8.19 Secure control command +CSCC

27.0073GPPAT command set for User Equipment (UE)Release 18TS

Table 79: +CSCC parameter command syntax

Command

Possible response(s)

+CSCC=<mode>[,<cmd_set>[,<token>]]

+CSCC: <challenge>

+CME ERROR: <err>

+CSCC?

+CSCC: <mode>,<cmd_set1>

[<CR><LF>+CSCC: <mode>,<cmd_set2>

[…]]

+CME ERROR: <err>

+CSCC=?

+CSCC: (list of supported <mode>s),(list of supported <cmd_set>s)

Description

This command is used to enable/disable access to commands protected by security mechanism. This enables/disables access to command sets designated as "secure" such as programming of MT. Refer clause 9.2 for possible <err> values.

The TE asks for a <challenge> with <mode>=1 and one specific command set (<cmd_set>), the MT replies with the <challenge>, which should be inserted into the identification algorithm in both entities (TE and MT). The algorithm output <token> is sent to the MT with <mode>=2 to enable the specified command set. <mode>=3 is used to disable the command set.

The read command returns the status (<mode> 2 or 3) of each supported command set.

Test command returns the values supported as compound values.

Defined values

<mode>: integer type

1 request challenge token to enable access to specified command set

2 enable access to specified command set (<token> required)

3 disable access to specified command set

<cmd_set>, <cmd_set1>, <cmd_set2>:

0 MT/TA code re-programming command set.

other values below 128 are reserved by the present document.

<token>: string type; a variable length bit string represented with IRA characters 0 – 9 and A – F, each character representing a nibble; e.g. bit string "0110 1100 1001 1010" is represented by the IRA string "6C9A". The length of the required bit string varies depending on the value of <cmd_set>.

<challenge>: same format as token

Implementation

Optional.