3 Definitions, abbreviations and symbols
31.1133GPPRelease 8TSUniversal Subscriber Identity Module Application Toolkit (USAT) interpreter byte codes
3.1 Definitions
For the purposes of the present document, the following terms and definitions apply:
anchor: named location on a page to which references can be made and at which rendering by the USAT Interpreter is initiated
NOTE: Anchors can be referenced by anchor reference TLVs.
attribute: A property assigned to a TLV. The attribute can consist of a single bit or of a sequence of consecutive bits within the attribute bytes of a TLV.
attribute byte(s): sequence of consecutive bytes in the value part of a TLV containing the attributes of that TLV
current page: page which is currently rendered by the USAT Interpreter
current terminal response handler configuration: terminal response handler configuration currently valid
external system entity: any entity outside the USAT Interpreter, able to communicate with the USAT Interpreter (e.g. USAT Gateway, content/application system)
default terminal response handler configuration: the terminal response handler configuration as specified in clause 4.3.2
general result range: general result range is a range of general results in the terminal response of an USAT command (refer to TS 31.111 [1] )
navigation unit: block of a service description that can be referenced (by its anchor) and hence independently activated
page: context of an USAT Interpreter rendering, the default scope of USAT Interpreter variables and the unit of transmission between an external system entity and the USAT Interpreter
protected variable: shared variable, which is protected by an one time password
service: collection of pages that defines an unitary capability of the mobile equipment from the point of view of the user. Examples include remote database access, electronic mail, and alerts
service ID: unique ID to identify a service on the external system entity
shared variable: variable to be shared with the following page
NOTE: Shared variables can be provided to the next page in a protected or non protected manner.
string pool: list of predefined variables provided by the current page within the page TLV
NOTE: The string pool is mainly used for optimisation purposes.
system terminal response handler configuration: default terminal response handler configuration possibly modified by personalisation
terminal response handler configuration: configuration used by the terminal response handler mechanism to allow the mapping of actions to general results of USAT commands (see 4.3.1.1)
variable ID: identifier to reference a variable within a variable usage area
wait state: state which is possibly entered by the USAT Interpreter to wait for a response from the external system entity after information has been submitted to the external system entity
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply:
3DES Triple DES
AKI Asymmetric Key Index
AD Asymmetric Decryption Plug-in
ASN.1 Abstract Syntax Notation One (1)
C Conditional
CA Certification Authority
CBC Cipher Block Chaining (Mode)
CHV Card Holder Verification
CP Change PIN Plug-in
DCS Data Coding Scheme
DD Triple DES Decrypt Plug-in
DE Triple DES Encrypt Plug-in
DER Distinguished Encoding Rules of ASN.1
DES Data Encryption Standard
DS Triple DES Sign Plug-in
DU Triple DES Unwrap Plug-in
ECB Electronic Code-book (mode)
EDE Encrypt-Decrypt-Encrypt
FP Fingerprint Plug-in
IANA Internet Assigned Numbers Authority
ICCID Integrated Circuit Card IDentification
ID IDentifier
IV Initialisation Vector
LSB Least Significant Bit
M Mandatory
MAC Message Authentication Code
MDC Modification Detection Code
MSB Most Significant Bit
NCI Native Code Identifier
NU Navigation Unit
O Optional
OID Object Identifier
OTA Over-the-Air
OTP One Time Password
P7 PKCS#7 Signature Plug-in
PIN Personal Identification Number
PKCS Public-Key Cryptography Standards
PS Plug-in Status Code
PUK PIN Unblocking Key
RFU Reserved for Future Use
RP Reset PIN Plug-in
RSA Algorithm invented by Rivest, Adleman and Shamir
SHA-1 Secure Hash Algorithm 1
SMS Short Message Service
SW1/SW2 Status Word 1 / Status Word 2
TLV Tag Length Value
TR Terminal Response
TS Technical Specification
TTBS Text To Be Signed
UCS2 Universal two byte coded Character Set
UE User Equipment
URL Uniform Resource Locators
USAT USIM Application Toolkit
USIM Universal Subscriber Identity Module
WAP Wireless Application Protocol
WIM Wireless Identity Module
WTLS Wireless Transport Layer Security
XML eXtensible Markup Language
3.3 Symbols
For the purposes of the present document, the following symbol applies:
‘0’ to ‘9’ and ‘A’ to ‘F’ The sixteen hexadecimal digits
Single bits are identified by b1 to b8, where b1 is the LSB and b8 is the MSB of the byte containing the bit.
RFU bits and bytes are to be set to ‘0’.
Symbols used in annexes:
<i..j> |
Sub-string extraction operator. Extracts bytes i through j. 1 i j. |
|
X || Y |
Concatenation of byte-strings X and Y (in that order). |
|
|| .|| |
Byte length operator. |
|
bn |
Individual bit in a byte. Range from bit 1 (least significant), denoted b1, to bit 8 (most significant), denoted b8. |
|
Bn |
Individual byte in a byte-string. Range from byte 1 (leftmost), denoted B1, to byte n (rightmost), denoted Bn. |
|
c |
Ciphertext representative. An integer between 0 and n-1. |
|
C |
Ciphertext. Input parameter to the AD plug-in. |
|
DP |
Decrypted PIN data. |
|
DTBS |
Data-to-be-signed. Input parameter to the FP plug-in. |
|
EM |
Encrypted message. |
|
DM |
Decrypted message. |
|
EMSA-PKCS1-v1_5-ENCODE |
PKCS#1 encoding function. See [9] for further reference |
|
EP |
Encrypted PIN data. |
|
I2OSP |
Integer-to-Octet-String conversion primitive. See [9] for further reference. |
|
ICCID |
Raw ICCID. 10 bytes length. |
|
ISO_IEC_9797_ALG3 |
ISO/IEC 9797 MAC algorithm 3. See [10] for further reference. |
|
ISO_IEC_9797_PAD2 |
ISO/IEC 9797 padding method 2. See [10] for further reference. |
|
k |
Length in bytes of the modulus. |
|
K |
RSA private key. |
|
K1, K2, K , K’ |
DES keys. |
|
KC |
An 8 byte key checksum. |
|
KH |
SHA-1 hash of the public key. The hash shall be computed from the unsigned modulus to be in line with WAP WTLS and WAP WIM. |
|
m |
Message representative. An integer between 0 and n-1. |
|
M |
Message, a byte string. |
|
MAC |
A ISO/IEC 9797 message authentication code |
|
MD |
A SHA-1 hash value. |
|
N |
Modulus. An integer. |
|
OS2IP |
Octet-String-to-Integer conversion primitive. See [9] for further reference. |
|
PC |
An 8 byte PIN checksum. |
|
PKCS5_PAD |
PKCS#5 padding function. See [16] for further reference. |
|
PKCS5_UNPAD |
Inverse of PKCS5_PAD. See [16] for further reference. |
|
PM |
A padded message. |
|
R |
Random nonce. 8 bytes length. |
|
RSADP |
RSA decryption primitive. See [9] for further reference. |
|
RSASP1 |
RSA signature primitive. See [9] for further reference. |
|
RSASSA-PKCS1-v1_5-SIGN |
PKCS#1 signature generation function. See [9] for further reference. |
|
S |
Raw signature of byte length k. |
|
SHA1 |
SHA-1 hash function. See [12] for further reference. |
|
TDEA_DECR |
Triple DES decryption algorithm. See [8] for details regarding the algorithm. |
|
TDEA_ENCR |
Triple DES encryption algorithm. See [8] for details regarding the algorithm. |
|
TTBS |
Text-to-be-signed. Byte string. Input parameter to P7 plug-in. |