TS 131 113 : 8.0.0
Current
The latest, up-to-date edition.
UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; UNIVERSAL SUBSCRIBER IDENTITY MODULE APPLICATION TOOLKIT (USAT) INTERPRETER BYTE CODES
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
Foreword
1 Scope
2 References
3 Definitions, abbreviations and symbols
3.1 Definitions
3.2 Abbreviations
3.3 Symbols
4 Model of computation
4.1 Navigation
4.2 Communication with the external system entity
4.3 Terminal response handler mechanism
4.4 Activation
4.5 Page format overview
4.6 History list
5 TLV Format
5.1 Coding of the tag byte
5.2 Attributes in TLVs
5.3 Coding of attribute bytes
6 Variables
6.1 Usage areas
6.2 Variable values
6.3 Variable substitution
7 Used USAT Interpreter data structures
7.1 Page
7.2 Navigation Unit
7.3 Anchor Reference
7.4 Variable Identifier List
7.5 Inline Value
7.6 Inline Value 2
7.7 Input List
7.8 Ordered TLV List
7.9 Page Reference
7.10 Submit
8 USAT Interpreter byte codes
8.1 Set Variable
8.2 Assign and Branch
8.3 Extract
8.4 Go Back
8.5 Branch On Variable Value
8.6 Exit
8.7 Execute USAT Command
8.8 Execute Native Command
8.9 Get Length
8.10 Get TLV Value
8.11 Display Text
8.12 Get Input
9 Native Commands
9.1 Security Plug-ins
10 End to End Security
10.1 Encrypt
10.2 Decrypt
11 Modes of operation
11.1 Pull
11.2 Push/Cell Broadcast
12 Error handling and coding
12.1 Setting of the environment variable "error code"
12.2 User notification of the execution
12.3 Error coding
13 Tag Values
Annex A (informative): Terminal Response Handler Flow Charts
Annex B (informative): Example of Accessing USAT Interpreter
Functionality in Wireless Mark-up Language
B.1 Introduction
B.2 Namespace
B.3 WML
B.4 Implicit calls using WML syntax
B.5 Explicit calls using WML syntax
B.6 Access to Special Features
B.7 References
Annex C (informative): Terminal Response Handler Modifier
examples
C.1 Replace Operation
C.2 Add/Append Operation
C.3 Remove Operation
C.4 Restore Operation
C.5 Special case: Empty text for user notification
C.6 Special case: No text for user notification
C.7 Special case: Modify a single exception case
Annex D (normative): PKI Plug-ins Implementation Specification
D.1 P7
D.2 FP
D.3 AD
D.4 Non-functional Requirements
Annex E (normative): PIN Management Plug-ins Implementation
Specification
E.1 CP
E.2 RP
E.3 Non-functional Requirements
Annex F (normative): Triple DES Plug-ins Implementation
Specification
F.1 DE
F.2 DD
F.3 DS
F.4 DU
F.5 Non-functional Requirements
Annex G (informative): Change History
History
Defines the byte codes that are recognised by an USAT Interpreter. The byte codes primary purpose is to provide efficient programmatic access to the SIM Application Toolkit commands.
Committee |
3GPP CT 6
|
DocumentType |
Standard
|
Pages |
136
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
ISO/IEC 7816-6:2016 | Identification cards — Integrated circuit cards — Part 6: Interindustry data elements for interchange |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.