4.4.11 Contents of files at the DF5GS level
31.1023GPPCharacteristics of the Universal Subscriber Identity Module (USIM) applicationRelease 17TS
4.4.11.1 Introduction
This clause describes the files that are specific for 5GS.
DF5GS shall be present at the ADFUSIM level if any of the following services are "available" in EFUST (USIM Service Table):
Service n°122 |
5GS Mobility Management Information |
Service n°123 |
5G Security Parameters |
Service n°124 |
Subscription identifier privacy support |
Service n°125 |
SUCI calculation by the USIM |
Service n°126 |
UAC Access Identities support |
Service n°127 |
Control plane-based steering of UE in VPLMN |
Service n°128 |
Call control on PDU Session by USIM |
Service n°129 |
5GS Operator PLMN List |
Service n°130 |
Support for SUPI of type NSI or GLI or GCI |
Service n°132 |
Support for URSP by USIM |
Service n°133 |
5G Security Parameters extended |
Service n°134 |
MuD and MiD configuration data |
Service n°135 |
Support for Trusted non-3GPP access networks by USIM |
Service n°136 |
Support for multiple records of NAS security context storage for multiple registration |
Service n°137 |
Pre-configured CAG information list |
Service n°138 |
SOR-CMCI storage in USIM |
Service n°140 |
Storage of disaster roaming information in USIM |
Service n°141 |
Pre-configured eDRX parameters |
Service n°142 |
5G NSWO support |
Service n°144 |
Multiplier Coefficient for Higher Priority PLMN search via NG-RAN satellite access |
Service n°145 |
KAUSF derivation configuration |
4.4.11.2 EF5GS3GPPLOCI (5GS 3GPP location information)
If service n°122 is "available" in EFUST, this file shall be present.
This EF contains the following 5GS location information for 3GPP access:
‑ 5G-Globally Unique Temporary Identifier (5G-GUTI);
‑ Last visited registered Tracking Area Identity in 5GS (TAI);
‑ 5GS update status.
Identifier: ‘4F01’ |
Structure: transparent |
Optional |
||||
SFI: ’01’ |
||||||
File size: 20 bytes |
Update activity: high |
|||||
Access Conditions: READ PIN UPDATE PIN DEACTIVATE ADM ACTIVATE ADM |
||||||
Bytes |
Description |
M/O |
Length |
|||
1 to 13 |
5G-GUTI for 3GPP access |
M |
13 bytes |
|||
14 to19 |
Last visited registered TAI in 5GS for 3GPP access |
M |
6 bytes |
|||
20 |
5GS update status for 3GPP access |
M |
1 byte |
‑ 5G-GUTI for 3GPP access.
Contents:
5G-Globally Unique Temporary Identifier for 3GPP access.
Coding:
as the 5G-GUTI part of the 5GS mobile identity information element defined in TS 24.501 [104]. Byte 1 corresponds to "octet 2" of an 5GS mobile identity information element containing a 5G-GUTI. Byte 13 corresponds to "octet 14" of an 5GS mobile identity information element information element containing a 5G-GUTI.
Byte 1: first byte of 5G-GUTI for 3GPP access
b8 |
b7 |
b6 |
b5 |
b4 |
b3 |
b2 |
b1 |
|||||||||||
MSB |
‑ Last visited registered TAI in 5GS for 3GPP access
Contents:
Last visited registered Tracking Area Identity in 5GS for 3GPP access.
Coding:
as the content of the tracking area identity information element defined in TS 24.501 [104]. Byte 14 corresponds to "octet 2" of a tracking area identity information element. Byte 19 corresponds to "octet 7" of a tracking area identity information element.
Byte 14: first byte of last visited registered TAI for 3GPP access
b8 |
b7 |
b6 |
b5 |
b4 |
b3 |
b2 |
b1 |
|||||||||||
MSB |
‑ 5GS update status for 3GPP access.
Contents:
status of 5GS update for 3GPP access according to TS 24.501 [104].
Coding:
byte 20:
Bits: b3 b2 b1.
0 0 0 : 5U1 UPDATED.
0 0 1 : 5U2 NOT UPDATED.
0 1 0 : 5U3 ROAMING NOT ALLOWED.
0 1 1 : reserved.
1 0 0 : reserved.
1 0 1 : reserved.
1 1 0 : reserved.
1 1 1 : reserved.
Bits b4 to b8 are RFU (see TS 31.101 [11]).
Unused bytes shall be set to ‘FF’.
4.4.11.3 EF5GSN3GPPLOCI (5GS non-3GPP location information)
If service n°122 is "available" in EFUST, this file shall be present.
This EF contains the following 5GS location information for non-3GPP access:
‑ 5G-Globally Unique Temporary Identifier (5G-GUTI);
‑ Last visited registered Tracking Area Identity in 5GS (TAI);
‑ 5GS update status.
Identifier: ‘4F02’ |
Structure: transparent |
Optional |
||||
SFI: ’02’ |
||||||
File size: 20 bytes |
Update activity: high |
|||||
Access Conditions: READ PIN UPDATE PIN DEACTIVATE ADM ACTIVATE ADM |
||||||
Bytes |
Description |
M/O |
Length |
|||
1 to 13 |
5G-GUTI for non-3GPP access |
M |
13 bytes |
|||
14 to19 |
Last visited registered TAI in 5GS for non-3GPP access |
M |
6 bytes |
|||
20 |
5GS update status for non-3GPP access |
M |
1 byte |
For content and coding see clause 4.4.11.2 for EF5GS3GPPLOCI.
4.4.11.4 EF5GS3GPPNSC (5GS 3GPP Access NAS Security Context)
If service n°122 is "available" in EFUST, this file shall be present.
This EF contains the 5GS 3GPP access NAS security context as defined in TS 24.501 [104], consisting of KAMF with the associated key set identifier, the UE security capabilities, and the uplink and downlink NAS COUNT values. This EF also contains the EPS NAS security algorithms to be used when the UE goes to EPS, either by means of connected mode handover in a network that supports N26 interface, or by the means of idle mode mobility performed by the UE from 5GS to EPS, as specified in TS 33.501 [105]. This file shall contain one record.
If Service n°136 is not "available" in EFUST, the file shall contain one record.
If service n°136 is "available" in EFUST, the file shall contain two records. As specified in TS 33.501 [105] clause 6.3.2.1, in case of multiple registrations in different PLMNs, each record shall store 5GS 3GPP access NAS security context for each different PLMN (Refer to Annex O for examples),
Identifier: ‘4F03’ |
Structure: linear fixed |
Optional |
||||
SFI: ’03’ |
||||||
Record size: X bytes (X≥57) |
Update activity: high |
|||||
Access Conditions: READ PIN UPDATE PIN DEACTIVATE ADM ACTIVATE ADM |
||||||
Bytes |
Description |
M/O |
Length |
|||
1 to X |
5GS NAS Security Context TLV Object |
M |
X bytes |
5GS NAS Security Context tags
Description |
Tag Value |
5GS NAS Security Context Tag |
‘A0’ |
5GS NAS Security Context information
Description |
Value |
M/O |
Length (bytes) |
5GS NAS Security Context Tag |
‘A0’ |
M |
1 |
Length (length of all subsequent data) |
Y |
M |
Note 1 |
ngKSI Tag |
’80’ |
M |
1 |
Length |
K |
M |
Note 1 |
ngKSI |
— |
M |
K |
KAMF Tag |
’81’ |
M |
1 |
Length |
L |
M |
Note 1 |
KAMF |
— |
M |
L |
Uplink NAS count Tag |
’82’ |
M |
1 |
Length |
M |
M |
Note 1 |
Uplink NAS count |
— |
M |
M |
Downlink NAS count Tag |
’83’ |
M |
1 |
Length |
N |
M |
Note 1 |
Downlink NAS count |
— |
M |
N |
Identifiers of selected NAS integrity and encryption algorithms Tag |
’84’ |
M |
1 |
Length |
S |
M |
Note 1 |
Identifiers of selected NAS integrity and encryption algorithms |
— |
M |
S |
Identifiers of selected EPS NAS integrity and encryption algorithms for use after mobility to EPS Tag |
’85’ |
M |
1 |
Length |
U |
M |
Note 1 |
Identifiers of selected EPS NAS integrity and encryption algorithms for use after mobility to EPS |
— |
M |
U |
PLMN identifier tag |
’86’ |
C (see Note 2) |
1 |
Length |
3 |
C (see Note 2) |
Note 1 |
PLMN identifier |
— |
C (see Note 2) |
3 |
Note 1: The length is coded according to ISO/IEC 8825-1 [35] Note 2: If service n°136 is "available", PLMN identifier shall be included to identify the PLMN of the 5GS NAS Security Context stored in record 2 for the access. The PLMN identifier is not applicable for record 1 and is mandatory for record 2. |
– ngKSI Tag ’80’
Contents:
The ngKSI (Key Set Identifier in 5G) as defined in TS 33.501 [105] is coded on 1 byte.
Coding:
b8 |
b7 |
b6 |
b5 |
b4 |
b3 |
b2 |
b1 |
||||||||||||
ngKSI |
|||||||||||||||||||
bits b4 to b8 are coded 0 |
– KAMF Tag ’81’
Contents:
The KAMF as defined in TS 33.501 [105] is coded on 32 bytes. The ME shall treat any KAMF values stored in this EF as invalid if the ngKSI indicates that no KAMF is available or if the length indicated in the KAMF TLV is set to ’00’,
Coding:
The most significant bit of KAMF is the most significant bit of the 1st byte of this TLV value field. The least significant bit of KAMF is the least significant bit of the last byte of this TLV value field.
– Uplink NAS count Tag ’82’
Contents:
The uplink NAS count as defined in TS 33.501 [105] is coded on 4 bytes.
Coding:
The most significant bit of the uplink NAS count is the most significant bit of the 1st byte of this TLV value field. The least significant bit of the uplink NAS count is the least significant bit of the last byte of this TLV value field.
– Downlink NAS count Tag ’83’
Contents:
The downlink NAS count as defined in TS 33.501 [105] is coded on 4 bytes.
Coding:
The most significant bit of the downlink NAS count is the most significant bit of the 1st byte of this TLV value field. The least significant bit of the downlink NAS count is the least significant bit of the last byte of this TLV value field.
– Identifiers of selected NAS integrity and encryption algorithms Tag ’84’
Contents:
The identifiers of selected NAS integrity and encryption algorithms as defined in TS 33.501 [105] and TS 24.501 [104]. In this release the identifiers of selected NAS integrity and encryption algorithms are coded as 4-bit identifiers.
Coding:
Coding is same as the content of the NAS security algorithms information element defined in TS 24.501 [104].
Byte 1 of this TLV value field: first byte of the value part of the NAS security algorithms information element
b8 |
b7 |
b6 |
b5 |
b4 |
b3 |
b2 |
b1 |
|||||||||||
MSB |
– Identifiers of selected EPS NAS algorithms for use after mobility to EPS Tag ’85’
Contents:
The identifiers of selected EPS NAS integrity and encryption algorithms to be used when the UE goes to EPS, either by means of connected mode handover in a network that supports N26 interface, or by the means of idle mode mobility performed by the UE from 5GS to EPS, as specified in TS 33.501 [105] and TS 24.501 [104]. These identifiers are coded as 4-bit identifiers.
Coding:
Coding is same as the content of the EPS NAS security algorithms information element specified in TS 24.301 [51].
Byte 1 of this TLV value field: first byte of the value part of the EPS NAS security algorithms information element in TS 24.301 [51].
b8 |
b7 |
b6 |
b5 |
b4 |
b3 |
b2 |
b1 |
|||||||||||
MSB |
– PLMN identifier Tag ’86’
Contents:
The PLMN identifier comprising MCC and MNC defined in TS 23.003 [25] is coded on 3 bytes.
Coding:
The PLMN identifier is coded according to TS 24.008 [9].
Unused bytes shall be set to ‘FF’.
In order to mark the stored 5GS NAS security context as invalid:
– the record bytes shall be set to ‘FF’, or
– the ngKSI is set to ’07’, or
– the length indicated in the KAMF TLV is set to ’00’.
4.4.11.5 EF5GSN3GPPNSC (5GS non-3GPP Access NAS Security Context)
If Service n°122 is "available" in EFUST, this file shall be present.
This EF contains the 5GS non-3GPP access NAS security context as defined in TS 24.501 [104], consisting of KAMF with the associated key set identifier, the UE security capabilities, and the uplink and downlink NAS COUNT values. This EF also contains the EPS NAS security algorithms to be used when the UE goes to EPS, either by means of connected mode handover in a network that supports N26 interface, or by the means of idle mode mobility performed by the UE from 5GS to EPS, as specified in TS 33.501 [105]. .
If Service n°136 is not "available" in EFUST, the file shall contain one record.
If service n°136 is "available" in EFUST, the file shall contain two records. As specified in TS 33.501 [105] clause 6.3.2.1, in case of multiple registrations in different PLMNs, each record shall store 5GS non-3GPP access NAS security context for each different PLMN (Refer to Annex O for examples).
Identifier: ‘4F04’ |
Structure: linear fixed |
Optional |
||||
SFI: ’04’ |
||||||
Record size: X bytes (X≥57) |
Update activity: high |
|||||
Access Conditions: READ PIN UPDATE PIN DEACTIVATE ADM ACTIVATE ADM |
||||||
Bytes |
Description |
M/O |
Length |
|||
1 to X |
5GS NAS Security Context TLV Object |
M |
X bytes |
For content and coding see clause 4.4.11.4 for EF5GS3GPPNSC.
4.4.11.6 EF5GAUTHKEYS (5G authentication keys)
If Service n°123 is "available" in EFUST, this file shall be present. This EF contains KSEAF for 3GPP access and the KAUSF that are generated on the ME using CK and IK as part of AKA procedures as described in TS 33.501 [105].
If Service n°133 is not "available" in EFUST, the file size is at least 68 bytes.
If Service n°133 is also "available" in EFUST, this EF additionally contains KSEAF for non-3GPP access, SOR counter and UE parameter update counter and the file size is at least 110 bytes.
Identifier: ‘4F05’ |
Structure: transparent |
Optional |
||||
SFI: ’05’ |
||||||
File size: >= 68 or 110 bytes |
Update activity: high |
|||||
Access Conditions: READ PIN UPDATE PIN DEACTIVATE ADM ACTIVATE ADM |
||||||
Description |
Value |
M/O |
Length |
|||
KAUSF Tag |
’80’ |
M |
1 |
|||
Length |
K (Note2) |
M |
Note1 |
|||
KAUSF |
— |
M |
K (Note2) |
|||
KSEAF for 3GPP access Tag |
’81’ |
M |
1 |
|||
Length |
L (Note2) |
M |
Note1 |
|||
KSEAF for 3GPP access |
— |
M |
L (Note2) |
|||
KSEAF for non-3GPP access Tag |
’82’ |
C |
1 |
|||
Length |
M (Note2) |
C |
Note1 |
|||
KSEAF for non-3GPP access |
— |
C |
M (Note2) |
|||
SOR counter Tag |
’83’ |
C |
1 |
|||
Length |
N |
C |
Note 1 |
|||
SOR counter |
— |
C |
N (Note 3) |
|||
UE parameter update counter Tag |
’84’ |
C |
1 |
|||
Length |
O |
C |
Note 1 |
|||
UE parameter update counter |
— |
C |
O (Note 3) |
|||
Note 1: The length is coded according to ISO/IEC 8825-1 [35] |
||||||
Note 2: As per TS 33.501 [105], the length of keys KAUSF and KSEAF is 32 bytes each |
||||||
Note 3: As per TS 33.501 [105], the length of SOR counter and UE parameter update counter is 2 bytes each |
‑ KAUSF Tag ’80’.
Contents:
– KAUSF as described in TS 33.501[105]).
Coding:
– The most significant bit of KAUSF is the most significant bit of the 1st byte of this TLV value field. The least significant bit of KAUSF is the least significant bit of the last byte of this TLV value field.
‑ KSEAF for 3GPP access Tag ’81’.
Contents:
– KSEAF for 3GPP access as described in TS 33.501[105]. If there is no valid KSEAF for 3GPP access, the contents (Value part of the TLV) shall be ‘FF…FF’.
Coding:
– The most significant bit of KSEAF for 3GPP access is the most significant bit of the 1st byte of this TLV value field. The least significant bit of KSEAF for 3GPP access is the least significant bit of the last byte of this TLV value field.
‑ KSEAF for non-3GPP access Tag ’82’.
Contents:
– KSEAF for non-3GPP access as specified in TS 33.501[105]. If there is no valid KSEAF for non-3GPP access, the contents (Value part of the TLV) shall be ‘FF…FF’.
Coding:
– The most significant bit of KSEAF for non-3GPP access is the most significant bit of the 1st byte of this TLV value field. The least significant bit of KSEAF for non-3GPP access is the least significant bit of the last byte of this TLV value field.
– SOR counter Tag ’83’
Contents:
– The SOR counter as defined in 3GPP TS 33.501 [105] clause 6.14.2.3. In this release the SOR counter is coded on 2 bytes. If there is no valid SOR counter, the contents (Value part of the TLV) shall be ‘FF…FF’.
Coding:
– The most significant bit of the SOR counter is the most significant bit of the 1st byte of this TLV value field. The least significant bit of the SOR counter is the least significant bit of the last byte of this TLV value field.
– UE parameter update counter Tag ’84’
Contents:
– The UE parameter update counter as defined in 3GPP TS 33.501 [105] clause 6.15.2.2. In this release the UE parameter update counter is coded on 2 bytes. If there is no valid UE parameter update counter, the contents (Value part of the TLV) shall be ‘FF…FF’.
Coding:
– The most significant bit of the UE parameter update counter is the most significant bit of the 1st byte of this TLV value field. The least significant bit of the UE parameter update counter is the least significant bit of the last byte of this TLV value field.
4.4.11.7 EFUAC_AIC (UAC Access Identities Configuration)
If service n°126 is "available" in EFUST, this file shall be present.
This EF contains the configuration information pertaining to access identities allocated for specific high priority services that can be used by the subscriber. The assigned access identities are used, in combination with an access category, to control the access attempts. For more information see TS 22.261 [106] and TS 24.501 [104].
Identifier: ‘4F06’ |
Structure: transparent |
Optional |
||||
SFI: ’06’ |
||||||
File size: 4 bytes |
Update activity: low |
|||||
Access Conditions: READ PIN UPDATE ADM DEACTIVATE ADM ACTIVATE ADM |
||||||
Bytes |
Description |
M/O |
Length |
|||
1 to 4 |
UAC access identities configuration |
M |
4 bytes |
‑ UAC access identities configuration
Contents:
‑ Configuration of certain Unified Access Control (UAC) access identities specified in TS 24.501 [104] clause 4.5.2.
Coding:
‑ Each access identity configuration is coded on one bit.
Byte 1:
b8 |
b7 |
b6 |
b5 |
b4 |
b3 |
b2 |
b1 |
||||||||||||
b1=0: UE is not configured for Multimedia Priority Service in the HPLMN,EHPLMN or a visited PLMN of the home country. b1=1: UE is configured for Multimedia Priority Service in the HPLMN,EHPLMN or a visited PLMN of the home country. |
|||||||||||||||||||
b2=0: UE is not configured for Mission Critical Services in the HPLMN,EHPLMN or a visited PLMN of the home country. b2=1: UE is configured for Mission Critical Services in the HPLMN,EHPLMN or a visited PLMN of the home country. |
|||||||||||||||||||
RFU |
Bytes 2 to 4:
Bits b1 to b8 are RFU.
NOTE 1: Access Identities 11 to 15 (as specified in TS 24.501 [104]) are configured as Access Classes 11 to 15 in EFACC, specified in clause 4.2.15.
NOTE 2: The home country is defined as the country to which user subscription is associated (e.g. the MCC part of the IMSI, see the definition in TS 24.301[51]).
4.4.11.8 EFSUCI_Calc_Info (Subscription Concealed Identifier Calculation Information EF)
If "SUCI calculation is to be performed by the ME" (i.e. service n°124 is "available" in EFUST and service n°125 is not "available" in EFUST), this file shall be present. This EF contains information needed by the ME for the support of subscription identifier privacy as defined in 3GPP TS 33.501[105].
If "SUCI calculation is to be performed by the USIM" (i.e. service n°124 is "available" in EFUST and service n°125 is "available" in EFUST), this file shall not be available to the ME.
If service n°124 is not "available" in EFUST, this file shall not be available to the ME.
Note: How the file is made "not available to the ME" is implementation specific, e.g. the file may not be present, the file may be present but not readable by the ME, or the file may be present but deactivated.
Identifier: ‘4F07’ |
Structure: transparent |
Optional |
||||
SFI: ’07’ |
||||||
File size: X bytes (X ≥ 2) |
Update activity: low |
|||||
Access Conditions: READ PIN UPDATE ADM DEACTIVATE ADM ACTIVATE ADM |
||||||
Bytes |
Description |
M/O |
Length |
|||
1 to Z |
Protection Scheme Identifier List data object |
M |
Z bytes |
|||
Z+1 to Y+Z |
Home Network Public Key List data object |
C |
Y bytes |
‑ Protection Scheme Identifier List data object.
Contents:
This data object shall always be present. If Protection Scheme Identifier List data object length is not zero, this data object contains a list of the Protection Scheme Identifier and the corresponding Key Index. The first Protection Scheme Identifier entry has the highest priority and the last Protection Scheme Identifier entry has the lowest priority. The Key Index value indicates the position of the Home Network Public Key in the Home Network Public Key List, that is applicable to the Protection Scheme.
Coding:
Description |
Value |
M/O/C |
Length (bytes) |
Protection Scheme Identifier List data object tag |
‘A0’ |
M |
1 |
Protection Scheme Identifier List data object length |
L1 |
M |
Note 1 |
Protection Scheme Identifier 1 (Highest priority) |
— |
O |
1 |
Key Index 1 |
— |
C (Note 2) |
1 |
Protection Scheme Identifier 2 |
— |
O |
1 |
Key Index 2 |
— |
C (Note 2) |
1 |
… |
… |
… |
… |
Protection Scheme Identifier N (Lowest priority) |
— |
O |
1 |
Key Index N |
— |
C (Note 2) |
1 |
Note 1: The length is coded according to ISO/IEC 8825-1 [35] Note 2: This field is present only if the corresponding Protection Scheme Identifier field is present |
The Protection Scheme Identifier represents a protection scheme as described in 3GPP TS 33.501 [105] and it is coded in one byte as follows:
b8 |
b7 |
b6 |
b5 |
b4 |
b3 |
b2 |
b1 |
||||||||||||
Protection Scheme identifier coded as described in 3GPP TS 24.501 [104] |
|||||||||||||||||||
RFU, bit = 0 |
The Key Index is coded in one byte such that its value indicates the position of the Home Network Public Key in the Home Network Public Key List data object, that is applicable to the Protection Scheme. A Key Index with a value of "1" refers to the first Network Public Key entry in the Home Network Public Key List, and so on. A Key Index with a value of "0" indicates that there is no Home Network Public Key associated with that Protection Scheme (e.g., in the case of null-scheme).
‑ Home Network Public Key List data object.
Contents:
This data object contains a list of the Home Network Public Key and the corresponding Home Network Public Key Identifier that shall be used by the ME to calculate the SUCI.
This data object may not be present if none of the protection scheme profiles identified by the Protection Scheme Identifiers included in the Protection Scheme Identifier List data object use the Home Network Public Key (e.g. null-scheme). If this data object is present, it shall contain at least one Home Network Public Key and the corresponding Home Network Public Key Identifier.
Coding:
Description |
Value |
M/O/C |
Length (bytes) |
Home Network Public Key List data object |
‘A1’ |
C |
1 |
Home Network Public Key List data object length |
L1 |
C |
Note 1 |
Home Network Public Key 1 Identifier tag |
’80’ |
C |
1 |
Home Network Public Key 1 Identifier length |
L2 |
C |
Note 1 |
Home Network Public Key 1 Identifier |
— |
C |
L2 |
Home Network Public Key 1 tag |
’81’ |
C |
1 |
Home Network Public Key 1 length |
L3 |
C |
Note 1 |
Home Network Public Key 1 |
— |
C |
L3 |
… |
… |
… |
… |
Home Network Public Key N Identifier tag |
’80’ |
O |
1 |
Home Network Public Key N Identifier length |
L4 |
O |
Note 1 |
Home Network Public Key N Identifier |
— |
O |
L4 |
Home Network Public Key N tag |
’81’ |
O |
1 |
Home Network Public Key N length |
L5 |
O |
Note 1 |
Home Network Public Key N |
— |
O |
L5 |
Note 1: The length is coded according to ISO/IEC 8825-1 [35] |
The Home Network Public Key Identifier may have any value in the range from 0 to 255 as described in 3GPP TS 23.003 [25] and it is coded in one byte as described in 3GPP TS 24.501 [104].
The Home Network Public Key is coded in hexadecimal digits as described in IETF RFC 7748 [108] (for Protection Scheme Profile A) and in IETF RFC 5480 [107] (for Protection scheme Profile B). The length of the Home Network Public Key depends on the Protection Scheme and the form of the Home Network Public Key (e.g. compressed or uncompressed).
4.4.11.9 EFOPL5G (5GS Operator PLMN List)
If service n°129 is "available", this file shall be present.
This EF contains a prioritised list of Tracking Area Identity (TAI) identities for NG-RAN that are used to associate a specific operator name contained in EFPNN or EFPNNI with the TAI. The ME shall use this EF in association with the EFPNN in place of any network name stored within the ME’s internal list and any network name received when registered to the PLMN, as defined by TS 24.501 [104]. The PLMN Network Name may also be provided in a graphical format in EFPNNI. The ME shall use the text format or the graphical format or both to display the service provider name according to the rules defined in clause 4.2.89.
Identifier: ‘4F08’ |
Structure: linear fixed |
Optional |
||||
SFI: ’08’ |
||||||
Record length: X bytes, (X ≥ 10) |
Update activity: low |
|||||
Access Conditions: READ ALWAYS UPDATE ADM DEACTIVATE ADM ACTIVATE ADM |
||||||
Bytes |
Description |
M/O |
Length |
|||
1 to 9 |
Tracking Area Identity |
M |
9 bytes |
|||
10 |
PLMN Network Name Record Identifier |
M |
1 byte |
– Tracking Area Identity
Contents:
Tracking Area Identity for NG-RAN, this comprises of the MCC, MNC and TAC
Coding:
PLMN: according to TS 24.501 [104]
A BCD value of ‘D’ in any of the MCC and/or MNC digits shall be used to indicate a "wild" value for that corresponding MCC/MNC digit
TAC: according to TS 24.501 [104]
Two values for the TAC are stored in order to allow a range of TAC values to be specified for a given PLMN. A value of ‘000000’ stored in bytes 4 to 6 and a value of ‘FFFFFE’ stored in bytes 7 to 9 shall be used to indicate the entire range of TACs for the given PLMN. In the case where only a single TAC value is to be specified then the value stored in bytes 4 to 6 shall be identical to the value stored in bytes 7 to 9 for the given PLMN. If a range of TAC values are to be specified, then the value stored in bytes 4 to 6 shall be the start of the TAC range and the value stored in bytes 7 to 9 shall be the end of the TAC range for the given PLMN.
– PLMN Network Name Record Identifier
Contents:
Identifier of operator name to be displayed
Coding:
A value of ’00’ indicates that the name is to be taken from other sources, see TS 22.101 [24]
A value in the range ’01’ to ‘FE’ indicates the record number in EFPNN that shall be displayed as the registered PLMN name. It also indicates the record number in EFPNNI that may be displayed as the registered PLMN name icon.
NOTE: The intent of this file is to provide exceptions to the other sources of a network name. Care should be taken not to introduce too many PLMN entries. An excessive number of entries could result in a longer initialisation period.
4.4.11.10 EFSUPI_NAI (SUPI as Network Access Identifier)
If service n°130 is "available", this file shall be present.
This EF contains the SUPI in NAI format consisting of a:
– network specific identifier(NSI), as specified in TS 23.003 [25], when SUPI type is NSI or
– Global Line Identifier (GLI), as specified in TS 23.003 [25] clause 28.15.2, when SUPI type is GLI or
– Global Cable Identifier (GCI), as specified in TS 23.003 [25] clause 28.16.2, when SUPI type is GCI,
The SUPI contained in this EF shall not be an IMSI.
Identifier: ‘4F09’ |
Structure: transparent |
Optional |
||||
SFI: ’09’ |
||||||
File size: Z bytes (Z ≥ X) |
Update activity: low |
|||||
Access Conditions: READ PIN UPDATE ADM DEACTIVATE ADM ACTIVATE ADM |
||||||
Bytes |
Description |
M/O |
Length |
|||
1 to X |
Network Access Identifier TLV data object |
M |
X bytes |
– Network Access Identifier TLV data object:
Contents:
– This data object contains the Subscription Permanent Identifier in NAI format consisting of a:
– network specific identifier (NSI) or
– Global Line Identifier (GLI) or
– Global Cable Identifier (GCI).
Coding:
When SUPI type is network specific identifier:
Description |
Value |
M/O |
Length (bytes) |
Network Specific Identifier Tag |
’80’ |
M |
1 |
Length |
L |
M |
Note |
Network Specific Identifier |
— |
M |
L |
Note: The length is coded according to ISO/IEC 8825-1 [35] |
The Network Specific Identifier in NAI format is a NAI constructed as specified in IETF RFC 7542 and encoded as UTF-8 string.
When SUPI type is Global Line Identifier:
Description |
Value |
M/O |
Length (bytes) |
Global Line Identifier Tag |
’81’ |
M |
1 |
Length |
L |
M |
Note |
Global Line Identifier |
— |
M |
L |
Note: The length is coded according to ISO/IEC 8825-1 [35] |
The Global Line Identifier as specified in TS 23.003 [25] clause 28.16.2.
When SUPI type is Global Cable Identifier (GCI):
Description |
Value |
M/O |
Length (bytes) |
Global Cable Identifier Tag |
’82’ |
M |
1 |
Length |
L |
M |
Note |
Global Cable Identifier |
— |
M |
L |
Note: The length is coded according to ISO/IEC 8825-1 [35] |
The Global Cable Identifier as specified in TS 23.003 [25] clause 28.15.2.
NOTE 1: The length is coded according to ISO/IEC 8825-1 [35]
4.4.11.11 EFRouting_Indicator (Routing Indicator EF)
If service n°124 is "available" in EFUST, this file shall be present. This EF contains Routing Indicator needed by the ME or by the USIM for SUCI calculation.
Identifier: ‘4F0A’ |
Structure: transparent |
Optional |
||||
SFI: ‘0A’ |
||||||
File size: 4 bytes |
Update activity: low |
|||||
Access Conditions: READ PIN UPDATE ADM DEACTIVATE ADM ACTIVATE ADM |
||||||
Bytes |
Description |
M/O |
Length |
|||
1 to 4 |
Routing Indicator |
M |
4 bytes |
‑ Routing Indicator
Contents:
This EF contains Routing Indicator that allows together with the MCC and MNC to route network signalling with SUCI to AUSF and UDM instances capable to serve the subscriber, as specified in 3GPP TS 23.003 [25].
Coding:
Bytes 1 to 2:
The Routing Indicator is coded in 2 bytes as specified in 3GPP TS 24.501 [104]. This EF shall contain at least one valid digit of Routing ID even if that only digit is set to 0 (which is the case when the HPLMN intends to not configure a valid Routing Indicator in the USIM), as specified in 3GPP TS 24.501 [104].
Bytes 3 to 4:
RFU.
4.4.11.12 EFURSP (URSP)
If service n°132 is "available" in EFUST, this file shall be present. This EF contains UE Route Selection Policies per PLMN. The format of the UE Route Selection Policies are specified in 3GPP TS 24.526 [109].
Identifier: ‘4F0B’ |
Structure: BER-TLV |
Optional |
||||
SFI: Optional |
||||||
File size: > (L0 + X1+X2+…+XN +L1+L2+…+LN + 3 x N) bytes |
Update activity: low |
|||||
Access Conditions: READ PIN UPDATE ADM DEACTIVATE ADM ACTIVATE ADM |
||||||
Bytes |
Description |
M/O |
Length |
|||
1 to L0 +1 +X1+X2+…+XN +L1+L2+…+LN + 3 x N |
URSP Rules data object |
O |
L0 +1 +X1+X2+…+XN +L1+L2+…+LN + 3 x N |
– URSP Rules data object coded as follows:
Description |
Value |
M/O |
Length |
URSP Rules data object tag |
’80’ |
O |
1 byte |
URSP Rules length |
X1+X2+…+XN +L1+L2+…+LN + 3 x N |
O |
L0 bytes (note) |
PLMN 1 |
O |
3 bytes |
|
Total length of URSP rules for PLMN 1 |
X1 |
O |
L1 bytes (note) |
UE Route Selection Policy rules for PLMN 1 |
O |
X1 bytes |
|
PLMN 2 |
O |
3 bytes |
|
Length of URSP rules for PLMN 2 |
X2 |
O |
L2 bytes (note) |
UE Route Selection Policy rules for PLMN 2 |
O |
X2 bytes |
|
… |
|||
PLMN N |
O |
3 bytes |
|
Length of URSP rules for PLMN N |
XN |
O |
LN bytes (note) |
UE Route Selection Policy rules for PLMN N |
O |
XN bytes |
|
Note: The length is coded according to ISO/IEC 8825-1 [35]. |
‑ PLMN
Contents:
– Mobile Country Code (MCC) followed by the Mobile Network Code (MNC).
Coding:
– According to TS 24.008 [9].
– Total length of URSP rules
Contents:
– This field contains the Total length of URSP rules for this PLMN.
Coding:
– The length is coded according to ISO/IEC 8825-1 [35].
– UE Route Selection Policy rules for this PLMN
Contents:
– UE Route Selection Policies used by the UE to determine how to route outgoing traffic.
Coding:
– The coding of the URSP rules is specified in clause 5.2 and URSP rule is encoded as shown in figures 5.2.1 to 5.2.4 and table 5.2.1 of 3GPP TS 24.526 [109].
4.4.11.13 EFTN3GPPSNN (Trusted non-3GPP Serving network names list)
If service n°135 is "available" in EFUST, this file shall be present.
This EF contains the coding for n Serving network name TLV data objects, n is determined by the operator.
This information is determined by the home network operator as specified in TS 33.501 [105] (see clause 7.1a).
Identifier: ‘4F0C’ |
Structure: transparent |
Optional |
||||
SFI: ‘0C ‘ |
||||||
File size: Z (>=1) bytes |
Update activity: low |
|||||
Access Conditions: READ PIN UPDATE ADM DEACTIVATE ADM ACTIVATE ADM |
||||||
Bytes |
Description |
M/O |
Length |
|||
1 |
Number of Serving network name TLV data objects (n) |
M |
1 |
|||
2 to X1+1 |
1st Serving network name TLV data object |
O |
X1 bytes |
|||
… |
||||||
2+X1+..+Xn-1 |
Nth Serving network name TLV data object |
O |
Xn bytes |
– Number of Serving network name TLV data objects
Contents:
– Number of TLV data objects coded in the file
– Serving network name TLV data object
Contents:
– This data object contains Serving network name for Trusted non-3GPP access network
Coding:
Description |
Value |
M/O/C |
Length (bytes) |
Serving network name tag |
’80’ |
M |
1 |
Length |
X |
M |
Note |
Serving network name |
— |
M |
X |
Note: The length is coded according to ISO/IEC 8825-1 [35] |
– The serving network name is defined as specified in TS 33.501 [105] (see clauses 6.1.1.4) and shall be encoded to an octet string according to UTF-8 encoding rules as specified in IETF RFC 3629 [48]
4.4.11.14 EFCAG (Pre-configured CAG information list EF)
If service n°137 is "available" in EFUST, this file shall be present. This EF contains a pre-configured CAG information list used by the ME as specified in 3GPP TS 23.122 [31] clause 3.8.
Identifier: ‘4F0D’ |
Structure: transparent |
Optional |
||||
SFI: ‘0D’ |
||||||
File size: Z (>=2) bytes |
Update activity: low |
|||||
Access Conditions: READ PIN UPDATE ADM DEACTIVATE ADM ACTIVATE ADM |
||||||
Bytes |
Description |
M/O |
Length |
|||
1 to 2 |
Length of CAG information list entries |
M |
2 |
|||
3 to 2+X1 |
1st CAG information list entry |
O |
X1 bytes |
|||
… |
||||||
3+X1+..+XN-1 to 2+X1+…+XN |
Nth CAG information list entry |
O |
XN bytes |
Length of CAG information list entries
Contents:
– Total length of all the CAG information list entries that follow
– CAG information list entry
Contents:
– Each CAG information list entry contains either:
i) an entry in the CAG information list , the coding of which is specified in 3GPP TS 24.501 [104] clause 9.11.3.18A, Figure 9.11.3.18A.2 and Table 9.11.3.18A.1;or
ii) an entry for HPLMN or EHPLMN including a CAG-ID range, the coding of which is as shown below.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Length of entry including a CAG-ID range contents |
octet 3+X1+…+Xm-1 |
|||||||
MCC digit 2 |
MCC digit 1 |
octet 4+X1+…+Xm-1 |
||||||
MNC digit 3 |
MCC digit 3 |
octet 5+X1+…+Xm-1 |
||||||
MNC digit 2 |
MNC digit 1 |
octet 6+X1+…+Xm-1 |
||||||
0 Spare |
0 Spare |
0 Spare |
0 Spare |
0 Spare |
0 Spare |
1 NOTE 1 |
CAG only |
octet 7+X1+…+Xm-1 |
CAG-ID range |
octet 8+X1+…+Xm-1 octet 15+X1+…+Xm-1 |
where:
a) MCC digits 1 to 3, MNC digits 1 to 3, and CAG only bit, are encoded as corresponding fields of an entry in the CAG information list; and
b) a CAG-ID range contains two CAG-IDs. The coding of the CAG-ID is defined as the CAG-Identifier in 3GPP TS 23.003 [25]. It shall be considered that all CAG-IDs in the CAG-ID range between the first CAG-ID and the second CAG-ID including the first and second CAG-IDs are allowed.
NOTE 1: Bit 2 in octet 7+X1+…+Xm-1 is set to ‘1’ to indicate a range of CAG ID’s see 3GPP TS 24.501 [104].
4.4.11.15 EFSOR-CMCI (Steering Of Roaming – Connected Mode Control Information)
If service n°138 is "available" in EFUST, this file shall be present.
This EF contains SOR-CMCI parameters as specified in 3GPP TS 24.501 [104]
Identifier: ‘4F0E’ |
Structure: transparent |
Optional |
||||
SFI: ‘0E’ |
||||||
File size: Z bytes (Z ≥ X) |
Update activity: low |
|||||
Access Conditions: READ PIN UPDATE ADM DEACTIVATE ADM ACTIVATE ADM |
||||||
Bytes |
Description |
M/O |
Length |
|||
1 to X |
SOR-CMCI data object |
O |
X bytes |
‑ SOR-CMCI data object
Coding of the SOR-CMCI data object
Length |
Description |
Coding |
Status |
1 |
SOR-CMCI data object tag |
‘80’ |
O |
1 to L (L ≤ 4) |
SOR-CMCI data object length |
As defined in TS 31.101 [11] for BER-TLV structured files |
O |
X-1-L bytes |
SOR-CMCI parameters |
As specified in TS 24.501 [104] clause 9.11.3.51 and start from octet (o+3) of SOR-CMCI as defined in Figure 9.11.3.51.7 of TS 24.501 [104]. |
O |
As defined in 3GPP TS 23.122 [31] clause C.4.1, ‘no SOR-CMCI rule’ is defined when:
– SOR-CMCI data object is not present; or
– SOR-CMCI data object is zero length
Then UE behaviour described in 3GPP TS 23.122 [31] clause C.4.2 applies.
4.4.11.16 Void
4.4.11.16.1 Void
4.4.11.16.2 Void
4.4.11.16.3 Void
4.4.11.16.4 Void
4.4.11.16.5 Void
4.4.11.16.6 Void
4.4.11.17 EFDRI (Disaster roaming information EF)
If service n°140 is "available" in EFUST, this file shall be present.
This EF contains the indication of whether disaster roaming is enabled in the UE as specified in 3GPP TS 23.122 [31].
In addition it contains disaster roaming parameters indicating availability of each related information field.
Further it contains disaster roaming wait range as specified in 3GPP TS 23.122 [31], disaster return wait range as specified in 3GPP TS 23.122 [31] and the indication of ‘applicability of "lists of PLMN(s) to be used in disaster condition" provided by a VPLMN’ from the USIM into the ME, as specified in 3GPP TS 24.501 [104] annex C.
Identifier: ‘4F0F’ |
Structure: transparent |
Optional |
||||
SFI: ‘0F’ |
||||||
File size: ≥ 7 bytes |
Update activity: low |
|||||
Access Conditions: READ PIN UPDATE ADM DEACTIVATE ADM ACTIVATE ADM |
||||||
Bytes |
Description |
M/O |
Length |
|||
1 |
Disaster roaming is enabled |
M |
1 byte |
|||
2 |
Disaster roaming parameters indicator status |
M |
1 byte |
|||
3 to 4 |
Disaster roaming wait range |
M |
2 bytes |
|||
5 to 6 |
Disaster return wait range |
M |
2 bytes |
|||
7 |
Applicability indicator for "list of PLMN(s) to be used in disaster condition" provided by VPLMN |
M |
1 byte |
Storage is allocated for all of the possible disaster roaming parameters, regardless of whether they are present or absent. Any bytes unused, due to parameters not requiring all of the bytes, or due to absent parameters, shall be set to ‘FF’.
‑ Disaster roaming is enabled
Coding:
The indication of whether disaster roaming is enabled, it is coded in one byte as follows:
b8 |
b7 |
b6 |
b5 |
b4 |
b3 |
b2 |
b1 |
||||||||||||
Indication of whether disaster roaming is enabled as described in 3GPP TS 24.501 [104] |
|||||||||||||||||||
RFU, bit = 0 |
‑ Disaster roaming parameters indicator status
Contents:
Each of the disaster roaming information parameters which can be stored in the remainder of the record are marked absent or present by individual bits within this byte.
Coding:
allocation of bits:
bit number Parameter indicated.
1 Disaster roaming wait range.
2 Disaster return wait range
3 Applicability indicator for "list of PLMN(s) to be used in disaster condition" provided by VPLMN.
4 reserved, set to 1.
5 reserved, set to 1.
6 reserved, set to 1.
7 reserved, set to 1.
8 reserved, set to 1.
Bit value Meaning.
0 Parameter present.
1 Parameter absent.
‑ Disaster roaming wait range
Coding:
The disaster roaming wait range is coded as specified in 3GPP TS 24.501 [104] clause 9.11.3.84 and starts from octet 3 of the registration wait range as defined in Figure 9.11.3.84.1 of 3GPP TS 24.501 [104].
‑ Disaster return wait range
Coding:
The disaster return wait range is coded as specified in 3GPP TS 24.501 [104] clause 9.11.3.84 and starts from octet 3 of the registration wait range as defined in Figure 9.11.3.84.1 of 3GPP TS 24.501 [104].
‑ Applicability indicator for "list of PLMN(s) to be used in disaster condition" provided by VPLMN
Coding:
The applicability indicator for "list of PLMN(s) to be used in disaster condition" provided by VPLMN is coded as specified in 3GPP TS 24.501 [104].
4.4.11.18 EF5GSEDRX (5GS eDRX Parameters)
If service n°141 is "available" in EFUST, this file shall be present.
This EF contains the following 5GS eDRX parameters:
‑ ratType: Radio Access Technology Type;
‑ edrxValue: Extended idle mode DRX cycle length.
Identifier: ‘4F10’ |
Structure: transparent |
Optional |
||||
SFI: ’10’ |
||||||
File size: X bytes, (X ≥ 2) |
Update activity: low |
|||||
Access Conditions: READ PIN UPDATE ADM DEACTIVATE ADM ACTIVATE ADM |
||||||
Bytes |
Description |
M/O |
Length |
|||
1 |
5GS ratType |
M |
1 byte |
|||
2 |
The extended idle mode DRX cycle length value |
M |
1 byte |
‑ 5GS ratType.
Contents:
The NG-RAN rat type which eDRX values are applicable to.
Coding:
b8 |
b7 |
b6 |
b5 |
b4 |
b3 |
b2 |
b1 |
||||||||||||
1:the rat type is NG-RAN 0:RFU |
|||||||||||||||||||
1:the rat type is Satellite NG-RAN 0:RFU |
|||||||||||||||||||
RFU |
‑ The extended idle mode DRX cycle length value.
Contents:
The extended idle mode DRX cycle length value.
Coding:
This data object contains the extended idle mode DRX cycle length value, the coding of which is specified in 3GPP TS 24.008 table 10.5.5.32.
4.4.11.19 EF5GNSWO_CONF (5G Non-Seamless WLAN Offload configuration)
If service n°142 is "available", this file shall be present.
This EF contains 5G Non-Seamless WLAN Offload configuration related information.
If the 5G Non-Seamless WLAN Offload usage Indicator is enabled ME shall always use 5G NSWO as in TS 33.501 [105] (i.e., it shall not use EPS NSWO).
Identifier: ‘4F11’ |
Structure: transparent |
Optional |
||||
SFI: ’11’ |
||||||
File size: >= 1 byte |
Update activity: low |
|||||
Access Conditions: READ PIN UPDATE ADM DEACTIVATE ADM ACTIVATE ADM |
||||||
Bytes |
Description |
M/O |
Length |
|||
1 |
5G Non-Seamless WLAN Offload usage Indicator |
M |
1byte |
– 5G Non-Seamless WLAN Offload usage Indicator:
Contents:
5G Non-Seamless WLAN Offload usage Indicator
Coding:
– ’00’ – 5G Non-Seamless WLAN Offload usage Indicator is disabled
– ’01’ –5G Non-Seamless WLAN Offload usage Indicator is enabled
– All other values are RFU
4.4.11.20 EFMCHPPLMN (Multiplier Coefficient for Higher Priority PLMN search)
If service n°144 is "available" in EFUST, this file shall be available.
This EF contains a multiplier coefficient which is used together with timer interval configured in EFHPPLMN to adjust the interval of time between two searches for a higher priority PLMN via NG-RAN satellite access (see 3GPP TS 23.122 [31]).
Identifier: ‘4F15’ |
Structure: transparent |
Optional |
||||
SFI: ’15’ |
||||||
File size: X bytes, (X ≥ 1) |
Update activity: low |
|||||
Access Conditions: READ PIN UPDATE ADM DEACTIVATE ADM ACTIVATE ADM |
||||||
Bytes |
Description |
M/O |
Length |
|||
1 |
Multiplier coefficient for higher priority PLMN search |
M |
1 byte |
‑ Multiplier coefficient.
Contents:
The multiplier coefficient to adjust the time interval for higher priority PLMN search.
Coding:
For UEs supporting satellite NG-RAN access as specified in 3GPP TS 23.122 [31], the multiplier coefficient is coded as an unsigned byte. The range is from one to a maximum value of 255. The encoding is:
‑ ’00’: Not defined.
‑ ’01’: 1;
‑ ’02’: 2;
‑ : :
‑ ‘FF’: 255; (maximum value).
4.4.11.21 EFKAUSF_DERIVATION (KAUSF derivation configuration)
If service n°145 is "available", this file shall be present. This EF contains the configuration parameter for KAUSF derivation, as defined in TS 33.501 [105].
Identifier: ‘4F16’ |
Structure: transparent |
Optional |
||||
SFI: ‘16’ |
||||||
File size: X bytes (X ≥ 1) |
Update activity: low |
|||||
Access Conditions: READ PIN UPDATE ADM ACTIVATE ADM DEACTIVATE ADM |
||||||
Bytes |
Description |
M/O |
Length |
|||
1 |
KAUSF derivation configuration |
M |
1 byte |
|||
2 to X |
RFU |
O |
X bytes |
Contents:
Configuration for KAUSF derivation
Coding:
b8 |
b7 |
b6 |
b5 |
b4 |
b3 |
b2 |
b1 |
||||||||||||
KAUSF derivation configuration in SNPN: b1=0 Use EMSK for derivation of KAUSF in SNPN b1=1 Use MSK for derivation of KAUSF in SNPN |
|||||||||||||||||||
RFU (see TS 31.101 [11]) |