throbber
Wolfgang Rankl»Wolfgang Effing
`
`Smart
`11
`
`
`
`Tenant
`
`Ex.1008
`APPLEINC./ Page 1 of 13
`
`Ex.1008
`APPLE INC. / Page 1 of 13
`
`

`

`First published under the title Handbuch der Chipkarten by Carl Hanser Verlag
`© Carl Hanser Verlag, Munich/FRO, 2002
`AU rights reserved.
`Authorized translation from the 4th edition in the miginal German language
`published by Carl Hanser Verlag, Munich/FRO.
`
`Copyright© 2003
`
`John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester
`West Sussex, PO I 9 8SQ, England
`
`National 01243 779777
`International
`(+44) 1243 779777
`
`Email (for orders and customer service enquiries): cs-books@wiley.co.uk
`Visit our Home Page on www.wileyeurope.com or www.wi!ey.com
`
`Reprinted March 2006
`
`All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any fonn or by any
`means, electronic, mechanical, photocopying, recording, scanning or otherwise, except under the terms of the Copyright, Designs
`and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road,
`London WIT 4LP. UK, without the permission in writing of the Publisher. Requests to the Publisher should be addressed to the
`Permissions Department,
`John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO 19 8SQ, England, or emailed to
`permreq@wiley.co.uk, or faxed to ( +44) 1243 77057 l.
`
`This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the
`understanding that the Publisher is not engaged in rendering professional services. If professional advice or other expert assistance is
`required, the services of a competent professional should be sought.
`
`Other Wiley Editorial Offices
`
`John Wiley & Sons Inc., l l l River Street, Hoboken, NJ 07030, USA
`
`Jossey-Bass, 989 Market Street, San Francisco, CA 94103-!741, USA
`
`Wiley-VCH Verlag GrnbH, Boschstr. 12, D-69469 Weinheim, Germany
`
`John Wiley & Sons Australia Ltd, 33 Park Road, Milton, Queensland 4064, Australia
`
`John Wiley & Sons (Asia) Pte Ltd, 2 Clementi Loop #02-01 , Jin Xing Distripark, Singapore 129809
`
`John Wiley & Sons Canada Ltd, 22 Worcester Road, Etobicoke, Ontario, Canada M9W l Ll
`
`Wiley also publishes its books in a variety of electronic fonnats. Some content that appears ih print may not be available in electronic
`books.
`
`Library of Congress Cataloging-in-Publication Data
`Rank!, W. (Wolfgang)
`[Handbuch der Chipkarten. English]
`Smart card handbook / Wolfgang Rank! and Wolfgang Effing. - 3rd ed.
`p.
`cm.
`Includes bibliographical references and index.
`ISBN 0-470-85668-8 (alk. paper)
`I. Smart cards-Handbooks, manuals, etc.
`TK7895.S62R36 l 3 2003
`006-dc22
`
`I. Effing, W. (Wolfgang)
`
`II. Title.
`
`2003062750
`
`British Library Cataloguing in Publication Data
`
`A catalogue record for this book is available from the British Library
`
`ISBN-IO: 0-470-85668-8 (H/B)
`ISBN-13: 978-0-470-85668-0 (H/B)
`
`Typeset in !O/ l 2pt Times by TechBooks. New Delhi, India
`Printed and bound in Great Britain by Antony Rowe Ltd, Chippenham Wiltshire
`This book is printed on acid-free paper responsibly manufactured from sustainable forestry
`in which at least two trees are planted for each one used for paper production.
`
`Ex.1008
`APPLE INC. / Page 2 of 13
`
`

`

`Preface to the Third Edition
`
`The English version of the Smart Card Handbook has now reached its third edition. In com(cid:173)
`parison with the previous edition, it has been considerably expanded and thoroughly updated
`to represent the current state of the technology. In this book, we attempt to cover all aspects
`of smart card technology, with the term 'technology' intentionally being understood in a very
`broad sense.
`As in previous editions, we have remained true to our motto, 'better one sentence too many
`than one word too few'. We have described this ever-expanding subject in as much detail as
`possible. Even more examples, drawings and photographs have been added to make it easier
`to understand complicated relationships. The glossary has been enlarged to include many new
`terms covering all essential co9cepts related to smart cards, and it has been enhanced with
`cross-references. In many cases, it can provide a quick introduction to a particular subject.
`Altogether, these additions, extensions and improvements have resulted in a book that is more
`than three times as large as the first edition.
`Here we can make a small comparison. Modern smart card operating systems cuJTently
`comprise 120,000 lines of source code, which roughly corresponds to two books the size of
`the present edition. Even if you are not familiar with programming, you can readily appreciate
`how sophisticated these operating systems have become.
`These small, colorful plastic cards with their semiconductor chips continue to spread from
`their original countries, Germany and France, throughout the world. In the coming years, this
`technology can be expected to outstrip all others, especially since it is still in its infancy and
`there is no end or consolidation in sight.
`Smart card technology progresses in leaps and bounds, and we attempt to keep pace by
`publishing a new edition of the Smart Card Handbook every two to three years. The Smart
`Card Handbook represents the present state of technical knowledge, and in areas that are
`presently undergoing rapid change, we indicate possible paths of evolution. If certain things
`come to be seen differently at a later date, we can only remark that no one knows what the
`future will bring. Despite this, or perhaps just because of this, we welcome all comments,
`suggestions and proposed improvements, so that this book can continue to cover the subject of
`smart cards as completely as possible. Here we would like to explicitly thank the many attentive
`and interested readers who have pointed out unclear or ambiguous passages and errors. Once
`again, an errata list for this edition will be made available atwww.wiley.co.uk/commstech/.
`We would also like to thank our many friends and colleagues who have repeatedly offered
`valuable (and occasionally somewhat uncomfortable) suggestions for making this book better
`
`Ex.1008
`APPLE INC. / Page 3 of 13
`
`

`

`xiv
`
`Preface
`
`and more complete. We would particularly like to thank Hermann Altschafl, Peter van Elst,
`Klaus Finkenzeller, Thomas GraBl, Michael Schnellinger, Harald Yater and Dieter WeiB, as
`well as Kathryn Sharples at Wiley for her helpful support and Kenneth Cox for the translation.
`
`Munich, June 2002
`
`Wolfgang Rankl
`[Rankl@gmx.net], [www.wiley.co.uk/commstech/]
`
`Wolfgang Effing
`[WEffing@gmx.net]
`
`Ex.1008
`APPLE INC. / Page 4 of 13
`
`

`

`1
`Introduction
`
`This book has been written for students, engineers and technically minded persons who want
`to learn more about smart cards. It attempts to cover this broad topic as completely as possible,
`in order to provide the reader with a general understanding of the fundamentals and the current
`state of the technology.
`We have put great emphasis on a practical approach. The wealth of pictures, tables and refer(cid:173)
`ences to real applications is intended to help the reader become familiar with the subject rather
`more quickly than would be possible with a strictly technical presentation. This book is thus
`intended to be useful in practice, rather than technically complete. For this reason, descriptions
`have been kept as concrete as possible. In places where we were faced with a choice between
`technical accuracy and ease of understanding, we have tried to strike a happy medium. When(cid:173)
`ever this proved to be impossible, we have always given preference to ease of understanding.
`The book has been written so that it can be read in the usual way, from front to back.
`We have tried to avoid forward references as much as possible. The designs of the individual
`chapters, in terms of structure and content, allow them to be read individually without any loss
`of understanding. The comprehensive index and the glossary allow this book to be used as a
`reference work. If you want to know more about a specific topic, the references in the text and
`the annotated directory of standards will help you find the relevant documents.
`Unfortunately, a large number of abbreviations have become established in smart card
`technology, as in so many other areas of technology and everyday life. This makes it particularly
`difficult for newcomers to become familiar with the. subject. We have tried to minimize the
`use of these cryptic and frequently illogical abbreviations. Nevertheless, we have often had
`to choose a middle way between internationally accepted smart card terminology used by
`specialists and common terms more easily understood by laypersons. If we have not always
`succeeded, the extensive list of abbreviations at the front of the book should at least help
`overcome any barriers to understanding, which we hope will be short-lived. An extensive
`glossary in the final chapter of the book explains the most important technical concepts and
`supplements the list of abbreviations.
`An important feature of smart cards is that their properties are strongly based on interna(cid:173)
`tional standards. This is fundamentally important with regard to the usually compulsory need
`for interoperability. Unfortunately, these standards are often difficult to understand, and in
`
`Smart Card Handbook, Third Edition. W. Rank! and W. Effing
`© 2004 John Wiley & Sons, Ltd ISBN: 0-470-85668-8
`
`Ex.1008
`APPLE INC. / Page 5 of 13
`
`

`

`486
`
`Smart Card Commands
`
`7.14 COMMANDS FOR ELECTRONIC PURSES
`
`Part 3 of the European standard for universal electronic purses, EN 1546, defines six commands
`for electronic purses and 12 commands for the security module in the terminal, which itself
`may be a smart card. The basic structures of the four most important commands used with
`smart card electronic purses8 are described here. These commands can be utilized to run an
`application in a smart card for making 'cashless' payments from a prepaid purse and refilling
`the purse. The commands for error recovery, currency conversion, parameter modification and
`canceling a payment are not described here, nor are those for the security module. The Common
`European Purse System (CEPS) specification for electronic purses defines commands that are
`very similar to those defined by EN 1546.
`The commands described here would fit just as well under 'Application-Specific Commands'
`· (Section 7.16), since they are defined specifically for this one application. They can never be
`used for any other purpose than electronic purses, since they have been optimized for this
`application. However, we dedicate a section to them because electronic purses are one of the
`main future applications for smart cards, besides telecommunications.
`All electronic purse transactions are divided into three steps according to EN 1546. In the
`first step, the card is initialized using the command INITIALIZE IEP for Load / for Purchase.
`In the second step, a command is executed to perform the actual transaction, such as filling
`the purse or paying with the purse. In the optional third step, the transaction just performed
`is confirmed. All purse commands directly access files in the purse application of the smart
`card for both writing and reading. These files hold the purse balance, log entries and various
`parameters.
`The individual steps of a purse transaction are executed using the commands described
`below. The EN 1546 standard precisely defines the internal processes of each command with
`regard to functionality and the sequence of the individual steps. All implementations thus have
`at least the same general processes.
`The INITIALIZE IEP command can be used for several purposes. A parameter is used to
`select initialization of a purse loading transaction, a purchase transaction or another type of
`transaction.
`Loading ( crediting) the purse in the smart card is initiated by the command INITIALIZE
`IEP for Load. The transferred data, such as a currency code and amount to be loaded, are
`checked in the card to see whether they match prescribed values in the parameter files. Freely
`definable data (user-determined data) can also be stored in a log file . Next, a transaction counter
`is incremented and a signature S1 is generated for various data (such as the current balance
`and expiry date), so that this information can be transferred to the terminal without risk of
`manipulation.
`-
`In the second step of the load transaction, the card essentially receives information about
`the keys to be used and a signature S2 via the CREDIT IEP command. This information
`comes from the security module in the terminal, and besides protecting the data, it allows
`the card to authenticate the security module. The smart card has already been authenticated
`with respect to the security module in the terminal by the previous INITIALIZE IEP for Load
`
`8 Command sequences and general system structures of electronic purse systems are described in detail in Section
`12.3.1, 'The CEN EN 1546 standard'
`
`Ex.1008
`APPLE INC. / Page 6 of 13
`
`

`

`576
`
`Quality Assurance and Testing
`
`a limited degree, since the provider usually does not have all the necessary technical expertise
`and capabilities. The second option, which is assigning the tests to another party, is currently
`regarded by all concerned as an acceptable solution.
`This same problem has existed for many years with software and systems developed for
`military use. It is thus not something that is new in the smart card world. In order to establish
`metrics for the trustworthiness of software products, which means to make it objectively
`measurable, the US National Computer Security Center (NCSC) issued a catalog of criteria
`for evaluating the trustworthiness of information technology systems in 1983. NCSC was
`founded in 1981 by the American Department of Defense (DoD). The publication of 'Trusted
`Computer System Evaluation Criteria' (TCSEC) followed in 1985. This book had an orange
`binding, so it has come to be generally known as the 'Orange Book'. These criteria serve as
`guidelines to the NCSC for the certification of information technology systems.
`The TCSEC has become an international model for practically all criteria catalogs in the
`information technology field. In Europe, specifically European criteria have been defined,
`although they are based on the TCSEC. They were first published in 1990 as the 'Informa(cid:173)
`tion Technique System Evaluation Criteria' (ITSEC), and a revised version was issued in
`1991.
`The Common Criteria (CC) were created in order to provide a uniform standard for testing
`the correctness of software. They can be regarded as representing the essential elements of the
`TCSEC and the ITSEC. The Common Criteria are also better organized for the evaluation of
`software than the TCSEC or the ITSEC. Although the first version of the Common Criteria was
`published as early as 1996, it has not yet supplanted the TCSEC or the ITSEC.2 The Common
`Criteria have also been published as an international standard (ISO 15408). In contrast to the
`ITSEC, which has six levels, the Common Criteria have seven levels of trustworthiness. It is
`relatively easy to make the transition from an evaluation based on the TCSEC or the ITSEC to
`one based on the Common Criteria, since all of these catalogs have many features in common.
`However, since in the smart card field in particular the ITSEC is still used as the essential basis
`for software evaluation, we refer only to this catalog in the following description.
`Occasionally, the requirements of the PIPS 140-2 standard are taken into account in per(cid:173)
`forming evaluations, in addition to the ITSEC and the CC. This standard specifies four possible
`security levels for security modules, which can be considered to include smart cards, and pro(cid:173)
`vides detailed descriptions of seven requirement areas related to security. The contents of this
`standard are very practically oriented.and also deal with details of technical implementation,
`such as criteria for the quality of random-number generators.
`Regardless of the method used, an evaluation process has four characteristics. First, it must
`be unbiased, which means that the evaluator must not have any preconceived ideas regarding
`the item to be evaluated or its producer. The second characteristic is that the evaluation process
`must be objective and structured to minimize the significance of personal opinions. The third
`characteristic is that the same result must be obtained if the evaluation process is repeated.
`The final characteristic is that the evaluation process must be reproducible, which means that
`a different tester or testing agency must reach the same conclusions.
`One of the most important considerations in any evaluation is defining the security targets
`for the target of evaluation (TOE). The target of the evaluation is the object to be tested,
`
`2 The TCSEC, ITSEC and CC are available at no charge from many Interne; sites (e.g., the CC at [NIST] )
`
`Ex.1008
`APPLE INC. / Page 7 of 13
`
`

`

`682
`
`Smart Cards in Payment Syst,
`
`The background system has complete control of the electronic payment system, regard
`of the system architecture. Even with systems that work completely offline, the backgro
`system establishes the global system parameters and monitors the security and operatio1
`the system.
`
`Network
`
`The network links the background system to the terminals. The connections may
`circuit-switched (e.g. ISDN) or packet-switched (e.g. X.25). As a rule, the network is
`tally transparent to the data traffic, which is passed unmodified from the sender to
`receiver.
`
`Terminals
`
`The various types of terminals can be classified as either loading terminals or payment
`minals, according to their functions with respect to payments. They can also be classifie<
`automated terminals or attended terminals. The classic example of an automated termim
`a cash dispenser (ATM). In electronic purse systems, automated terminals are primarily u
`only to load cards. It would naturally also be conceivable to allow an electronic purse tc
`emptied using such a terminal, with the balance being paid out in cash. Attended terminals
`typically located at supermarket checkouts and in retail shops. They are always used to pay
`goods. In some systems, terminals in banks can also be used to load smart cards in excha
`for cash payments.
`
`Smart cards
`
`Smart cards are the most widely distributed component of the system. They can be usec
`electronic purses, but they can also be used as security modules in various types of termin
`Another use is transporting data between various system components. Cards for this purp<
`which are called transfer cards, are used to manually transfer transaction data from a term
`that works completely offline to one that works online (such as a cash dispenser).
`The example system shown in Figure 12.4 illustrates the system components and their log
`connections. The background system, which may be the background system of a diffe1
`operator or a component of the system itself, is connected to the other components vi
`transparent network.
`Electronic purses are must commonly loaded using cash dispensers, most of which ope:
`online, although they can also operate offline for a limited time in the event of a network fail1
`For this reason, they have their own security modules, which hold all of the keys necessary
`normal operation and key derivation.
`There are also electronic purse payment systems that operate fully offline. Two exam1
`are parking meters and terminals in taxis. In such cases, transfer cards can be used to trans]
`the transaction data from the security modules to a ca~.!1 dispenser, from which they reach
`
`Ex.1008
`APPLE INC. / Page 8 of 13
`
`

`

`13.2 The GSM System
`
`General packet radio system (GPRS)
`
`735
`
`GPRS is a packet-switched bearer service defined in GSM 01.60 and GSM 02.60. It supports
`a theoretical maximum data transmission rate of up to 115.2 kbit/s for uplink and downlink.
`
`13.2 THE GSM SYSTEM
`
`The smart card used in GSM mobile telephones, which is called the 'subscriber identity module'
`(SIM), was and still is the pioneer in terms of functionality and memory capacity. This is in part
`due to the fact that smart cards used in mobile telephones: whose manufacturing costs are several
`hundred euros, are significantly less price sensitive than other types of smart cards, such as those
`used for electronic payments or medical applications. Another decisive factor with regard to
`smart card technology is the generally high rate of evolution of the entire telecommunications
`sector. The pioneering position with regard to technology and standardization that is presently
`held by the SIM, in comparison with all other smart card applications, is the reason why this
`topic is described here in such great detail.
`GSM,whichwascommercially inaugurated in 1992, became the international standard for
`mobile.tekcoIW!).µnications systems within only a few years. This includes transmitting not
`only/voice butalso data, which are presently still primarily transmitted in .the form of 'short
`messages' using SMS. In mid-2001, there were a total of 400 mobile telecommunications
`networks in 171 countries based on the GSM standard, with more than 565 million subscribers.
`Moretllan 20 billion short.messages are transmitted every month.4 Mobile telecommunications
`networks based on the GSM standard often have country-specific designations. In Germany,
`forinstance, the four operational GSM networks are called the D~Netz (900-MHz and 1800-
`MHzGSM variants) and the E-Netz (1800-MHz variant), and in Austria the GSM network is
`in part also referred to as the A-Netz.
`Specification of the GSM system started in 1982 under the auspices of the Conference
`Europeenne des Pastes et Telecommunications (CEPT). The objective was to generate a speci(cid:173)
`fication for a transnational, interoperable mobile telecommunications network. In the course of
`time, these efforts led to the conclusion that it was possible to draft specifications for a transna(cid:173)
`tional, interoperable andISDN-compatible digital cellular mobile telecommunication system
`operating in the 900-MHz band. The Groupe Special Mobile was founded for this purpose,
`which.gave rise to the original abbreviation 'GSM'. In 1986, the GSM Permanent Nucleus
`was ~stablished, with headquarters irrParis, to coordinate the generation of the specification. It
`was later also responsible for specifying a wide variety oftests for system components. From
`atec~nical p¢rspective, it is interesting to note that a number of the technologies that were
`cllos<:;n for GSM at that time were fully new and untested in practice. For instance, the air
`in.t~tface using a combination oftime-division multiple access with frequency-division multi(cid:173)
`pl~access and digital data transmission was totally unexplored territory for large-scale mobile
`telecommunication applications. These decisions led to many technical problems, particularly
`in the system development stage, but from the present perspective they can be regarded as a
`fortunate choice, since GSM proved to be an innovative system that was not burdened with the
`technical ballast of the early days of mobile telecommunications.
`
`4 A good overview of current statistical figures and network operators can be found at GSM World [GSM]
`
`Ex.1008
`APPLE INC. / Page 9 of 13
`
`

`

`13.2 The GSM System
`
`Location area information (LAI)
`
`745
`
`The LAI is the unique position information of the mobile station. It is used in combination with
`the TMSI to generate a unique subscriber identity. The LAI consists of a three-digit country
`code (CC), a two-digit mobile network code (MNC) and a location area code (LAC), which
`has a maximum length of five digits.
`
`Mobile station ISDN number (MSISDN)
`
`The MSISDN is the dialing number of the mobile station. It is independent of the subscriber
`identity (IMSI).
`
`Temporary mobile subscriber identity (TMSI)
`
`The TMSI is a temporally and spatially limited subscriber identity with a length of four bytes.
`It is used to protect the true subsc1iber identity. The TMSI is only unique in combination with
`the location area information (LAI). The TMSI is assigned by the VLR, where it is also stored.
`
`13.2.4 The subscriber identity module (SIM)
`
`The Slfy:'[ is a mandatory -Security module located in the mobile telephone of a GSM system
`as an !-(Xc;;hapgeable component. It is defined as follows in the GSM 02.17 specification: 'The
`SIM is anentity that contains the identity of the subscriber. The primary function of the SIM
`is to secure the authenticity of the mobile station with respect to the network ' .
`Be~iQyS .its primary. functions of holding the identity of the subscriber, which is realized
`using aPIN, and authenticating the mobile station with respect to the network, the SIM also
`perlorms a number of other functions. It allows program execution to be protected against
`manipulation, and it makes it possible to store data such as dialing numbers, short messages
`and p~r~onal configuration settings for the mobile telephone. In addition, it is the bearer for
`secure supplementary services used with mobile telecommunications.
`Two different SIM formats are used in the GSM system. In mobile telephones designed to
`allow the SIM to be exchanged relatively often, the ID-1 format is used. This is based on the
`idea of a company or family telephone with a separate card for each user. Mobile telephones
`with small dimensions, whose SIMs are intended to be ~xchanged only rarely, use plug-in
`SIMs in the ID-000 format. However, the only difference between the two types of SIMs is the
`physical size of the card. Their logical and physical characteristics are otherwise fully identical.
`Since the mid- l 990s, mobile telephones have become more or less personal accessories. This
`has had an effect of the size of card used, since it is no longer necessary to exchange the card
`depending on who is using the telephone. Already in 1995, half of all ID-1 cards sold were
`punched to allow a card in ID-000 format to be broken loose, and since 1998 practically all
`cards have this feature .
`Communications between the mobile equipment and the SIM use the T = 0 protocol with
`the standard parameters, as specified in ISO/IEC 7816-3. The data transmission convention can
`
`Ex.1008
`APPLE INC. / Page 10 of 13
`
`

`

`774
`
`Smart Cards in Telecommunicati,
`
`Table 13.7 The proactive SIM smart card commands specified for the SIM Application Toolkit in
`GSM 11.14. Note that the commands listed here are sent to the terminal by the smart card, rather th,
`from the terminal to the smart card as usual. Certain commands can only be used if they are support1
`by the hardware configuration of the mobile equipment
`
`Command
`
`User interface
`DISPLAY TEXT
`
`GETINKEY
`
`GETINPUT
`
`LANGUAGE NOTIFICATION
`
`PLAY TONE
`SELECT ITEM
`
`SET UP IDLE MODE TEXT
`
`SETUP MENU
`
`Second card terminal
`GET READER STATUS
`
`PERFORM CARD APDU
`
`POWER OFF CARD
`
`POWER ON CARD
`
`Network interface
`CLOSE CHANNEL
`GET CHANNEL STATUS
`
`OPEN CHANNEL
`RECEIVE DATA
`
`RUN AT COMMAND
`
`SEND DATA
`
`SENDDTMF
`SEND SHORT MESSAGE
`
`Brief description
`
`Show a text or icon passed with the command on the display c
`the mobile station.
`Show a text or icon passed with the command on the display c
`the mobile station, followed by requesting a character from th
`keypad.
`Show a text or icon passed with the command on the display c
`the mobile station, followed by requesting one or more
`characters from the keypad.
`Advise the mobile equipment of the language used by the Silv
`Application Toolkit in the text fields.
`Instruct the mobile equipment to issue a tone.
`Transfer a selection list to the mobile equipment with the
`instruction that the user is to select an item.
`Show a text or icon passed with the command on the display c
`the mobile station while the mobile station is switched on but
`not in use.
`Transfer a menu list to the mobile equipment with the
`instruction to integrate it into the menu structure of the mobile
`equipment.
`
`Request the status of a supplementary card terminal in the
`mobile station.
`Send an APDU to the smart card located in a supplementary
`card terminal in the mobile station.
`Deactivate the smart card located in a supplementary card
`terminal in the mobile station.
`Activate the smart card located in a supplementary card
`terminal in the mobile station.
`
`Instruct the mobile equipment to close a_data channel.
`Instruct the mobile equipment to return the status of a data
`channel.
`Instruct the mobile equipment to open a data channel.
`Instruct the mobile equipment to receive data via an open data
`channel.
`Transfer an AT command to the mobile equipment and execut
`the command in the mobile equipment, followed by passing th
`result back to the SIM.
`Instruct the mobile equipment to transmit data via an open <lat
`channel.
`Transmit a DTMF during a current voice connection.
`Transmit a short message.
`
`Ex.1008
`APPLE INC. / Page 11 of 13
`
`

`

`16.1 Glossary
`
`965
`
`the various stages of the -'>- life cycle of a smart card. In the simplest case different security
`environments would be defined for the personalization and subsequent use of the card, so that
`different file -'>- access conditions would be specified for the different stages of the smart card
`life cycle. Write access would be allowed to all files for personalization, but for normal use
`the access conditions would be specified according to the actual -'>- application.
`
`Security module
`
`A component that is secured both mechanically and computationally and is used to store secret
`data and execute cryptographic algorithms. It is also known as a secure application module
`(SAM), hardware security module (RSM) or host security module (HSM).
`
`Security target
`
`In the context of an-'>- evaluation, security targets describe the mechanisms to be tested for the
`-'>- target of evaluation. They thus represent a sort of requirement~ catalog for the evaluation.
`The security targets for specific types of targets of evaluation and specific application areas
`for targets ofevaluation can be described using -'>- protection profiles.
`
`Seed number (seed)
`
`A random number used as the initial value for a pseudorandom number generator.
`
`Sequence control
`
`A method for specifying a compulsory sequence of activities. For example, the correct sequence
`of -'>- commands for mutual authentication of a -'>- smart card and a background system can
`be enforced using sequence control in the smart card. This is done by specifying the states
`and state transitions of a state machine in the -'>- smart card operating system that defines the
`command sequence that must be followed. 47
`
`Serial data transmission
`
`A type of data transmission in which individual data bits are sent sequentially along a data
`line. (-'>- parallel data transmission)
`
`Service provider
`
`In a smart card system, an entity offering services that are used and paid for by a user. In the
`case of an electronic purse system, a service provider is an entity that receives money from the
`electronic purse of a purse holder in exchange for goods or services.
`
`47 See also Section 5.8, 'Sequence Control'
`
`Ex.1008
`APPLE INC. / Page 12 of 13
`
`

`

`968
`
`Appendix
`
`SIM (subscriber identity module)
`
`The usual designation for a GSM-specific smart card.51 It is a mandatory security module that
`is present in mobile telephones in an exchangeable form. It may be the same size as a standard
`credit card (ID-1 format), or it may be a small plug-in card in the ID-000 format. The SIM
`bears the identity of the subscriber, and its primarily function is to secure the authenticity
`of the mobile station with respect to the network. Additional functions include executing
`programs with protection against manipulation (authentication), user identification (using a
`PIN) and storing data, such as telephone numbers. The equivalent of the SIM in the UMTS is
`the - USIM. 52
`
`SIM Alliance [SIM Alliance]
`
`A consortium founded in 1999 by Gemplus, G + D, ORGA and Schlumberger in order to ailti\V
`services developed for WAP to also be used with non-WAP-capable mobile telephones.Fqr ~j§
`purpose, the SIM must have a SIM-Alliance-capable browser and the mobile. telyp~~nf ~)§t
`support GSM Phase 2+. This allows the - SIM to control the mobile telephone via th~.~•~JM
`Application Toolkit to the extent that the majority of WA

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket