ETS 300 331 : 20001
Current
The latest, up-to-date edition.
RADIO EQUIPMENT AND SYSTEMS (RES) - DIGITAL EUROPEAN CORDLESS TELECOMMUNICATIONS (DECT); DECT AUTHENTICATION MODULE (DAM)
Hardcopy , PDF
English
Foreword
1 Scope
2 Normative references
3 Definitions symbols and abbreviations
3.1 Definitions
3.2 Symbols
3.3 Abbreviations
4 Physical characteristics
4.1 Format and layout
4.2 Temperature range for card operation
4.3 Contacts
4.4 Precedence
4.5 Static Protection
5 Electronic signals and transmission protocols
5.1 Supply voltage Vcc (contact C1)
5.2 Reset RST (contact C2)
5.3 Programming voltage Vpp (contact C6)
5.4 Clock CLK (contact C3)
5.5 I/O (contact C7)
5.6 States
5.7 Baudrate
5.8 Answer To Reset (ATR)
5.9 Bit/character duration and sampling time
5.10 Error handling
5.11 Presence of the DAM
6 Logical model
6.1 General description
6.2 File identifier
6.3 Dedicated Files (DF)
6.4 Elementary Files (EF)
6.5 Methods for selecting the DECT application
6.6 Methods for selecting a file
6.7 Reservation of file IDs
7 Security services and facilities
7.1 Overview
7.2 Authentication
7.3 UAK allocation
7.4 Data confidentiality
7.5 Access rights to the DECT system
7.6 File access control
7.7 Identification, keying and algorithm information
7.8 Subscription registration maintenance
8 Description of the functions
8.1 SELECT
8.2 STATUS
8.3 READ BINARY
8.4 UPDATE BINARY
8.5 READ RECORD
8.6 UPDATE RECORD
8.7 SEEK
8.8 INCREASE
8.9 VERIFY CHV
8.10 CHANGE CHV
8.11 DISABLE CHV
8.12 ENABLE CHV
8.13 UNBLOCK CHV
8.14 INVALIDATE
8.15 REHABILITATE
8.16 ASK RANDOM
8.17 PT AUTHENTICATION
8.18 FT AUTHENTICATION
8.19 USER AUTHENTICATION
8.20 UAK ALLOCATION
9 Description of the commands
9.1 Mapping principles
9.2 Coding of the commands
9.3 Definitions and coding
9.4 Status conditions returned by the DAM
10 Contents of the EFs
10.1 Contents of the EFs at the MF level
10.2 Contents of EFs at the parent level of the DECT
application
10.3 Contents of the EFs at the DECT application
level
10.4 Contents of the EFs at the subscription
registration level
11 Application protocol
11.1 General procedures
11.2 DAM management procedures
11.3 CHV related procedures
11.4 Authentication procedures
11.5 UAK allocation
11.6 General information procedures
11.7 Subscription registration maintenance
Annex A (normative): Plug-in Card
Annex B (informative): Service class
Annex C (informative): Bibliography
History
Specifies physical/electrical aspects of the authentication module.
Committee |
RES 3
|
DocumentType |
Standard
|
Pages |
91
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
Supersedes |
Standards | Relationship |
DIN ETS 300331:1996-06 | Identical |
PN ETS 300 331 : 2005 | Identical |
NF ETS 300 331 : 1998 | Identical |
EG 201 620 : 1.1.1 | INTELLIGENT NETWORKS (IN) - SECURITY STUDIES FOR CORDLESS TERMINAL MOBILITY (CTM) |
TR 102 183 : 1.2.1 | DIGITAL ENHANCED CORDLESS TELECOMMUNICATIONS (DECT); CONFORMANCE TESTING ON DECT EQUIPMENT |
ETR 183 : 20001 | RADIO EQUIPMENT AND SYSTEMS (RES); DIGITAL EUROPEAN CORDLESS TELECOMMUNICATIONS (DECT); CONFORMANCE TESTING ON DECT EQUIPMENT |
BS EN 1362:1997 | Identification card systems. Device interface characteristics. Classes of device interfaces |
ETR 178 : 20002 | DIGITAL ENHANCED CORDLESS TELECOMMUNICATIONS (DECT) |
I.S. EN 1362:1997 | IDENTIFICATION CARD SYSTEMS - DEVICE INTERFACE CHARACTERISTICS - CLASSES OF DEVICE INTERFACES |
EN 1362:1997 | Identification card systems - Device interface characteristics - Classes of device interfaces |
TR 101 178 : 1.5.1 | DIGITAL ENHANCED CORDLESS TELECOMMUNICATIONS (DECT); A HIGH LEVEL GUIDE TO THE DECT STANDARDIZATION |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.