• 4496阅读
  • 353回复

灌水我最牛之jiuwanli水楼 [复制链接]

上一主题 下一主题
离线jiuwanli
发帖
1201
金钱
1635
91币
0
信誉
0
资产
0 IST
在线时间
515 小时
注册时间
2008-12-07
最后登录
2016-08-01
只看该作者 70楼 发表于: 2009-01-21 07:05:47
The USIM shall support a mechanism for unblocking a blocked PIN. Unblocking of a PIN is performed by using the relevant PIN Unblocking Key.
PINs, but not Unblock PINs, shall be changeable by the user following correct entry of either the current PIN or Unblock PIN.
离线jiuwanli
发帖
1201
金钱
1635
91币
0
信誉
0
资产
0 IST
在线时间
515 小时
注册时间
2008-12-07
最后登录
2016-08-01
只看该作者 71楼 发表于: 2009-01-21 07:06:07
The Unblock PIN shall consist of eight (8) decimal digits and shall not be changeable by the user. If an incorrect Unblock PIN is presented, an indication shall be given to the user. After ten (10) consecutive incorrect entries, the Unblock PIN shall be blocked, even if between attempts the UICC has been removed, the USIM has been deselected or the ME has been switched off. Unblocking of a blocked PIN shall not be possible.
It shall not be possible to read PINs or Unblock PINs.
离线jiuwanli
发帖
1201
金钱
1635
91币
0
信誉
0
资产
0 IST
在线时间
515 小时
注册时间
2008-12-07
最后登录
2016-08-01
只看该作者 72楼 发表于: 2009-01-21 07:06:29
5.3    User data stored in ME
Subject to the exception below, all user related information transferred into the ME during network operations shall be deleted from the ME after removal of the UICC, deselection of the USIM, deactivation of the ME, or following an electrical reset of the UICC. This includes any data that was transferred to the ME by USIM Application Toolkit commands.
User related security codes such as PIN and Unblock PIN may only be stored by the ME during the procedures involving such a code and shall be discarded by the ME immediately after completion of the procedure.
Optionally, an ME may retain some less security-sensitive data at UICC removal, USIM deselection or ME switch-off. Such data are e.g. SMS, ADN/SSC, FDN/SSC, LND. These data, when stored in the ME, shall only be readable/retrievable if the same USIM is reactivated (as determined by the IMSI). If the IMSI is retained in the ME for this purpose, it shall be stored securely and shall not be able to be read out.
离线jiuwanli
发帖
1201
金钱
1635
91币
0
信誉
0
资产
0 IST
在线时间
515 小时
注册时间
2008-12-07
最后登录
2016-08-01
只看该作者 73楼 发表于: 2009-01-21 07:06:45
5.4    Authentication
A means shall be specified to mutually authenticate the USIM and the network by showing knowledge of a secret key K which is shared between and available only to the USIM and in the user's Home Environment. The method is composed of a challenge/response and key establishment protocol combined with a sequence number-based one-pass protocol for network authentication.
离线jiuwanli
发帖
1201
金钱
1635
91币
0
信誉
0
资产
0 IST
在线时间
515 小时
注册时间
2008-12-07
最后登录
2016-08-01
只看该作者 74楼 发表于: 2009-01-21 07:07:06
5.5    Data integrity of signalling elements
Some signalling information elements are considered sensitive and must be integrity protected. An integrity function shall be applied on certain signalling information elements transmitted between the ME and the network.
The 3GPP Integrity Algorithm (UIA) is used with an Integrity Key (IK) to compute a message authentication code for a given message. The setting of IK is triggered by the authentication procedure. IK shall be stored on the USIM.
离线jiuwanli
发帖
1201
金钱
1635
91币
0
信誉
0
资产
0 IST
在线时间
515 小时
注册时间
2008-12-07
最后登录
2016-08-01
只看该作者 75楼 发表于: 2009-01-21 07:07:25
5.6    User identity confidentiality
A mechanism shall be specified to provide user identity confidentiality by means of a temporary identity.
离线jiuwanli
发帖
1201
金钱
1635
91币
0
信誉
0
资产
0 IST
在线时间
515 小时
注册时间
2008-12-07
最后登录
2016-08-01
只看该作者 76楼 发表于: 2009-01-21 07:07:43
5.7    Length of security parameters
In order to allow for enhancements of the security level in 3G, the following requirements shall be covered:
-    all security-related parameters for 3G shall be accompanied by a length indicator;
-    the USIM shall support variable-length security parameters.
If the USIM supports the GSM security mechanisms in addition to 3G security, fixed length security parameters according to 3GPP TS 51.011 [8] shall be supported in addition.
离线jiuwanli
发帖
1201
金钱
1635
91币
0
信誉
0
资产
0 IST
在线时间
515 小时
注册时间
2008-12-07
最后登录
2016-08-01
只看该作者 77楼 发表于: 2009-01-21 07:07:59
6    Logical issues
6.1    Application selection
In a multiapplication environment, a flexible application selection method is required. The application identifier defined in ETSI TS 101 220 [5] should be used for application selection. Direct application selection, including selection by partial DF name and the EFDIR concept of ISO/IEC 7816-4 [12] shall be followed. In particular, a mechanism for the ME and the UICC shall be specified in order to allow the user, when the ME is in idle mode, to select and activate one application amongst those which are available and supported by the ME (this will permit the user to choose, for instance, between 2 different USIM applications). At switch on, the last active USIM shall be automatically selected. The last active USIM shall be stored on the UICC. By default if there is no last active USIM defined in the UICC, the user shall be able to select the active USIM amongst those available on the UICC.
离线jiuwanli
发帖
1201
金钱
1635
91币
0
信誉
0
资产
0 IST
在线时间
515 小时
注册时间
2008-12-07
最后登录
2016-08-01
只看该作者 78楼 发表于: 2009-01-21 07:08:17
6.2    Simultaneous access
A mechanism shall be specified for simultaneous access to several files or applications.
7    Service Requirements
7.1    Void
离线jiuwanli
发帖
1201
金钱
1635
91币
0
信誉
0
资产
0 IST
在线时间
515 小时
注册时间
2008-12-07
最后登录
2016-08-01
只看该作者 79楼 发表于: 2009-01-21 07:08:33
7.2    Data transfer
A mechanism allowing highly secure transfer of applications and/or associated data to/from the UICC/USIM shall be specified in line with the requirements in 3GPP TS 22.101 [2]. This requires a secure transfer mechanism.
7.3    Application execution environment
An application execution environment may exist on the UICC/USIM which includes  functionality defined in 3GPP TS 31.111 [6].