
ETSI
TSI TS 100 977 V8.14.0 (2007
6)
3GPP TS 11.11 version 8.14.0 Release 1999
8.2 STATUS...........................................................................................................................................................30
8.3 READ BINARY...............................................................................................................................................30
8.4 UPDATE BINARY..........................................................................................................................................31
8.5 READ RECORD..............................................................................................................................................31
8.6 UPDATE RECORD.........................................................................................................................................32
8.7 SEEK................................................................................................................................................................32
8.8 INCREASE ......................................................................................................................................................33
8.9 VERIFY CHV..................................................................................................................................................33
8.10 CHANGE CHV................................................................................................................................................34
8.11 DISABLE CHV................................................................................................................................................34
8.12 ENABLE CHV.................................................................................................................................................34
8.13 UNBLOCK CHV.............................................................................................................................................35
8.14 INVALIDATE .................................................................................................................................................35
8.15 REHABILITATE.............................................................................................................................................35
8.16 RUN GSM ALGORITHM...............................................................................................................................36
8.17 SLEEP..............................................................................................................................................................36
8.18 TERMINAL PROFILE....................................................................................................................................36
8.19 ENVELOPE .....................................................................................................................................................36
8.20 FETCH.............................................................................................................................................................36
8.21 TERMINAL RESPONSE ................................................................................................................................37
9 Description of the commands.................................................................................................................37
9.1 Mapping principles...........................................................................................................................................37
9.2 Coding of the commands..................................................................................................................................40
9.2.1 SELECT......................................................................................................................................................41
9.2.2 STATUS.....................................................................................................................................................43
9.2.3 READ BINARY.........................................................................................................................................43
9.2.4 UPDATE BINARY ....................................................................................................................................44
9.2.5 READ RECORD ........................................................................................................................................44
9.2.6 UPDATE RECORD ...................................................................................................................................44
9.2.7 SEEK ..........................................................................................................................................................45
9.2.8 INCREASE.................................................................................................................................................45
9.2.9 VERIFY CHV ............................................................................................................................................46
9.2.10 CHANGE CHV ..........................................................................................................................................46
9.2.11 DISABLE CHV..........................................................................................................................................46
9.2.12 ENABLE CHV...........................................................................................................................................46
9.2.13 UNBLOCK CHV........................................................................................................................................47
9.2.14 INVALIDATE............................................................................................................................................47
9.2.15 REHABILITATE .......................................................................................................................................47
9.2.16 RUN GSM ALGORITHM .........................................................................................................................47
9.2.17 SLEEP ........................................................................................................................................................47
9.2.18 GET RESPONSE........................................................................................................................................48
9.2.19 TERMINAL PROFILE...............................................................................................................................48
9.2.20 ENVELOPE................................................................................................................................................48
9.2.21 FETCH........................................................................................................................................................48
9.2.22 TERMINAL RESPONSE...........................................................................................................................49
9.3 Definitions and coding .....................................................................................................................................49
9.4 Status conditions returned by the card..............................................................................................................50
9.4.1 Responses to commands which are correctly executed ..............................................................................51
9.4.2 Responses to commands which are postponed ...........................................................................................51
9.4.3 Memory management.................................................................................................................................51
9.4.4 Referencing management ...........................................................................................................................51
9.4.5 Security management..................................................................................................................................51
9.4.6 Application independent errors...................................................................................................................52
9.4.7 Commands versus possible status responses ..............................................................................................52
10 Contents of the Elementary Files (EF)...................................................................................................53
10.1 Contents of the EFs at the MF level .................................................................................................................53
10.1.1 EF
ICCID
(ICC Identification) .......................................................................................................................53
10.1.2 EF
ELP
(Extended language preference).......................................................................................................54
10.2 DFs at the GSM application level ....................................................................................................................55
10.3 Contents of files at the GSM application level.................................................................................................55