In the GSM mobile communication industry, the end user — called subscriber — is identified in the operator's network by the use of the Subscriber Identity Module SIM. In the third generation network 3G the equivalent application is called Universal Subscriber Identity Module USIM card. A (U)SIM card is a removable Smart Card for mobile phones. A mobile network operator is a telephone company that provides services for mobile phone subscribers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
3 GPP TS 03.19 Subscriber Identity Module Application Programming Interface (SIM API) for Java Card
3 GPP TS 03.48 Security mechanisms for SIM application toolkit; Stage 2
3 GPP TS 11.11 Specification of the Subscriber Identity Module - Mobile Equipment (SIM- ME) Interface
3 GPP TS 11.14 Specification of the SIM Application Toolkit (SAT) for the Subscriber Iden- tity Module - Mobile Equipment (SIM-ME) interface
3 GPP TS 23.048 Security mechanisms for the (U)SIM application toolkit; Stage 2
3 GPP TS 31.102 Characteristics of the Universal Subscriber Identity Module (USIM) appli- cation
3 GPP TS 31.111 Universal Subscriber Identity Module (USIM) Application Toolkit (USAT)
3 GPP TS 31.130 (U)SIM Application Programming Interface (API); (U)SIM API for Java Card
3 GPP TS 51.011 Specification of the Subscriber Identity Module - Mobile Equipment (SIM- ME) interface
. ETSI TS 102 22 Smart cards UICC-Terminal interface Physical and logical characteristics
. ETSI TS 102 124 Smart Cards; Transport Protocol for UICC based applications; Stage 1
. ETSI TS 102 127 Smart Cards; Transport Protocol for CAT applications; Stage 2
. ETSI TS 102 241 Smart cards UICC Application Programming Interface (UICC API) for Java Card (TM)
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Cadonau, J. (2008). OTA and Secure SIM Lifecycle Management. In: Smart Cards, Tokens, Security and Applications. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-72198-9_11
Download citation
DOI: https://doi.org/10.1007/978-0-387-72198-9_11
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-72197-2
Online ISBN: 978-0-387-72198-9
eBook Packages: Computer ScienceComputer Science (R0)