ETSI TS 102 223

ETSI TS 102 223
ETSI TS 102 223 English PDF Smart cards; Card Application Toolkit (CAT) (Release 4)

standard published 07/01/2001 by European Telecommunications Standards Institute

More details

Download

PDF AVAILABLE FORMATS IMMEDIATE DOWNLOAD
$43.45 tax incl.

$101.05 tax incl.

(price reduced by 57 %)

1000 items in stock

Full Description

The present document defines the interface between the UICC and the Terminal, and mandatory Terminal procedures, specifically for NAA Card Application Toolkit. The CAT is a set of generic commands and procedures for use by the ICC, irrespective of the access technology of the network. Within the scope of this document, the UICC refers here to a ICC which support at least one application in order to access a network. This application is called here Network Access Application (NAA). The ICC is considered as a platform, which is either based on TS 102 221, here called 3G platform, or TS 151 011, here called 2G platform. NAA can be: -a USIM application, as defined in TS 131 102, which can reside only on a 3G platform, -a SIM application, as defined in TS 151 011, which can reside either on a 3G or a 2G platform, -a TSIM application, as defined in TS 100 812 Part 2, which can reside only on a 3G platform, -a RUIM application, as defined in TIA / IS -820, 3GPP2 C.S0023-0, which can reside on a 2G platform, -or other applications residing on a 3G platform or a 2G platform. Specifying the interface is to ensure interoperability between a ICC and a Terminal independently of the respective manufacturers and operators. These document specifies as well mechanisms in order to expand the generic set of commands and procedures by access technology specific ones. The present document defines: -the commands; -the application protocol; -the mandatory requirements on the ICC and Terminal for each procedure. The present document does not specify any aspects related to the administrative management phase. Any internal technical realization of either the ICC or the Terminal are only specified where these reflect over the interface. The present document does not specify any of the security algorithms that may be used.

Contact us