3 Definitions, symbols, abbreviations and coding conventions

31.1023GPPCharacteristics of the Universal Subscriber Identity Module (USIM) applicationRelease 17TS

3.1 Definitions

For the purposes of the present document, the following definition applies.

ADM: access condition to an EF which is under the control of the authority which creates this file.

Allocation of these levels and the respective requirements for their fulfilment are the responsibility of the appropriate administrative authority

The definition of access condition ADM does not preclude the administrative authority from using ALW, PIN, PIN2 and NEV if required.

A terminal does not need to evaluate access conditions indicated as ADM in the present document.

PIN/ADM: A terminal is required to evaluate the access condition and verify it in order to access the EF if the access condition is set to PIN or PIN2.

EHPLMN: represents the Equivalent HPLMNs for network selection purposes. The behaviour of EHPLMNs is defined in TS 23.122 [31].

3.2 Symbols

For the purposes of the present document, the following symbols apply:

|| Concatenation

⊕ Exclusive OR

f1 Message authentication function used to compute MAC

f1* A message authentication code (MAC) function with the property that no valuable information can be inferred from the function values of f1* about those of f1, …, f5 and vice versa

f2 Message authentication function used to compute RES and XRES

f3 Key generating function used to compute CK

f4 Key generating function used to compute IK

f5 Key generating function used to compute AK

3.3 Abbreviations

For the purposes of the present document, the following abbreviations apply:

3GPP 3rd Generation Partnership Project

5GCN 5G Core Network

AC Access Condition

ACDC Application specific Congestion control for Data Communication

ACL APN Control List

ADF Application Dedicated File

AID Application Identifier

AK Anonymity key

ALW ALWays

AMF Authentication Management Field

AoC Advice of Charge

APN Access Point Name

ASME Access Security Management Entity

ASN.1 Abstract Syntax Notation One

AuC Authentication Centre

AUTN Authentication token

BDN Barred Dialling Number

BER-TLV Basic Encoding Rule – TLV

B-TID Bootstrapping Transaction Identifier

CAG Closed Access Group

CCP Capability Configuration Parameter

CK Cipher key

CLI Calling Line Identifier

CNL Co-operative Network List

CPBCCH COMPACT Packet BCCH

CS Circuit switched

DCK Depersonalisation Control Keys

DF Dedicated File

DO Data Object

EC-GSM-IoT Extended coverage in GSM for IoT

DUCK Discovery User Confidentiality Key

DUIK Discovery User Integrity Key

DUSK Discovery User Scrambling Key

eDRX Extended Discontinuous Reception

EARFCN Evolved Absolute Radio Frequency Channel Number

EF Elementary File

EPC Evolved Packet Core

ePDG Evolved Packet Data Gateway

EPS Evolved Packet System

FCP File Control Parameters

FFS For Further Study

FQDN Full Qualified Domain Name

GCI Global Cable Identifier

GLI Global Line Identifier

GSM Global System for Mobile communications

HE Home Environment

HNB Home NodeB

HeNB Home eNodeB

IARI IMS Application Reference Identifier

ICC Integrated Circuit Card

ICE In Case of Emergency

ICI Incoming Call Information

ICT Incoming Call Timer

ID Identifier

Idi Identity of the initiator

Idr Identity of the responder

IEI Information Element Identifier

IK Integrity key

IMSI International Mobile Subscriber Identity

IOPS Isolated E-UTRAN Operation for Public Safety

K USIM Individual key

KC Cryptographic key used by the cipher A5

KSI Key Set Identifier

LI Language Indication

LSA Localised Service Areas

LSB Least Significant Bit

MAC Message authentication code

MAC-A MAC used for authentication and key agreement

MAC-I MAC used for data integrity of signalling messages

MBMS Multimedia Broadcast/Multicast Service

MCC Mobile Country Code

MCData Mission Critical Data

MCPTT Mission Critical Push To Talk

MCS Mission Critical Services

MCVideo Mission Critical Video

MexE Mobile Execution Environment

MF Master File

MGV-F MTK Generation and Validation Function

MICO Mobile Initiated Connection Only

MiD Multi-iDentity

MIKEY Multimedia Internet KEYing

MINT Minimization of Service Interruption

MM Multimedia Message

MMI Man Machine Interface

MMS Multimedia Messaging Service

MMSS MultiMode System Selection

MNC Mobile Network Code

MODE Indication packet switched/circuit switched mode

MSB Most Significant Bit

MSK MBMS Service Key

MTC Machine Type Communications

MTK MBMS Traffic Key

MuD Multi-Device

MUK MBMS User Key

NAI Network Access Identifier

NB-IoT Narrowband IoT

NEV NEVer

ngKSI Key Set Identifier in 5G

NG-RAN Next Generation Radio Access Network

NPI Numbering Plan Identifier

NSI Network Specific Identifier

NSWO Non-Seamless WLAN Offload

OCI Outgoing Call Information

OCT Outgoing Call Timer

PBID Phonebook Identifier

PGK ProSe Group Key

PIN Personal Identification Number

PL Preferred Languages

PS Packet switched

PSDK Public Safety Discovery Key

PS_DO PIN Status Data Object

PSM Power Saving Mode

PTK ProSe Traffic Key

RAND Random challenge

RANDMS Random challenge stored in the USIM

RES User response

RFU Reserved for Future Use

RLOS Restricted Local Operator Services

RST Reset

SDN Service dialling number

SE Security Environment

SEQp Sequence number for MGV-F stored in the USIM

SFI Short EF Identifier

SGSN Serving GPRS Support Node

SN Serving Network

SNPN Standalone Non-Public Network

SoLSA Support of Localised Service Areas

SOR-CMCI Steering of roaming connected mode control information

SQN Sequence number

SRES Signed RESponse calculated by a USIM

SUCI Subscription Concealed Identifier

SUPI Subscription Permanent Identifier

SW Status Word

TLV Tag Length Value

TMGI Temporary Mobile Group Identity

TV Television

UAC Unified Access Control

URSP UE Route Selection Policy

USAT USIM Application Toolkit

USD User Service Description

USIM Universal Subscriber Identity Module

V2X Vehicle-to-Everything

VLR Visitor Location Register

WLAN Wireless Local Area Network

WSID WLAN Specific Identifier

XRES Expected user RESponse

3.4 Coding Conventions

The following coding conventions apply to the present document.

All lengths are presented in bytes, unless otherwise stated. Each byte is represented by bits b8 to b1, where b8 is the most significant bit (MSB) and b1 is the least significant bit (LSB). In each representation, the leftmost bit is the MSB.

The coding of Data Objects in the present document is according to TS 31.101 [11].

‘XX’: Single quotes indicate hexadecimal values. Valid elements for hexadecimal values are the numbers ‘0’ to ‘9’ and ‘A’ to ‘F’.