. Command Description...-.. R-UIM Supply Voltage Identification...-. Content of EFs...-. Application Protocol...-0. CDMA Card Application Toolkit...-.0 Coding of Alpha Fields in the R-UIM for UCS...- Multi-Mode R-UIM Dedicated File (DF) and Elementary File (EF) Structure...-. DF and EFs for ANSI- Based Applications...-. File Identifier (ID)...-. Reservation of File IDs...-. Coding of EFs for NAM Parameters and Operational Parameters...-.. EF COUNT (Call Count)...-.. EF IMSI_M (IMSI_M)...-.. EF IMSI_T (IMSI_T)...-.. EF TMSI (TMSI)...-0.. EF AH (Analog Home SID)...-.. EF AOP (Analog Operational Parameters)...-.. EF ALOC (Analog Location and Registration Indicators)...-.. EF CDMAHOME (CDMA Home SID, NID)...- i

CONTENTS.. EF ZNREGI (CDMA Zone-Based Registration Indicators)...-..0 EF SNREGI (CDMA System-Network Registration Indicators)...-.. EF DISTREGI (CDMA Distance-Based Registration Indicators)...-0.. EF ACCOLC (Access Overload Class ACCOLCp)...-.. EF TERM (Call Termination Mode Preferences)...-.. EF SSCI (Suggested Slot Cycle Index)...-.. EF ACP (Analog Channel Preferences)...-.. EF PRL (Preferred Roaming List)...-.. EF RUIMID (Removable UIM_ID)...-.. EF CST (CDMA Service Table)...-.. EF SPC (Service Programming Code)...-..0 EF OTAPASPC (OTAPA/SPC_Enable)...-.. EF NAMLOCK (NAM_LOCK)...-.. EF OTA (OTASP/OTAPA Features)...-.. EF SP (Service Preferences)...-.. EF ESNME (ESN_ME)...-.. EF Revision (R-UIM Revision)...-.. EF PL (Preferred Languages)...-.. EF SMS (Short Messages)...-0.. EF SMSP (Short Message Service Parameters)...-.. EF SMSS (SMS Status)...-..0 EF SSFC (Supplementary Services Feature Code Table)...-.. EF SPN (CDMA Home Service Provider Name)...-0.. EF USGIND (Removable UIM_ID/SF_EUIMID Usage Indicator)...-.. EF AD (Administrative Data)...-.. EF MDN (Mobile Directory Number)...-.. EF MAXPRL (Maximum PRL)...-.. EF SPCS (SPC Status)...-.. EF ECC (Emergency Call Codes)...-.. EF MEGPDOPC (ME GPD Operation Capability)...-.. EF GPDOPM (GPD Operation Mode)...-0 ii

CONTENTS..0 EF SIPCAP (SimpleIP Capability Parameters)...-.. EF MIPCAP (MobileIP Capability Parameters)...-.. EF SIPUPP (SimpleIP User Profile Parameters)...-.. EF MIPUPP (MobileIP User Profile Parameters)...-.. EF SIPSP (SimpleIP Status Parameters)...-.. EF MIPSP (MobileIP Status Parameters)...-.. EF SIPPAPSS (SimpleIP PAP SS Parameters)...-.. Reserved...-.. Reserved...-.. EF PUZL (Preferred User Zone List)...-0..0 EF MAXPUZL (Maximum PUZL)...-.. EF MECRP (ME-specific Configuration Request Parameters)...-.. EF HRPDCAP (HRPD Access Authentication Capability Parameters)...-.. EF HRPDUPP (HRPD Access Authentication User Profile Parameters)...-.. EF CSSPR (CUR_SSPR_P_REV)...-.. EF ATC (Access Terminal Class)...-.. EF EPRL (Extended Preferred Roaming List)...-.. EF BCSMScfg (Broadcast Short Message Configuration)...-.. EF BCSMSpref (Broadcast Short Message Preference)...-.. EF BCSMStable (Broadcast Short Message Table)...-..0 EF BCSMSP (Broadcast Short Message Parameter)...-.. EF IMPI (IMS private user identity)...-.. EF DOMAIN (Home Network Domain Name)...-.. EF IMPU (IMS public user identity)...-.. EF PCSCF (Proxy Call Session Control Function)...-.. EF BAKPARA (Currently used BAK Parameters)...-.. EF UpBAKPARA (Updated BAK Parameters)...-.. EF MMSN (MMS Notification)...-.. EF EXT (Extension )...-.. EF MMSICP (MMS Issuer Connectivity Parameters)...-..0 EF MMSUP (MMS User Preferences)...- iii

CONTENTS.. EF MMSUCP (MMS User Connectivity Parameters)...-0.. EF AuthCapability (Authentication Capability)...-0.. EF GCIK (G Cipher and Integrity Keys)...-0.. EF DCK (De-Personalization Control Keys)...-0.. EF GID (Group Identifier Level )...-0.. EF GID (Group Identifier Level )...-0.. EF CDMACNL (CDMA Co-operative Network List)...-0.. EFHOME_TAG (Home System Tag)...-0.. EFGROUP_TAG (Group Tag List)...-0..0 EFSPECIFIC_TAG (Specific Tag List)...-.. EF CALL_PROMPT (Call Prompt List)...-.. EF SF_EUIMID (Short Form EUIMID)...-.. EF ICCID (ICC Identification)...-. Coding of Packet Data Security-Related Parameters...-.. SimpleIP CHAP SS Parameters...-.. MobileIP SS Parameters...-.. HRPD Access Authentication CHAP SS Parameters...-. Coding of Shared Secret Used in IETF Protocol...-. Multi-Mode Card...- Authentication and Security...-. Parameter Storage and Parameter Exchange Procedures...-. Description of Security-Related Functions...-.. Managing Shared Secret Data...-.. Performing Authentication Calculations and Generating Encryption Keys...-.. Managing the Call History Parameter...-. Description of OTASP/OTAPA Functions...-.. Elementary Files for OTASP/OTAPA...-... EF SPC (Service Programming Code)...-... EF OTAPASPC (OTAPA/SPC_Enable)...-... EF NAMLOCK (NAM_LOCK)...-... EF OTA (OTASP/OTAPA Features)...- iv

CONTENTS.. Mapping of OTASP/OTAPA Request/Response Messages to R-UIM Commands -... Protocol Capability Request/Response Messages...-... MS Key Request/Response Messages...-0... Key Generation Request/Response Messages...-0... SSD Update...-0... Re-Authentication Request/Response Messages...-0... Validation Request/Response Messages...-... Configuration Request/Response Messages...-... Download Request/Response Messages...-... SSPR Configuration Request/Response Messages...-...0 SSPR Download Request/Response Messages...-... OTAPA Request/Response Messages...-... Commit Request/Response Messages...-... PUZL Configuration Request/Response Messages...-... PUZL Download Request/Response Messages...-... GPD Configuration Request/Response Messages...-... GPD Download Request/Response Messages...-... Secure Mode Request/Response Messages...-... Service Key Generation Request/Response Messages...-... MMD Configuration Request/Response Messages...-...0 MMD Download Request/Response Messages...-... MMS Configuration Request/Response Messages...-... MMS Download Request/Response Messages...-... System Tag Configuration Request/Response Messages...-... System Tag Download Request/Response Messages...-. Description of Security-Related Commands...-.. Update SSD...-.. Base Station Challenge...-.. Confirm SSD...-.. Authenticate...-... Advisory Note on the Use of Run CAVE...- v

CONTENTS... Use of Cipher Key Generation Command...-.. Generate Key/VPM...-. Description of OTASP/OTAPA Commands...-.. MS Key Request...-.. Key Generation Request...-.. Commit...-.. Validate...-.. Configuration Request...-.. Download Request...-.. SSPR Configuration Request...-.. SSPR Download Request...-.. OTAPA Request...-..0 PUZL Configuration Request...-0.. PUZL Download Request...-.. GPD Configuration Request...-.. GPD Download Request...-.. Secure Mode...-.. FRESH...-.. Service Key Generation Request...-.. MMD Configuration Request...-.. MMD Download Request...-.. MMS Configuration Request...-..0 MMS Download Request...-.. System Tag Configuration Request...-0.. System Tag Download Request...-0. ESN and MEID Management Command...-.. Store ESN_MEID_ME...-. Description of Packet Data Security-Related Functions...-.. Managing Shared Secrets...-.. Performing Simple IP Authentication...-.. Performing Mobile IP Authentication...- vi

CONTENTS.. HRPD Access Authentication...-. Description of Packet Data Security-Related Commands...-.. Compute IP Authentication...-... CHAP...-... MN-HA Authenticator...-... MIP-RRQ Hash...-... MN-AAA Authenticator...-... HRPD Access Authentication...-. Descriptions of BCMCS Commands...-.. RETRIEVE SK...-... Command description...-... Command parameters/data:...-.. Update BAK...-... Command description...-... Command parameters/data:...-.. Delete BAK...-... Command description...-... Command parameters/data:...-.. RETRIEVE SRTP SK...-... Command description...-.. Generate Authorization Signature...-... Command description...-... Command parameters/data:...-.. BCMCS Authentication...-0... Command description...-0... Command parameters/data:...-0.0 Descriptions of Application Authentication Commands...-.0. Application Authentication Command...-. Description of AKA-related Functions...-.. Authentication and key agreement procedure...-.. Cryptographic Functions...- vii

CONTENTS.. G Authentication Command description...-.. UMAC Generation Command Description...-.. Restoration of G keys...-.. CONFIRM_KEYS Command description...-. Description of AKA commands...-.. UMAC Generation...-.. CONFIRM_KEYS...- Additional Air Interface Procedures...-. Registration Procedure...-.. R-UIM Removal and Insertion...-.. Procedure when ESN Changes with TMSI Assigned...-. NAM Parameters when no R-UIM is inserted into the ME...-. IMSI-Related Parameters in the ME when no IMSI is Programmed in the R-UIM...-. Preferred Access Channel Mobile Station ID Type...- BCMCS Procedures...-. Functionalities of R-UIM and ME...-.. R-UIM...-.. ME...-. Key Management...- Annex A (informative): Suggested contents of the EFs at pre-personalization... Annex B (informative): BCMCS-RELATED Tag Values... viii

FIGURES 0 Figure -. Dedicated File Structure...- Figure..-. Base Station Challenge Function...- Figure..-. Update SSD Function, AUTHBS Calculation...- Figure..-. Confirm SSD Function...- Figure..-. Run CAVE Function...- Figure..-. Generate Key/VPM Function...- Figure.-. Authentication Models...- Figure..-. Compute IP Authentication Command (CHAP Option)...- Figure..-. Computation of MN-AAA Authenticator...- Figure..-. HRPD Access Authentication Command...- Figure..- AKA Procedures...- Figure..- UMAC Generation...- ix

TABLES 0 Table.- Physical Characteristics...- Table.- Electronic Signals and Transmission Protocols...- Table.- Logical Model...- Table.- File Access Conditions...- Table.- Description of the Functions...- Table.- Description of the Commands (Part of )...- Table.- Content of EFs...- Table.- Content of EFs for R-UIM supporting the enhanced phonebook...- Table.- Application Protocol...-0 Table 0- Authentication mechanism...- Table A-. Summary of R-UIM Files... x

FOREWORD 0 0 This document contains the requirements for the Removable User Identity Module (R- UIM). It is an extension of Subscriber Identity Module (SIM), per latest [] capabilities, to enable operation in a [/] radiotelephone environment. Examples of this environment include, but are not limited to, analog, []-based CDMA and the [-] family of standards. These requirements are expressed as additions to the current specification of the SIM. The composite R-UIM is comprised of the current SIM specification and this ancillary or delta document. The SIM specification is included as a reference. It is intended that all upgrades to the SIM specification will also apply to the R-UIM. The current SIM specifications (see references) address the physical and electrical characteristics of the removable module, along with the user-to-card interface and terminal-to-card signaling protocol. Operation in a [/] environment requires that additional commands and responses be developed within the context of this document. This document also defines new Elementary Files (EFs) for storage of parameters that are added for operation in a [/] environment. This standard specifies security-related procedures and commands, along with data and information storage items that permit basic operation in the [/] environment. Later versions are expected to also address the delivery of [/] user features and services via the R-UIM. Although the focus of this document is compatibility with [/], the scope of this document may later be expanded to include compatibility with other []-related technologies such as TDMA and AMPS. [ ] indicates the corresponding document to be cross referenced. xi

No text. xii

REFERENCES The following standards are referenced in this text. At the time of publication, the editions indicated were valid. All standards are subject to revision, and parties to agreements based upon this document are encouraged to investigate the possibility of applying the most recent editions of the standards indicated below. ANSI and TIA maintain registers of currently valid national standards published by them. 0 0 0 Normative:. GPP C.S000-D, Introduction to cdma000 Spread Spectrum Systems, March 00.. GPP C.S000-D, Physical Layer Standard for cdma000 Spread Spectrum Systems, March 00.. Reserved.. GPP C.S000-D, Signaling Link Access Control (LAC) Standard for cdma000 Spread Spectrum Systems, March 00.. GPP C.S000-D, Upper Layer (Layer ) Signaling Standard for cdma000 Spread Spectrum Systems, March 00.. Reserved.. GPP C.S00-C, Over-the-Air Service Provisioning of Mobile Stations in Spread Spectrum Systems, November 00.. C.S00-B, Short Message Service for Spread Spectrum Systems, May 00.. ITU-T Recommendation E., Identification Plan for Land Mobile Stations,. 0. Reserved.. Reserved.. Reserved. Reserved. TIA--B, Mobile Station - Base Station Compatibility Standard for Wideband Spread Cellular Systems, October 00.. GPP X.S000-E V.0, Cellular Radio-Telecommunications Intersystem OperationsMobile Application Part, July, 00.. TIA/EIA/IS--A, Base Station Mobile Station Compatibility Specification for 00 MHz Cellular, Auxiliary, and Residential Services, November.. GPP TS.0 Third Generation Partnership Project; Technical Specification Group Terminals; Specification of the Subscriber Identity Module-Mobile Equipment (SIM- ME) Interface (Release ).. ETSI TS 0 Smart cards; UICC-Terminal Interface; Physical and logical Characteristics (Release ).. Reserved. xiii

REFERENCES 0 0 0 0. GPP S.S00-0 v.0 Common Cryptographic Algorithms, January, 00.. Reserved.. Reserved.. GPP X.S00-C cdma000 Wireless IP Network Standard, August, 00.. IETF RFC 00, IP Mobility Support, October.. IETF RFC, Mobile IP Network Access Identifier Extension for IPv, March 000.. IETF RFC, Remote Authentication Dial In User Service (RADIUS), June 000.. IETF RFC 0, Mobile IPv Challenge/Response Extensions, November 000.. GPP C.S00-0, cdma000 High Rate Packet Data Air Interface Specification, October 00.. GPP A.S000-0, Inteoperability Specification (IOS) for High Rate Packet Data (HRPD) Network Access Interfaces, Addendum, May 00. 0. ETSI TS.0, Third Generation Partnership Project; Technical Specification Group Terminals; Characteristics of the USIM application, (Release ). ETSI TS.0 rd Generation Partnership Project: Technical Specification Group Terminals; Characteristics of the IP Multimedia Services Identity Module (ISIM) Application (Release ). GPP X.S00 All-IP Core Network Multimedia Domain -Overview, December, 00. IETF RFC SIP: Session Initialization Protocol.. IETF RFC The Network Access Identifier.. Reserved. GPP S.S00-A, Broadcast-Multicast Service Security Framework, Jan 00September 00. GPP X.S00-00 MMS Stage-, Functional Description, May 00. ETSI TS.0 Alphabets and language-specific information. GPP X.S00-0 MMS MM Stage- Using OMA/WAP, May 00 0. GPP X.S00- MMS MM Stage- Using M-IMAP for message submission and retrieval. GPP X.S00- MMS MM Stage- Using SIP, June 00. GPP S.S00-A V.0 Enhanced Cryptographic Algorithms September 00. GPP C.S00-A, cdma000 High Rate Packet Data Air Interface Specification, March 00. GPP C.S00-0 ME Personalization, for cdma000 Spread Spectrum Systems, June 00. GPP S.S00-B IMS Security Framework, December 00 xiv

. IETF RFC (00): "UTF-, a transformation format of ISO 0".. ITU E. The international telecommunication charge card, 0/00 Informative:. TSB-FC.R00-D, Administration of Parameter Value Assignments for cdma000 Wideband Spread Spectrum Standards, DecemberApril 00. xv

GENERAL 0 0 0. Terms GPD. Third Generation Packet Data. AC. See Authentication Center. Access Network (AN). The network equipment providing data connectivity between a packet switched data network (typically the Internet) and the access terminals. An access network is equivalent to a base station in []. Access Terminal (AT). A device providing data connectivity to a user. An access terminal may be connected to a computing device such as a laptop personal computer or it may be a self-contained data device such as a personal digital assistant. An access terminal is equivalent to a mobile station in []. A-key. A secret, -bit pattern stored in the mobile station and HLR/AC. It is used to generate or update the mobile station s Shared Secret Data. Authentication. A procedure used by a base station to validate a mobile station s identity. Authentication Center (AC). An entity that manages the authentication information related to the mobile station. BAK. BCMCS related parameter. See []. BAK_Expire. BCMCS related parameter. See []. BAK_ID. BCMCS related parameter. See []. Base Station. A fixed station used for communicating with mobile stations. Depending upon the context, the term base station may refer to a cell, a sector within a cell, an MSC, an OTAF or other part of the wireless system. (See also MSC and OTAF.) BCMCS. Broadcast Multicast Service. BCMCS_Flo w_id. BCMCS related parameter. See []. BCMCS Root Key. A secret -bit pattern used for BCMCS (Broadcast Multicast Service). Defined as 'Registration Key' in []. CAVE. The algorithm currently used in [] for Authentication and Key Generation. CRC. See Cyclic Redundancy Code. Cyclic Redundancy Code (CRC). A class of linear error detecting codes which generate parity check bits by finding the remainder of a polynomial division. DF. Dedicated File. Diffie/Hellman. The key exchange mechanism used by []. ECMEA. Enhanced Cellular Message Encryption Algorithm -

ECMEA_NF. Enhanced Cellular Message Encryption Algorithm (Non Financial) 0 0 0 EF. Elementary File. Electronic Serial Number (ESN). A -bit number assigned by the mobile station manufacturer, uniquely identifying the mobile station equipment. ESN. See Electronic Serial Number. EUIMID. Expanded R-UIM Identifier. HLR. See Home Location Register. Home Location Register (HLR). The location register to which a MIN/IMSI is assigned for record purposes such as subscriber information. Home System. The cellular system in which the mobile station subscribes for service. ICC. Integrated Circuit(s) Card. ICCID. ICC Identification. IMS. IP Multimedia Subsystem. IMSI. See International Mobile Subscriber Identity. IMSI_M. MIN-based IMSI using the lower 0-digits to store the MIN. IMSI_T. True IMSI not associated with MIN. This could be digits or fewer. IMS Root Key. A secret -bit pattern used for IMS (IP Multimedia Subsystem). International Mobile Subscriber Identity (IMSI). A method of identifying subscribers in the land mobile service as specified in []. IRM. International Roaming MIN Long Code Mask. A -bit binary number that creates the unique identity of the long code. See also Public Long Code, Private Long Code, Public Long Code Mask, and Private Long Code Mask. LF_EUIMID. Long form of EUIMID, which is ICCID based. In this document this term refers to the entire 0 digit/0 octet contents of EFICCID even though this will include a check digit and a padding digit. LSB. Least significant bit. M/O. Mandatory/Optional. MAC. Message authentication code MAC-A. MAC used for authentication and key agreement MAC-I. Message Authentication Code for message integrity. The -bit output of the message integrity algorithm that allows the receiver to authenticate the message MCC. See Mobile Country Code -

0 0 0 ME. Mobile Equipment. MEID. Mobile Equipment Identifier. MF. Master File. M obile Country Code (MCC). A part of the E. IMSI identifying the home country. See []. M obile Directory Number (MDN). A dialable directory number which is not necessarily the same as the mobile station s air interface identification, i.e., MIN, IMSI_M or IMSI_T. M obile Equipment (ME). An R-UIM capable mobile station without an R-UIM inserted. MIN. See Mobile Identification Number. M NC. See Mobile Network Code. M obile Identification Number (MIN). The -bit number that is a digital representation of the 0-digit number assigned to a mobile station. M obile Network Code (MNC). A part of the E. IMSI identifying the home network within the home country. See []. M obile Station. A station, fixed or mobile, which serves as the end user s wireless communication link with the base station. Mobile stations include portable units (e.g., hand-held personal units) and units installed in vehicles. M obile Station Originated Call. A call originating from a mobile station. M obile Station Terminated Call. A call received by a mobile station (not to be confused with a disconnect or call release). MSB. Most significant bit. NAM. See Number Assignment Module. Net w ork. A network is a subset of a wireless system, such as an area-wide wireless network, a private group of base stations, or a group of base stations set up to handle a special requirement. A network can be as small or as large as needed, as long as it is fully contained within a system. See also System. Net w ork Identification (NID). A number that uniquely identifies a network within a wireless system. See also System Identification. NID. See Network Identification. Number Assignment Module (NAM). A set of MIN/IMSI-related parameters stored in the mobile station. OTAF. See Over-the-Air Service Provisioning Function. Over-the-Air Service Provisioning Function (OTAF). A configuration of network equipment that controls OTASP functionality and messaging protocol. OTAPA. See Over-the-Air Parameter Administration. -

0 0 0 OTASP. See Over-the-Air Service Provisioning. Over-the-Air Parameter Administration (OTAPA). Network initiated OTASP process of provisioning mobile station operational parameters over the air interface. Over-the-Air Service Provisioning (OTASP). A process of provisioning mobile station operational parameters over the air interface. Parity Check Bits. Bits added to a sequence of information bits to provide error detection, correction or both. P-CSCF. Proxy Call Session Control Function Preferred Roaming List (PRL). See SSPR. Private Long Code. The long code characterized by the private long code mask. Private Long Code Mask. The long code mask used to form the private long code. Pseudo-Electronic Serial Number (P-ESN). A -bit number hashed from MEID. Pseudo-UIMID (P-UIMID). A -bit number derived from EUIM_ID using a specific algorithm. Release. A process that the mobile station and base station use to inform each other of call disconnect. RFU. Reserved for future use. Roamer. A mobile station operating in a wireless system (or network) other than the one from which service was subscribed. Root Key. A secret -bit pattern permanently stored in the R-UIM. R-UIM. Removable UIM. SF_EUIMID. Short form of EUIMID. An EUIMID selected from MEID numbering resources. Secure Mode. Network initiated mode of communicating operational parameters between a mobile station and network based provisioning entity in an encrypted form. Service Option. A service capability of the system. Service options may be applications such as voice, data or facsimile. See informative []. Shared Secret Data (SSD). A -bit pattern stored in the mobile station (in semipermanent memory) and known by the base station. SSD is a concatenation of two -bit subsets: SSD_A, which is used to support the authentication procedures, and SSD_B, which serves as one of the inputs to the process generating the encryption mask and private long code. SID. See System Identification. SIP. Session Initialization Protocol SIM. Subscriber Identity Module. SK. BCMCS related parameter. See []. -

0 0 0 SK_RAND. BCMCS related parameter. See []. SMCK. Secure Mode Ciphering Key. SPASM. See Subscriber Parameter Administration Security Mechanism. SPC. Service Programming Code. SRTP. Secure Real Time Transport Protocol. See []. SSD. See Shared Secret Data. SSPR. See System Selection for Preferred Roaming. Subscriber Parameter Administration Security Mechanism (SPASM). Security mechanism protecting parameters and indicators of active NAM from programming by an unauthorized network entity during the OTAPA session. SW/SW. Status Word /Status Word. System. A system is a wireless telephone service that covers a geographic area such as a city, metropolitan region, county or group of counties. See also Network. System Identification (SID). A number uniquely identifying a wireless system. System Selection Code. A part of the Activation Code that specifies the user selection of a Band and a Block operated by the selected service provider. System Selection for Preferred Roaming (SSPR). A feature that enhances the mobile station system acquisition process based on the set of additional parameters stored in the mobile station in the form of a Preferred Roaming List (PR_LISTs-p). TK. BCMCS related parameter. See []. TK_RAND. BCMCS related parameter. See []. T MSI. Temporary Mobile Station Identity. UAK. UIM Authentication Key. A -bit pattern produced by AKA that is used for R-UIM authentication. U MAC. UIM-Present MAC. A -bit output of the UMAC algorithm computed by R- UIM based on MAC-I, which provides a means for the mobile station to prove that the R- UIM was present at the time the message is formed. UCS. Universal Multiple-Octet Coded Character Set. UIM. User Identity Module. UIM_ID. An (up to) -bit electronic identification (ID) number that is unique to the R-UIM. URI. Universal Resource Identifier. VPM. Voice Privacy Mask. W LAN Root Key. A secret -bit pattern used for WLAN services. -

No text. -

PHYSICAL, ELECTRICAL, AND LOGICAL INTERFACES. Physical Interface The physical characteristics of the R-UIM shall follow the definitions specified in the sections of [] shown in Table.-. Table.- Physical Characteristics Section of [] Title Physical Characteristics. ID- UICC. Plug-In UICC, including Annex A (Normative). Temperature range for card operations. Contacts.. Contact activation and deactivation.. Inactive contacts.. Contact pressure -

. Electrical Interface The electrical characteristics of the R-UIM shall follow the definitions specified in the sections of [] shown in Table.-. Table.- Electronic Signals and Transmission Protocols Section of [] Title Electronic Signals and Transmission Protocols. Electrical specifications. Initial communication establishment procedures.. Error handling for speed enhancement. Transmission protocols. Clock Terminals and R-UIM supporting other voltage technologies than Class A (see section. of ) shall support at least consecutive voltage classes, i.e. classes A and B, or classes B and C. 0. Logical Interface The logical interface of the R-UIM shall follow the definitions specified in the sections of [] shown in Table.-. The Dedicated file ID for CDMA (used for EFs in section.) is F. Table.- Logical Model Section of [] Title Application and File structure. SIM application structure. File types.. Dedicated files.. Elementary files... Cyclic EF. Methods for selecting a file. Security Features Security-Related procedures and protocols are defined in section. -

.. G Authentication and Key Generation Procedure See section. and.... Algorithms and Processes The algorithm used by the R-UIM for authentication and key generation is CAVE (see section. and.)... File Access Conditions The file access conditions of the R-UIM shall follow the definitions specified in the section of [] shown in Table.-. 0 Table.- File Access Conditions Section of [] Title. File Access Conditions.. G AKA (Authentication and Key Agreement) Procedure and Function See section. and.. -

. Function Description The functions of the R-UIM shall follow the definitions specified in the sections of [] shown in Table.-. For [], the following functions from section are used: Update SSD, Base Station Challenge, Confirm SSD, Run CAVE, Generate Key/VPM and Store ESN_MEID_ME. These functions are applicable for CDMA operation; other modes are outside of the scope of this document. They shall not be executable unless DF CDMA or any sub-directory under DF CDMA has been selected as the current directory and a successful CHV verification procedure has been performed. 0 Table.- Description of the Functions Section of [] Title Description of The Functions. SELECT. STATUS. READ BINARY. UPDATE BINARY. READ RECORD. UPDATE RECORD. SEEK. INCREASE. VERIFY CHV.0 CHANGE CHV. DISABLE CHV. ENABLE CHV. UNBLOCK CHV. INVALIDATE. REHABILITATE. SLEEP. TERMINAL PROFILE. ENVELOPE.0 FETCH. TERMINAL RESPONSE -

. Command Description The commands used with the R-UIM shall follow the definitions specified in the sections of [] shown in Table.-. The commands used to run CAVE are specified in section.. Table.- Description of the Commands (Part of ) Section of [] Title Description of the Commands. Mapping Principles. Coding of the Commands.. SELECT*.. STATUS.. READ BINARY.. UPDATE BINARY.. READ RECORD.. UPDATE RECORD.. SEEK.. INCREASE.. VERIFY CHV..0 CHANGE CHV.. DISABLE CHV.. ENABLE CHV.. UNBLOCK CHV.. INVALIDATE.. REHABILITATE -

Table.- Description of the Commands (Part of ) Section of [] Title.. SLEEP.. GET RESPONSE.. TERMINAL PROFILE..0 ENVELOPE.. FETCH.. TERMINAL RESPONSE. Definition and coding. Status conditions returned by the card.. Responses to commands which are correctly executed.. Responses to commands which are postponed.. Memory management.. Referencing management.. Security management.. Application independent errors.. Commands versus possible status responses The INCREASE command is coded as specified in TS 0 [] with the following limitations: - Class = 'A0' - P, P = '00' - P = 'Record length of selected cyclic file' The response is according to the command parameters, as defined in TS 0 [] *Response parameters/data in case of DF CDMA : 0 Byte(s) Description Length - RFU - Total amount of memory of the selected directory which is not allocated to any of the DFs or EFs under the selected directory - File ID Type of file (see subclause.) - RFU Length of the following data (byte to the end) - CDMA specific data -

CDMA specific data: Byte(s) Description Length File characteristics (see detail ) Number of DFs which are a direct child of the current directory Number of EFs which are a direct child of the current directory Number of CHVs, UNBLOCK CHVs and administrative codes RFU CHV status (see detail ) 0 UNBLOCK CHV status (see detail ) CHV status (see detail ) UNBLOCK CHV status (see detail ) RFU - Reserved for the administrative management 0 lgth Bytes - are mandatory and shall be returned by the R-UIM. Bytes and following are optional and may not be returned by the R-UIM. NOTE : Byte and following are RFU. 0 For the above bytes R-UIM shall follow definitions in section.. of []... R-UIM Supply Voltage Identification R-UIM supporting Class B or C operating conditions (as specified in []) shall support the supply voltage indication as specified in section.. of []. The table below shows the CDMA equivalent command for the listed GSM command. GSM command SELECT GSM CDMA Equivalent command SELECT CDMA -

. Content of EFs The content of the EFs of the R-UIM shall include the sections of [] shown in Table.-. Table.- Content of EFs Section of [] Title 0. Contents of the EFs at the MF level 0.. EFICCID (ICC Identification) () 0. DFs at the GSM application level 0. Contents of files at the telecom level 0.. EFADN (Abbreviated dialing numbers)() 0.. EFFDN (Fixed dialing numbers)() / () 0.. EFLND (Last number dialed)() 0.. EFSDN (Service Dialing Numbers)() 0..0 EFEXT (Extension)() 0.. EFEXT (Extension)() 0.. EFEXT (Extension)() 0. DFs at the telecom level 0.. Contents of files at the telecom graphics level 0... EFIMG (Image) 0... Image Instance Data Files 0 Notes: () The numbers are stored in the same format as []. () See FDN procedures in [] Annex B. The table below shows the CDMA equivalent of GSM files that are specially handled in FDN mode: GSM File CDMA Equivalent File DF GSM DF CDMA EF LOCI EF IMSI EF TMSI EF IMSI_M, EF IMSI_T () See section.. for some additional restrictions on the contents of EF ICCID. In addition, the R-UIM may optionally provide an enhanced phonebook in a DF PHONEBOOK (File ID FA ) under DF TELECOM as defined in [0]. In this case, the content of DF PHONEBOOK -

on the R-UIM may include the sections of [0] shown in Table.-, with the following restrictions: PIN shall be interpreted as CHV and PIN shall be interpreted as CHV. SFIs (Short File Identifiers) shall not apply to the R-UIM. 0 EF ADN and EF PBR shall always be present if the DF PHONEBOOK is present. To ensure proper inter-working in all terminals, the first EFs ADN and EXT files, if under DF PHONEBOOK, are linked to the corresponding files under DF TELECOM, i.e. EF ADN = 'FA' and EF EXT = 'FA', respectively. This means that the contents of EFs ADN and EXT files under DF PHONEBOOK shall remain synchronized with those under DF TELECOM In addition, the Phonebook Restrictions defined in chapter... of [0] apply to the R- UIM. Table.- Content of EFs for R-UIM supporting the enhanced phonebook Section of [0] Title... EF PBR (Phone Book Reference file) ()... EF IAP (Index Administration Phone book)... EF ADN (Abbreviated dialing numbers) ()... EF EXT (Extension)... EF GRP (Grouping file)... EF AAS (Additional number Alpha String)... EF GAS (Grouping Information Alpha String)... EF ANR (Additional Number) ()...0 EF SNE (Second Name Entry) ()... EF EMAIL (e-mail address) () 0 Notes: The files EF PBC (Phone Book Control), EF UID (Unique Identifier), and EF CCP (Capability Configuration Parameters ) are not applicable to the R-UIM. ADN File SFI should be interpreted as Last byte of ADN File Identifier whenever a one-byte field is used to refer to an ADN file. -

. Application Protocol The application protocol of the R-UIM shall follow the definitions specified in the sections of [] shown in Table.-. Table.- Application Protocol Section of [] Title Application protocol. General procedures.. Administrative information request.. () SIM service table request.. () SIM phase request.. SIM Presence Detection and Proactive Polling () To CDMA mode, ME should read EF CDMA service table. () To CDMA mode, ME should read EF R-UIM revision. -0

. CDMA Card Application Toolkit Reserved..0 Coding of Alpha Fields in the R-UIM for UCS Reserved. -

MULTI-MODE R-UIM DEDICATED FILE (DF) AND ELEMENTARY FILE (EF) STRUCTURE Figure - depicts the multi-mode R-UIM file structure. MF F00 DF F0 Telecom DF F0 GSM evolved IMT-000 DF EF EF EF DF F0 PCS 00 EF EF DF EF EF EF DF F TDMA DF F CDMA DF EF EF EF Specified for TDMA evolution DF EF EF EF Specified for CDMA evolution Figure -. Dedicated File Structure 0. DF and EFs for ANSI- Based Applications EFs assigned under DF F for storage of Number Assignment Module (NAM) parameters and operational parameters that are required for Analog/CDMA operation are based on [] and the family of standards defined in []. Section. shows the detailed coding of these EFs. In this document, only single-nam operation for CDMA is supported and therefore, each parameter is included once. -

0. File Identifier (ID) A file ID is used to address or identify each specific file. The file ID consists of two bytes and shall be coded in hexadecimal notation. File IDs are specified in section.. The first byte identifies the type of file. The numbering scheme for DFs and EFs is inherited from [] as: F : Master File; F : st level Dedicated File; F : nd level Dedicated File; F : Elementary File under the Master File; F : Elementary File under the st level Dedicated File; F : Elementary File under the nd level Dedicated File. File IDs shall be subject to the following conditions: the file ID shall be assigned at the time of creation of the file concerned; no two files under the same parent shall have the same ID; a child and any parent, either immediate or remote in the hierarchy, e.g. grandparent, shall never have the same file ID. In this way each file is uniquely identified.. Reservation of File IDs 0 In addition to the identifiers used for the files specified in the present document, the following file IDs are reserved for use by GSM and CDMA. Dedicated Files: administrative use: F X, F X, F X operational use: F 0 (DF ), F 0 (DF ), F (DF ), F (DF ), F (DF TELECOM GSM DCS00 IS- FP- ), F (DF ), F (DF ), and F X, where X ranges from CTS TIA/EIA- TIA/EIA- to F. reserved under F0 : 0 F 0 (DF ) GRAPHICS reserved under F0 : F 0 (DF ), F (DF ), F (DF ), F (DF ), F X, where IRIDIUM Globalstar ICO ACeS X ranges from to F for other MSS. F 0 (DF ), F Y where Y ranges from to F ; PCS-00 F X where X ranges from 0 to F ; F 0 (DF ), F Y where Y ranges from to F ; CTS F 0 (DF ), F Y where Y ranges from to F ; SoLSA F YX where Y ranges from to F and X from 0 to F. 0 Elementary files: administrative use: F XX in the DFs F X ; F XX in the DFs F X, F X F X in the DFs F 0, F 0, F, F ; F X in all nd level DFs F 0, F EX in the MF F 00 ; operational use: F X, F X, F X in F 0 and F X ; F YX, where Y ranges from to F in all nd level DFs. -

F X in the MF F 00. In all the above, X ranges, unless otherwise stated, from 0 to F, inclusive. -

0. Coding of EFs for NAM Parameters and Operational Parameters All quantities shown in the EF descriptions are represented in binary format, unless otherwise specified. All unused, allocated bytes of memory are set to 00 unless otherwise specified. Some bits are marked as RFU. Some or all of these RFU bits may be used in the future for additional parameters. Therefore, all RFU bits shall be set to 0 (zero). The ME shall ignore the state of all RFU bits. The dedicated file ID used for EFs in this section is F (CDMA). [] and [] store parameters in several different types of memory. Variables stored in permanent memory use the subscript p. Variables stored in semi-permanent memory use the subscript s-p. When an R-UIM is used, some of these variables are maintained in the R-UIM while other variables are maintained in the ME. -

.. EF COUNT (Call Count) This EF stores the value of Call Count, COUNTs-p. Identifier: F Structure: cyclic Mandatory Record Length: bytes Update activity: high Access Conditions: READ UPDATE INCREASE INVALIDATE REHABILITATE CHV CHV CHV Bytes Description M/O Length COUNTs-p M bytes COUNTs-p is contained in the least significant bits of the two-byte field. Coding: Byte : 0 Byte : b b b b b b b b b b b b b b b b RFU LSB of COUNTs-p Middle bits of COUNTs-p MSB of COUNTs-p RFU -

0.. EF IMSI_M (IMSI_M) This EF stores the five components of IMSI_M. Identifier: F Structure: transparent Mandatory File size: 0 bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Bytes Description M/O Length IMSI_M_CLASSp M byte IMSI_M_S from IMSI_M_Sp M bytes IMSI_M_S from IMSI_M_Sp M bytes IMSI_M p M byte IMSI_M_PROGRAMMED/ M byte IMSI_M_ADDR_NUMp 0 MCC_Mp M bytes IMSI_M_CLASSp - Class assignment of the IMSI_M. IMSI_M_ADDR_NUMp - Number of IMSI_M address digits. MCC_Mp - Mobile country code. IMSI_M p - th and th digits of the IMSI_M. IMSI_M_Sp - The least significant 0 digits of the IMSI_M. Coding: Byte : b b b b b b b b b=0: class 0 b=: class RFU Byte, byte, byte, byte and byte are encoded as described in [], Section..., Encoding of IMSI_M_S and IMSI_T_S. Byte : Byte : b b b b b b b b LSB of IMSI_M_S IMSI_M_S bits in ascending order -

b b b b b b b b Byte : b b b b b b b b Byte : b b b b b b b b Byte : b b b b b b b b Next MSB of IMSI_M_S MSB of IMSI_M_S RFU LSB of IMSI_M_S IMSI_M_S bits in ascending order IMSI_M_S bits in ascending order IMSI_M_S bits in ascending order MSB of IMSI_M_S 0 Byte is encoded as described in [], Section..., Encoding of IMSI_M and IMSI_T. Byte : b b b b b b b b LSB of IMSI_M Middle bits of IMSI_M MSB of IMSI_M RFU Byte is the binary equivalent of the IMSI_M_ADD_NUM, as described in [], Section.., Mobile Station Identification Number. Byte : b b b b b b b b LSB of IMSI_M_ADD_NUM Middle bit of IMSI_M_ADD_NUM MSB of IMSI_M_ADD_NUM RFU IMSI_M_PROGRAMMED indicator b=0: IMSI_M has not been programmed b=: IMSI_M has been programmed 0 IMSI_M_PROGRAMMED shall be set to if an IMSI_M has been programmed (IMSI_M would contain a MIN for systems that comply with []); if an IMSI_M has not been programmed, it shall be set to 0. -

Byte and byte 0 are encoded as described in [] Section..., Encoding of the MCC_M and MCC_T. Byte : b b b b b b b b LSB of MCC_M MCC_M bits in ascending order Byte 0: b b b b b b b b Next MSB of MCC_M MSB of MCC_M RFU 0 For R-UIM applications in systems that comply with [], the parameter MIN is stored in EF IMSI_M. For these instances, the 0 bits of MIN are stored in bytes and, with the coding shown above, while the bits of MIN are stored in bytes,, and. The selection of IMSI_M or IMSI_T for use in the authentication process shall be in accordance with [] Section... and [] Section..., which stipulate that the MIN portion of IMSI_M shall be used as an input parameter of the authentication calculation if IMSI_M is programmed and that a -bit subset of IMSI_T shall be used if only IMSI_T has been programmed. -

.. EF IMSI_T (IMSI_T) This EF stores the five components of IMSI_T. Identifier: F Structure: transparent Mandatory File size: 0 bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Bytes Description M/O Length IMSI_T_CLASSp M byte IMSI_T_S from IMSI_T_Sp M bytes IMSI_T_S from IMSI_T_Sp M bytes IMSI_T p M byte IMSI_T_PROGRAMMED/ M byte IMSI_T_ADDR_NUMp 0 MCC_Tp M bytes All byte descriptions, encodings and reference sections in [] are identical to those described in Section.., except that all references to IMSI_M shall apply to IMSI_T. EF IMSI_T is not used to store a MIN. -

.. EF TMSI (TMSI) This EF stores the Temporary Mobile Station Identity (TMSI). TMSI is assigned by the serving network and consists of components, ASSIGNING_TMSI_ZONE_LENs-p, ASSIGNING_TMSI_ZONEs-p, TMSI_CODEs-p, and TMSI_EXP_TIMEs-p. Identifier: F Structure: transparent Mandatory File size: bytes Update activity: high Access Conditions: READ UPDATE INVALIDATE REHABILITATE Coding: Byte : CHV CHV CHV Bytes Description M/O Length M byte ASSIGNING_TMSI_ZONE_LENs-p ASSIGNING_TMSI_ZONEs-p M bytes 0 TMSI_CODEs-p M bytes TMSI_EXP_TIMEs-p M bytes b b b b b b b b LSB of ASSIGNING_TMSI_ZONE_LENs-p Middle bits of ASSIGNING_TMSI_ZONE_LENs-p MSB of ASSIGNING_TMSI_ZONE_LENs-p RFU 0 0 Bytes through store the (up to) -octet TMSI Zone as described in Sections..,... and... of []. These sections are entitled Temporary Mobile Station Identity, Overview and TMSI Assignment Memory respectively. In each case the lowest-order octet shall be stored in the lowest-order byte (i.e., byte ) of each set of contiguous bytes, and successively higher octets stored in the next highest order bytes. Unused bytes shall be set to 00. Bytes 0 through store the ( to octet) TMSI Code as described in the sections of [] referenced above. In each case the lowest-order octet shall be stored in the lowest-order byte (i.e., byte 0) of each set of contiguous bytes, and successively higher octets stored in the next highest order bytes. Unused bytes shall be set to 00. Bytes through store the TMSI Expiration Time as described in the sections of [] referenced above. In each case the lowest-order octet shall be stored in the lowest-order byte (i.e., byte ) of each set of contiguous bytes, and successively higher octets stored in the next highest order bytes. -0

.. EF AH (Analog Home SID) This EF identifies the home SID when the mobile station is operating in the analog mode. Identifier: F Structure: transparent Mandatory File size: bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Bytes Description M/O Length - Analog home SID (HOME_SIDp) M bytes Coding: Byte : b b b b b b b b Byte : b b b b b b b b LSB of SID SID bits in ascending order SID bits in ascending order MSB of SID RFU -

.. EF AOP (Analog Operational Parameters) This EF includes the Extended Address bit (Exp), the Local Use Mark (LCM) and the Group ID (GID) field. Identifier: F Structure: transparent Mandatory File size: byte Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE Coding: Byte : CHV CHV Bytes Description M/O Length Analog Operational Parameters M byte (Exp, LCM, GID) b b b b b b b b Extended address Local use mark Group ID RFU -

.. EF ALOC (Analog Location and Registration Indicators) This EF stores parameters related to Autonomous Registration memory (NXTREGs-p and SIDs-p) as well as the Location Area memory (LOCAIDs-p and PUREGs-p). Identifier: F Structure: transparent Mandatory File size: bytes Update activity: high Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Bytes Description M/O Length - NXTREGs-p M bytes - SIDs-p M bytes - LOCAIDs-p, PUREGs-p M bytes 0 Coding: Byte : b b b b b b b b Byte : b b b b b b b b Byte : b b b b b b b b Byte : b b b b b b b b Byte : b b b b b b b b LSB of NXTREGs-p NXTREGs-p bits in asceding order NXTREGs-p bits in asceding order NXTREGs-p bits in asceding order MSB of NXTREGs-p RFU LSB of SIDs-p SIDs-p bits in ascending order SIDs-p bits in ascending order MSB of SIDs-p RFU -

Byte : b b b b b b b b Byte : b b b b b b b b LSB of LOCAIDs-p LOCAIDs-p bits in ascending order LOCAIDs-p bits in ascending order MSB of LOCAIDs-p RFU PUREGs-p -

.. EF CDMAHOME (CDMA Home SID, NID) This EF identifies the home SID and NID when the mobile station is operating in the CDMA mode. Identifier: F Structure: linear fixed Mandatory Record length: bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE Coding: Byte : CHV CHV Bytes Description M/O Length CDMA Home SID (SIDp) M bytes CDMA Home NID (NIDp) M bytes Band Class M byte 0 b b b b b b b b Byte : b b b b b b b b Byte : b b b b b b b b Byte : b b b b b b b b Byte : b b b b b b b b LSB of SIDp SIDp bits in ascending order SIDp bits in ascending order MSB of SIDp RFU LSB of NIDp NIDp bits in ascending order NIDp bits in ascending order MSB of NIDp Band class as defined in informative [] RFU -

.. EF ZNREGI (CDMA Zone-Based Registration Indicators) This EF stores the zone-based registration list ZONE_LIST. The list includes a REG_ZONE and a corresponding SID, NID pair. Details are described in sections titled Registration Memory, Zone-Based Registration and Registration Procedures of [/]. Identifier: F Structure: linear fixed Mandatory Record length: bytes Update activity: high Access Conditions: READ UPDATE INVALIDATE REHABILITATE Coding: Byte : CHV CHV Bytes Description M/O Length REG_ZONE M bytes SID M bytes NID M bytes RFU M bytes 0 b b b b b b b b Byte : b b b b b b b b Byte : b b b b b b b b Byte : b b b b b b b b LSB of REG_ZONE REG_ZONE bits in ascending order REG_ZONE bits in ascending order MSB of REG_ZONE RFU LSB of SID SID bits in ascending order SID bits in ascending order MSB of SID RFU -

Byte : b b b b b b b b Byte : b b b b b b b b LSB of NID NID bits in ascending order NID bits in ascending order MSB of NID -

..0 EF SNREGI (CDMA System-Network Registration Indicators) This EF stores the SID and NID of the wireless system in which the mobile station last registered. This is described in sections of [] titled Registration Memory and Zone- Based Registration, respectively. Identifier: FA Structure: transparent Mandatory File size: bytes Update activity: high Access Conditions: READ UPDATE INVALIDATE REHABILITATE Coding: Byte : CHV CHV Bytes Description M/O Length N, size of SID/NID list (N=) M byte SID M bytes NID M bytes RFU M bytes 0 b b b b b b b b Byte : b b b b b b b b Byte : b b b b b b b b Byte : b b b b b b b b b= RFU LSB of SID SID bits in ascending order SID bits in ascending order MSB of SID RFU LSB of NID NID bits in ascending order -

Byte : b b b b b b b b NID bits in ascending order MSB of NID -

.. EF DISTREGI (CDMA Distance-Based Registration Indicators) This EF stores the Base Station Latitude (BASE_LAT_REG), the Base Station Longitude (BASE_LONG_REG) and the Registration Distance (REG_DIST_REG) of the base station to which the first access probe (for a Registration Message, Origination Message or Page Response Message) was transmitted after entering the System Access State. Identifier: FB Structure: transparent Mandatory File size: bytes Update activity: high Access Conditions: READ UPDATE INVALIDATE REHABILITATE Coding: Byte : CHV CHV Bytes Description M/O Length - BASE_LAT_REG M bytes - BASE_LONG_REG M bytes - REG_DIST_REG M bytes 0 b b b b b b b b Byte : b b b b b b b b Byte : b b b b b b b b Byte : b b b b b b b b Byte : b b b b b b b b LSB of BASE_LAT_REG BASE_LAT_REG bits in ascending order BASE_LAT_REG bits in ascending order BASE_LAT_REG bits in ascending order MSB of BASE_LAT_REG RFU LSB of BASE_LONG_REG BASE_LONG_REG bits in ascending order BASE_LONG_REG bits in ascending order -0

Byte : b b b b b b b b Byte : b b b b b b b b Byte : BASE_LONG_REG bits in ascending order MSB of BASE_LONG_REG RFU LSB of REG_DIST_REG REG_DIST_REG bits in ascending order NOTE: b b b b b b b b REG_DIST_REG bits in ascending order MSB of REG_DIST_REG RFU The parameters for Distance-Based Registration are described in [], Section... -

.. EF ACCOLC (Access Overload Class ACCOLCp) This EF defines the access overload class for the mobile station. This access overload class identifies which overload class controls access attempts by the mobile station and is used to identify redirected overload classes in global service redirection. For normal mobile stations, the -bit access overload class indicator is derived from the last digit of the associated decimal representation of the IMSI_M via decimal to binary conversion as specified in [] and []. Identifier: FC Structure: transparent Mandatory File size: byte Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length Access overload class (ACCOLCp) M byte 0 Coding: Byte : b b b b b b b b LSB of ACCOLCp Middle bits of ACCOLCp MSB of ACCOLCp RFU -

.. EF TERM (Call Termination Mode Preferences) This EF contains the call termination preference MOB_TERM_HOMEp, MOB_TERM_SIDp and MOB_TERM_FOR_NIDp. Identifier: FD Structure: transparent Mandatory File size: byte Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE Coding: Byte : CHV CHV Bytes Description M/O Length Call termination preferences M byte b b b b b b b b MOB_TERM_FOR_NIDp b=0: disallow mobile-terminated call while a NID roamer b=: allow mobile-terminated call while a NID roamer MOB_TERM_FOR_SIDp b=0: disallow mobile-terminated call while a SID roamer b=: allow mobile-terminated call while a SID roamer MOB_TERM_HOMEp b=0: disallow mobile-terminated call while using home (SID, NID) pair b=: allow mobile-terminated call while using home (SID, NID) pair RFU -

0.. EF SSCI (Suggested Slot Cycle Index) This EF suggests a value for the mobile station s preferred slot cycle index for CDMA operation (see.. of []). Since the mobile equipment may not support all the slot cycle indexes, the mobile equipment shall select the minimum, as the preferred slot cycle index defined in [], between the slot cycle index supported by the mobile equipment and the suggested slot cycle index contained in the EF SSCI. Identifier: FE Structure: transparent Optional File size: byte Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE Coding: Byte : CHV CHV Bytes Description M/O Length Suggested slot cycle index M byte b b b b b b b b LSB of suggested slot cycle index Middle bit of suggested slot cycle index MSB of suggested slot cycle index RFU -

0.. EF ACP (Analog Channel Preferences) This EF specifies the analog mode channel preferences as determined by the service provider in accordance with the terms of the subscription. The items addressed are the Analog Initial Paging Channel, the Analog First Dedicated Control Channel for System A, the Analog First Dedicated Control Channel for System B, and the Number of Dedicated Control Channels to scan. Identifier: FF Structure: transparent Mandatory File size: bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Bytes Description M/O Length - Analog Initial Paging Channel M bytes - Analog First Dedicated Control M bytes Channel System A - Analog First Dedicated Control M bytes Channel System B Number of Dedicated Control Channel to Scan M byte NOTE: Each channel is represented by an -bit binary number. Coding: Byte,, : b b b b b b b b Byte,, : b b b b b b b b LSB of channel number channel number bits, in ascending order channel number bits, in ascending order MSB of channel number RFU -

.. EF PRL (Preferred Roaming List) This EF stores the Preferred Roaming List, as described in Section.. of []. The Preferred Roaming List includes selection parameters from [] and []. Identifier: F0 Structure: transparent Mandatory File size: MAX_PR_LIST_SIZE Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length - PR_LIST_ SIZE PR_LIST (see Section.. of []) M PR_LIST_SIZE -

.. EF RUIMID (Removable UIM_ID) This EF stores a -bit electronic identification number (ID) unique to the R-UIM or a - bit pseudo-uimid of the R-UIM. The file may store a -bit pseudo-uimid constructed in the following way: The most significant bits shall be 0x 0. The least significant bits shall be the least significant bits of SHA- digest of the entire EUIMID, either LF_EUIMID or SF_EUIMID (based on n in CDMA service table).). Identifier: F Structure: transparent Mandatory File size: bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE ALW Never Never Never Bytes Description M/O Length Number of bytes M byte Lowest-order byte M byte : M byte : M byte : M byte : O byte : O byte Highest-order byte O byte Example: if the -bit SFLF_EUIMID (ICCID) is (hexadecimal) FF 00 00 (MSB) 0 0 0 0 F (LSB), the pseudo-uimid is (hexadecimal) 0 (Byte ) D ED (Byte ), and with Byte set to 0; if the -bit SF_EUIMID is (hexadecimal) FF (MSB) 00 00 0 (LSB), the pseudo-uimid is (hexadecimal) 0 (Byte ) 0 E.(Byte ), and with Byte set to 0. The EUIMID (either form) is loaded into a -bit SHA- input block, starting with bit of this block, to produce an output, from which the least significant bits are used as the least significant bits of EF(RUIMID). The -bit digits of EUIMID are loaded in the order d, d, d, d dn-, dn. For each digit the least significant bit is loaded into the highest numbered of four consecutive SHA- input bits and the most significant bit into the lowest. -

.. EF CST (CDMA Service Table) This EF indicates which services are allocated, and whether, if allocated, the service is activated. If a service is not allocated or not activated in the R-UIM, the mobile equipment (ME) shall not select this service. Identifier: F Structure: transparent Mandatory File size: N bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length Services n to n M byte Services n to n M byte Services n to n M byte Services n to n M byte Services n to n0 M byte : : : : N Services (n-) to (n) O byte -

Services: Service n : CHV disable function Service n : Abbreviated Dialing Numbers (ADN) Service n : Fixed Dialing Numbers (FDN) Service n : Short Message Storage (SMS) Service n : HRPD Service n : Enhanced Phone Book Service n : Multi Media Domain (MMD) Service n : SF_EUIMID-based EUIMID Service n : MEID Support Service n0 : Extension Service n : Extension Service n : SMS Parameters Service n : Last Number Dialled (LND) Service n : Service Category Program for BC-SMS Service n : RFU Service n : RFU Service n : CDMA Home Service Provider Name Service n : Service Dialing Numbers (SDN) Service n : Extension Service n0 : GPD-SIP Service n : RFU Service n : RFU Service n : RFU Service n : RFU Service n : Data Download via SMS Broadcast Service n : Data Download via SMS-PP Service n : Menu Selection Service n : Call Control Service n : Proactive R-UIM Service n0 : AKA Service n : RFU Service n : RFU Service n : RFU Service n : RFU Service n : RFU Service n : RFU Service n : RFU Service n : GPD-MIP Service n : BCMCS Service n0 : Multimedia Messaging Service (MMS) Service n : Extension Service n : MMS User Connectivity Parameters Service n : Application Authentication Service n : Group Identifier Level Service n : Group Identifier Level Service n : De-Personalization Control Keys Service n : Cooperative Network List NOTE: Additional services, when defined, will be coded on further bytes in the EF. -

0 0 Coding: Each byte is used to code services. bits are used to code each service: first bit = : service allocated first bit = 0: service not allocated where the first bit is b, b, b or b; second bit = : service activated second bit = 0: service not activated where the second bit is b, b, b or b. Service allocated means that the R-UIM has the capability to support the service. Service activated means that the service is available. Service delivery can only occur when service is allocated, service is activated and the R-UIM is operating in an environment that supports delivery of the service. The following codings are possible: first bit = 0: service not allocated, second bit has no meaning; first bit = and second bit = 0: service allocated but not activated; first bit = and second bit = : service allocated and activated. The bits for services not yet defined shall be set to RFU. All bytes that are RFU shall be set to 00 and RFU bits will be set to 0. Byte : Etc. Byte : b b b b b B b b b b b b b B b b Service n Service n Service n Service n Service n Service n Service n Service n 0 If the R-UIM supports the FDN feature (FDN allocated and activated) a special mechanism shall exist in the R-UIM which invalidates EF IMSI_T, EF IMSI_M and EF TMSI once during each CDMA session. This mechanism shall be invoked by the R-UIM automatically if FDN is enabled. This invalidation shall occur at least before the next command following selection of either EF FDN is enabled when the ADN is invalidated or not activated. If service n (SF_EUIMID-based EUIMID) is not activated (either allocated or not), ME shall fill in EUIMEXT_UIM_ID INFO RECORD with ICCID fromthe entire contents of EF ICCID in response to Status Request Message defined in []. Otherwise, ME shall fill in EUIMEXT_UIM_ID INFO RECORD with SF_EUIMID from EF SF_EUIMID. -0

0.. EF SPC (Service Programming Code) This EF includes the Service Programming Code (SPC), having a value from 0 to,. The default value is 0. Details of SPC are in [], section... Identifier: F Structure: transparent Mandatory File size: bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE Bytes Description M/O Length - Service Programming Code M bytes Coding: SPC is a -digit numberd D D D D D, where D is the most significant digit and D is the least significant digit. The coding of SPC in this EF is according to [], section..., whereby each digit is encoded in BCD format. Byte : Byte : b b b b b b b b b b b b b b b b LSB of Digit (D ) : : MSB of Digit (D ) LSB of Digit (D ) : : MSB of Digit (D ) LSB of Digit (D ) : : MSB of Digit (D ) LSB of Digit (D ) : : MSB of Digit (D ) -

Byte : b b b b b b b b LSB of Digit (D ) : : MSB of Digit (D ) LSB of Digit (D ) : : MSB of Digit (D ) -

0..0 EF OTAPASPC (OTAPA/SPC_Enable) This EF contains user-entered control information that either prevents or (else) permits network manipulation of the SPC, and either prevents or (else) permits OTAPA to be performed on the NAM. This EF is based upon information in [], sections.. and... A successful base station response to an R-UIM initiated challenge is required prior to any network manipulation of OTAPA accessible files. Identifier: F Structure: transparent Mandatory File size: byte Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE Coding: Byte : CHV CHV Bytes Description M/O Length OTAPA/SPC_Enable M byte b b b b b b b b OTAPA_Enable RFU SPC_Change_Enable RFU For OTAPA_Enable, a value of 0 for the NAM indicates that the user consents to the performance of OTAPA for the NAM by the service provider. A value of indicates that the user does not permit OTAPA be to performed on the NAM. Refer to [], Section... For SPC_Change Enable, a value of 0 for the R-UIM indicates that the user consents to allow the service provider to change the value of the Service Programming Code. A value of indicates that the user denies permission for the service provider to change the value of SPC. -

.. EF NAMLOCK (NAM_LOCK) This EF stores the locked/unlocked state of the NAM. This EF is based upon information in []. Identifier: F Structure: transparent Mandatory File size: byte Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE Coding: Byte : CHV CHV Bytes Description M/O Length SPASM protection indicator M byte (NAM_LOCK) status b b b b b b b b NAM_LOCK_STATE NAM_LOCK OTA_MODE RFU 0 0 Bit gives the current NAM_LOCK_STATE. A value of indicates that the NAM is locked by the SPASM protection mechanism. A value of 0 indicates that the NAM is unlocked. Bit gives the permanent NAM_LOCK setting. A value of indicates that the SPASM protection mechanism must be satisfied for network initiated OTA. A value of 0 indicates that SPASM protection is not required. Bit gives the OTA_MODE for the current OTA session. A value of 0 indicates userinitiated, and a value of indicates network-initiated. If an OTA programming session was initiated by the user as described in Section.. of [], SPASM does not protect access to the NAM parameters and indicators. In this case, the ME shall set the NAM_LOCK_STATE to 0. The NAM_LOCK bit shall not be changed. On invocation of a network-initiated OTA session, the ME shall set the NAM_LOCK_STATE=NAM_LOCK. The ME updates the OTA_MODE bit to tell the R-UIM how an OTA session was initiated. The ME shall set this bit on initiation of an OTA session. The R-UIM shall comply with the requirements in [] (e.g. shall reject OTAPA Request while in a user-initiated session.) -

.. EF OTA (OTASP/OTAPA Features) This EF stores a listing of OTASP/OTAPA features supported by the R-UIM, along with protocol revision codes. This EF is a subset of the information in [], section... Identifier: F Structure: transparent Mandatory File size: N + bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length N, number of OTASP/OTAPA features M byte NAM Download (DATA_P_REV) ID M byte DATA_P_REV M byte Key Exchange (A_KEY_P_REV) ID M byte A_KEY_P_REV M byte System Selection for Preferred M byte Roaming (SSPR_P_REV) ID SSPR_P_REV M byte Service Programming Lock (SPL_P_REV) M byte ID SPL_P_REV M byte 0 Over-The-Air Parameter Admin M byte (OTAPA_P_REV) ID OTAPA_P_REV M byte Preferred User Zone List (PUZL_P_REV) M byte ID PUZL_P_REV M byte G Packet Data (GPD) ID M byte GPD M byte Secure MODE M byte (SECURE_MODE_P_REV) ID SECURE_MODE_P_REV M byte : : : : N Feature N M byte N + Protocol Revision for Feature N M byte NOTE: Coding of features and protocol revisions are described in [], section... -

.. EF SP (Service Preferences) This EF describes the user s service preferences as defined in [] Sections..0. and..0.. Identifier: F Structure: transparent Mandatory File size: byte Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE Coding: Byte : CHV CHV Bytes Description M/O Length Service Preferences (e.g. band class, M byte analog vs. CDMA) b b b b b b b b System A/B preference 000 No preference 00 A preferred 00 B preferred 0 RFU 00 RFU 0 A only 0 B only RFU RFU Analog/CDMA preference 000 No preference 00 Analog preferred 00 CDMA preferred 0 RFU 00 RFU 0 Analog only 0 CDMA only RFU RFU -

.. EF ESNME (ESN_ME) This EF stores the (up to) -bit Electronic Serial Number or -bit MEID or pseudo-esn of the Mobile Equipment (ME) to which the R-UIM is attached. This number is transferred to the R-UIM when the Mobile Equipment determines that the R-UIM has been inserted. Identifier: F Structure: transparent Mandatory File size: bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE ALW Bytes Description M/O Length Number of bytes for ESN_ME M byte Lowest-order byte M byte : M byte : M byte : M byte : M byte : M byte Highest-order byte M byte -

.. EF Revision (R-UIM Revision) This EF allows the ME to communicate with different versions of the R-UIM (i.e. R-UIM with different set of capabilities). Identifier: F Structure: transparent Mandatory File size: byte Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE Coding: Byte : ALW Bytes Description M/O Length R-UIM Revision M byte b b b b b b b b LSB of R-UIM revision R-UIM revision, in ascending order MSB of R-UIM revision An R-UIM complying with this specification shall set the R-UIM revision to 000000. 0 -

.. EF PL (Preferred Languages) This EF assists the ME in offering a set of different languages (i.e. English, German, French, Japanese, etc.). From this set of languages, the user can choose to have the information displayed in the desired language. Identifier: FA Structure: transparent Mandatory File size: N bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE Coding: Byte : ALW CHV Bytes Description M/O Length st language code (highest priority) M bytes nd language code O bytes : : : : N- N N th language code (lowest priority) O bytes 0 Byte : b b b b b b b b b b b b b b b b Character Encoding as defined in informative []. RFU Language Indicator as defined in informative []. -

.. EF SMS (Short Messages) This EF contains information in accordance with [] comprising short messages (and associated parameters) which have either been received by the MS from the network or are to be used as an MS originated message. Identifier: FC Structure: linear fixed Optional Record Length: variable () Update activity: high Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV 0 Note: Bytes Description M/O Length Status M byte MSG_LEN M byte +MSG_L EN SMS Transport Layer Message M MSG_LEN bytes () The length and the byte allocations are variable according to the actual size of the SMS Transport Layer message. The maximum length is, which includes the length of the short message plus two bytes for storing status and MSG_LEN. - Status Status byte of the record which can be used as a pattern in the SEEK command. For MS originating messages sent to the network, the status shall be updated when the MS receives a status report or sends a successful SMS Command relating to the status report. -0

Coding: Byte : b b b b b b b b Status xx0 Free space xx Used space 00 Message received by MS from network; message read 0 Message received by MS from network; message to be read 0 MS originating message; message sent to the network MS originating message; message to be sent 0 RFU 0 Message Protection Disabled Message Protection Enabled RFU - MSG_LEN The length of the message not including MSG_LEN. Note that the definition of this EF does allow multiple occurrences of the segment, which consists of PARAMETER_ID, PARAMETER_LEN, and Parameter Data as described in []. The number of repetitions of the aforementioned segment is determined by MSG_LEN and the PARAMETER_LEN of each segment. - SMS Transport Layer Message Contents: see Section.. of []. -

0 0.. EF SMSP (Short Message Service Parameters) This EF contains values for Short Message Service header Parameters (SMSP), which can be used by the Mobile Equipment (ME) for user assistance in preparation of mobile originated short messages. The EF consists of one or more records, with each record able to hold a set of SMS parameters. The first (or only) record in the EF shall be used as a default set of parameters, if no other record is selected. To distinguish between records, a four-byte Teleservice Identifier as defined in [] shall be included within each record. The SMS parameters stored within a record may be present or absent independently. When a short message is to be sent from the Mobile Station (MS), the parameters in the R-UIM record, if present, shall be used when a value is not supplied by the user. Identifier: FD Structure: linear fixed Optional Record Length: variable Update activity: high Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Bytes Description M/O Length (), () Teleservice Identifier M bytes Parameter Indicators M bytes Reserved M byte Destination Address M Variable ()() MSG_ENCODING M byte Validity Period M byte Service Category O bytes Destination Subaddress O Variable () Bearer Reply Option O bytes Bearer Data O Variable () Notes: () See []. () Starting and ending bytes depend on () () If the Destination Address is absent, the parameter length is byte. Storage is allocated for all of the possible SMS parameters, regardless of whether they are present or absent. Any bytes unused, due to parameters not requiring all of the bytes, or due to absent parameters, shall be set to FF. The supported teleservices include [] Extended Protocol Enhanced Services, Wireless Paging Teleservice, Wireless Messaging Teleservice, Voice Mail Notification and Wireless Application Protocol. See [] for details. - Parameter Indicators Contents: Each of the default SMS parameters which can be stored in the remainder of the record are marked absent or present by individual bits within this byte. -

Coding: Byte : b b b b b b b b Byte : Reserved, set to Destination Address Reserved, set to MSG_ENCODING Validity Period Service Category Reserved, set to Destination Subaddress Note: b b b b b b b b Bit value 0 means parameter present Bit value means parameter absent Bearer Reply Option Bearer Data Reserved, all set to 0 0 0 - Destination Address Contents and Coding: as defined in []. If this parameter is absent, then it shall be set to FF with a length of byte. - MSG_ENCODING Contents: as defined in informative []. This parameter can appear in the Bearer Data if Bearer Data is present. If this parameter appears in the Bearer Data too, then the same value shall be set to this parameter; otherwise the record is invalid. If this parameter appears in the Bearer Data, then this parameter shall be present; otherwise the record is invalid. Coding: b b b b b b b b Character Encoding as defined in informative []. RFU - Validity Period Contents and Coding: as defined in [] for relative time format. This parameter can appear in the Bearer Data if Bearer Data is present. If this parameter appears in the Bearer Data too, then the same value shall be set to this parameter; otherwise the record is invalid. If this parameter appears in the Bearer Data, then this parameter shall be present; otherwise the record is invalid. - Service Category Contents and Coding: as defined in []. - Destination Subaddress Contents and Coding: as defined in []. -

- Bearer Reply Option Contents and Coding: as defined in []. - Bearer Data Contents and Coding: as defined in []. -

0 0.. EF SMSS (SMS Status) This EF contains status information relating to the short message service. The provision of this EF is associated with EF SMS. Both files shall be present together or both shall be absent from the R-UIM. Identifier: FE Structure: transparent Optional File size: + X bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Bytes Description M/O Length MESSAGE_ID M bytes WAP MESSAGE_ID M bytes SMS "Memory Cap. Exceeded" Not. M byte Flag/SMS Timestamp Mode - + X Reserved O X bytes - MESSAGE_ID Contents: the value of the MESSAGE_ID in the last sent SMS Submit Message from a teleservice which requires message identifiers other than the WAP teleservice. Coding: as defined in []. - WAP MESSAGE_ID Contents: the value of the MESSAGE_ID in the last sent SMS Submit Message from the WAP teleservice. Coding: as defined in []. - SMS "Memory Capacity Exceeded" Notification Flag/SMS Timestamp Mode. Contents: Includes a flag that indicates whether or not there is memory capacity available to store SMS messages. Also includes a bit that indicates whether the SMS Timestamp mode is UTC or non-utc. Coding: Byte : b b b b b b b b b=0: flag set b=: flag unset; memory capacity available Reserved,set to b=0: SMS Timestamp mode is UTC. b=: SMS Timestamp mode is non-utc. Note: The SMS Timestamp mode is configured by the service provider. Reserved, all set to -

0..0 EF SSFC (Supplementary Services Feature Code Table) This EF stores the numeric feature code to be used by the ME when a supplementary service is invoked in CDMA or analog mode via an implementation-dependant user interface (such as a menu) that automatically inserts a feature code into the dialed digit string. Because feature codes are service-provider specific, this EF is required to enable the ME to perform the mapping to the feature code. When a supplementary service is invoked in CDMA or analog mode, the mobile station shall determine the feature code by reading the Supplementary Service Feature Code Table entry for the selected supplementary service, and pre-pending with asterisk. -

Identifier: FF Structure: transparent Optional File size: N+ Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Bytes Description M/O Length N, Number of Feature Codes M byte Activate Call Delivery (CD) M bytes De-activate Call Delivery (CD) M bytes Register new Call Forwarding Busy (CFB) M bytes forward-to number Register Call Forwarding Busy (CFB) to voice M bytes mail 0 De-register Call Forwarding Busy (CFB) M bytes Activate Call Forwarding Busy (CFB) M bytes De-activate Call Forwarding Busy (CFB) M bytes Register new Call Forwarding Default (CFD) M bytes forward-to number Register Call Forwarding Default (CFD) to voice M bytes mail 0 De-register Call Forwarding Default (CFD) M bytes Activate Call Forwarding Default (CFD) M bytes De- activate Call Forwarding Default (CFD) M bytes Register new Call Forwarding No Answer (CFNA) M bytes forward-to number Register Call Forwarding No Answer (CFNA) to M bytes voice mail 0 De-register Call Forwarding No Answer (CFNA) M bytes Activate Call Forwarding No Answer (CFNA) M bytes De-activate Call Forwarding No Answer (CFNA) M bytes Register new Call Forwarding Unconditional M bytes (CFU) forward-to number Register Call Forwarding Unconditional (CFU) to M bytes voice mail 0 De-register Call Forwarding Unconditional (CFU) M bytes Activate Call Forwarding Unconditional (CFU) M bytes De-activate Call Forwarding Unconditional (CFU) M bytes Activate Call Waiting (CW) M bytes De-activate Call Waiting (CW) M bytes 0 Temporarily De-activate Call Waiting (Cancel Call M bytes Waiting - CCW) Temporarily Activate Calling Number M bytes Identification Restriction (CNIR) (per-call blocking) Temporarily De-activate Calling Number M bytes Identification Restriction (CNIR) (per-call allowed) Invoke Conference Calling (CC) M bytes Invoke Drop Last Conference Calling (CC) Party M bytes 0 Activate Do Not Disturb (DND) M bytes -

De-activate Do Not Disturb (DND) M bytes Activate Message Waiting Notification (MWN) Alert M bytes Pip Tone De-activate Message Waiting Notification (MWN) M bytes Alert Pip Tone Activate Message Waiting Notification (MWN) Pip M bytes Tone 0 De-activate Message Waiting Notification (MWN) M bytes Pip Tone Temporarily De-activate Message Waiting M bytes Notification (MWN) Pip Tone (Cancel MWN - CMWN) Invoke Priority Access and Channel Assignment M bytes (PACA) Invoke Voice Message Retrieval (VMR) M bytes Activate Calling Name Presentation (CNAP) M bytes 0 De-activate Calling Name Presentation (CNAP) M bytes Activate Calling Name Restriction (CNAR) M bytes De-activate Calling Name Restriction (CNAR) M bytes Activate Automatic Callback (AC) M bytes De-activate Automatic Callback (AC) M bytes 0 Activate Automatic Recall (AR) M bytes De-activate Automatic Recall (AR) M bytes Register new network registered User Selectable M bytes Call Forwarding (USCF) directory number Activate Rejection of Undesired Annoying Calls M bytes (RUAC) De-activate Rejection of Undesired Annoying M bytes Calls (RUAC) 00 0 Invoke Advice of Charge (AOC) M bytes 0 0 Invoke Call Trace (COT) M bytes N N+ FCN M bytes N, Number of Feature Codes" is coded in hexadecimal value, which indicates the number of feature codes. A feature code of up to four digits shall be encoded via BCD into the two bytes of the feature code table entry as follows: - represent these four digits as D D D D. - if the feature code (FC) of less than four digits is used, the digits shall be right justified and the unused digits shall be set to 'F'. -

Coding: First byte: b b b b b b b b Second byte: b b b b b b b b LSB of Digit (D ) : : MSB of Digit (D ) LSB of Digit (D ) : : MSB of Digit (D ) LSB of Digit (D ) : : MSB of Digit (D ) LSB of Digit (D ) : : MSB of Digit (D ) -

.. EF SPN (CDMA Home Service Provider Name) This EF contains the home service provider name and appropriate requirements for display by the ME. Identifier: F Structure: transparent Optional File size: bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE ALW Bytes Description M/O Length Display Condition M byte Character Encoding M byte Language Indicator M byte Service Provider Name M bytes 0 - Display Condition Contents: An indication of whether or not a service provider name should be displayed when the MS is registered in the home service area. Coding: Byte : b b b b b b b b Byte : b b b b b b b b Byte : b b b b b b b b Byte : b=0: display of registered system is not required b=: display of registered system is required RFU Character encoding as specified in informative [] RFU Language Indicator as specified in informative [] 0 - Service Provider Name Contents: service provider string to be displayed Coding: the string shall use SMS conventions as defined in Tables - and - of informative []. The string shall be left justified. Unused bytes shall be set to FF. -0

0 0.. EF USGIND (Removable UIM_ID/SF_EUIMID Usage Indicator) This EF indicates whether the bits of the UIM_ID or ESN_ME is used as the ESN value for CAVE authentication and MS identification, as per Section... This EF also indicates whether the -bitbits of the SF_EUIMID or MEID shall be used as the MEID field over the air when Service n is allocated. This indicator shall be set to comply with US Code of Federal Regulations (CFR) Part., where applicable. Identifier: F Structure: transparent Mandatory File size: byte Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length UIM ID/SF_EUIMID Usage Indicator M byte Coding: bit is used as the UIM ID usage indicator. first bit = 0: ESN_ME is used for CAVE authentication and MS identification. first bit = : UIM_ID is used for CAVE authentication and MS identification. bit is used as the SF_EUMID usage indicator. second bit = 0: MEID is used for MS identification. second bit = : SF_EUIMID is used for MS identification. Byte : b b b b b b b b b=0: ESN_ME is used for CAVE Authentication and MS Identification. b=: UIM_ID is used for CAVE Authentication and MS Identification. b=0: MEID is used for MS Identification. b=: SF_EUIMID is used for MS Identification. RFU The default value for b shall be set to 0. If service n is not allocated, the b bit shall be set to 0 and shall not be interpreted by the ME. If service n is allocated and activated and the ME is assigned with ESN, then the b shall not be interpreted -

0.. EF AD (Administrative Data) This EF contains information concerning the mode of operation according to the type of UIM. It also provides an indication whether some ME features should be activated during the normal operation. Identifier: F Structure: transparent Mandatory File size: +X bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE ALW Bytes Description M/O Length MS operation mode M byte Additional information M bytes +X RFU O X bytes - MS operation mode Contents: mode of operation for the MS. Coding: Initial value - normal operation 00 Refer to [] for other operational values. Byte : b b b b b b b b - Additional information Coding: - specific facilities (if b= in byte ); b through b= 00000000. 0 Byte : (first byte of additional information) Byte : b b b b b b b b b b b b b b b b RFU RFU -

.. EF MDN (Mobile Directory Number) This EF stores the Mobile Directory Number, Type of Number, Numbering Plan, Presentation Indicator and Screening Indicator. Identifier: F Structure: linear fixed Optional Record length: bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Bytes Description M/O Length RFU Number of digits M byte MDN M bytes 0 NUMBER_TYPE and NUMBER_PLAN M byte PI and SI M byte Coding: Byte : b b b b b b b b LSB of Number of digits : : MSB of Number of digits RFU 0 Byte through store MDN up to digits described in Section... of []. Each digit shall be encoded according to Table...- of []. If MDN requires less than digits, excess nibbles at the end of data shall be set to F. Byte : b b b b b b b b LSB of digit : : MSB of digit LSB of digit : : MSB of digit -

Byte : b b b b b b b b LSB of digit : : MSB of digit LSB of digit : : MSB of digit And Byte through shall follow the same format as Bytes and. Byte 0: b b b b b b b b NUMBER_TYPE NUMBER_PLAN RFU Refer to [], Section... Byte : b b b b b b b b PI SI RFU Refer to [], Section... -

.. EF MAXPRL (Maximum PRL) This EF stores the maximum size, in octets, that the R-UIM can support for EF Preferred Roaming List and EF Extended Preferred Roaming List. See... and... of [] for more detail. Identifier: F Structure: transparent Mandatory File size: or bytes Update activity: Never Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length MAX_PR_LIST_SIZE for EF PRL M bytes MAX_PR_LIST_SIZE for EF EPRL O bytes -

.. EF SPCS (SPC Status) This EF identifies whether the EF SPC (Service programming code) is set to default and internally updated in the card to reflect the current state of SPC after an OTASP commit if the SPC was changed. Details of SPC are in [], section... Identifier: F Structure: transparent Mandatory File size: byte Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV NEVER NEVER NEVER Bytes Description M/O Length SPC Status M byte 0 - SPC Status Coding: Byte : b b b b b b b b SPC Status b=0: SPC is set to default value b=: SPC is set to any value other than the default value RFU -

.. EF ECC (Emergency Call Codes) This EF contains up to emergency call codes. Identifier: 'F' Structure: transparent Optional File size: n (n ) bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE ALW Bytes Description M/ Length O - Emergency Call Code O bytes - Emergency Call Code O bytes 0 (n-) to n - Emergency Call Code Emergency Call Code n O bytes Contents: Emergency Call Code. Each digit is encoded in BCD format. Coding: The emergency call code is of a variable length with a maximum length of digits. Each emergency call code is coded on three bytes, with each digit within the code being coded on four bits as shown below. If a code of less than digits is chosen, then the unused nibbles shall be set to 'F'. Byte : b b b b b b B b LSB of Digit : : MSB of Digit LSB of Digit : : MSB of Digit -

Byte : b b b b b b b b Byte : b b b b b b b b LSB of Digit : : MSB of Digit LSB of Digit : : MSB of Digit LSB of Digit : : MSB of Digit LSB of Digit : : MSB of Digit After R-UIM activation, the ME selects the Dedicated File DF CDMA and optionally attempts to select EF ECC. If EF ECC is available, the ME requests the emergency call codes. -

.. EF MEGPDOPC (ME GPD Operation Capability) If either service n0 or n is allocated (See Section..), this EF shall be present. This EF stores IP operation capabilities supported by the ME. Identifier: F Structure: transparent Optional File size: byte Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Bytes Description M/O Length ME_GPD_OP_MODE M byte Coding: Byte : b b b b b b b b SimpleIP MobileIP MobileIP with SimpleIP fallback RFU 0 After the selection of DF CDMA (F) during the initialization, the R-UIM shall set the value of this byte to 0. Mobile equipment that supports Simple IP or Mobile IP shall set each subfield to if it supports the corresponding operating mode. -

.. EF GPDOPM (GPD Operation Mode) If either service n0 or n is allocated (See Section..), this EF shall be present. This EF stores the GPD Operation Mode Parameter Block defined in []. Identifier: F Structure: transparent Optional File size: byte Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Bytes Description M/O Length See [], GPD Operational Mode M byte Parameter Block Coding: Byte : b b b b b b b b Operation Mode (See Table...- of []) RFU -0

..0 EF SIPCAP (SimpleIP Capability Parameters) If service n0 is allocated (See Section..), this EF shall be present. This EF stores the SimpleIP Capability Parameter Block defined in []. Identifier: FA Structure: transparent Optional File size: bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length See [], SimpleIP Capability Parameter M bytes Block -

.. EF MIPCAP (MobileIP Capability Parameters) If service n is allocated (See Section..), this EF shall be present. This EF stores the MobileIP Capability Parameter Block defined in []. Identifier: FB Structure: transparent Optional File size: bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length - See [], MobileIP Capability Parameter M bytes Block -

.. EF SIPUPP (SimpleIP User Profile Parameters) If service n0 is allocated (See Section..), this EF shall be present. This EF stores the SimpleIP User Profile Parameter Block defined in []. Identifier: FC Structure: transparent Optional File size: +X Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length Length of SimpleIP User Profile M bytes Parameter Block X+ See [], SimpleIP User Profile Parameter Block M X bytes -

.. EF MIPUPP (MobileIP User Profile Parameters) If service n is allocated (See Section..), this EF shall be present. This EF stores the MobileIP User Profile Parameter Block defined in []. Identifier: FD Structure: transparent Optional File size: +X Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length Length of MobileIP User Profile M bytes Parameter Block X+ See [], MobileIP User Profile Parameter Block M X bytes -

.. EF SIPSP (SimpleIP Status Parameters) If service n0 is allocated (See Section..), this EF shall be present. This EF stores the SimpleIP Status Parameters Block defined in []. Identifier: FE Structure: transparent Optional File size: Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Bytes Description M/O Length See [], SimpleIP Status Parameters M byte Block -

.. EF MIPSP (MobileIP Status Parameters) If service n is allocated (See Section..), this EF shall be present. This EF stores the MobileIP Status Parameters Block defined in []. Identifier: FF Structure: transparent Optional File size: X Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Bytes Description M/O Length X See [], MobileIP Status Parameters M X bytes Block -

.. EF SIPPAPSS (SimpleIP PAP SS Parameters) If service n0 is allocated (See Section..), this EF shall be present. This EF stores the SimpleIP PAP SS Parameter Block defined in []. Identifier: F0 Structure: transparent Optional File size: +X Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Bytes Description M/O Length Length of SimpleIP PAP SS Parameter M bytes Block X+ See [], SimpleIP PAP SS Parameter Block M X bytes -

.. Reserved -

.. Reserved -

.. EF PUZL (Preferred User Zone List) This EF stores the Preferred User Zone List, as described in Section.. of []. Identifier: F Structure: transparent Optional File size: CUR_UZ_LIST_SIZE Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length - PUZL (see Section.. of []) M CUR_UZ_LIST_SI CUR_UZ_LIST_SIZE ZE -0

..0 EF MAXPUZL (Maximum PUZL) This EF stores the maximum size, in octets, that the R-UIM can support for EF Preferred User Zone List (See.. of [] for more detail) and the maximum number of User Zone entries that the R-UIM can support for EF PUZL (See... of [] for more detail). Identifier: F Structure: transparent Optional File size: bytes Update activity: Never Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length MAX_UZ_LIST_SIZE M bytes - MAX_UZ M bytes -

0.. EF MECRP (ME-specific Configuration Request Parameters) This EF stores ME-specific parameters to be used to form the response to the Configuration Request command while secure mode is active. The ME shall update these ME-specific parameters during initializations. Identifier: F Structure: transparent Mandatory File size: bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE Coding: Byte : CHV CHV Bytes Description M/O Length SCM M byte MOB_P_REV M byte Local Control M byte b b b b b b b b SCM Note: b indicates if the ME is operating in slotted mode. Byte : Byte : b b b b b b b b b b b b b b b b MOB_P_REV Local Control for Analog Local Control for CDMA RFU -

.. EF HRPDCAP (HRPD Access Authentication Capability Parameters) If service n is allocated (See Section..), this EF shall be present. This EF stores the HRPD Access Authentication Capability Parameters Block defined in Section... of []. Identifier: F Structure: transparent Optional File size: bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length See [], HRPD Access Authentication M bytes Capability Parameters Block -

.. EF HRPDUPP (HRPD Access Authentication User Profile Parameters) If service n is allocated (See Section..), this EF shall be present. This EF stores the HRPD Access Authentication User Profile Parameters Block defined in Section... of []. Identifier: F Structure: transparent Optional File size: +X bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length Length of HRPD Access Authentication M byte User Profile Parameters Block X+ See [], HRPD Access Authentication User Profile Parameters Block M X bytes -

.. EF CSSPR (CUR_SSPR_P_REV) This EF stores the protocol revision of the current preferred roaming list stored in the EF EPRL. This information is used by the ME to parse the EF EPRL. Identifier: F Structure: transparent Optional File size: Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length CUR_SSPR_P_REV M byte -

.. EF ATC (Access Terminal Class) If service n is allocated (See Section..), this EF shall be present. This EF stores the class of access terminal used for Persistence Test in the system defined in []. Identifier: F Structure: transparent Optional File size: Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length Access Terminal Class M byte Coding: Byte : b b b b b b b b LSB of AT Class MSB of AT Class RFU -

.. EF EPRL (Extended Preferred Roaming List) This EF stores the Extended Preferred Roaming List, as described in Section.. of []. The Preferred Roaming List includes selection parameters from [] and [], Annex F. Identifier: FA Structure: transparent Optional File size: MAX_PR_LIST_SIZE Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length - PR_LIST_ SIZE PR_LIST (see Section.. of []) M PR_LIST_SIZE -

.. EF BCSMScfg (Broadcast Short Message Configuration) If service n is allocated, this EF shall be present. This EF contains the operator broadcast configuration setting for Broadcast SMS. This information, determined by the operator, defines the filtering criteria that can be used by the Mobile Equipment (ME) to receive Broadcast SMS. Identifier: FB Structure: transparent Optional File size: byte Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length Operator Broadcast Configuration M byte 0 Coding: Byte : b b b b b b b b 00=Disallow 0=Allow Table Only 0=Allow All =Reserved RFU Operator configuration includes filtering criteria imposed by a service provider. Field Name Description Disallow Allow Table Only Allow All This setting disables the mobile station s broadcast SMS capability (i.e., the mobile station will not process broadcast SMS). This setting allows the mobile station to receive only broadcast messages for the service categories that have been programmed in EF BCSMStable. This setting allows the mobile station to receive broadcast messages for all service categories. -

.. EF BCSMSpref (Broadcast Short Message Preference) If service n is allocated, this EF shall be present. This EF contains the user broadcast configuration setting for Broadcast SMS. This information, determined by the user, defines the filtering criteria that can be used by the Mobile Equipment (ME) to receive Broadcast SMS. Identifier: FC Structure: transparent Optional File size: byte Update activity: high Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Bytes Description M/O Length User Broadcast Configuration M byte Coding: Byte : b b b b b b b b 00=Deactivate 0=Activate Table Only 0=Activate All =Reserved RFU 0 User configuration includes filtering criteria determined by the mobile user. Field Name Description Deactivate Activate Table Only This setting deactivates the mobile station s broadcast SMS functions (i.e., the mobile station will not process broadcast SMS). This setting allows the mobile station to receive only broadcast messages for the service categories that have been programmed in EF BCSMStable, subject to any additional filtering criteria included in EF BCSMStable based on user preferences. This setting is only valid if the operator configuration is not Disallow. Moreover, the mobile user can selectively -

enable and disable individual programmed entries in EF BCSMStable. Activate All Activate All This setting allows the mobile station to receive broadcast messages for all service categories. This setting is only valid if the operator configuration is Allow All. EF BCSMStable will not be consulted for this setting. -0

.. EF BCSMStable (Broadcast Short Message Table) If service n is allocated, this EF shall be present. This EF contains information in accordance with [] comprising service category program parameters, which can be used by the Mobile Equipment (ME) for Broadcast SMS filtering. See Section.. of [] for more detail. Each record in this EF is linked to a record with the same record index in EFBCSMSP. Identifier: FD Structure: linear fixed Optional Record Length: +X byte Update activity: high Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length Status M byte Service Category M bytes Language M byte Max Messages M byte Alert Option M byte M byte Label Encoding to +X Label M X byte 0 - Status Contents: Status byte of the record which can be used as a pattern in the SEEK command. Coding: Byte : b b b b b b b b b=0: Free space b=: Used space RFU -

Byte : b b b b b b b b LSB of Service Category Service Category bits in ascending order Byte : b b b b b b b b Service Category bits in ascending order MSB of Service Category Byte : b b b b b b b b Language as defined in informative []. Byte : b b b b b b b b Byte : b b b b b b b b Max Messages Alert Option RFU 0 Byte : b b b b b b b b Label Encoding as defined in informative [] RFU -

..0 EF BCSMSP (Broadcast Short Message Parameter) If service n is allocated, this EF shall be present. This EF contains selection flag and priority associated with service categories and used by the ME for filtering of BC-SMS. Each record in this EF is linked to a record with the same record index in EFBCSMStable. Identifier: FE Structure: linear fixed Optional Record Length: bytes Update activity: high Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Coding: Byte : Bytes Description M/O Length Select M byte Priority M byte 0 Byte : b b b b b b B b b b b b b b b b 0=Not selected =selected RFU 00=Normal 0=Interactive 0=Urgent =Emergency RFU Unused records are filled with FF. When the b of Byte is set to, then the ME shall filter the BC-SMS according to the priority indicated in Byte. -

.. EF IMPI (IMS private user identity) If service n is allocated, this EF shall be present. This EF contains the private user identity of the user. Identifier: 'FF' Structure: transparent Optional File size: X bytes Update activity: low Access Conditions: READ UPDATE DEACTIVATE ACTIVATE CHV Bytes Description M/ Length O to X NAI TLV data object M X bytes 0 - NAI Contents: - Private user identity of the user. Coding: - For contents and syntax of NAI TLV data object values see IETF RFC []. The NAI shall be encoded to an octet string according to UTF- encoding rules as specified in IETF RFC []. The tag value of the NAI TLV data objects shall be 0. -

.. EF DOMAIN (Home Network Domain Name) If service n is allocated, this EF shall be present. This EF contains the home operator s network domain name SIP URI. Identifier: 'F0' Structure: transparent Optional File size: X bytes Update activity: low Access Conditions: READ UPDATE DEACTIVATE ACTIVATE CHV Bytes Description M/ Length O to X URI TLV data object M X bytes 0 - URI Contents: -Home Network Domain Name SIP URI. Coding: -For contents and syntax of URI TLV data object values see IETF RFC []. The URI shall be encoded to an octet string according to UTF- encoding rules as specified in IETF RFC []. The tag value of the URI TLV data objects shall be 0. -

.. EF IMPU (IMS public user identity) If service n is allocated, this EF shall be present. This EF contains values for public SIP Identities (SIP URI) of the user. The EF consists of one or more records, with each record able to hold a set of public user identities. Identifier: 'F' Structure: linear fixed Optional Record length: X bytes Update activity: low Access Conditions: READ UPDATE DEACTIVATE ACTIVATE CHV Bytes Description M/ Length O to X URI TLV data object M X bytes 0 - URI Contents: - Public user identity by which other parties know the subscriber, in the format of SIP URL, tel URL, or both. Coding: -For contents and syntax of URI TLV data object values see IETF RFC []. The URI shall be encoded to an octet string according to UTF- encoding rules as specified in IETF RFC []. The tag value of the URI TLV data objects shall be 0. -

.. EF PCSCF (Proxy Call Session Control Function) If service n is allocated, this EF shall be present. This EF contains one or more Proxy Call Session Control Function addresses. The first record in the EF shall be considered to be of the highest priority. The last record in the EF shall be considered to be the lowest priority. Identifier: 'F' Structure: linear fixed Optional Record length: X bytes Update activity: low Access Conditions: READ UPDATE DEACTIVATE ACTIVATE CHV Bytes Description M/ Length O to X P-CSCF TLV data object M X bytes 0 - P-CSCF Contents: - Address of Proxy Call Session Control Function, in the format of FQDN, an IPv address, or an IPv address. Coding: - The tag value of this P-CSCF TLV data objects shall be 0. The format of the data object is as follows: Field Length (bytes) Tag Length Address Type Address Length P-CSCF Address Address Length 0 Address Type: Type of the P-CSCF address. This field shall be set to the type of the P-CSCF address according to the following: Value Name 00000000 FQDN 0000000 Ipv 0000000 Ipv Reserved Reserved Address Length: Length of the P-CSCF address This field shall be set to the length of the P-CSCF address, in units of byte. -

P-CSCF Address: Address of the Proxy Call Session Control Function This field shall be set to the address of the Proxy Call Session Control Function. When the P-SCSF type is set to 0x00, the corresponding P-CSCF Address shall be encoded to an octet string according to UTF- encoding rules as specified in IETF RFC []. -

.. EF BAKPARA (Currently used BAK Parameters) If service n is allocated, this EF shall be present. This EF contains the triple (BCMCS_Flow_ ID, BAK_ ID, BAK_Expire) corresponding to BAK keys that have been delivered to the R-UIM and are currently used. See [] for more details. Identifier: 'F' Structure: Linear Fixed Optional Record length: X+Y+Z+ bytes Update activity: high Access Conditions: READ UPDATE DEACTIVATE ACTIVATE CHV Bytes Description M/O Length Length of BCMCS_Flow_ID M byte to X + BCMCS_Flow_ID M X bytes X+ Length of BAK_ID M byte X+ to BAK_ID M Y bytes X+Y+ X+Y+ Length of BAK_Expire M byte X+Y+ to X+Y+Z+ BAK_Expire M Z bytes 0 0 - Length of BCMCS_Flow_ID Content: number of bytes of the following data item containing the BCMCS flow identifier. Coding: Binary. - BCMCS_Flow_ID Content: BCMCS Flow Identifier Coding: Binary. - Length of BAK_ID Content: number of bytes of the following data item containing the BAK identifier. Coding: Binary - BAK_ID Content: BAK Identifier Coding: Binary. - Length of BAK_Expire Content: number of bytes of the following data item containing the BAK_Expire. Coding: Binary - BAK_Expire -

Content: BAK_Expire Coding: Binary. -0

.. EF UpBAKPARA (Updated BAK Parameters) If service n is allocated, this EF shall be present. This EF contains the triple (BCMCS_Flow_ID, BAK_ID, BAK_Expire) corresponding to BAK keys that have been delivered to the R-UIM but have not yet been used. See [] for more details. Identifier: 'F' Structure: cyclic Optional Record length: X+Y+Z+ bytes Update activity: high Access Conditions: READ UPDATE DEACTIVATE ACTIVATE CHV Bytes Description M/O Length Length of BCMCS_Flow_ID M byte to X + BCMCS_Flow_ID M X bytes X+ Length of BAK_ID M byte X+ to BAK_ID M Y bytes X++Y X+Y+ Length of BAK_Expire M byte X+Y+ to X+Y+Z+ BAK_Expire M Z bytes 0 0 - Length of BCMCS_Flow_ID Content: number of bytes of the following data item containing the BCMCS flow identifier. Coding: Binary - BCMCS_Flow_ID Content: BCMCS Flow Identifier Coding: Binary. - Length of BAK_ID Content: number of bytes of the following data item containing the BAK identifier. Coding: Binary - BAK_ID Content: BAK Identifier Coding: Binary. - Length of BAK_Expire Content: number of bytes of the following data item containing the BAK_Expire. Coding: Binary - BAK_Expire -

Content: BAK_Expire Coding: Binary. -

.. EF MMSN (MMS Notification) If service n 0 is allocated, this file shall be present. This EF contains information in accordance with [] comprising MMS notifications (and associated parameters) which have been received by the ME from the network. Identifier: F Structure: Linear fixed Optional Record length: +X bytes Update activity: low Access Conditions: READ CHV UPDATE CHV INVALIDATE REHABILITATE Bytes Description M/O Length - MMS Status M bytes MMS Implementation M byte to X+ MMS Notification M X bytes X+ Extension file record number M byte 0 - MMS Status Content: -The status bytes contain the status information of the notification. Coding: -b indicates whether there is valid data or if the location is free. b indicates whether the MMS notification has been read or not. Bits b-b of the first byte indicate the MM retrieval, MM rejection, or MM forwarding status, Bits b-b of the first byte and the entire second byte are reserved for future use. First byte: b b B b b b b b X X X 0 Free space X X X Used space X X 0 Notification not read X X Notification read 0 0 X MM not retrieved 0 X MM retrieved 0 X MM rejected X MM forwarded Reserved for future use Second byte: -

b b b b b b b b Reserved for future use 0 - MMS Implementation Contents: -The MMS Implementation indicates the used implementation type, e.g. WAP, M- IMAP, SIP. Coding: -Allocation of bits: Bit number Parameter indicated WAP implementation of MMS M-IMAP implementation of MMS SIP implementation of MMS - Reserved for future use Bit value Meaning 0 0 Implementation not supported. Implementation supported. - MMS Notification Contents: -The MMS Notification contains the MMS notification. Coding: -The MMS Notification is coded according to the MMS Implementation as indicated in Byte. -Any unused byte shall be set to 'FF'. - Extension file record number Contents: -extension file record number. This byte identifies the number of a record in the EF EXT containing extension data for the notification information. The use of this byte is optional. If it is not used it shall be set to 'FF'. Coding: -binary. -

.. EF EXT (Extension ) If service n is allocated, this file shall be present. This EF contains extension data of a MMS Notification (Multimedia Messaging Service). Identifier: 'F' Structure: linear fixed Optional Record length: X+ bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Bytes Description M/O Length Record type M byte to X+ Extension data M X bytes X+ Identifier M byte For contents and coding see [0]. -

0.. EF MMSICP (MMS Issuer Connectivity Parameters) If service n 0 is allocated, this file shall be present. This EF contains values for Multimedia Messaging Connectivity Parameters as determined by the issuer, which can be used by the ME for MMS network connection. This file may contain one or more sets of Multimedia Messaging Issuer Connectivity Parameters. The first set of Multimedia Messaging Issuer Connectivity Parameters is used as the default set. Each set of Multimedia Messaging Issuer Connectivity Parameters may consist of one or more Interface to Core Network and Bearer information TLV objects (only for WAP), but shall contain only one MMS implementation TLV object (for WAP, M-IMAP and SIP), one MMS Relay/Server TLV object (for WAP, M-IMAP and SIP) and one Gateway TLV object (only for WAP). The order of the Interface to Core Network and Bearer information TLV objects in the MMS Connectivity TLV object defines the priority of the Interface to Core Network and Bearer information, with the first TLV object having the highest priority. Identifier: 'F' Structure: Transparent Optional File Size: X+ + Xn bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length to X MMS Connectivity Parameters TLV M X bytes object X+ to X + X MMS Connectivity Parameters TLV O X bytes object X+ + Xn-+ to X+ + Xn MMS Connectivity Parameters TLV object O Xn bytes - MMS Connectivity Parameters tags Description Tag Value MMS Connectivity Parameters Tag 'AB' MMS Implementation Tag 0 MMS Relay/Server Tag Interface to Core Network and Bearer Information Tag '' Gateway Tag '' MMS Authentication Mechanism Tag MMS Authentication ID Tag - MMS Connectivity Parameters contents -

Description Value M/O Length (bytes) MMS Connectivity Parameters Tag 'AB' M Length Note M Note MMS Implementation Tag '0' M Length M MMS Implementation Information -- M MMS Relay/Server Tag '' M Length X M Note MMS Relay/Server Address -- M X st Interface to Core Network and Bearer '' C Information Tag (highest priority) Length Y C Note st Interface to Core Network and Bearer -- C Y information nd Interface to Core Network and Bearer '' C Information Tag Length Y C Note nd Interface to Core Network and Bearer -- C Y information N th Interface to Core Network and Bearer '' C Information Tag (lowest priority) Length Y C Note N th Interface to Core Network and Bearer -- C Y information Gateway Tag '' O Length Z O Note Gateway Information -- O Z MMS Authentication Mechanism Tag '' C Length X C Note MMS Authentication Mechanism -- C X MMS Authentication ID Tag '' C Length X C Note MMS Authentication ID (Login_ID) -- C X NOTE : This is the total size of the constructed TLV object. NOTE : The length is coded according to ISO/IEC. C: only present if M-IMAP or SIP indicated in tag 0 C: only present if WAP is indicated in tag 0 0 - MMS Implementation Tag '0' See [0] for contents and coding. -MMS Relay/server Tag '' Contents: -The MMS relay/server contains the address of the associated MMS relay/server; In addition, for M-IMAP and SIP, authentication mechanism and authentication ID (Login ID) are also included. Coding: -The MMS relay/server address is coded as URI appropriate to the MM implementation being used, for example SIP, or M-IMAP. - Interface to Core Network and Bearer Information Tag '' Contents: -

0 0 -The Interface to Core Network and Bearer Information may contain the following information to set up the bearer: Bearer, Address, Type of address, Speed, Call type, Authentication type, Authentication id, Authentication password. Coding: -The coding is according to the guideline provided in []. If MMS implementation type is WAP, st Interface to Core Network and Bearer Information is mandatory. If MMS implementation type is M-IMAP or SIP, no Interface to Core Network and Bearer Information is needed. - Gateway Tag '' Contents: -The Gateway may contain the following information; Address, Type of address, Port, Service, Authentication type, Authentication id and Authentication password. Coding: -The coding is according to the guideline provided in []. - MMS Authentication Mechanism Tag Contents: - The MMS authentication mechanism contains the authentication mechanism for MMS. It is mandatory for M-IMAP and SIP. Coding: - The MMS authentication mechanism is coded as table.0.-. - MMS Authentication ID Tag Contents: - The MMS authentication ID contains the authentication ID for MMS. It is mandatory for M-IMAP and SIP. Coding: -The coding is according to the guideline provided in []. Unused bytes shall be set to 'FF'. -

..0 EF MMSUP (MMS User Preferences) If service n 0 is allocated, this file shall be present. This EF contains values for Multimedia Messaging Service User Preferences, which can be used by the ME for user assistance in preparation of mobile multimedia messages (e.g. default values for parameters that are often used). Identifier: 'F' Structure: Linear Fixed Optional Record Length: X bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Bytes Description M/O Length to X MMS User Preference TLV Objects M X bytes - MMS User Preference tags Description MMS Implementation Tag MMS User preference profile name Tag MMS User Preference information Tag Tag Value '0' '' '' - MMS User Preference information Description Value M/O Length (bytes) MMS Implementation Tag '0' M Length M Note MMS Implementation information -- M MMS User preference profile name '' M Tag Length X M Note MMS User profile name -- M X MMS User Preference information '' M Tag Length Y M Note MMS User Preference information -- M Y NOTE: The length is coded according to ISO/IEC. 0 - MMS Implementation Tag '0' For contents and coding see [0] - MMS User preference profile name Tag '' Contents: -Alpha tagging of the MMS user preference profile. Coding: -this alpha-tagging shall use either: the SMS default -bit coded alphabet as defined in [] with bit set to 0. The alpha identifier shall be left justified; or -

one of the UCS coded options as defined in the annex of [0]. - MMS User Preference information Tag '' Contents: -The following information elements may be coded; Sender Visibility, Delivery Report, Read-Reply, Priority, Time of Expiry and Earliest Delivery Time. Refer to [], [], [0], and []. Coding: -Depending upon the MMS implementation as indicated in Tag '0'. -00

0.. EF MMSUCP (MMS User Connectivity Parameters) If service n 0 and n are allocated, this file shall be present. This EF contains values for Multimedia Messaging Connectivity Parameters as determined by the user, which can be used by the ME for MMS network connection. This file may contain one or more sets of Multimedia Messaging User Connectivity Parameters. Each set of Multimedia Messaging User Connectivity Parameters may consist of one or more Interface to Core Network and Bearer information TLV objects (only for WAP), but shall contain only one MMS implementation TLV object (for WAP, M-IMAP and SIP), one MMS Relay/Server TLV object (for WAP, M-IMAP and SIP) and one Gateway TLV object (only for WAP). The order of the Interface to Core Network and Bearer information TLV objects in the MMS Connectivity TLV object defines the priority of the Interface to Core Network and Bearer information, with the first TLV object having the highest priority. Identifier: 'F' Structure: Transparent Optional File Size: X+ + Xn bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV/CHV (fixed during administrative management) Bytes Description M/O Length to X MMS Connectivity Parameters TLV O X bytes object X+ to X + X MMS Connectivity Parameters TLV O X bytes object X+ + Xn-+ to X+ + Xn MMS Connectivity Parameters TLV object O Xn bytes For the contents and coding see... -0

.. EF AuthCapability (Authentication Capability) If service n is allocated, this file shall be present. This EF stores authentication capabilities for each application supported by the R-UIM. Identifier: FA Structure: Linear Fixed Optional Record Length: bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length Application ID M byte - Authentication Capability M bytes - Reserved M bytes Coding: Byte : The coding for Application ID is as follows: Binary Value Application ID 00000000 MMS 0000000 MMD 0 0000000 - Reserved Byte : B b b b B B b b CRAM-MD (RFC ) HTTP DIGEST (MD) (RFC ) HTTP DIGEST (MD-session) (RFC ) HTTP DIGEST (AKA v-md) (RFC 0) HTTP DIGEST (AKA v-md-session) (RFC 0) DIGEST-MD ( SASL DIGEST) (RFC ) SASL OTP (RFC ) SASL GSSAPI (RFC ) Bytes - are reserved. The R-UIM shall set each subfield to if it supports the corresponding authentication mechanism. -0

.. EF GCIK (G Cipher and Integrity Keys) If service n 0 is allocated, this file shall be present. This EF contains the cipher key CK, the integrity key IK. Identifier : FB Structure : transparent Optional File size: bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length - Cipher key CK M bytes - Integrity key IK M bytes 0 - Cipher key CK. Coding: -The least significant bit of CK is the least significant bit of the th byte. The most significant bit of CK is the most significant bit of the st byte. - Integrity key IK. Coding: The least significant bit of IK is the least significant bit of the nd byte. The most significant bit of IK is the most significant bit of the th byte. -0

.. EF DCK (De-Personalization Control Keys) If service no is allocated, this EF shall be present. This EF provides storage for the de-personalization control keys associated with the OTA de-personalization cycle of [].. Identifier: 'FC' Structure: transparent Optional File size: 0 bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV CHV Bytes Description M/ O to digits of Network Type M de-personalization control key to digits of Network Type M de-personalization control key to digits of service provider M de-personalization control key to digits of corporate de-personalization M control key to 0 digits of HRPD Network M de-personalization control key Length bytes bytes bytes bytes bytes Empty control key fields shall be coded 'FFFFFFFF'. -0

.. EF GID (Group Identifier Level ) If service no is allocated, this EF shall be present. This EF contains identifiers for particular R-UIM/ME associations. It can be used to identify a group of R-UIMs for a particular application. Identifier: 'FD' Structure: transparent Optional File size: to n bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/ Length O to n R-UIM group identifier(s) O n bytes -0

.. EF GID (Group Identifier Level ) If service no is allocated, this EF shall be present. This EF contains identifiers for particular R-UIM/ME associations. It can be used to identify a group of R-UIMs for a particular application. Identifier: 'FE' Structure: transparent Optional File size: to n bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV NOTE: Bytes Description M/ Length O to n R-UIM group identifier(s) O n bytes The structure of EFGID and EFGID are identical. They are provided to allow the network operator to enforce different levels of security dependant on an application. 0-0

.. EF CDMACNL (CDMA Co-operative Network List) If service no is allocated, this EF shall be present. This EF contains the Co-operative Network List for the multiple network personalization services defined in []. Identifier: 'FF' Structure: transparent Optional File size: n bytes Update activity: low Access Conditions: READ CHV UPDATE INVALIDATE REHABILITATE Bytes Description M/ Length O to Element of co-operative net list M bytes n- to n Element n of co-operative net list O bytes 0 - Co-operative Network List Contents: Service provider ID and corporate ID of co-operative networks. Coding: For each byte list element Byte to : MCC + MNC: As per ITU-T Recommendation E. Annex A. Byte to : most significant digits of the International Roaming based MIN. b b B b b b b b b b B b b b b b LSB of IRM digit : : MSB of IRM digit LSB of IRM digit : : MSB of IRM digit LSB of IRM digit : : MSB of IRM digit LSB of IRM digit : : MSB of IRM digit -0

Byte : B b b b b b b b Byte : b b b b b b b b LSB of service provider digit : : MSB of service provider digit LSB of service provider digit : : MSB of service provider digit LSB of corporate digit : : MSB of corporate digit LSB of corporate digit : : MSB of corporate digit Empty fields shall be coded with 'FF'. The end of the list is delimited by the first MCC field coded 'FFF'. -0

.. EFHOME_TAG (Home System Tag) This EF stores the Home System Tag, as described in Section..0. of []. Identifier: F0 Structure: transparent Mandatory File size: X bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length - X Home System Tag (see Section..0. M Variable of []) -0

.. EFGROUP_TAG (Group Tag List) This EF stores the Group Tag List, as described in Section.. of []. Identifier: F Structure: transparent Mandatory File size: GROUP_TAG_LIST_SIZE Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length - GROUP_T AG_LIST_ SIZE Group Tag List (see Section.. of []) M Variable -0

..0 EFSPECIFIC_TAG (Specific Tag List) This EF stores the Specific Tag List, as described in Section.. of []. Identifier: F Structure: transparent Mandatory File size: SPEC_TAG_LIST_SIZE Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length - SPEC_TA G_LIST_SI ZE Specific Tag List (see Section.. of []) M Variable -

.. EF CALL_PROMPT (Call Prompt List) This EF stores the Call Prompt List, as described in Section.. of []. Identifier: F Structure: transparent Mandatory File size: CALL_PRMPT_LIST_SIZE Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE CHV Bytes Description M/O Length - CALL_PR MPT_LIST _SIZE Call Prompt List (see Section.. of []) M Variable -

.. EF SF_EUIMID (Short Form EUIMID) If service n is allocated, this file shall be present. This EF stores the -bit electronic identification number (ID) unique to the R-UIM. The order of the digits when treated as four-bit digits is shown in the table below, with d representing the leftmost/most significant digit and d representing the rightmost/least significant digit. Identifier: F Structure: transparent Optional File size: bytes Update activity: low Access Conditions: READ UPDATE INVALIDATE REHABILITATE ALW Never Never Never Bytes Description M/O Length Lowest-order byte M byte : M byte : M byte : M byte : M byte : M byte Highest-order byte M byte Bytes M/O Length d d M byte d d M byte d d0 M byte d d M byte d d M byte d d M byte d d M byte 0 -

.. EF ICCID (ICC Identification) EF ICCID is defined in [] with the following restrictions: This EF shall contain digits of the actual ICCID followed by the check digit and a single 0xF filler digit. The ICCID shall be globally unique, using an Issuer Identifier Number registered with the ITU-T as specified in []. -

0 0 0. Coding of Packet Data Security-Related Parameters This section specifies the coding of packet data security-related parameters to be stored in the R-UIM securely. These parameters are used for IP based authentication functions by the R-UIM. Also, these parameters can be read or updated via OTA commands (i.e. GPD Configuration/Download Request command) only when the Secure Mode is turned on. If the R-UIM receives the GPD Configuration Request command or GPD Download Request command containing Block_ID for SimpleIP CHAP SS, MobileIP SS or HRPD Access Authentication CHAP SS Parameters Block and Secure Mode is not active, then the R-UIM shall return SW= and SW=... SimpleIP CHAP SS Parameters The SimpleIP CHAP SS Parameters shall be present if service n0 is allocated (See Section..) and coded as follows: Bytes Description Length Length of SimpleIP CHAP SS Parameter Block bytes X+ See [], SimpleIP CHAP SS Parameter Block X bytes Details of the SimpleIP CHAP SS Parameters Block are defined in Section...0 of []... MobileIP SS Parameters The MobileIP SS Parameters shall be present if service n is allocated (See Section..) and coded as follows: Bytes Description Length Length of MobileIP SS Parameter Block bytes X+ See [], MobileIP SS Parameter Block X bytes Details of the MobileIP SS Parameters Block are defined in Section... of []... HRPD Access Authentication CHAP SS Parameters The HRPD Access Authentication CHAP SS Parameters shall be present if service n is allocated (See Section..) and coded as follows: Bytes Description Length Length of HRPD Access Authentication CHAP bytes SS Parameters Block X+ See [], HRPD Access Authentication CHAP SS Parameters Block X bytes Details of the HRPD Access Authentication CHAP SS Parameters Block are defined in Section... of []. -

. Coding of Shared Secret Used in IETF Protocol This section specifies the coding of shared secret to be stored in the R-UIM securely, which is used in Authentication Function by the R-UIM. The Shared Secret shall be present if service n0 is allocated (See Section..) and coded as follows: Bytes Description Length - Length of Shared Secret bytes X+ Shared Secret, see IETF RFCs in.. X bytes 0. Multi-M ode Card Multi mode card (e.g. CDMA and GSM) shall comply with both this document and []. In case of multi- mode mobile supporting multiple modes, if one mode fails to initialize, then the mobile shall attempt to initialize the other modes. -

AUTHENTICATION AND SECURITY This section describes the interface between the ME and the R-UIM. Details of the [] protocols are provided in order to clarify the interface. Section. describes parameter storage and flow. Section. describes the components of []-based security procedures within the context of a R-UIM environment. Section. specifies detailed commands and responses between the ME and the R-UIM, and uses section. as a reference. The authentication procedures may be tested using the test vectors from Section of [0]. 0 0 0. Parameter Storage and Parameter Exchange Procedures The following parameters are stored on the R-UIM: Algorithm(s) for Authentication and Key Generation. Currently []-related security functions utilize the CAVE algorithm for these functions. A-key, which is accessible only to the algorithm used for Key Generation. The A-key may be programmed into the R-UIM directly by the service provider or it may be programmed into the R-UIM through an over-the-air procedure. The A-key is not accessible by the ME. Therefore the method of storage on the R-UIM is not specified in this document. During the execution of some procedures, it is necessary that two values ( old and new ) of the A-key be stored. Shared Secret Data (SSD), which is accessible only to the Authentication and Key Generation functions. SSD is not accessible by the ME. Therefore the method of storage on the R-UIM is not specified in the document. During the execution of some procedures, it is necessary that two values ( old and new ) of SSD be stored. Temporary (typically per-call) secret parameters used for the generation of ciphering keys subsequent to the authentication process. COUNT, accessible by the ME. COUNT is incremented upon network command. International Mobile Station Identity, consisting of both IMSI_M and IMSI_T. IMSI_M contains a Mobile Identification Number (MIN) in its lower 0 digits. IMSI_T is not related to the MIN. Subscription Identity is accessible by the ME. UIM_ID or pseudo-uimid(if EUIM_ID is used), a parameter that is stored in EF RUIMID having an identifier of F. Service Programming Code (SPC), having an identifier of F. SPC is used in the OTASP/OTAPA procedures. OTAPA/SPC_Enable, having an identifier of F. This stores the user s input to the OTASP/OTAPA procedures. NAM_LOCK, having an identifier of F. This stores the lock/unlock status of the NAM. -

Root Key, which is accessible only to the algorithm used for Key Generation. The Root Key may be programmed into the R-UIM directly by the service provider or it may be programmed into the R-UIM through the procedures defined in []. The Root Key is not accessible by the ME. Therefore the method of storage on the R-UIM is not specified in this document. During the execution of some procedures, it is necessary that two values ( old and new ) of the Root Key be stored. 0 The following parameters are stored in the ME: All algorithms used for the encryption of voice, user data and signaling messages. Key-processing for ECMEA and ECMEA_NF functions. ME Electronic Serial Number (ESN). MEID Control mechanism for OTASP/OTAPA procedures 0 0 The following parameters are passed from the ME to the R-UIM during the course of security-related procedures: RAND, the global random challenge, available in the overhead information. Last Dialed Digits, a subset of the digits used to identify the called party. The R-UIM uses these to compose the Auth Data field for some ME messages. Refer to [], Table...-, entitled Auth_Signature Input Parameters. RANDU, a unique random challenge sent by the network. AUTHBS, an authentication response sent from the network during the SSD Update process. RANDSeed, a random number that may be used to generate RANDBS. RANDSSD, the parameter that accompanies an SSD update command sent by the network to initiate an SSD update. ME Electronic Serial Number (ESN_ME), passed from the ME to the R-UIM upon insertion of the R-UIM into the ME if the ME has an ESN. Also it is sent in Run CAVE Command or Update SSD command. If UIM_ID Usage Indicator = 00, the ESN value received in security command shall be used in authentication algorithm regardless of what is stored in EF ESNME. ME Pseudo-ESN (if ESN is not available), the parameter that accompanies a Run CAVE Command or SSD update command. The following parameters are passed from the ME to the R-UIM during the course of OTASP/OTAPA procedures: RANDSeed, a -bit random number that accompanies the OTAPA Request. -

RANDSeed, a 0-bit random number that is a parameter in the MS Key Request. A-key/Root Key generation parameters P, P Length, G, G Length, A-key Protocol Revision, BS Result and BS Result Length. Block ID, Block Length, Parameter Data, Offset and Size parameters that refer to stored data as components of Configuration, Validation and Download request messages. Start/Stop indicator as part of OTAPA Request Message Pseudo-ESN, the parameter that accompanies the OTAPA Request command (if ME is assigned with MEID and service n is allocated and activated) 0 The following parameters are passed from the R-UIM to the ME during the course of security-related procedures: AUTHR, the response to the global challenge. Keys, as needed, for use with the encryption algorithm(s). These may include a - bit key and a variable length VPM. AUTHU, the response to a unique challenge. RANDBS, the network authentication challenge for the SSD Update procedure. 0 The following parameters are passed from the R-UIM to the ME during the course of OTASP/OTAPA procedures: RAND_OTAPA, for network validation. A-key/Root Key generation parameters MS Result and MS Result Length. Result Code for most commands to indicate success/failure and reason(s) for failure. Block ID, Block Length, Parameter Data, Offset and Size as needed to identify segments of stored data. -

. Description of Security-Related Functions The ME should start and finish the executions of all of the commands related to an [] based security procedure in order and within the same Dedicated File (DF) environment. The R-UIM performs the following operations; managing shared secret data, performing authentication calculations and generating encryption keys and managing the call history parameter. 0 0.. Managing Shared Secret Data The R-UIM stores and manages the SSD that is used as the derived secret variable for all authentication response calculations and subsequent key generations. SSD is derived from the A-key stored in the R-UIM. SSD updates are initiated when the network issues the command UPDATE SSD, containing the parameter RANDSSD, to the ME. Details of the SSD update procedure are described in [] and other EIA/TIA air interface documents. A subscriber s home network is the only entity that may update the subscriber s Shared Secret Data (SSD). This is illustrated in Figure..-. When the network launches an SSD Update to a particular subscriber, the subscriber s ME will first store the parameter RANDSSD and then generate a random number called RANDSeed. The ME begins the Base Station Challenge function by passing the parameter RANDSeed to the R-UIM. This in turn causes the R-UIM to generate RANDBS. The relationship of RANDBS to RANDSeed is specified by the issuer of the R-UIM. The R-UIM may derive RANDBS by applying a pseudo-random process to RANDSeed, or it may ignore RANDSeed and generate RANDBS independently. RANDBS should not be the same for consecutive identical values of RANDSeed. The command Base Station Challenge directs the R-UIM to pass RANDBS to the ME, which in turn forwards RANDBS to the network. UIM ME Network temporary storage RANDSSD RANDBS RANDBS random number enhancement RAND Seed random number generator Figure..-. Base Station Challenge Function 0 Next, the ME updates SSD by sending the Update SSD command to the R-UIM, containing the parameter RANDSSD and a control data field. Refer to Figure..-. The R-UIM then calculates a new (trial) value of SSD and calculates an expected value of the -

network s response to RANDBS, called AUTHBS. The parameters ESN and IMSI used for these calculations are determined at the time of R-UIM insertion into the ME in accordance with EF F. If ESN rather than UIMID is chosen (i.e. UIM_ID Usage Indicator = 00 ), the value used as input to authentication algorithms shall be the one received from security commands, regardless of what is stored in EF ESN_ME. For details, refer to section., ESN and MEID Management Command, and to section.., EF IMSI_M. UIM ME Network UIMID select ESN A-KEY CAVE RANDSSD (new) SSD CAVE IMSI_T select RANDBS AUTHBS IMSI_M 0 Figure..-. Update SSD Function, AUTHBS Calculation In the network, the parameter RANDSSD is also used to generate a new value of SSD for the selected R-UIM. When RANDBS is received from the subscriber s ME, the network combines it with the new SSD to calculate AUTHBS. AUTHBS is then sent from the network to the subscriber s phone. Refer to Figure..-. The ME in turn forwards the received value of AUTHBS to the R-UIM as a parameter of the Confirm SSD function. The R-UIM then compares its calculated value of AUTHBS to that sent by the network. 0 If the R-UIM finds the two values to be equivalent, the SSD Update procedure has been a success. The new value of SSD is then stored in semi-permanent memory on the R-UIM and used for all subsequent authentication calculations, with one exception, noted below. If the two values of AUTHBS are different, the R-UIM discards the new SSD and continues to retain its current value. Refer to Figure..-. If the SSD Update procedure is being performed as part of an OTASP/OTAPA procedure, the ME shall set process control bit to the value of as an input parameter of the Update SSD command. This will cause the R-UIM to retain the current value of SSD in semi-permanent memory but use the new value for re-authentication calculations. The R-UIM will set the value of SSD to the new value only upon R-UIM acceptance of the Commit Request Message from the network. -

UIM ME Network CAVE AUTHBS Compare AuthBS If Equal, SSD = SSD(new) Success/ Failure Figure..-. Confirm SSD Function 0.. Performing Authentication Calculations and Generating Encryption Keys The second R-UIM security-related function is to perform authentication calculations and generate encryption keys for use with ME ciphering techniques. See Figure..-. This is performed by the Run CAVE function. The settings of the input parameters for the authentication procedure are defined in [] and []. The parameters ESN and IMSI that are used for the Run CAVE function are determined at the time of R-UIM insertion into the ME. If ESN rather than UIMID is chosen (i.e. UIM_ID Usage Indicator = 00 ) for the Run CAVE function, the value used for the CAVE algorithm shall be the one received from security commands, regardless of what is stored in EF ESN_ME. For details, refer to section., ESN and MEID Management Command, and to section.., EF IMSI_M. -

UIMID UIM ME Network select ESN RAND/ RANDU SSD CAVE randtype AUTHR/ AUTHU DigLength modify DIGITS select IMSI_T IMSI_M Figure..-. Run CAVE Function 0 0 The R-UIM stores both an IMSI_M and an IMSI_T to identify the subscription. The lower 0 digits of each are encoded as bit subsets identified as IMSI_M_S and IMSI_T_S, respectively. These are further subdivided into the -bit quantities IMSI_M_S and IMSI_T_S to identify the coding of the lower digits and the 0-bit quantities IMSI_M_S and IMSI_T_S to identify the coding of the remaining digits. For the authentication calculation, the -bit coding of the lower digits is used for most applications. Furthermore, an -bit subset of the coding of the remaining digits may also be used. See Table...- in [], entitled Auth_Signature Input Parameters. The IMSI to be used for these calculations is determined at the time of R-UIM insertion into the ME. For details, refer to section.., EF IMSI_M. In order that conformance to [] be supported, a -bit MIN will be stored in EF IMSI_M. The use of these bits for the calculation of authentication responses shall be as described above. The command Get Response causes the R-UIM to pass the output AUTHR or AUTHU ( global challenge response or unique challenge response) to the ME. Temporary parameters may be stored on the R-UIM for use in calculating ciphering keys. The calculation of ciphering keys is performed by execution of the Generate Key/VPM function. The Generate Key/VPM function is shown in Figure..-. This function will produce keys for some of the ciphering mechanisms as specified in []. Generate Key/VPM will process temporary stored parameters that were produced during the calculation of an authentication response by the Run CAVE function and will produce keys. Some may be used directly for ME encryption functions and some may be further processed within the ME for use by the ECMEA and ECMEA_NF encryption functions. -

UIM ME Network CAVE Generate Key/VPM (VPM endpoints) Key,VPM Stored Data from Run_CAVE Function Figure..-. Generate Key/VPM Function 0.. Managing the Call History Parameter The third security-related function is the generation and management of the call history parameter CALL COUNT. CALL COUNT is used as a simple clone detector. During network access protocols, the R-UIM reports its value of CALL COUNT to the network. If the value is consistent with the network s perception of CALL COUNT, the network will likely grant access based on the authentication process. During the call, the value of CALL COUNT may be incremented upon a command from the network. If the network determines that a value of CALL COUNT appears to be out of sequence, the network may choose to investigate the possibility that the R-UIM has been cloned and take remedial action. Incrementing and reading the parameter COUNT is accomplished via standard ME-to-R- UIM commands. -

. Description of OTASP/OTAPA Functions A complete description of Over-the-Air Service Provisioning (OTASP) and Over-the-Air Parameter Administration (OTAPA) may be found in []. This section highlights the aspects of R-UIM that support OTASP/OTAPA. EFs are described first, followed by [] Request/Response messages that have been mapped to R-UIM commands. In some cases, ME intervention is necessary to accomplish the OTASP/OTAPA functions... Elementary Files for OTASP/OTAPA Four EFs are described. 0... EF SPC (Service Programming Code) The Service Programming Code (SPC) is a simple means to protect the contents of the R- UIM from being programmed without authorization. SPC is described in [] section...... EF OTAPASPC (OTAPA/SPC_Enable) This EF can be written to and read via the ME. It allows the user to activate OTAPA protection for the NAM on the R-UIM. It also allows the user to enable (or deny) over-theair changes to be made to his SPC.... EF NAMLOCK (NAM_LOCK) [] provides means for locking NAM contents under the control of the service provider, with appropriate inputs from the user. This EF stores the current state (locked/unlocked) of the NAM. 0... EF OTA (OTASP/OTAPA Features) This EF maintains a listing of OTASP/OTAPA features and the associated protocol version for each. The ME reads this EF in order to respond to the Protocol Capability Request Message from the network. The ME combines this information with parameters, such as model number, that are stored in the ME... Mapping of OTASP/OTAPA Request/Response Messages to R-UIM Commands Eleven () OTASP/OTAPA message pairs are listed in []. In some cases, the mapping is one-to-one. In others, the ME intervenes by performing a translation to enable the use of simple R-UIM commands. In still other cases, the ME relies upon security-related commands to prepare a response. 0... Protocol Capability Request/Response Messages This message requests information that is stored in both the ME and in the R-UIM. The ME reads the EF OTASP/OTAPA Features in order to format the features component of the response, then adds information stored in the ME in order to complete the response. -

0... MS Key Request/Response Messages This is the command that causes the R-UIM to generate its private and public key pair. This key pair is intended for use in a subsequent Diffie/Hellman key exchange that enables calculation of the A-key and/or Root Key. Upon receipt of the MS Key Request message from the network, the ME generates a 0-bit random number called RANDSeed and sends RANDSeed to the R-UIM along with the modulus P and the generator G sent by the network. The R-UIM in turn generates a random number x that may be related to RANDSeed. Then the R-UIM raises G to the x power, modulo P and temporarily stores the result as MS_RESULT. The R-UIM computes a Result Code and sends this in response to the MS Key Request message. The ME forwards the Result Code to the network to complete this transaction.... Key Generation Request/Response Messages This request/response pair completes the Diffie/Hellman key exchange. The network sends BS_RESULT to the R-UIM and the R-UIM in turn sends MS_RESULT to the network. The R-UIM calculates the Diffie/Hellman result by raising BS_RESULT to the x power, modulo P. A subset of this result is temporarily stored as the A-key and/or Root Key. Details of this process are in [], section.. 0... SSD Update An SSD Update may be performed as a component of OTASP/OTAPA procedures. This process uses commands and EFs described in other sections of the R-UIM document. The SSD Update procedure that is performed during OTASP/OTAPA uses temporary values of the A-Key and SSD, and does not store these temporary values in semi-permanent memory until the R-UIM accepts the Commit Request Message. This slight deviation from the [] procedure is accommodated by the setting of bit of the process control parameter of the Update SSD command to the R-UIM. The R-UIM should reject any Update SSD command and return SW= and SW= if it is received outside of the context of a key generation procedure. 0... Re-Authentication Request/Response Messages The ME receives the Re-Authentication Request Message containing the four-octet parameter RAND. The ME constructs the Re-Authentication Response Message by taking the following steps. () Read EF COUNT () Prepare AUTH_DATA (See [], section..) () Truncate RAND to produce RANDC () Compute AUTHR by using the command Run CAVE with input parameters: RANDTYPE= 0000 0000 (i.e., bits) RAND=RAND received by ME -0

0 DigLength, DIGITS as specified by AUTH_DATA Process Control Bit0: 0 (inactive) Bit: 0 (inactive) Bit: (wait for Commit before storing A-key, SSD) Bit: 0 (inactive) Bit: (save registers) Bit: 0 (inactive) Bit: 0 (inactive) Bit: 0 (inactive) If message encryption or voice privacy is to be activated, the ME executes the command Generate Key/VPM with the R-UIM. -

0... Validation Request/Response Messages The ME receives the Validate Request Message, which seeks validation of NUM_BLOCKS blocks of data, each block having a length of BLOCK_LEN. In order that R-UIM command coding be simplified, the ME buffers the data into respective blocks, then validates each block via the command Validate, whereby a single block of data having length BLOCK_LEN is validated. For each block, the R-UIM responds with a Result Code. The ME then accumulates the R-UIM responses and sends a composite response to the network. [] Section.. describes common blocks of data that are validated. These include verification of the SPC, verification that the SPC may be updated by the network and validation of SPASM, whereby AUTH_OTAPA is compared within the R-UIM to an internally-generated value that was calculated as a component of the R-UIM s response to the OTAPA Request command. Thus, the SPASM mechanism requires that an OTAPA Response Message be sent from ME to network prior to the Validation Request message. 0... Configuration Request/Response Messages The ME receives the Configuration Request Message, which requests configuration details of NUM_BLOCKS of data, each block having a length of BLOCK_LEN. In order that R-UIM command coding be simplified, the ME buffers the request into NUM_BLOCK single block requests, then asks for configuration details for each block via the Configuration Request command to the R-UIM. For each block, the R-UIM responds with the Block ID, Block Length, Result Code and Parameter Data. The ME accumulates the set of block responses and sends a composite response to the network. Note that the R-UIM shall use ME-specific parameters (i.e. SCM, MOB_P_REV and Local Control) stored in the EF MECRP to generate a response. 0... Download Request/Response Messages The ME receives the Download Request Message, which attempts to download NUM_BLOCKS of data to the R-UIM, each block having a Block ID, Block Length and Parameter Data of length Block Length. In order that R-UIM command coding be simplified, the ME buffers the request into NUM_BLOCK single block requests, then attempts to download each block via the Download Request command to the R-UIM. Prior to issuance of multiple Download Request commands, the ME may query appropriate EF data to determine if adequate storage space exists in the R-UIM EFs to successfully complete the downloading operation. For each execution of the Download Request command, the R-UIM returns the Block ID and Result Code. The ME accumulates the set of block responses and sends a composite response to the network.... SSPR Configuration Request/Response Messages The network asks for SSPR data stored in a particular area of the R-UIM. The R-UIM responds with Block ID, Result Code, Block Length and Parameter Data. The ME is transparent to this operation. Parameters are formatted as in []. -

...0 SSPR Download Request/Response Messages The network attempts to download SSPR data into the R-UIM. The data contains a Block ID, a Block Length and Parameter Data having Block Length size. The R-UIM responds with the Block ID, Result Code, Segment Offset and Segment Size, as described in [], sections... and... The ME is transparent to this operation. 0... OTAPA Request/Response Messages The network attempts to initiate OTAPA by sending an OTAPA Request Message containing the start/stop parameter. The ME in turn passes this to the R-UIM, along with a -bit ME-generated random number RANDSeed. If service n is allocated and activated and ME is assigned with MEID, the ME also passes pseudo-esn to the R-UIM. The R-UIM generates its own random number RAND_OTAPA which may be related to RANDSeed. Also, the R-UIM computes a value for AUTH_OTAPA as described in [], section... The input parameter ESN described in section.. shall be set to the ESN parameter field used for air interface access messages (e.g., origination, registration, termination). The R-UIM passes RAND_OTAPA, a Result Code and NAM_LOCK indication to the ME, which re-formats the data and sends it to the network. 0... Commit Request/Response Messages The network sends a Commit Request Message to the R-UIM via the ME. The ME translates this to the R-UIM command Commit. The R-UIM responds with the Result Code which the ME forwards to the network via the Commit Response Message.... PUZL Configuration Request/Response Messages The network asks for PUZL data stored in a particular area of the R-UIM. The R-UIM responds with Block ID, Result Code, Block Length and Parameter Data. The ME is transparent to this operation. Parameters are formatted as in []. 0... PUZL Download Request/Response Messages The network attempts to download PUZL data into the R-UIM. The data contains a Block ID, a Block Length and Parameter Data having Block Length size. The R-UIM responds with the Block ID, Result Code, Identifier Present Flag, User Zone ID and User Zone System ID, as described in [], sections... and... The ME is transparent to this operation.... GPD Configuration Request/Response Messages The ME receives the GPD Configuration Request Message which requests configuration details of NUM_BLOCKS of data with each block having a length of BLOCK_LEN. In order that R-UIM command coding be simplified, the ME buffers the request into NUM_BLOCK single block requests, then asks for configuration details for each block via the GPD Configuration Request command to the R-UIM. For each block, the R-UIM responds with the Block ID, Block Length, Result Code and Parameter Data. The ME accumulates the set of block responses and sends a composite response to the network. If the GPD -

Configuration Request command contains a BLOCK_ID for SimpleIP CHAP SS Parameters, MobileIP SS Parameters or HRPD Access Authentication CHAP SS Parameters, the R-UIM shall check if the Secure Mode is active. If the Secure Mode is not active, then the R-UIM shall return SW= and SW= 0... GPD Download Request/Response Messages The ME receives the GPD Download Request Message which attempts to download NUM_BLOCKS of data to the R-UIM, each block having a Block ID, Block Length and Parameter Data of length Block Length. In order that R-UIM command coding be simplified, the ME buffers the request into NUM_BLOCK single block requests, then attempts to download each block via the GPD Download Request command to the R-UIM. The ME may query appropriate EF data to determine if adequate storage space exists in the R-UIM EFs to successfully complete the downloading operation, prior to issuance of multiple Download Request commands. For each execution of the GPD Download Request command, the R-UIM returns the Block ID and Result Code. The ME accumulates the set of block responses and sends a composite response to the network. If the GPD Download Request command contains a BLOCK_ID for SimpleIP CHAP SS Parameters, MobileIP SS Parameters or HRPD Access Authentication CHAP SS Parameters, the R-UIM shall check if the Secure Mode is active. If the Secure Mode is not active, then the R-UIM shall return SW= and SW= 0 0... Secure Mode Request/Response Messages This is the command that causes the R-UIM to generate Secure Mode Ciphering Key (SMCK). The R-UIM shall use the SMCK as a key for encryption and decryption of all PARAM-DATA of all Parameter Blocks sent and received by the R-UIM in the OTASP Data Messages while the Secure Mode is active. The network can initiate the Secure Mode by sending Secure Mode Request Message to the ME with the START_STOP field set to. Upon receipt of the Secure Mode Request Message with the START_STOP filed set to, the ME translates this to the Secure Mode command. The R-UIM shall use RAND_SM received in this command and the SSD to compute the SMCK as described in [], section... and then the R-UIM responds with Result Code, which the ME forwards to the network via the Secure Mode Response Message. While the Secure Mode is active, the ME shall send FRESH command to the R- UIM prior to send any commands when it receives one of the following messages; Configuration Request Messages SSPR Configuration Request Message PUZL Configuration Request Message GPD Configuration Request Message Download Request Messages SSPR Download Request Message -

0 PUZL Download Request Message GPD Download Request Message MMD Configuration Request Message MMD Download Request Message MMS Configuration Request Message MMS Download Request Message System Tag Configuration Request Message System Tag Download Request Message For the configuration request messages, the ME sends the FRESH command to R-UIM to request a -bit FRESH value selection. This can be selected at random or can be set to a monotonically increasing counter. The R-UIM responds with the FRESH value. For the download request messages, the ME sends the FRESH command to R-UIM to pass the FRESH value received from the network. The network can terminate the Secure Mode by sending Secure Mode Request Message to the ME with the START_STOP field set to 0. Upon receipt of the Secure Mode Request Message with the START_STOP filed set to 0, the ME translates this to the Secure Mode command. The R-UIM responds with Result Code, which the ME forwards to the network via the Secure Mode Response Message. 0... Service Key Generation Request/Response Messages This is the command that causes the R-UIM to generate Service keys, such as BCMCS, IMS, WLAN, etc. R-UIM shall generate an intermediate key based on the root key before using it to generate service keys. Details of this process are in [], section..0.... MMD Configuration Request/Response Messages The network asks for MMD data stored in a particular area of the R-UIM. The R-UIM responds with Block ID, Result Code, Block Length and Parameter Data. The ME is transparent to this operation. Parameters are formatted as in []. 0...0 MMD Download Request/Response Messages The network attempts to download MMD data into the R-UIM. The data contains a Block ID, a Block Length and Parameter Data having Block Length size. The R-UIM responds with the Block ID and Result Code as described in [], sections... and... The ME is transparent to this operation. -

0... MMS Configuration Request/Response Messages The network asks for MMS data stored in a particular area of the R-UIM. The R-UIM responds with Block ID, Result Code, Block Length and Parameter Data. The ME is transparent to this operation. Parameters are formatted as in [].... MMS Download Request/Response Messages The network attempts to download MMS data into the R-UIM. EF MMSICP (MMS Issuer Connectivity Parameters) should be updated. The data contains a Block ID, a Block Length and Parameter Data having Block Length size. The R-UIM responds with the Block ID and Result Code as described in [], sections... and... The ME is transparent to this operation.... System Tag Configuration Request/Response Messages The network asks for System Tag data stored in a particular area of the R-UIM. The R-UIM responds with Block ID, Result Code, Block Length and Parameter Data. The ME is transparent to this operation. Parameters are formatted as in [].... System Tag Download Request/Response Messages The network attempts to download System Tag data into the R-UIM. The data contains a Block ID, a Block Length and Parameter Data having Block Length size. The R-UIM responds with the Block ID, Result Code, Segment Offset and Segment Size, as described in []. The ME is transparent to this operation. 0 -

0 0. Description of Security-Related Commands The commands Base Station Challenge, Update SSD and Confirm SSD are performed in sequence. If either Update SSD or Confirm SSD are run out of sequence, the card shall return SW= and SW=. If T=0 protocol is used, APDU is mapped onto TPDU (see Section. in []) In the procedures described in Sections.. through..; RANDSSD, RANDSeed, RANDBS, AuthBS, RAND, RANDU, AUTHR and AUTHU are encoded with the highest-order byte first. ESN is encoded with the lowest-order byte first to match the coding for EF ESN-ME... Update SSD COM MAND CLASS INS P P Lc Le UPDATE SSD A0 00 00 0F 00 Command parameters/data: Octet(s) Description Length RANDSSD bytes Process_Control* byte ESN bytes The input parameter Process_Control is coded as follows: The least significant bit (bit 0) is reserved for future use. The next-least significant bit (bit ) is reserved for future use. Bit of Process_Control specifies the trigger that causes newly-calculated values of SSD to become stored in semi-permanent memory. 000x 0000 successful validation of AUTHBS via Confirm SSD command 000x 000 upon acceptance of a Commit Request Message command during OTASP/OTAPA Bit of Process_Control is reserved for future use. Bit specifies the need to save registers: 000 0x00 save registers ON 0000 0x00 save registers OFF If save registers is set (to ON) this causes the authentication process to maintain or freeze the state of internal registers following the generation of an authentication response. 0 The use of bit is only relevant to the Run CAVE command, in which the generation of keys may follow the generation of an authentication response. -

Bits - of Process_Control are reserved for future use. If the ME is assigned with MEID, Pseudo-ESN value shall be used in ESN field. If EF USGIND bit is set to 0, then the R-UIM shall use the value in ESN field as an input to CAVE algorithm. 0 0.. Base Station Challenge COM MAND CLASS INS P P Lc Le BASE STATION CHALLENGE A0 A 00 00 0 0 Command parameters/data: Octet(s) Description Length RANDSeed bytes Response parameters/data: Octet(s) Description Length RANDBS bytes.. Confirm SSD COM MAND CLASS INS P P Lc Le CONFIRM SSD A0 00 00 0 empty Command parameters/data: Octet(s) Description Length AuthBS bytes Response parameters/data: No response parameters are generated as a result of command execution. Successful comparison will cause SW to be set to 0 and SW to be set to 00. Unsuccessful comparison will cause SW to be set to and SW to be set to 0. If the ME is assigned an MEID and if bit of the EF USGIND is set to 0, then the Pseudo-ESN value received in the Update SSD command shall be used in ESN field as input to CAVE algorithm for the computation of AuthBS. -

.. Authenticate This command performs authentication functions. COM MAND CLASS INS P P Lc Le Authenticate A0 P 00 XX YY P parameter defines the authentication command type: 0 0 P Meaning 00 Run CAVE 0 G Access AKA 0 EAP AKA P= 00 : G Authentication-Run CAVE Command parameters/data: Octet(s) Description Length RANDTYPE (RAND/RANDU) byte RAND/RANDU bytes DigLength (expressed in bits) byte DIGIT bytes 0 Process_Control byte ESN bytes The parameter RANDTYPE is coded as follows: 0000 0000 RAND (global random challenge) 0000 000 RANDU (unique random challenge) All other values of RANDTYPE are reserved for future use. If the RANDTYPE is set to RAND, then the RAND occupies octets -. If the RANDTYPE is set to RANDU, then the RANDU occupies octets - and octet is ignored. If there are no DIGITS for input to CAVE (e.g., for Registration or Unique Challenge), then DigLength = 0 and Octets - = 0. If DIGITS are included, bits b to b of Octet encode the least significant digit of DIGITS, the next least significant digit is encoded in bits b to b of Octet, the next least significant digit is encoded in bits b to b of Octet and so on to Octet. If less than digits are input, then bytes - are zero padded. For example, if the digits are, then Byte = 0000 00, -

Byte = 0000 0000, Byte = 0000 000 and Byte = 000 00. If the ME is assigned with MEID, Pseudo-ESN value shall be used in ESN field. If EF USGIND bit is set to 0, then the R-UIM shall use the value in ESN field as an input to CAVE algorithm. 0 0 Response parameters/data: Octet(s) Description Length AUTHR/AUTHU bytes The input parameter Process_Control is coded as follows: The least significant bit (bit 0) is reserved for future use. The next-least significant bit (bit ) is reserved for future use. Bit of Process_Control specifies the trigger that causes newly-calculated values of SSD to become stored in semi-permanent memory. 000x 0000 successful validation of AUTHBS via Confirm SSD command 000x 000 upon acceptance of a Commit Request Message command during OTASP/OTAPA Bit is reserved for future use and shall be set to 0. Bit specifies the need to save registers: 000 0x00 save registers ON 0000 0x00 save registers OFF If save registers is set (to ON) this causes the authentication process to maintain or freeze the state of internal registers following the generation of an authentication response. The use of bit is only relevant to the Run CAVE command, in which the generation of keys may follow the generation of an authentication response. Bit is reserved for future use and shall be set to 0. Bits and of Process_Control are reserved for future use and shall be set to 0. 0 P= 0 : G Authentication-AKA Upon receiving this command, the R-UIM either generates IK, CK, RES, UAK if supported, by using Root Key or sends an AUTS if sequence number resynchronization is necessary. -0

Command parameters/data: Octet(s) Description Length - RANDA bytes Length of AUTN (L) byte -+L AUTN L bytes Where AUTN = SQN AK AMF MAC-A Response parameters/data: Octet(s) Description Length Synchronization Failure Tag byte Either Cipher Key bytes Integrity Key bytes RES Length byte to +RES RES RES Length Length- Or - AUTS bytes 0 If the R-UIM detects the sequence numbers to be invalid, the R-UIM shall set synchronization failure tag to 0000000 and include AUTS. Otherwise, the R-UIM shall set synchronization failure tag to 00000000 and include CK, IK, RES Length and RES. All the other values are reserved. If MACA comparison fails, the R-UIM returns status words SW = and SW = 0. RES Length field shall be set to the length of RES, and it has to be greater or equal to. P= 0 : WLAN Authentication-AKA Upon receiving this command, the R-UIM either generates IK, CK, RES, UAK if supported, by using WLAN Root Key or sends an AUTS if sequence number resynchronization is necessary. Command parameters/data: Octet(s) Description Length - RANDA bytes Length of AUTN (L) byte -+L AUTN L bytes Where AUTN = SQN AK AMF MAC-A Response parameters/data: -

Octet(s) Description Length Synchronization Failure Tag byte Either Cipher Key bytes Integrity Key bytes RES Length byte to +RES RES RES Length Length- Or - AUTS bytes 0 0 If the R-UIM detects the sequence numbers to be invalid, the R-UIM shall set synchronization failure tag to 0000000 and include AUTS. Otherwise, the R-UIM shall set synchronization failure tag to 00000000 and include CK, IK, RES Length and RES. All the other values are reserved. If MACA comparison fails, the R-UIM returns status words SW = and SW = 0. RES Length field shall be set to the length of RES, and it has to be greater or equal to.... Advisory Note on the Use of Run CAVE In early versions of R-UIM specifications, the Run CAVE command was used to perform both the calculations of authentication responses and the generation of ciphering keys. As [/] systems continue to evolve, it became necessary to partition the tasks of authentication and cipher key generation among several commands. The Run CAVE command as shown is used to generate authentication responses and to enable the calculation of ciphering keys upon the invocation of a subsequent command. If ciphering keys are to be generated, the Run CAVE command should carry the input parameter Process_Control with bit set to ON ( ). Once the authentication response has been delivered via the Get Response command, a cipher key generation command may be issued. This will perform key generation calculations that are based upon the saved parameters that were stored upon the execution of the Run CAVE command with bit of the Process_Control octet set to ON.... Use of Cipher Key Generation Command The command Generate Key/VPM may be invoked at any time following the Run CAVE command with the save function ON. One or more instances of Run CAVE may be performed with the save registers function OFF during the intervening time period, but the input parameters to the Generate Key/VPM will be those values that were stored upon the most recent invocation of the Run CAVE command with the save registers function turned ON. Generate Key/VPM will provide a fixed-length -bit key along with a key of host-specified length to the host function upon the execution of the Get Response command. 0 -

0.. Generate Key/VPM This command relies on the prior successful execution of the Run CAVE command with the save function activated. If this has not occurred, the status word SW= and SW= shall be returned upon the invocation of this command. COM MAND CLASS INS P P Lc Le GENERATE KEY/VPM A0 E 00 00 0 * Command parameters/data: Octet(s) Description Length First octet of VPM to be output byte Last octet of VPM to be output byte Details value: Octet(s) Description of the choice for the VPM to be output. Length XX YY Retrieve the (YY-XX+) length of the VPM to be (YY-XX+) bytes output FF FF No VPM to be output 0 byte Note: If VPM output is present, then the range of XX and YY shall be between 00 and 0. Response parameters/data: Octet(s) Description Length Key bytes VPM octets * The number of VPM octets varies as specified by command parameter -

0 0. Description of OTASP/OTAPA Commands.. MS Key Request COM MAND CLASS INS P P Lc Le Generate Public Key A0 0 00 00 * 0 Command parameters/data: Octet(s) Description Length 0 RANDSeed 0 bytes A-key Protocol Revision byte Parameter P Length byte Parameter G Length byte X Parameter P Parameter P Length X+ to Y Parameter G Parameter G Length *If A-key Protocol Revision is greater than 0000000, Parameter P Length and Parameter G Length shall be set to 00000000 and the Parameter P and G shall be omitted. Details of command parameters are in [], section..., MS Key Request Message. Response parameters/data: Octet(s) Description Length Result Code byte Details of the response are in [], section..., MS Key Response Message... Key Generation Request COM MAND CLASS INS P P Lc Le Key Generation Request A0 00 00 * ** Command parameters/data: Octet(s) Description Length BS Result Length byte Lc BS Result Lc bytes Note: Lc=Length of BS Result in octets +, Details of command parameters are in [], section... Response parameters/data: -

Octet(s) Description Length Result Code byte MS Result Length byte Le MS Result Le bytes ** Note: Le=Length of MS Result + Details of the response are in [], section... -

0 0.. Commit COM MAND CLASS INS P P Lc Le Commit A0 CC 00 00 empty 0 Response parameters/data: Octet(s) Description Length Result Code byte Details of the Commit Request and Response are in [], sections... and..., respectively... Validate COM MAND CLASS INS P P Lc Le Validate A0 CE 00 00 * 0 Command parameters/data: Octet(s) Description Length Block ID byte Block Length byte Lc Param Data Lc bytes This command requests validation of a single block of data and forms a subset of the Validation Request Message as described in [], section...0. Note: Lc = Length of Param Data + Response parameters/data: Octet(s) Description Length Block ID byte Result Code byte This response pertains to a single block of data and forms a subset of the Validation Response Message as described in [], section...0... Configuration Request COM MAND CLASS INS P P Lc Le Configuration Request A0 00 00 0 * Command parameters/data: Octet(s) Description Length Block ID byte -

0 0 This command requests configuration details of a single block of data and forms a subset of the Configuration Request Message as described in [], section... Response parameters/data: Octet(s) Description Length Block ID byte Block Length byte Result Code byte Le Param Data Le bytes Note: Le = Length of Param Data +. This response provides configuration details of a single block of data and forms a subset of the Configuration Response Message as described in [], section..... Download Request COM MAND CLASS INS P P Lc Le Download Request A0 00 00 * 0 Command parameters/data: Octet(s) Description Length Block ID byte Block Length byte Lc Param Data Lc bytes This command requests the download of a single block of data and forms a subset of the Download Request Message as described in [], section... Note: Lc = Length of Param Data + Response parameters/data: Octet(s) Description Length Block ID byte Result Code byte This response pertains to a single block of data and forms a subset of the Download Response Message as described in [], section..... SSPR Configuration Request COM MAND CLASS INS P P Lc Le SSPR Configuration Request A0 EA 00 00 0 * -

0 0 Command parameters/data: Octet(s) Description Length Block ID byte Request Offset bytes Request Max Size byte Note: If Block ID = 0000 000 (Preferred Roaming List Parameter Block), then octets through are used as inputs for this command. For other Block Ids, octets through are ignored. Details of command parameters are in [], section..., SSPR Configuration Request Message. Response parameters/data: Octet(s) Description Length Block ID byte Result Code byte Block Length byte Le Param Data Le bytes Note: Le=Length of Param Data +. Details of the response are in [], section..., SSPR Configuration Response Message... SSPR Download Request COM MAND CLASS INS P P Lc Le SSPR Download Request A0 EC 00 00 * 0 Command parameters/data: Octet(s) Description Length Block ID byte Block Length byte Lc Param Data Lc bytes Note: Lc=Length of Param Data +. Details of the command parameters are in [], section..., SSPR Download Request Message. Response parameters/data: Octet(s) Description Length Block ID byte Result Code byte Segment Offset bytes Segment Size byte Details of the response are in [], section..., SSPR Download Response Message. -

0.. OTAPA Request COM MAND CLASS INS P P Lc Le OTAPA Request A0 EE XX 00 XX 0 P is set to 00 if any of the following condition holds: ME is assigned with ESN; ME is assigned with MEID but service n is not allocated or activated; If service n is allocated and activated and ME is assigned with MEID then P = 0 If P = 00 Command parameters/data: Octet(s) Description Length Start/Stop byte RANDSeed bytes If P = 0 Command parameters/data: Octet(s) Description Length Start/Stop byte RANDSeed bytes - pseudo-esn bytes The Start/Stop parameter as defined in Section... of [] shall be coded as follows: Octet b b b b b b b b 0 0 0 0 0 0 0 Start/Stop 0 Response parameters/data: Octet(s) Description Length Result Code byte NAM_LOCK Indicator byte RAND OTAPA bytes * The RAND_OTAPA (bytes -) is returned if and only if the Result_Code is 00 and the NAM_LOCK_STATE is enabled (= ). -

The NAM_LOCK Indicator parameter as defined in Section... of [] shall be coded as follows: Octet b b b b b b b b NAM_LOCK Indicator 0 0 0 0 0 0 0 0 Details of the response are in [], section..., OTAPA Response Message...0 PUZL Configuration Request COM MAND CLASS INS P P Lc Le PUZL Configuration Request A0 F 00 00 * * Command parameters/data: Octet(s) Description Length Block ID ( 0000 0000 ) byte Note: If Block ID = 0000 000 (PUZL Priorities Parameter Block), then octets through are used as inputs for this command. Octet(s) Description Length Block ID ( 0000 000 ) byte Request Index bytes Request Max Entries byte The Request Index parameter as defined in [] shall be coded as follows: Octet b b b b b b b b Request Index (bit ) Request Index (bit 0) Request Index (bit ) Request Index (bit ) 0 0 0 0 Octet -0

b b b b b b b b Request Index (bit ) Request Index (bit ) Request Index (bit ) Request Index (bit ) Request Index (bit ) Request Index (bit ) Request Index (bit ) Request Index (bit ) Note: If Block ID = 0000 000 (User Zone Parameter Block), then octets through are used as inputs for this command. Octet(s) Description Length Block ID ( 0000 000 ) byte UZ_ID bytes UZ_SID bytes Request Offset bytes Request Max Size byte The UZ_SID parameter as defined in [] shall be coded as follows: Octet b b b b b b b b UZ_SID (bit ) UZ_SID (bit 0) UZ_SID (bit ) UZ_SID (bit ) UZ_SID (bit ) UZ_SID (bit ) UZ_SID (bit ) 0 0 Octet b b b b b b b b UZ_SID (bit ) UZ_SID (bit ) UZ_SID (bit ) UZ_SID (bit ) UZ_SID (bit ) UZ_SID (bit ) UZ_SID (bit ) UZ_SID (bit ) The Request Offset parameter as defined in [] shall be coded as follows: Octet -

b b b b b b b b Request Offset (bit ) Request Offset (bit 0) Request Offset (bit ) Request Offset (bit ) 0 0 0 0 Octet b b b b b b b b Request Offset (bit ) Request Offset (bit ) Request Offset (bit ) Request Offset (bit ) Request Offset (bit ) Request Offset (bit ) Request Offset (bit ) Request Offset (bit ) 0 Note: If Block ID = 0000 00 (Preferred User Zone List Parameter Block), then octets through are used as inputs for this command. Octet(s) Description Length Block ID ( 0000 00 ) byte Request Index bytes Request Offset bytes Request Max Size byte Details of command parameters are in [], section..., PUZL Configuration Request Message. Response parameters/data: Octet(s) Description Length Block ID byte Result Code byte Block Length byte Le Param Data Le bytes * Note: Le=Length of Param Data +. Details of the response are in [], section..., PUZL Configuration Response Message... PUZL Download Request COM MAND CLASS INS P P Lc Le PUZL Download Request A0 F 00 00 * 0 -

Command parameters/data: Octet(s) Description Length Block ID byte Block Length byte Lc Param Data Lc bytes * Note: Lc=Length of Param Data +. Details of the command parameters are in [], section..., PUZL Download Request Message. Response parameters/data: Octet(s) Description Length Block ID byte Result Code byte Identifiers Present Flag byte UZ_ID bytes UZ_SID bytes The Identifiers Present Flag parameter as defined in [] shall be coded as follows: Octet b b b b b b b b Identifier Present Flag (bit) 0 0 0 0 0 0 0 0 * The bytes - are returned if the Identifiers Present Flag is set to. Details of the response are in [], section..., PUZL Download Response Message. The UZ_SID parameter as defined in [] shall be coded as follows: Octet b b b b b b b b UZ_SID (bit ) UZ_SID (bit 0) UZ_SID (bit ) UZ_SID (bit ) UZ_SID (bit ) UZ_SID (bit ) UZ_SID (bit ) 0 Octet -

b b b b b b b b UZ_SID (bit ) UZ_SID (bit ) UZ_SID (bit ) UZ_SID (bit ) UZ_SID (bit ) UZ_SID (bit ) UZ_SID (bit ) UZ_SID (bit ) 0.. GPD Configuration Request COM MAND CLASS INS P P Lc Le GPD Configuration Request A0 FC 00 00 0 * Command parameters/data: Octet(s) Description Length Block ID byte This command requests GPD configuration details of a single block of data and forms a subset of the GPD Configuration Request Message as described in [], section... Response parameters/data: Octet(s) Description Length Block ID byte Block Length byte Result Code byte Le Param Data Le bytes * Note: Le = Length of Param Data +. This response provides GPD configuration details of a single block of data and forms a subset of the GPD Configuration Response Message as described in [], section..... GPD Download Request COM MAND CLASS INS P P Lc Le GPD Download Request A0 00 00 * 0 -

0 0 Command parameters/data: Octet(s) Description Length Block ID byte Block Length byte Lc Param Data Lc bytes This command requests the GPD download of a single block of data and forms a subset of the GPD Download Request Message as described in [], section... * Note: Lc = Length of Param Data +. Response parameters/data: Octet(s) Description Length Block ID byte Result Code byte This response pertains to a single block of data and forms a subset of the GPD Download Response Message as described in [], section..... Secure Mode COM MAND CLASS INS P P Lc Le 00 : start See 0 Secure Mode A0 A 0 0 : stop below empty P= 00 Command parameters/data: Octet(s) Description Length RAND_SM bytes Details of command parameters are in [], section..., Secure Mode Request Message. Response parameters/data: Octet(s) Description Length Result Code byte Details of response parameters are in [], section..., Secure Mode Response Message. P= 0 Command parameters/data: No command parameters are generated. P shall be used for "KEY_IN_USE" parameter as described in []. If KEY_IN_USE = '0000', then P = 0x00 If KEY_IN_USE = '000', then P = 0x0. -

0 Response parameters/data: Octet(s) Description Length Result Code byte Details of response parameters are in [], section..., Secure Mode Response Message... FRESH COM MAND CLASS INS P P Lc Le 00 : put 0 Empty FRESH A0 C 00 0 : get empty 0 P= 00 Command parameters/data: Octet(s) Description Length Crypto-Sync bytes Response parameters/data: No response parameters are generated as a result of command execution. Successful generation will cause SW to be set to 0 and SW to be set to 00. Unsuccessful generation will cause SW to be set to and SW to be set to 0. P= 0 Command parameters/data: No command parameters are generated. Response parameters/data: Octet(s) Description Length Crypto-Sync bytes The Crypto-Sync parameter as defined in [] shall be coded as follows: 0 Octet b b b b b b b b Crypto_Sync (bit ) Crypto_Sync (bit 0) Crypto_Sync (bit ) Crypto_Sync (bit ) Crypto_Sync (bit ) Crypto_Sync (bit ) Crypto_Sync (bit ) 0 Octet -

b b b b b b b b Crypto_Sync (bit ) Crypto_Sync (bit ) Crypto_Sync (bit ) Crypto_Sync (bit ) Crypto_Sync (bit ) Crypto_Sync (bit ) Crypto_Sync (bit ) Crypto_Sync (bit ).. Service Key Generation Request COM MAND CLASS INS P P Lc Le Service Key Generation Request A0 E 00 00 0 0 Command parameters/data: Octet(s) Description Length - KEY_ID bytes The bitmap of KEY_ID defined in Table...- of [] shall be coded as follows: Byte : 0 Byte : b b b b b b b b b b b b b b b b RFU RFU RFU RFU RFU WLAN Root Key BCMCS Root Key IMS Root Key RFU RFU RFU RFU RFU RFU RFU RFU Response parameters/data: -

Octet(s) Description Length Result Code byte 0 0 Details of response parameters are in []... MMD Configuration Request COM MAND CLASS INS P P Lc Le MMD Configuration Request A0 C 00 00 0 * Command parameters/data: Octet(s) Description Length Block ID byte This command requests configuration details of a single block of data and forms a subset of the MMD Configuration Request Message as described in [], section... Response parameters/data: Octet(s) Description Length Block ID byte Block Length Result Code byte Block Length Result Code byte Le Param Data Le bytes * Note: Le=Length of Param Data +. Details of the response are in [], section..., MMD Configuration Response Message... MMD Download Request COM MAND CLASS INS P P Lc Le MMD Download Request A0 C 00 00 * 0 Command parameters/data: Octet(s) Description Length Block ID byte Block Length byte Lc Param Data Lc bytes * Note: Lc=Length of Param Data +. Details of the command parameters are in [], section..., MMD Download Request Message. -

0 0 Response parameters/data: Octet(s) Description Length Block ID byte Result Code byte Details of the response are in [], section..., MMD Download Response Message... MMS Configuration Request COM MAND CLASS INS P P Lc Le MMS Configuration Request A0 00 00 0 * Command parameters/data: Octet(s) Description Length Block ID byte This command requests configuration details of a single block of data and forms a subset of the MMS Configuration Request Message as described in [], section... Response parameters/data: Octet(s) Description Length Block ID byte Block Length Result Code byte Block Length Result Code byte Le Param Data Le bytes * Note: Le=Length of Param Data +. Details of the response are in [], section..., MMS Configuration Response Message...0 MMS Download Request COM MAND CLASS INS P P Lc Le MMS Download Request A0 00 00 * 0 Command parameters/data: Octet(s) Description Length Block ID byte Block Length byte Lc Param Data Lc bytes * Note: Lc=Length of Param Data +. -

Details of the command parameters are in [], section..., MMS Download Request Message. Response parameters/data: Octet(s) Description Length Block ID byte Result Code byte Details of the response are in [], section..., MMS Download Response Message... System Tag Configuration Request COM MAND CLASS INS P P Lc Le System Tag Configuration Request A0 C 00 00 0 * Command parameters/data: Octet(s) Description Length Block ID byte Request Offset bytes Request Max Size byte 0 Note: If Block ID = 0000 000 (Group Tag List), '0000 000' (Specific Tag List), or '0000 00' (Call Prompt List), then octets through are used as inputs for this command. For other Block IDs, octets through are ignored. Details of command parameters are in [], section...0, System Tag Configuration Request Message. Response parameters/data: Octet(s) Description Length Block ID byte Result Code byte Block Length byte Le Param Data Le - bytes 0 * Note: Le=Length of Param Data +. Details of the response are in [], section...0, System Tag Configuration Response Message... System Tag Download Request -0

COM MAND CLASS INS P P Lc Le System Tag Download Request A0 CA 00 00 * 0 Command parameters/data: Octet(s) Description Length Block ID byte Block Length byte Lc Param Data Lc - bytes * Note: Lc=Length of Param Data +. Details of the command parameters are in [], section..., System Tag Download Request Message. Response parameters/data: Octet(s) Description Length Block ID byte Result Code byte Segment Offset bytes Segment Size byte 0 Note: If the BLOCK_ID = '0000 000' (Group Tag List), '0000 000' (Specific Tag List), or '0000 00' (Call Prompt List), then octets through are used. For other Block IDs, octets through are ignored. Details of the response are in [], section..., System Tag Download Response Message. -

0. ESN and MEID Management Command If T=0 protocol is used, APDU is mapped onto TPDU. (See Section. in []).. Store ESN_MEID_ME COM MAND CLASS INS P P Lc Le Store ESN_MEID_ME A0 DE XX 00 0 0 P is set to 00 if any of the following condition holds: ME is assigned with ESN; ME is assigned with MEID but service n is not allocated or activated; If service n is allocated and activated and ME is assigned with MEID then P = 0 Command parameters/data: (P = 00 ): Octet(s) Description Length ESN_ME Length byte ESN_ME bytes ESN is encoded with the lowest-order byte first to match the coding for EF ESN-ME. During the ME and R-UIM initialization process, the ME shall invoke the Store ESN_MEID_ME command to store its ESN in EF F. The ESN_ME length, expressed in octets, is specified by bits 0 through, inclusive, of Octet, where bit is MSB and bit 0 is LSB. 0 0 Bits thru of Octet are RFU. Response parameters/data: Octet(s) Description Length Change Flag, Usage Indicator byte Bit 0 (LSB) of Octet indicates whether the ESN_ME is different from the previous ESN or MEID that was stored in EF F. Bit 0 is set to 0 if the ESN_ME has not changed and is set to if it has changed. This allows the ME to re-register as required in Section... Bits through are RFU and are set to 000. Bit of Octet form a Usage Indicator, as defined in EF F. Bit indicates whether the LSBs of the UIM_ID or the LSBs of the handset ESN are used as the ESN input to calculations performed using CAVE. If bit is set to, UIM_ID is used for both identification and for authentication calculations; i.e. UIM_ID is used instead of ESN in every place where ESN is used in [] and []. If bit is set to 0, the handset ESN is used for both identification and for authentication calculations. Bits through of Octet are RFU and are set to 00. -

If an R-UIM which does not support service n is inserted into a ME assigned with MEID, the ME shall issue the Store ESN_MEID_ME (P= 00) command with Pseudo-ESN value in the ESN field. Command parameters/data: (P = 0 ): used by ME (assigned with MEID) Octet(s) Description Length MEID Length byte MEID bytes 0 During the ME and R-UIM initialization process, the ME shall invoke the Store ESN_MEID_ME command to store its MEID in EF ESN_ME F. The MEID length, expressed in octets, is specified by bits 0 through, inclusive, of Octet, where bit is MSB and bit 0 is LSB. Bits through of Octet are RFU. 0 0 Response parameters/data: Octet(s) Description Length Change Flag, Usage Indicator byte Bit 0 (LSB) of Octet indicates whether the MEID is different from the previous ESN or MEID that was stored in EF ESN_ME F. Bit 0 is set to 0 if the MEID has not changed and is set to if it has changed. This allows the ME to re-register as required in Section... Bits through are RFU and are set to 000. Bit of Octet forms a Usage Indicator, as defined in EF USGIND F. Bit indicates whether the LSBs of the UIM_ID or the LSBs of the handset Pseudo-ESN are used as the ESN input to calculations performed using CAVE. If bit is set to, UIM_ID is used for both identification and for authentication calculations; i.e. UIM_ID is used instead of pseudo ESN in every place where ESN is used in [] and []. If bit is set to 0, the handset Pseudo-ESN is used for both identification and for authentication calculations. Bit indicates whether the bits of the SF_EUIMID (stored in EF SF_EUIMID ) or the bits of the handset MEID is used in every place where MEID is used in []. If bit is set to '', then the SF_EUIMID is used. If bit is set to '0', then the handset MEID is used. If service n is not allocated, b value shall not be interpreted by the handset. Bits through of Octet are RFU and are set to 00. -

0. Description of Packet Data Security-Related Functions This section describes the interface between the ME and R-UIM when the R-UIM performs service authentication and access authentication functions for G packet data service. Currently [] defines Simple IP and Mobile IP as the two access methods for service authentication. Simple IP refers to a service in which an access provider network assigns an IP address and supplies an IP routing address to a mobile station (MS). When using Simple IP, the network may request either Point-to-Point Challenge Handshake Authentication Protocol (PPP CHAP) or Point-to-Point Password Authentication Protocol (PPP PAP) to authenticate the user. Mobile IP refers to a service where the network provides the user with IP routing service to a public IP network and/or secure IP routing service to private networks. When using Mobile IP, the network authenticates the user by Mobile IP mobile-home authentication and Mobile IP challenge/response authentication. [] defines access authentication used for HRPD. Access authentication is a procedure in which the Access Terminal (AT) is authenticated by the AN-AAA (Access Network Authentication, Authorization and Accounting entity). Figure.- shows the authentication model for both the packet data service and voice services. Voice Data Home Authentication Server (AC) Home RADIUS Server PSTN MSC PDSN / RADIUS Client Internet BSC / PCF MS /AT Figure.-. Authentication Models -

.. Managing Shared Secrets The R-UIM stores and manages the Shared Secrets (SS) used in Simple IP and Mobile IP operation for packet data authentication calculations. The network can update the Shared Secrets on the R-UIM using secure mode OTASP/OTAPA messages. 0.. Performing Simple IP Authentication To start the Simple IP authentication process, the network (PDSN) sends a CHAP- Challenge to the mobile station along with the same CHAP-ID sent by the mobile station in the access request. The mobile equipment (ME) will forward this information to the R- UIM with the NAI-Entry-Index used in the access request using the Compute IP authentication command (option CHAP). This NAI-Entry-Index determines the SS to be used in the calculation of the CHAP-Response. The R-UIM computes the CHAP-Response and passes it to the ME to be subsequently forwarded to the network. If the CHAP- Response sent by the MS matches the network s calculated CHAP-Response, the network will send back an Access-Accept granting service. R-UIM ME Network CHAP CHAP-Challenge CHAP-ID CHAP-Response SS Simple IP Shared Secret data NAI-Entry-Index Figure..-. Compute IP Authentication Command (CHAP Option) 0.. Performing Mobile IP Authentication For a mobile station that uses Mobile IP, the PDSN shall begin transmission of an operator configurable number of Agent Advertisements immediately following establishment of PPP or upon reception of an Agent Solicitation message from the mobile station. Mobile IP authentication takes place after the mobile receives the agent advertisement message with a challenge from the host. To authenticate, the mobile station shall start by sending a Mobile IP registration request message (MIP-RRQ) to the network as defined in []. This -

0 0 0 message shall include various extensions that allow authentication data to be carried from the mobile station to the PDSN. The PDSN then sends the authentication data to a RADIUS server by use of an Access Request message. Once the Authentication is successful, the RADIUS server responds either with an Access Accept message to grant service or with an Access Reject to refuse service. The MIP_RRQ message shall include the following extensions as specified in [] in the order given:. MN-NAI Extension []. MN-HA Authentication Extension []. MN-FA Challenge Extension []. MN-AAA Extension [] The mobile station shall use a static Home Agent (HA) address. To calculate the MN-HA Authentication extension, the ME sends the Compute IP authentication command (MN-HA Authenticator option) to the R-UIM with the following information: - the NAI-Entry-Index to indicate the NAI used in the request, - the protected fields of the MIP-RRQ (Registration Message) (refer to []). The protected fields are: - the UDP payload, - all prior Extensions in their entirety and - the Type, Length and SPI of this Extension. The R-UIM returns the MN-HA-Authenticator by hashing the MN-HA Shared Secret indicated by the associated NAI with the protected fields in the registration message. Since the RADIUS protocol defined in [] can not carry attributes greater than in size, the preceding Mobile IP data, type, subtype (if present), length and SPI are hashed before the MN-AAA Authenticator can be generated. This is achieved by using the Compute IP authentication command (MIP-RRQ Hash option). In this command the ME sends the preceding MIP-RRQ data to the R-UIM and the R-UIM calculates the Hash of this data. The Hash is not returned to the ME. Subsequently, this MIP-RRQ Hash, the CHALLENGE from the network and the NAI-Entry- Index identifying the secret the mobile station shares with the home RADIUS server shall be sent to the R-UIM in the Compute IP authentication command (MN-AAA Authenticator option). The R-UIM computes the MN-AAA Authenticator according to [], and returns to the ME, to be sent in the MIP-RRQ message to the network. -

!"# #$ %&'()*+ #%,....)*': #%,-./0&& #%,.../.;'&'<')* #"=,>/?.@? #%,.../@@ #)A&"=/@*&B @&<*&'/C' #"=,>?.@? &&*')* #%,.../%.",$'*D,"B&E &'*') #&& &&*')* #"=,> #%,?./@@ #%,?./%.",$'*D,"B&E #%,?..)*': &'*')/#&& #%,?./.;'&'<')* Figure..-. Computation of MN-AAA Authenticator 0.. HRPD Access Authentication For access authentication, the AT and the network AN initiate Point-to-Point Protocol (PPP) and Link Control Protocol (LCP) negotiations. If the access authentication feature is used, the AN always proposes CHAP as a PPP option in an initial LCP Configure-Request during the PPP establishment. The AN generates a random challenge and sends it to the AT in a CHAP-Challenge message. The mobile equipment (ME) will forward this information to the R-UIM using the Compute IP authentication command (option HRPD Access Authentication). The R-UIM computes the CHAP-Response and passes it to the ME to be subsequently forwarded to the network. If the CHAP-Response sent by the AT matches the network s calculated CHAP-Response, the AN will return an indication of CHAP access authentication success to the AT. -

R-UIM ME Network CHAP CHAP-Challenge CHAP-ID CHAP-Response SS HRPD AA Shared Secret data Figure..-. HRPD Access Authentication Command 0. Description of Packet Data Security-Related Commands.. Compute IP Authentication This command computes responses and authenticators for use in Simple IP, Mobile IP and HRPD Access Authentication. COM MAND CLASS INS P P Lc Le Compute IP Authentication 0 0 P P Lc Le P parameter defines the IP authentication command type: P CLASS 00 CHAP 0 MN-HA Authenticator 0 MIP-RRQ Hash 0 MN-AAA Authenticator 0 HRPD Access Authenticator The mobile must perform the MN-HA Authenticator, MIP-RRQ Hash and MN-AAA Authenticator types in sequence. If either MIP-RRQ Hash or MN-AAA Authenticator are run out of sequence, the R-UIM shall return SW= and SW=. However, the mobile can execute the MN-HA Authenticator any number of times before the MIP-RRQ Hash and MN-AAA authenticator command.... CHAP This IP authentication command type generates the CHAP response. -

0 0 COM MAND CLASS INS P P Lc Le Compute IP Authentication 0 0 00 00 * 0 Command parameters/data: Octet(s) Description Length CHAP_ID byte NAI-Entry-Index byte X CHAP-Challenge Lc - byte CHAP-ID: CHAP Identifier as specified in [] and []. NAI-Entry-Index: The Simple IP NAI-Entry-Index indicates the Shared Secret to use from the Simple IP CHAP SS Parameters block. CHAP-Challenge: Challenge received from the network used in computing the CHAP- Response. The length of the CHAP-Challenge depends upon the method used to generate the octets, and is independent of the hash algorithm used. *Lc = Length of CHAP-Challenge +. Response parameters/data: Octet(s) Description Length CHAP-Response bytes The R-UIM calculates the CHAP-Response as follows: CHAP-Response = Algo (CHAP-ID CHAP-SS CHAP-Challenge) CHAP-SS: Simple IP CHAP Shared Secret associated with the given NAI-Entry-Index Algo: The operator shall choose the function for one-way hashing. MD is defined as the hashing function, but the operator may choose another hashing function.... MN-HA Authenticator This IP authentication command type computes the MN-HA Authenticator. If the maximum length of the Registration-Message exceeds bytes, this command shall chain successive blocks of registration data with a maximum size of bytes each. If the blocks used within the command are run out of sequence, the card shall return SW= and SW=. COM MAND CLASS INS P P Lc Le Compute IP Authentication 0 0 0 * * * P contains chaining information as follows: -

P 00 First Block 0 Next Block 0 Single Block 0 Last Block Block *Le : 0 bytes for P = 00 or 0 bytes for P = 0 or 0 0 The command data depends on the value of P: P = 00 or 0 : Command parameters/data: Octet(s) Description Length NAI-Entry-Index byte X Registration-Data Lc - bytes P = 0 or 0 : Command parameters/data: Octet(s) Description Length X Registration-Data Lc bytes NAI-Entry-Index: The Mobile IP NAI-Entry-Index indicates the MN-HA Shared Secret to use from the Mobile IP SS Parameters block. Registration-Data: Protected fields from the registration message pursuant to []. The protected fields contain the UDP payload, all prior Extensions in their entirety and the Type, Length and SPI of this Extension (See Section..). Maximum length of the Registration-Data is octets per block. 0 The response depends on the chaining information P: P = 00 or 0 Response: NONE P = 0 or 0 Response parameters/data: Octet(s) Description Length MN-HA Authenticator bytes The R-UIM calculates the MN-HA Authenticator response as follows: MN-HA Authenticator = Algo (MN-HA SS Registration-Message MN-HA SS) MN-HA SS: MN-HA Shared Secret associated with the given NAI-Entry-Index. Registration-Message: The complete Registration-Message containing the Registration- Data blocks in the consecutive command messages. -0

Algo: The operator shall choose the function for one-way hashing. MD is defined as the hashing function, but the operator may choose another hashing function.... MIP-RRQ Hash This IP authentication command type calculates the MIP-RRQ Hash. As the preceding MIP-RRQ data can exceed bytes, it shall be sent to the R-UIM in one or several successive blocks, depending on its actual length. If the command blocks are run out of sequence, the card shall return SW= and SW=. COM MAND CLASS INS P P Lc Le Compute IP Authentication 0 0 0 * * 00 P contains chaining information as follows: P Block 00 First Block 0 Next Block 0 Single Block 0 Last Block 0 The command data depends on the value of P: P = 00 or 0 : Command parameters/data: Octet(s) Description Length X Preceding MIP-RRQ Data Lc bytes P = 0 or 0 : Command parameters/data: Octet(s) Description Length X Preceding MIP-RRQ Data Lc - bytes X+ X+ MN-AAA Extension Header bytes MN-AAA Extension Header: Type, Length and SPI fields of the MN-AAA EXTENSION. Preceding MIP-RRQ Data: The mobile IP registration request preceding the MN-AAA EXTENSION. Maximum length of the Preceding MIP-RRQ Data is for the first and next blocks and octets for the last or single blocks. 0 Response parameters/data: NONE The R-UIM will calculate the MIP-RRQ Hash as follows: MIP-RRQ Hash: Algo (PRECEDING-MIP-RRQ MN-AAA Extension Header) -

0 0 PRECEDING-MIP-RRQ: The complete preceding mobile IP registration request, containing the Preceding MIP-RRQ Data from the consecutive MIP-RRQ Hash options. Algo: The operator shall choose the function for one-way hashing. MD is defined as the hashing function, but the operator may choose another hashing function.... MN-AAA Authenticator This IP command type computes the MN-AAA Authenticator. COM MAND CLASS INS P P Lc Le Compute IP Authentication 0 0 0 00 * 0 Command parameters/data: Octet(s) Description Length NAI-Entry-Index byte X Challenge Lc- bytes NAI-Entry-Index: The Mobile IP NAI-Entry-Index indicates the MN-AAA Shared Secret to be used from the Mobile IP SS Parameters block. Challenge: Challenge in the MN-AAA Extension. If the ME receives a challenge greater than bytes, it will send the highest-order byte and least significant bytes to the R- UIM. If the challenge has fewer than bytes, this R-UIM shall include the high-order byte in the computation twice, but ensures that the challenge is used exactly as is. Additional padding is never used to increase the length of the challenge. *Lc = Length of Challenge + bytes Response parameters/data: Octet(s) Description Length MN-AAA Authenticator bytes The R-UIM will calculate the response as follows: MN-AAA Authenticator = Algo (Highest Order byte from Challenge MN-AAA SS MIP- RRQ Hash Least Significant bytes of Challenge up to bytes) MN-AAA SS: MN-AAA Shared Secret associated with the given NAI-Entry-Index. Algo: The operator shall choose the function for one-way hashing. MD is defined as the hashing function, but the operator may choose another hashing function.... HRPD Access Authentication This IP authentication command type generates the CHAP response used for HRPD access authentication. COM MAND CLASS INS P P Lc Le Compute IP Authentication 0 0 0 00 * 0 Command parameters/data: -

Octet(s) Description Length CHAP_ID byte -X CHAP-Challenge Lc - byte CHAP-ID: CHAP Identifier as specified in [] and []. CHAP-Challenge: Challenge received from the network used in computing the CHAP- Response. The length of the CHAP-Challenge depends upon the method used to generate the octets, and is independent of the hash algorithm used. *Lc = Length of CHAP-Challenge +. 0 Response parameters/data: Octet(s) Description Length CHAP-Response bytes The R-UIM calculates the CHAP-Response as follows: CHAP-Response = Algo (CHAP-ID CHAP-SS CHAP-Challenge) CHAP-SS: HRPD Access Authentication Shared Secret Algo: The operator shall choose the function for one-way hashing. MD is defined as the hashing function, but the operator may choose another hashing function. 0. Descriptions of BCMCS Commands The following commands are used for BCMCS key management. The R-UIM shall implement these commands whenever the BCMCS service is allocated in the CDMA Service Table. This assumes that a BCMCS Root key is securely stored in the R-UIM. COM MAND CLASS INS P P Lc Le BCMCS A0 P P Lc Le P parameter defines the BCMCS command type: P CLASS 00 Retrieve SK 0 Update BAK 0 Delete BAK 0 Retrieve SRTP SK 0 Generate Authorization Signature 0 BCMCS Authentication -

.. RETRIEVE SK 0... Command description This function is used by the terminal to ask the R-UIM to calculate the BCMCS Short Term Key (SK) associated with a particular BCMCS Flow Identifier (BCMCS_Flow_ID). For this computation, the R-UIM uses the Broadcast Access Key (BAK) identified by the Broadcast Access Key Identifier (BAK_ID). Input: Service Type = 0 corresponding to GPP BCMCS BCMCS_Flow_ID BAK_ID SK_RAND Output: SK... Command parameters/data: 0 Code Value CLA A0 INS P '00' P '00' Lc Length of the subsequent data field Data Service Type, BCMCS_Flow_ID, BAK_ID, SK_RAND Le '' The command data contains: -A Service Type byte: 0 ( GPP BCMCS ) -Three TLV objects for BCMCS_Flow_ID, BAK_ID, SK_RAND Note: Coding of Tag Field inside BCMCS TLV Objects is defined in Annex B Command data: Byte(s) Description Length Service Type = 0 (GPP BCMCS) -A+ BCMCS_Flow_ID TLV A A+-A+B+ BAK_ID TLV B A+B+- SK_RAND TLV C A+B+C+ NOTE: The tags inside TLV objects in the command are specified in Annex B of this document. -

Response parameters/data: Byte(s) Description Length SK TLV NOTE: The tags inside TLV objects in the response are specified in Annex B of this document. 0.. Update BAK... Command description This function asks the R-UIM to perform a BCMCS BAK update. Input: Service Type = 0 corresponding to GPP BCMCS BCMCS_Flow_ID BAK_ID BAK_Expire TK_RAND Encrypted BAK Output: None... Command parameters/data: Code Value CLA A0 INS P '0' P '00' Lc Length of the subsequent data field Data Service Type, BCMCS_Flow_ID, BAK_ID, BAK_Expire, TK_RAND, Encrypted BAK Le '00' Command data: -

Byte(s) Description Length Service Type = 0 (GPP BCMCS) -A+ BCMCS_Flow_ID TLV A A+-A+B+ BAK_ID TLV B A+B+ BAK_Expire TLV C A+B+C+ A+B+C+ TK_RAND TLV D A+B+C+D+ A+B+C+D+ Encrypted BAK A+B+C+D+ NOTE: The tags inside TLV objects in the command are specified in Annex B of this document. Response Data: None 0.. Delete BAK... Command description This function asks the R-UIM to perform a BCMCS BAK deletion in order to free the memory. This command should not be used as a means for ending a user s subscription. Input: Service Type = 0 corresponding to GPP BCMCS BCMCS_Flow_ID BAK_ID Output: None.... Command parameters/data: Code Value CLA A0 INS P '0' P '00' Lc Length of the subsequent data field Data Service Type, BCMCS_Flow_ID, BAK_ID Le '00' Command data: -

Byte(s) Description Length Service Type = 0 (GPP BCMCS) -A+ BCMCS_Flow_ID TLV A A+-A+B+ BAK_ID TLV B NOTE: The tags inside TLV objects in the command is specified in Annex B of this document. Response Data: None The following diagnostics shall be indicated in the command response by the following Status Words: 0 : Invalid BAK ID. 0 : Invalid BCMCS Flow ID... RETRIEVE SRTP SK 0... Command description This function is used by the terminal to ask the R-UIM to calculate the BCMCS SRTP Short Term Key (SK) associated with a particular BCMCS Flow Identifier (BCMCS_Flow_ID). For this computation, the R-UIM uses the Broadcast Access Key (BAK) identified by the BCMCS_Flow_ID, Broadcast Access Key Identifier (BAK_ID), SK_RAND and Packet Index. Input: Service Type = 0 corresponding to GPP BCMCS BCMCS_Flow_ID BAK_ID SK_RAND Packet Index 0 Output: SRTP SK -

... Command parameters/data: Code Value CLA A0 INS P 0 P 00 Lc Length of the subsequent data field Data Service Type, BCMCS_Flow_ID, BAK_ID, SK_RAND, Packet Index Le The command data contains: -Three TLV objects for BAK_ID, SK_RAND and Packet Index Command data: Byte(s) Description Length Service Type = 0 (GPP BCMCS) - A+ BAKBCMCS_Flow_ID TLV A A+ - A+B+ SK_RANDBAK_ID TLV B A+B+- Packet IndexSK_RAND TLV C A+B+C+ A+B+C+- Packet Index TLV D A+B+C+D+ NOTE: The tags inside TLV objects in the command are specified in Annex B of this document. Response parameters/data 0 Byte(s) Description Length SRTP SK TLV NOTE: The tag inside TLV object in the response is specified in Annex B of this document... Generate Authorization Signature... Command description This function is used by the terminal to ask the R-UIM to calculate the authorization signature associated with a particular BCMCS Flow Identifier (BCMCS_Flow_ID). For this computation, the R-UIM uses the Broadcast Access Key (BAK) identified by the Broadcast Access Key Identifier (BAK_ID) and timestamp. -

Input: Service Type BCMCS_Flow_ID BAK_ID Timestamp Output: Auth Signature... Command parameters/data: 0 Code Value CLA A0 INS P '0' P '00' Lc Length of the subsequent data field Data Service Type, BCMCS_Flow_ID, BAK_ID, Timestamp Le '0' The command data contains: -Three TLV objects for BCMCS_Flow_ID, BAK_ID, and Timestamp. Command data: Byte(s) Description Length Service Type = 0 (GPP BCMCS) -A+ BCMCS_Flow_ID TLV A A+-A+B+ BAK_ID TLV B A+B+- Timestamp TLV C A+B+C+ NOTE: The tags inside TLV objects in the command are specified in Annex B of this document. Response parameters/data Byte(s) Description Length Auth Signature TLV NOTE: The tag inside TLV object in the response is specified in Annex B of this document. 0 -

.. BCMCS Authentication... Command description This function is used by the terminal to ask the R-UIM to calculate the BCMCS digest response for information acquisition. For this computation, the R-UIM uses the BCMCS Root Key. 0 Input: RAND Challenge Output: Digest Response... Command parameters/data: Code Value CLA A0 INS P 0 P 00 Lc Length of the subsequent data field Data RAND, Challenge Le The command data contains: -Two TLV objects for RAND, and Challenge. Command data: Byte(s) Description Length Service Type = 0 (GPP BCMCS) -A+ RAND TLV A A+-A+B+ Challenge TLV B NOTE: The tags inside TLV objects in the command are specified in Annex B of this document. 0 Response parameters/data Byte(s) Description Length Digest Response TLV NOTE: The tag inside TLV object in the response is specified in Annex B of this document. -0

0.0 Descriptions of Application Authentication Commands The ME will select the authentication mechanism based on the capability of the R-UIM card and the server, and send an Authenticate Command to the card to generate the response and optionally session keys. Successful authentication calculation will cause SW to be set to 0 and SW to be set to 00. Unsuccessful calculation will cause SW to be set to and SW to be set to 0. For complete details on MMS, refer to [], [], [0] and []. For complete details on MMD, refer to [].0. Application Authentication Command R-UIM generates response and optional or sets of session keys. COM MAND CLASS INS P P Lc Le Application Authentication A0 A 00 00 xx xx Command parameters/data: Octet(s) Description Length Authentication Mechanism & Algorithm byte Application ID byte - Length of Realm (Service or Host Name) bytes to A+ Realm (Service or Host Name) A bytes A + to A+ Length of Server Nonce bytes A + to A + B+ Server Nonce B bytes A+ B+ to A + B + Length of Client Nonce bytes A + B+ to A+B+C+ Client Nonce C bytes The coding for authentication mechanism & algorithm is defined according to the following table: Table 0- Authentication mechanism Binary Value Authentication Mechanism 00000000 CRAM-MD 0000000 HTTP Digest (MD) 0000000 HTTP Digest (MD-sess) 000000 HTTP Digest (AKAv-MD) -

0000000 HTTP Digest (AKAv-MD-sess) 000000 SASL DIGEST 000000 SASL OTP 00000 SASL GSSAPI 0000000 - Reserved Response parameters/data: Octet(s) Description Length Response Length bytes to X+ Response X bytes X+ to X+ SessionKey Length bytes X+ to X+ Y+ SessionKey Ybytes X+ Y+ to X+ Y+ SessionKey Length bytes X+ Y+ to X+ Y+ Z+ SessionKey Z bytes It is up to different authentication mechanism algorithm to determine if session keys are needed and if so, how many session keys should be returned. For example, SASL Digest returns session keys, HTTP Digest (MD-session) returns session key and HTTP Digest (MD) returns no session key. If no session key is to be returned by the R-UIM, the R-UIM shall set the corresponding session key length to 0. The following is a call flow for MMS message retrieval: R-UIM ME SERVER Read Binary MMS Notification(only for MMS Retrieval) Capability Report Request Capability Response Authentication Mechanism Application Authentication Command( Authentication Mechanism, Realm, Server Nonce, Client Nonce) Application Authentication Response (Response, Session Key, Session Key) Server Authentication Data (Nonce, Realm) Authentication Response (with Client nonce) Authentication Response MMS Retrieve/Submit Request MMS Retrieve/Submit Response Note: Capability Report/Response/Authentication Mechanismare all optional; that is, either none of them are used, or all of them are used. The carrier determines to use them or not. -

0 0. Description of AKA-related Functions In order to support AKA, the R-UIM shall support the requirement defined in Section.. of []. The following AKA-related parameters are stored in the R-UIM. Root Key Cipher and Integrity Keys (CK, IK) SQN MS UAK (if supported).. Authentication and key agreement procedure This section gives an overview of the authentication mechanism and cipher and integrity key generation that are invoked by the network. For complete details, refer to [], [0] and []. The mechanism achieves mutual authentication by the user and the network showing knowledge of a secret root key that is shared between the R-UIM and the Authentication Center. In addition, the R-UIM keeps track of a counter SQN MS to support network authentication. SQN MS denotes the highest sequence number the R-UIM has ever accepted. The R-UIM first computes the anonymity key AK = f (RANDA) and retrieves the SQN = (SQN AK) AK Then the R-UIM computes MACA = f (SQN RAND AMF) as defined in [0]. This value is compared with the MAC-A value included in AUTN. The R-UIM keeps track of a counter SQN MS to support network authentication. SQN MS denotes the highest sequence number the R-UIM has ever accepted. If the R-UIM detects the sequence numbers to be invalid, the R-UIM shall set synchronization failure tag to 0000000 and include AUTS. Where AUTS = ConSeq (SQN MS ) MACS; ConSeq(SQN MS ) = SQN MS f*(rand) is the concealed value of the counter SQN MS in the R-UIM and MACS = f*(sqn MS RAND AMF); -

R-UIM ME G Authentication (RANDA,AUTN) R-UIM uses f to compute MACA MACA = MAC-A? No Auth Error Yes SQN is in correct range No Sync Failure Yes R-UIM uses the f, f, and f to compute RES, CK, IK, and UAK RES, CK, IK If CHANGE_KEYS = CONFIRM_KEYS Store IK, CK and UAK in permanent memory Figure..- AKA Procedures -

.. Cryptographic Functions The names and parameters of the cryptographic functions supported by the R-UIM are defined in []... G Authentication Command description The function is used during the procedure for authenticating the R-UIM to its network and vice versa. In addition, a cipher key, an integrity key, and UAK if supported, are calculated. For the execution of the command the R-UIM uses the root key, which is stored in the R-UIM. 0.. UMAC Generation Command Description If UAK is supported by the R-UIM, the R-UIM uses UAK to convert MAC-I, into UMAC. If UMAC is successfully generated, the R-UIM responds to the ME by setting the Success Tag to and including the UMAC in the response to the ME. Otherwise, the R-UIM sets the Success Tag to 0 and omits the UMAC. R-UIM ME UMAC Generation (MAC-I) Success Tag =, UMAC OR Success Tag =0 (UAK is not supported) Figure..- UMAC Generation -

0.. Restoration of G keys The CK and IK are generated during AKA, and updated through AKA. The CK and IK are stored in the R-UIM and a copy is stored in the ME. The CK and IK are sent from the R-UIM to the ME upon request from the ME. The ME shall delete the CK and IK from memory after power-off as well as after removal of the R-UIM. Upon powering on, the ME shall check the R-UIM revision and service table, if AKA is supported and activated, then the ME shall read the EF GCIK from the R-UIM and restore them... CONFIRM_KEYS Command description The function is used during the procedure for G authentication. The (IK, CK) pair and the UAK that was calculated by the R-UIM when it received the G Authentication command is now stored in permanent memory.. Description of AKA commands.. UMAC Generation 0 COM MAND CLASS INS P P Lc Le UMAC Generation A0 E 00 00 0 xx Command parameters/data: Octet(s) Description Length - MAC-I bytes Response parameters/data: Octet(s) Description Length SUCCESS TAG byte UMAC 0 or bytes If the R-UIM generates UMAC successfully, the R-UIM shall set success tag to 0000000, and include the UMAC. If the R-UIM does not support UAK, the R-UIM shall set success tag to 00000000 and omit the UMAC. All the other values are reserved... CONFIRM_KEYS COM MAND CLASS INS P P Lc Le CONFIRM_KEYS A0 C 00 00 empty empty Command parameters/data: The command has no parameters Response parameters/data: No response parameters are generated as a result of this command. -

0 0 0 ADDITIONAL AIR INTERFACE PROCEDURES. Registration Procedure.. R-UIM Removal and Insertion Upon the removal of an R-UIM from a powered-on ME, the ME shall clear its temporary memory of R-UIM related parameters. Upon the insertion of an R-UIM into a powered-on ME, the ME shall perform the following: Perform ME/R-UIM initialization tasks; Update its NAM parameters to those stored on the R-UIM; for any service available and activated in the R-UIM, the parameters available from the R-UIM shall be used. Perform the actions defined in... of [] or... of []; and Enter the System Determination Substate with a power-up indication as described in [] or []... Procedure when ESN Changes with TMSI Assigned When the ME detects that an R-UIM is inserted, it will use the Store ESN_MEID_ME command to inform the R-UIM of the ESN or MEID of the ME. If bit 0 of octet of the response parameters/data to the Store ESN_MEID_ME command is set to, REG_ENABLED S is equal to YES and there is a TMSI assigned in the R-UIM (the bits of the TMSI_CODEs-p field of the TMSI EF are not all set to ), the ME shall perform the following: Store the value USE_TMSIs in a temporary variable; Set USE_TMSIs to 0 ; Initiate a power up registration regardless of the state of POWER_UP_REG S and REGISTERED S ; and Restore the value of USE_TMSIs from the temporary variable. If the registration fails due to access attempt failure or if the registration is cancelled due to initiation of an origination by the user or detection of a page match (see section... of [] and section... of []), the ME shall delete the TMSI in the R-UIM by setting all bits of the TMSI_CODEs-p field of the TMSI EF to.. NAM Parameters when no R-UIM is inserted into the ME When no R-UIM is inserted into the ME, the ME shall use the following default set of NAM parameters, from Section. of []: IMSI_M_CLASSp shall be set to 0. -

0 MCC_Mp, IMSI_M p, and IMSI_M_Sp shall be set to coded value of the IMSI_M with the four least-significant digits set to ESNp, converted directly from binary to decimal, modulo 0000. The other digits shall be set to 0. IMSI_M_ADDR_NUMp shall be set to 000. IMSI_T_CLASSp shall be set to 0. MCC_Tp, IMSI_T p, and IMSI_T_Sp shall be set to the coded value of the IMSI_T with the four least-significant digits set to ESNp, converted directly from binary to decimal, modulo 0000. The other digits shall be set to 0. IMSI_T_ADDR_NUMp shall be set to 000. ACCOLCp shall be set as specified in.. of []. HOME_SIDp, if present, shall be set to 0. All other indicators of the selected NAM may be set to manufacturer-defined default values. All configuration indicator values shall be set within their valid range (see F. of []). MEs may perform any function allowable by applicable standards, including system accesses when no R-UIM is inserted into the ME. 0 0. IMSI-Related Parameters in the ME when no IMSI is Programmed in the R-UIM When the IMSI_M_PROGRAMMED bit of the IMSI_M EF is set to 0, the ME shall use the following values associated with IMSI_M in lieu of the values programmed in the IMSI_M EF: IMSI_M_CLASSp shall be set to 0. MCC_Mp, IMSI_M p, and IMSI_M_Sp shall be set to the coded value of the IMSI_M with the four least-significant digits set to ESNp, converted directly from binary to decimal, modulo 0000. The other digits shall be set to 0. IMSI_M_ADDR_NUMp shall be set to 000. ACCOLCp shall be set as specified in.. of []. When the IMSI_T_PROGRAMMED bit of the IMSI_T EF is set to 0, the ME shall use the following values for IMSI_T in lieu of the values programmed in the IMSI_T EF: IMSI_T_CLASSp shall be set to 0. MCC_Tp, IMSI_T p, and IMSI_T_Sp shall be set to the coded value of the IMSI_T with the four least-significant digits set to ESNp, converted directly from binary to decimal, modulo 0000. The other digits shall be set to 0. IMSI_T_ADDR_NUMp shall be set to 000. -

. Preferred Access Channel Mobile Station ID Type Operational Requirement: If UIMID Usage Indicator= 0 or SF_EUIMID Usage Indicator = 0 (service n is allocated and activated, bit or of EF USGIND to 0 ), appropriate PREF_MSID value should be set in overhead message. -

No text. -

BCMCS PROCEDURES For complete details, refer to [].. Functionalities of R-UIM and ME 0.. R-UIM Generate TK from BCMCS Root Key and TK_RAND, then decrypt BAK using TK Compute SK from BAK and SK_RAND and pass SK to ME Store BCMCS Root Key, BAK, BCMCS_Flow_ID, BAK_ID and BAK_Expire When necessary, generate Auth-Key from BCMCS Root Key and calculate digest response When necessary, generate SRTP session Encryption Key using AES Generate authorization signature from BAK and timestamp by using EHMAC algorithm (BAK Hash) 0.. ME Use SK to decrypt BCMCS content Determine whether to issue RetrieveSK command by checking BAK_ID and SK_RAND Initiate BAK Request to the network and issue update BAK command Can store BCMCS_FLOW_ID, BAK_ID, BAK_EXPIRE, SK and SK_RAND Determine the expiration status of BAK and send delete BAK command when necessary 0. Key Management If service n 0 is allocated, a secret list of current BAK values (BAK) and secret list of updated BAK values (UpdatedBAK) shall be securely maintained in the R-UIM (not accessible to the ME). When ME sends a Update BAK command, the R-UIM shall create a new entry in EF UpBAKPARA and put the decrypted BAK into a record in the secret list of updated BAK values (UpdatedBAK) corresponding to EF UpBAKPARA. When ME sends a Delete BAK command, the R-UIM shall search for the given (BCMCS_Flow_ID, BAK_ID) pair in EF BAKPARA. If such a record is found, it shall erase (fill up with FF ) the record corresponding to the BAK in the BAK secret list (BAK). If this search is unsuccessful, the R-UIM shall look for the (BCMCS_Flow_ID, BAK_ID) pair in EF UpBAKPARA. If the record is found, the R-UIM shall remove the record in EF UpBAKPARA and corresponding -

BAK in the Updated BAK secret list (UpdatedBAK) identified by BCMCS_Flow_ID and BAK_ID. 0 When ME sends a Retrieve SK command, if BCMCS_Flow_ID and BAK_ID are found in EF BAKPARA, R-UIM shall use the corresponding BAK from the secret BAK list (BAK) to generate SK. Otherwise, if the ID pair matches any record in EF UpBAKPARA, R-UIM shall copy the parameters (BCMCS_Flow_ID, BAK_ID, BAK_Expire) into the EF BAKPARA, copy the corresponding BAK from the Updated BAK secret list (UpdatedBAK) to the BAK secret list (BAK) and use this BAK to generate SK. If none of the precedent procedures apply (BCMCS_Flow_ID and BAK_ID unavailable), the R-UIM shall reply with an appropriate error status word A, referenced data not found. -

ANNEX A (INFORMATIVE): SUGGESTED CONTENTS OF THE EFS AT PRE-PERSONALIZATION 0 Table A- is a general outline of the R-UIM files defined in this specification.. All values are sized in Bytes unless otherwise noted.. Default Values are specified when available and are intended to be guidelines only. In some cases, operators must specify explicit parameter values as no logical default exists. In the case where the parameter values are necessary, valid values and/or ranges are listed.. Default and Parameter values are for general quick reference only and not intended to specify details. Refer to the corresponding file for details.. Default Values and Parameter Values are specified in Hexadecimal, unless otherwise noted.. GSM-specific files are not included.. If EFs have an unassigned value, it may not be clear from the main text what this value should be. This annex suggests values in these cases. Table A-. Summary of R-UIM Files File Name File ID File Access - Access - Access Size in Mandatory Default Values (D) and/or Type Read Update Invalidate- Bytes or Optional Parameter Values (P) in Bytes Rehabilitate Authentication NAM Parameters and Operational Parameters A-Key - - Never Never - M Specified by Operator Root Key - - Never Never - M Specified by Operator BCMCS Root - - Never Never - O Specified by Operator Key IMS Root Key - - Never Never - O Specified by Operator A-

File Name File ID File Access - Access - Access Size in Mandatory Default Values (D) and/or Type Read Update Invalidate- Bytes or Optional Parameter Values (P) in Bytes Rehabilitate WLAN Root Key - - Never Never - O Specified by Operator SSD - - Never Never - M - EF COUNT F00/F/F CY CHV CHV - M D = 00 00 BAK - - Never Never - O Specified by Operator UpdatedBAK - - Never Never - O Specified by Operator SharedSecret - - Never Never - Variable O Specified by Operator UAK - - Never Never - O Specified by Operator SQN MS - - Never Never - O - NAM Parameters and Operational Parameters EF IMSI_M F00/F/F TR CHV -CHV 0 M P = Specified by Operator or D= 00 00 EF IMSI_T F00/F/F TR CHV -CHV 0 M P = Specified by Operator or D= 00 00 EF TMSI F00/F/F TR CHV CHV -CHV M D = 00 00 00 00 00 00 00 00 00 FF FF FF FF 00 00 00 EF AH F00/F/F TR CHV CHV - M P = Specified by Operator or D = 00 00 EF AOP F00/F/F TR CHV CHV - M - EF ALOC F00/F/F TR CHV CHV - M - EF CDMAHOME CHV - F00/F/F LF CHV M P = Specified by Operator or D = 00 00 00 00 00 A-

File Name File ID File Access - Access - Access Size in Mandatory Default Values (D) and/or Type Read Update Invalidate- Bytes or Optional Parameter Values (P) in Bytes Rehabilitate EF ZNREGI F00/F/F LF CHV CHV - M D = 00 00 00 00 00 00 00 00 EF SNREGI F00/F/FA TR CHV CHV - M - EF DISTREGI F00/F/FB TR CHV CHV - M D = 00 00 00 00 00 00 00 00 EF ACCOLC F00/F/FC TR CHV - M P = 00 to 0F derived from IMSI_M / IMSI_T EF TERM F00/F/FD TR CHV CHV - M Specified by Operator P = 00 to 0 EF SSCI F00/F/FE TR CHV CHV - O Specified by Operator P = 00 to 0 EF ACP F00/F/FF TR CHV CHV - M Specified by Operator EF PRL F00/F/F0 TR CHV - Variable M Specified by Operator EF RUIMID F00/F/F TR ALW NEVER NEVER- NEVER M Specified by R-UIM Manufacturer EF CST F00/F/F TR CHV - Variable M Specified by Operator EF SPC F00/F/F TR - M D = 00 00 00 or P = 00 00 00 to EF OTAPASPC F00/F/F TR CHV CHV - M Specified by Operator or D = 00 EF NAMLOCK F00/F/F TR CHV CHV - M Specified by Operator EF OTA F00/F/F TR CHV - Variable M P = Defined in [] EF SP F00/F/F TR CHV CHV - M Specified by Operator EF ESNME F00/F/F TR ALW - M D = 00 00 A-

File Name File ID File Access - Access - Access Size in Mandatory Default Values (D) and/or Type Read Update Invalidate- Bytes or Optional Parameter Values (P) in Bytes Rehabilitate EF Revision F00/F/F TR ALW - M D = 0 EF PL F00/F/FA TR ALW CHV - Variable M D = FF FF EF SMS F00/F/FC LF CHV CHV - Variable O D = 00 FF FF EF SMSP F00/F/FD LF CHV CHV - Variable O D = FF FF EF SMSS F00/F/FE TR CHV CHV - Variable O D = FF FF EF SSFC F00/F/FF TR CHV CHV - Variable O Specified by Operator EF SPN F00/F/F TR ALW - O Specified by Operator EF USGIND F00/F/F TR CHV - M Specified by Operator EF AD F00/F/F TR ALW - Variable M D = 00 00 EF MDN F00/F/F LF CHV CHV - O Specified by Operator EF MAXPRL F00/F/F TR CHV - or M Specified by Operator EF SPCS F00/F/F TR CHV NEVER NEVER- NEVER M P = If EF F is set to default value then D = 00 otherwise D = 0 EF ECC F00/F/F TR ALW - Variable O D = FF EF MEGPDOPC F00/F/F TR CHV CHV - O D = 00 EF GPDOPM F00/F/F TR CHV CHV - O Specified by Operator EF SIPCAP F00/F/FA TR CHV - O Specified by Operator EF MIPCAP F00/F/FB TR CHV - O Specified by Operator EF SIPUPP F00/F/FC TR CHV - Variable O Specified by Operator EF MIPUPP F00/F/FD TR CHV - Variable O Specified by Operator A-

File Name File ID File Access - Access - Access Size in Mandatory Default Values (D) and/or Type Read Update Invalidate- Bytes or Optional Parameter Values (P) in Bytes Rehabilitate EF SIPSP F00/F/FE TR CHV CHV - O Specified by Operator EF MIPSP F00/F/FF TR CHV CHV - Variable O Specified by Operator EF SIPPAPSS F00/F/F0 TR CHV CHV - Variable O Specified by Operator SimpleIP CHAP SS - - Never Never - Variable O Specified by Operator MobileIP SS - - Never Never - Variable O Specified by Operator Shared Secret - - Never Never - Variable O Specified by Operator EF PUZL F00/F/F TR CHV - Variable O Specified by Operator EF MAXPUZL F00/F/F TR CHV - O Specified by Operator EF MECRP F00/F/F TR CHV CHV - M D = 00 00 00 EF HRPDCAP F00/F/F TR CHV - O Specified by Operator EF HRPDUPP F00/F/F TR CHV - Variable O Specified by Operator HRPD AA CHAP SS - - Never Never - Variable O Specified by Operator EF CSSPR F00/F/F TR CHV - O D = FF EF ATC F00/F/F TR CHV - O Specified by Operator EF EPRL F00/F/FA TR CHV - Variable O Specified by Operator EF BCSMScfg F00/F/FB TR CHV - O Specified by Operator EF BCSMSpref F00/F/FC TR CHV CHV - O D = FF EF BCSMStable F00/F/FD LF CHV - Variable O D = 00 FF FF EF BCSMSp F00/F/FE LF CHV CHV - O D = FF FF EF IMPI F00/F/FF TR CHV - Variable O Specified by Operator A-

File Name File ID File Access - Access - Access Size in Mandatory Default Values (D) and/or Type Read Update Invalidate- Bytes or Optional Parameter Values (P) in Bytes Rehabilitate EF DOMAIN F00/F/F0 TR CHV - Variable O Specified by Operator EF IMPU F00/F/F LF CHV - Variable O Specified by Operator EF PCSCF F00/F/F LF CHV - Variable O Specified by Operator EF BAKPARA F00/F/F LF CHV - Variable O Specified by Operator EF UpBAKPARA F00/F/F CY CHV - Variable O Specified by Operator EF MMSN F00/F/F LF CHV CHV - Variable O D= 00 00 00 FF FF EF EXT F00/F/F LF CHV CHV - Variable O D= FF FF EF MMSICP F00/F/F TR CHV - Variable O D= FF...FF EF MMSUP F00/F/F LF CHV CHV - Variable O D= FF...FF EF MMSUCP F00/F/F TR CHV CHV/ - Variable O D= FF FF EF AuthCapability F00/F/FA LF CHV - Variable O D= 00 00 EF GCIK F00/F/FB TR CHV - O Specified by Operator EF DCK F00/F/FC TR CHV CHV - 0 O Specified by Operator EF GID F00/F/FD TR CHV - N O Specified by Operator EF GID F00/F/FE TR CHV - N O Specified by Operator EF CDMACNL F00/F/FF TR CHV - N O Specified by Operator EF SF_EUIMID F00/F/F TR ALW NEVER NEVER- NEVER O Specified by R-UIM Manufacturer A-

ANNEX B (INFORMATIVE): BCMCS-RELATED TAG VALUES Tag Name of Data Element Usage '0' BCMCS Flow ID TLV object BCMCS command '' BAK ID TLV object BCMCS command '' RAND, SK RAND or TK RAND TLV objects BCMCS command '' BAK Expire TLV object BCMCS command Packet Index TLV object BCMCS command SK TLV object or SRTP SK TLV object BCMCS command Timestamp TLV object BCMCS command Auth Signature TLV object BCMCS command Challenge TLV object BCMCS command Digest Response TLV object BCMCS command B-