8.19 Secure control command +CSCC
27.0073GPPAT command set for User Equipment (UE)Release 18TS
Table 79: +CSCC parameter command syntax
Command |
Possible response(s) |
+CSCC=<mode>[,<cmd_set>[,<token>]] |
+CSCC: <challenge> +CME ERROR: <err> |
+CSCC? |
+CSCC: <mode>,<cmd_set1> [<CR><LF>+CSCC: <mode>,<cmd_set2> […]] +CME ERROR: <err> |
+CSCC=? |
+CSCC: (list of supported <mode>s),(list of supported <cmd_set>s) |
Description
This command is used to enable/disable access to commands protected by security mechanism. This enables/disables access to command sets designated as "secure" such as programming of MT. Refer clause 9.2 for possible <err> values.
The TE asks for a <challenge> with <mode>=1 and one specific command set (<cmd_set>), the MT replies with the <challenge>, which should be inserted into the identification algorithm in both entities (TE and MT). The algorithm output <token> is sent to the MT with <mode>=2 to enable the specified command set. <mode>=3 is used to disable the command set.
The read command returns the status (<mode> 2 or 3) of each supported command set.
Test command returns the values supported as compound values.
Defined values
<mode>: integer type
1 request challenge token to enable access to specified command set
2 enable access to specified command set (<token> required)
3 disable access to specified command set
<cmd_set>, <cmd_set1>, <cmd_set2>:
0 MT/TA code re-programming command set.
other values below 128 are reserved by the present document.
<token>: string type; a variable length bit string represented with IRA characters 0 – 9 and A – F, each character representing a nibble; e.g. bit string "0110 1100 1001 1010" is represented by the IRA string "6C9A". The length of the required bit string varies depending on the value of <cmd_set>.
<challenge>: same format as token
Implementation
Optional.