Interoperability Stepping Stones

Interoperability Stepping Stones

Interoperability Stepping Stones Release 6 Published by now Trusted Connectivity Alliance Interoperability Stepping Stones Figure index .......................................................................................................... 8 1 Introduction .................................................................................................... 9 2 Reference Documentation............................................................................. 10 3 Abbreviations................................................................................................. 11 4 Definitions ..................................................................................................... 13 5 Release 6: the standard evolution ................................................................ 14 5.1.1 UICC physical/logical characteristics......................................................................................................14 5.1.2 UICC OTA ............................................................................................................................................15 5.1.3 UICC Toolkit.........................................................................................................................................16 5.1.4 UICC JAVA Card ...................................................................................................................................17 6 The UICC Architecture................................................................................... 19 6.1 Definition of UICC ............................................................................................. 19 6.2 Application selection......................................................................................... 19 6.3 File system........................................................................................................ 20 6.3.1 Security architecture ............................................................................................................................20 6.3.2 Referencing a EF ARR record: the Referenced Format...............................................................................21 6.3.3 Structure of the EF ARR file......................................................................................................................21 6.4 PIN in the UICC................................................................................................. 23 6.4.1 Security Environments in the UICC .......................................................................................................23 6.4.2 Retrieving information about a file: the FCP template............................................................................24 6.4.3 Files Life Cycle Status...........................................................................................................................25 6.5 Mapped files...................................................................................................... 26 7 Java Card Features ........................................................................................ 27 7.1 Java Card Language: a Subset of Java Language ............................................. 27 7.2 Backward Compatibility.................................................................................... 27 7.3 The Java Card Runtime Environment................................................................ 27 7.3.1 Atomicity and Transactions...................................................................................................................27 7.3.2 Security Concept and Firewalls .............................................................................................................28 7.3.3 Entry Point Objects ..............................................................................................................................29 7.3.4 Global Arrays .......................................................................................................................................30 7.4 The Java Card VM.............................................................................................. 30 7.4.1 Summary of Java Card Language Limitations ........................................................................................30 Summary of Java Card VM Constraints.................................................................................................................30 7.5 Development tools............................................................................................ 31 7.5.1 Converter.............................................................................................................................................31 7.5.2 Verifier.................................................................................................................................................31 7.6 The Java Card API............................................................................................. 31 java.lang ........................................................................................................................................................32 javacard.framework ......................................................................................................................................32 javacard.framework.service .....................................................................................................................33 javacard.security ........................................................................................................................................34 javacardx.crypto ..........................................................................................................................................34 java.rmi ..........................................................................................................................................................34 Release 6 Version 1.00 Page 2 Interoperability Stepping Stones 7.7 New JC 2.2.1 Features ...................................................................................... 34 7.7.1 Logical Channels ..................................................................................................................................35 7.7.2 Applet and Package deletion.................................................................................................................35 7.7.3 Java Card Remote Method Invocation (JCRMI)......................................................................................36 7.8 Managing Memory and Objects......................................................................... 38 7.8.1 Garbage collector:................................................................................................................................39 7.9 Java Card Technology Compatibility Kit............................................................ 39 7.10 Overview of Versions needed for basic interoperability................................. 39 8 Card Application Toolkit (CAT) - USIM Application Toolkit (USAT) .............. 40 8.1 Scope ................................................................................................................ 40 8.2 CAT commands ................................................................................................. 40 8.3 What is a CAT session? ..................................................................................... 40 8.4 What is a proactive session?............................................................................. 41 9 (U)SIM and UICC API description ................................................................. 42 9.1 Scope ................................................................................................................ 42 9.2 Toolkit API and CAT Runtime Environment ...................................................... 42 9.2.1 The CAT Runtime Environment.............................................................................................................42 9.2.2 Toolkit applet .......................................................................................................................................42 9.3 Terminal Profile ................................................................................................ 46 9.4 Envelope management ..................................................................................... 46 9.4.1 Envelope management.........................................................................................................................46 9.4.2 EnvelopeResponseHandler management for the EVENT_FORMATTED_SMS_PP_ENV event ....................47 9.4.3 EnvelopeResponseHandler management for the events EVENT_CALL_CONTROL_BY_NAA or EVENT_MO_SHORT_MESSAGE_ CONTROL_BY_NAA_SMS_PP_ENV ......................................................................47 9.4.4 Details .................................................................................................................................................48 9.5 Event management ........................................................................................... 48 9.5.1 Overview .............................................................................................................................................48 9.5.2 List of the available Events ...................................................................................................................49 9.5.3 Events Description................................................................................................................................50

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    149 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us