throbber
ETSI TS 1 02 226 V6.12.0
`(2005-09)
`
`
`
`Technical Specification
`
`
`
`Smart cards;
`Remote APDU structure for UICC based applications
`
`(Release 6)
`
`IPR2022-01240
`Apple EX1045 Page 1
`
`

`

`
`
`Release 6
`
`2
`
`
`
`ETSI TS 102 226 V6.12.0 (2005-09)
`
`Reference
`RTS/SCP-T0285r12
`
`Keywords
`
`protocol, smart card
`
`ETSI
`
`650 Route des Lucioles
`
`
`F-06921 Sophia Antipolis Cedex -FRANCE
`
`Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
`
`Siret N° 348 623 562 00017 -NAF 742 C
`
`
`
`Association a but non lucratif enregistree a la
`
`Sous-Prefecture de Grasse (06) N° 7803/88
`
`Important notice
`
`Individual copies of the present document can be downloaded from:
`
`
`
`
`http://www.etsi.org
`
`The present document may be made available in more than one electronic version or in print. In any case of existing or
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).
`
`
`
`
`
`
`
`In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive
`
`within ETSI Secretariat.
`
`Users of the present document should be aware that the document may be subject to revision or change of status.
`
`
`
`
`
`
`
`
`
`
`
`Information on the current status of this and other ETSI documents is available at
`http://portal.etsi.org/tb/status/status.asp
`
`
`If you find errors in the present document, please send your comment to one of the following services:
`
`
`
`
`http://portal.etsi.org/chaircor/ETSI support.asp
`
`Copyright Notification
`
`No part may be reproduced except as authorized by written permission.
`
`
`
`
`
`
`
`The copyright and the foregoing restriction extend to reproduction in all media.
`
`
`
`
`
`© European Telecommunications Standards Institute 2005.
`
`All rights reserved.
`
`DECT™ , PLUGTESTS
`for the benefit of its Members.TM and UMTS TM are Trade Marks of ETSI registered
`
`
`
`
`
`
`of its Members.by ETSI for the benefit TIPHON TM and the TIPHON logo are Trade Marks currently being registered
`
`
`
`Partners.3GPP TM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational
`
`ETSI
`
`IPR2022-01240
`Apple EX1045 Page 2
`
`

`

`
`
`Release 6
`
`3
`
`
`
`ETSI TS 102 226 V6.12.0 (2005-09)
`
`Contents
`
`
`
`
`
`Intellectual Property Rights ................................................................................................................................ 4
`
`
`
`
`
`
`
`
`
`Foreword ............................................................................................................................................................. 4
`
`
`
`1 Scope ........................................................................................................................................................ 5
`
`
`
`
`
`2 References ................................................................................................................................................ 5
`
`3 Definitions and abbreviations ................................................................................................................... 6
`
`
`
`
`
`3 .1 Definitions .......................................................................................................................................................... 6
`
`
`6 3.2 Abbreviations .....................................................................................................................................................
`
`
`
`
`
`
`
`
`
`4 Overview of remote management ............................................................................................................ 6
`
`5 Remote APDU format .............................................................................................................................. 7
`
`
`
`
`
`
`5 .1 Compact Remote Application data format ......................................................................................................... 7
`
`
`5 .1.1 Compact Remote command structure ........................................................................................................... 7
`
`
`5.1.2 Compact Remote response structure ............................................................................................................. 8
`
`
`
`5.2 Expanded Remote Application data format ........................................................................................................ 8
`
`
`
`5.2.1 Expanded Remote command structure ......................................................................................................... 8
`
`
`
`
`5.2.2 Expanded Remote response structure ........................................................................................................... 9
`
`6 Security parameters assigned to applications ........................................................................................... 9
`
`
`
`
`
`
`
`6.1 Minimum Security Level (MSL) ........................................................................................................................ 9
`
`
`6 .2 Access domain .................................................................................................................................................. 10
`
`7 Remote File Management (RFM) .......................................................................................................... 10
`
`
`
`
`7.1 Commands ........................................................................................................................................................ 10
`
`
`
`11 ...................................................................................... 7.2 UICC Shared File System Remote File Management
`
`
`7 .3 ADF Remote File Management ........................................................................................................................ 11
`
`8 Remote Application Management (RAM) ............................................................................................. 11
`
`
`
`8.1
`
`
`
`
`
`Remote application management application behaviour .................................................................................. 12
`8.2
`
`
`
`Commands coding and description ................................................................................................................... 12
`8.2.1
`
`Commands .................................................................................................................................................. 12
`8.2.1.1
`
`DELETE ............................................................................................................................................... 12
`8.2.1.2
`
`SET STATUS ....................................................................................................................................... 12
`8.2.1.3
`
`INSTALL .............................................................................................................................................. 13
`8.2.1.3.1
`
`
`INST ALL [ for load] ........................................................................................................................ 13
`8.2.1.3.2
`
`
`INST ALL [ for install] ..................................................................................................................... 13
`8.2.1.4
`
`LOAD ................................................................................................................................................... 20
`8.2.1.5
`
`PUTKEY .............................................................................................................................................. 20
`8.2.1.6
`
`GET STATUS ....................................................................................................................................... 20
`8.2.1.6.1
`
`
`Menu parameters ............................................................................................................................. 20
`8.2.1.7
`
`GETDATA ........................................................................................................................................... 21
`8.2.1.7.1
`
`Void ................................................................................................................................................. 21
`8.2.1.7.2
`
`
`
`Extended Card resources information ............................................................................................. 21
`
`9 Additional command for push ................................................................................................................ 22
`
`
`
`
`9.1 Push command behaviour ................................................................................................................................ 22
`
`
`
`9.1.1 Request for open channel ............................................................................................................................ 22
`
`
`
`
`9.1.2 Request for CAT_TP link establishment .................................................................................................... 22
`
`
`
`9.1.3 Behaviour for responses .............................................................................................................................. 22
`
`
`
`9.2 Commands coding ............................................................................................................................................ 22
`
`
`9 .2.1 Data for BIP channel opening ..................................................................................................................... 23
`
`
`23 9.2.2 Data for CAT TP link establishment. .........................................................................................................
`
`
`
`9.3 Closing of the BIP channel ............................................................................................................................... 23
`
`Annex A (normative):
`
`
`BER-TL V tags ................................................................................................ 24
`
`
`Annex B (informative):
`
`
`
`Change history ............................................................................................... 25
`
`
`
`
`
`History .............................................................................................................................................................. 27
`
`ETSI
`
`IPR2022-01240
`Apple EX1045 Page 3
`
`

`

`Release 6
`
`4
`
`ETSI TS 102 226 V6.12.0 (2005-09)
`
`Intellectual Property Rights
`
`IPRs essential or potentially essential to the present document may have been declared to ETSI. The information
`pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
`in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, orpotentially Essential, IPRs notified to ETSI in
`respect ofETSI standards", whichis available from the ETSI Secretariat. Latest updates are available on the ETSI Web
`server
`://webapp.etsi.org/IPR/home.asp).
`
`Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
`can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
`server) which are, or may be, or may become,essential to the present document.
`
`Foreword
`
`This Technical Specification (TS) has been produced by ETSI Project Smart Card Platform (SCP).
`
`It is based on work originally done in the 3GPP in TSG-terminals WG3 and ETSI SMG.
`
`The contents of the present documentare subject to continuing work within EP SCP and may change following formal
`EP SCPapproval. If EP SCP modifies the contents of the present document, it will then be republished by ETSI with an
`identifying change of release date and an increase in version numberas follows:
`
`Version X.y.Z
`
`where:
`
`x:
`
`thefirst digit:
`
`0—early working draft;
`
`1
`
`2
`
`presented to EP SCP for information;
`
`‘presented to EP SCPfor approval;
`
`3__or greater indicates EP SCP approved document under changecontrol.
`
`y:
`
`z:
`
`the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections,
`updates, etc.
`
`the third digit is incremented when editorial only changes have been incorporated in the document.
`
`ETSI
`
`IPR2022-01240
`Apple EX1045 Page 4
`
`IPR2022-01240
`Apple EX1045 Page 4
`
`

`

`Release 6
`
`5
`
`ETSI TS 102 226 V6.12.0 (2005-09)
`
`1
`
`Scope
`
`The present document defines the remote management of the UICC based on the secured packetstructure specified in
`TS 102 225 [1].
`
`It specifies the APDU format for remote management.
`
`e
`
`e
`
`Furthermore the present documentspecifies: a set of commands coded according to this APDUstructure and
`used in the remote file management on the UICC. This is based on TS 102 221 [2].
`
`Aset of commandscoded according to this APDU structure and used in the remote application management
`on the UICC.This is based on the GlobalPlatform Card Specification[4].
`
`2
`
`References
`
`The following documents contain provisions which, through referencein this text, constitute provisions of the present
`document.
`

`
`Referencesare either specific (identified by date of publication and/or edition numberor version number) or
`non-specific.
`
`e_For a specific reference, subsequent revisions do not apply.
`
`e__For anon-specific reference, the latest version applies. In the case of a reference to an EP SCP document, a
`non-specific reference implicitly refers to the latest version of that documentin the same Release as the
`present document.
`
`Referenced documents which are not foundto be publicly available in the expected location might be found at
`http://docbox.etsi.org/Reference.
`
`[1]
`
`[2]
`
`[3]
`
`[4]
`
`ETSI TS 102 225: "Smart cards; Secured packet structure for UICC based applications".
`
`ETSI TS 102 221: "Smart cards; UICC-Terminalinterface; Physical and logical characteristics".
`
`ETSI TS 102 223: "Smart cards; Card Application Toolkit (CAT)".
`
`GlobalPlatform (March 2003): "GlobalPlatform Card Specification, Version 2.1.1".
`
`NOTE:_Seehttp://www.globalplatform.org/.
`
`[5]
`
`[6]
`
`[7]
`
`[8]
`
`ETSI TS 101 220: "Smart cards; ETSI numbering system for telecommunication application
`providers".
`
`ETSI TS 143 019: "Digital cellular telecommunications system (Phase 2+); Subscriber Identity
`Module Application Programming Interface (SIM API) for Java Card; Stage 2 (3GPP TS 43.019)".
`
`ETSI TS 102 241: "Smart cards; UICC Application Programming Interface (UICC API) for Java
`Card (TM)".
`
`GlobalPlatform: "GlobalPlatform Card Specification Version 2.0.1".
`
`NOTE:_See http://www.globalplatform.org/.
`
`[9]
`
`GlobalPlatform: "Card Specification 2.1 Compliance Packages Version 1.1".
`
`NOTE:_See http://www.globalplatform.org/.
`
`[10]
`
`ETSI TS 102 222: "Integrated Circuit Cards (ICC); Administrative commands for
`telecommunications applications”.
`
`ETSI
`
`IPR2022-01240
`Apple EX1045 Page 5
`
`IPR2022-01240
`Apple EX1045 Page 5
`
`

`

`Release 6
`
`6
`
`ETSI TS 102 226 V6.12.0 (2005-09)
`
`[11]
`
`[12]
`
`ETSI TS123 048: "Digital cellular telecommunications system (Phase 2+); Universal Mobile
`Telecommunications System (UMTS); Security mechanismsfor the (U)SIM application toolkit;
`Stage 2 (3GPP TS 23.048)".
`
`ETSI TS 102 127: "Smart cards; Transport protocol for CAT applications; Stage 2".
`
`3
`
`Definitions and abbreviations
`
`3.1
`
`Definitions
`
`For the purposes of the present document, the terms and definitions given in TS 102 225 [1] and TS 101 220 [5] apply.
`
`3.2
`
`Abbreviations
`
`For the purposes of the present document, the abbreviations given in TS 102 225 [1] and the following apply:
`
`ADD
`ADP
`AID
`BER-TLV
`BIP
`C-APDU
`DAP
`DEK
`MSL
`MSLD
`RAM
`R-APDU
`RFM
`RFU
`UICC
`
`Access Domain Data
`Access Domain Parameter
`Application Identifyer
`Basic Encoding Rules - Tag, Length, Value
`Bearer Independent Protocol
`Command Application Protocol Data Unit
`Data Authentication Pattern
`Data Encryption Key
`Minimum Security Level
`Minimum Security Level Data
`Remote Application Management
`Response Application Protocol Data Unit
`Remote File Management
`Reserved for Future Use
`Universal Integrated Curcuit Card
`
`4
`
`Overview of remote management
`
`Receiving
`Entity
`
`Receiving
`
`Sending
`Application
`
`Sending
`Entity
`
`Application
`
`Figure 4.1: Remote management
`
`ETSI
`
`IPR2022-01240
`Apple EX1045 Page 6
`
`IPR2022-01240
`Apple EX1045 Page 6
`
`

`

`Release 6
`
`7
`
`ETSI TS 102 226 V6.12.0 (2005-09)
`
`All data exchanged between the Sending Entity and Receiving Entity shall be formatted as "Secured data" according to
`TS 102 225 [1]:
`
`1)
`
`2)
`
`3)
`
`4)
`
`5
`
`5.1
`
`The parameter(s) in the "Secured data"is either a single command, ora list of commands, which shall be
`processed sequentially.
`
`The Remote Managementapplication shall take parameters from the "Secured data" and shall act upon the
`files or applications according to these parameters. A Remote Managementapplication is the on-card
`Receiving Application that performs either Remote File Management (RFM)or Remote Application
`Management (RAM) as defined in the following clauses.
`
`Remote Management commandsshall be executed by the dedicated Remote Management Application (RAM).
`A Command "session" is defined as starting upon receipt of the parameter/commandlist, and ends when the
`parameterlist in the "Secured data" is completed, or whenan error(i.e. SW1 of the commandindicates an
`error condition) is detected which shall halt further processing of the commandlist. Warnings or procedure
`bytes do nothalt processing of the commandlist.
`
` Atthe beginning and end of a Command "session"the logical state of the UICC as seen from the terminalshall
`not be changedto an extentsufficient to disrupt the behaviour of the terminal. If changes in the logical state
`have occurred that the terminal needs to be awareof, the application on the UICC may issue a REFRESH
`commandaccording to TS 102 223 [3]. However, this is application dependent and therefore out of scope of
`the present document.
`
`Remote APDU format
`
`Compact Remote Application data format
`
`5.1.1
`
`Compact Remote commandstructure
`
`A commandstring may contain a single commandor a sequence of commands. Thestructure of each commandshall be
`according to the generalized structure defined below; each element other than the Data field is a single octet (see
`TS 102 221 [2]).
`
`The format of the commandsis the sameas the one defined in TS 102 221 [2] for T= 0 TPDU commands.
`
`Class byte
`CLA
`
`Instruction
`code (INS
`
`P1
`
`P2
`
`If the sending application needsto retrieve the Response parameters/data of a case 4 command, then a GET
`RESPONSEcommandshall follow this commandin the commandstring.
`
`The GET RESPONSEandany case 2 command (i.e. READ BINARY, READ RECORD)shall only occur once in a
`commandstring and,if present, shall be the last commandinthestring.
`
`Forall case 2 commandsand for the GET RESPONSE command,if P3 = '00', then the UICC shall send backall
`available response parameters/data e.g. if a READ RECORD command has P3="'00' the whole record shall be returned.
`The limitation of 256 bytes does not apply for the length of the response data. In case the data is truncated in the
`response, the remaining bytes are lost and the status wordsshall be set to '62 FI’.
`
`ETSI
`
`IPR2022-01240
`Apple EX1045 Page 7
`
`IPR2022-01240
`Apple EX1045 Page 7
`
`

`

`Release 6
`
`8
`
`ETSI TS 102 226 V6.12.0 (2005-09)
`
`5.1.2
`
`Compact Remote responsestructure
`
`If a proof of Receipt is required by the sending entity, the Additional Response Data sent by the Remote Management
`Application shall be formatted according to table 5.1.
`
`Table 5.1: Format of additional response data
`
`Length|C—“‘“CC«*SN€meeCeCCds
`Number of commands executed within the commandscript (see note
`Status bytes or'61 xx’ procedure bytesoflast executed command/
`GET RESPONSE
`Responsedata of last executed command / GET RESPONSE if
`available (i.e. if the last command was a case 2 command or a GET
`RESPONSE
`NOTE:_This field shall be set to '01' if one command was executedwithin the
`
`Xx
`
`commandscript, '02' if two commands were executed, etc.
`
`5.2
`
`Expanded Remote Application data format
`
`5.2.1
`
`Expanded Remote commandstructure
`
`The "Secured data" sent to a Remote Management Application shall be a BER-TLV data object formatted according to
`table 5.2.
`
`Table 5.2: Expanded format of Remote Managementapplication command "secured data"
`
`Lengthinbytes|CName
`CommandScripting template tag
`Length of CommandScripting template= A+B+...C
`C-APDU
`a-e
`P
`
`C-APDU
`
`C-APDU
`
`The CommandScripting template is a BER-TLV data object as defined in TS 101 220 [5] and the tag of this TLV is
`defined in annex A.
`
`A Remote Managementapplication commandstring may contain a single or several C-APDU TLVs.
`
`The structure of each C-APDUshall be a TLV structure coded according to the C-APDU COMPREHENSION-TLV
`data object coding defined in TS 102 223 [3]. The restriction on the length of the C-APDU mentionedin the note in
`TS 102 223 [3] shall not apply.
`
`Forall case 2 and case 4 C-APDUs, if Le='00' in the C-APDU,then the UICC shall send backall available response
`parameters/data in the R-APDU e.g. ifa READ RECORD command has Le='00'the whole record shall be returned.
`The limitation of 256 bytes does not apply for the length of the response data.
`
`In case the data is truncated in the response of a C-APDU,the status words for this C-APDU shall be set to '62 F1' in
`the corresponding R-APDU.This shall terminate the processing of the commandlist.
`
`Ifa R-APDUfills the response buffer so that no further R-APDU can be included in the response scripting template,
`this shall terminate the processing of the commandlist.
`
`If Le field is empty in the C-APDU,then no response data is expected in the R-APDU.In that case, no R-APDUshall
`be returned by the UICCin the application additional response data except if the corresponding C-APDUisthelast
`command executed in the script.
`
`NOTE:
`
`In this expanded format the GET RESPONSE commandis not used.
`
`ETSI
`
`IPR2022-01240
`Apple EX1045 Page 8
`
`IPR2022-01240
`Apple EX1045 Page 8
`
`

`

`Release 6
`
`9
`
`ETSI TS 102 226 V6.12.0 (2005-09)
`
`5.2.2
`
`Expanded Remote responsestructure
`
`The additional response application data which may be sent by a Remote Managementapplication is a BER-TLVdata
`object and shall be formatted according to table 5.3.
`
`Table 5.3: Expanded Format of Remote Managementapplication additional response data
`
`TLV is present only oncein the Response Scripti
`
`|Lengthinbytes|CName
`
`|=1~——_—*'|ResponseScriptingtemplatetagCd
`L2
`
`
`|L2|LengthofResponseScriptingtemplate=X+A+B..C
`
`R-APDU offirst executed case 2/ case 4 C-APDUin the script
`R-APDU of second executed case 2/ case 4 C-APDU in the script
`a-e
`|
`PE
`R-APDU oflast executed C-APDU in the script
`If the last executed C-APDU is a case 2 or case 4 command the R-APDU
`
`NOTE:
`
`The ResponseScripting template is a BER-TLV data object as defined in TS 101 220 [5] and the tag of this TLV is
`defined in annex A.
`
`The Number of executed C-APDUs TLVis a BER-TLVdata object and shall be coded as shown in table 5.4.
`
`Length in bytes
`|=1. |Numberof executed C-APDUstag
`Length=X|1 Length=x
`
`Numberof executed C-APDUs
`
`Table 5.4: Number of executed C-APDUs TLV
`
`The Number of executed C-APDUstag is defined in annex A. The Numberof executed C-APDUsvalue corresponds to
`the number of C-APDUsexecuted within the commandscript.
`
`Thestructure of each R-APDUshall be a TLV structure coded according to the RRAPDU COMPREHENSION-TLV
`data object coding defined in TS 102 223 [3]. Therestriction on the length of the R-APDU mentionedin the note in
`TS 102 223 [3] shall not apply. For Le='00', the length of the R-APDU may be coded on more than two bytes.
`
`A Remote Managementapplication response string may contain a single or several R-APDU TLVs.
`
`6
`
`6.1
`
`Security parameters assigned to applications
`
`Minimum Security Level (MSL)
`
`The Minimum Security Level (MSL) is used to specify the minimum level of security to be applied to Secured Packets
`sent to any Receiving Application. The Receiving Entity shall check the Minimum Security Level before processing the
`security of the CommandPacket. If the check fails, the Receiving Entity shall reject the messages and a Response
`Packet with the "Insufficient Security Level" Response Status Code (see TS 102 225 [1]) shall be sent if required.
`
`A Minimum Security Level as described in clause 8.2.1.3.2.4 shall be assigned to each Remote Managementapplication
`(RFM/RAM).
`
`ETSI
`
`IPR2022-01240
`Apple EX1045 Page 9
`
`IPR2022-01240
`Apple EX1045 Page 9
`
`

`

`Release 6
`
`10
`
`ETSI TS 102 226 V6.12.0 (2005-09)
`
`6.2
`
`Access domain
`
`The Access Domainis a parameter used to define the access rights granted to an Application allowingit to perform
`operations on UICCfiles specified in TS 102 221 [2]. Access Conditions of UICC Files shall be coded as defined in
`TS 102 221 [2].
`
`The access rights granted to an application by its Access Domain shall be independent from the access rights granted at
`the UICC/Terminalinterface.
`
`NOTE:_This implies in particular that the status of a secret code (e.g. disabled PIN1, blocked PIN2,etc.) at the
`UICC/Terminalinterface does not affect the access rights granted to an application.
`
`An Access Domain as described in clause 8.2.1.3.2.5 shall be assigned to each Remote File Management Application.
`
`t
`
`Remote File Management (RFM)
`
`The concept of embedding APDUs in a commandpacketand the Additional Response data in a response packet shall be
`as defined in the previous clauses describing the Compact and expanded Remote Application data format.
`
`The Compact and expanded Remote Application data formats shall be distinguished by different TAR values.
`
`7.1
`
`Commands
`
`The standardized commandsarelisted in table 7.1. The commandsare as defined in TS 102 221 [2] and
`TS 102 222 [10].
`
`Table 7.1: Remote File Management commands
`
`The SELECT commandshall not include the selection by DF name corresponding to P1='04' in the Command
`Parameters of SELECT(see TS 102 221 [2]).
`
`The Response Data shall be placed in the Additional Response Data element of the Response Packet.
`

`

`
`If P3/Le ='00' in the READ RECORD command, then the UICC shall send back the whole record data.
`
`If P3/Le ='00' in the READ BINARY command,then the UICC shall send back all data until the end of the
`file, according to clause 5.1.
`
`ETSI
`
`IPR2022-01240
`Apple EX1045 Page 10
`
`IPR2022-01240
`Apple EX1045 Page 10
`
`

`

`Release 6
`
`11
`
`ETSI TS 102 226 V6.12.0 (2005-09)
`
`7.2
`
`UICC Shared File System Remote File Management
`
`A UICC Shared File System Remote File Managementapplication shall have access only to the MF andall DFs and
`EFsthat are located under the MF.
`
`NOTE:
`
`ADFsare not considered to befiles located under the MF.
`
`The MFshall be implicitly selected and be the current directory at the beginning of a Command "session".
`
`No ADFshall be accessed by the UICC Shared File System Remote File Managementapplication.
`
`All commandsdefined in clause 7.1 shall apply.
`
`The TAR value of the UICC Shared File System Remote File Management application is defined in TS 101 220 [5].
`
`7.3
`
`ADF Remote File Management
`
`An ADF Remote File Management application shall have access to the DFs and EFs located under the ADF.
`
`The ADFshall be implicitly selected and be the current directory at the beginning of a Command "session".
`
`The UICC Shared File System,i.e. the MF and all DFs and EFsthat are located under the MF, mayalso be accessed,
`depending on the access rights granted to the ADF Remote File Managementapplication.
`
`NOTE:
`
` ADFsare not consideredto be files located under the MF.
`
`All commandsdefined in clause 7.1 shall apply.
`
`The TAR of an ADF RFMapplication shall be linked to the AID ofthe application to which the ADF belongs.
`
`The TAR value of an ADF Remote File Managementapplication is defined in TS 101 220 [5].
`
`8
`
`Remote Application Management (RAM)
`
`Remote Application Management on a UICC cardincludesthe ability to load, install, and remove applications. This
`managementis under the control of the Issuer Security Domain or any Security Domain with delegated management
`privileges as described in GlobalPlatform Card Specification [4].
`
`All GlobalPatform features and functionality that are described in the present clause shall comply to GlobalPlatform
`Card Specification [4].
`
`A RAM Application shall support the features and functionality described as mandatory in Package 0 "Core OP
`functionality" of GlobalPlatform Card Specification 2.1 Compliance Packages [9] unless they are specifically defined as
`not applicable or optionalin the presentclause.
`
`A RAM Application shall support all features and functionality described in the present clause unless they are
`specifically described as optional.
`
`The support of the APIs defined in GlobalPlatform Card Specification [4] (Package 0.A (Java Card APD or
`Package 0.B (Windows Powered Smart Cards API) in GlobalPlatform Card Specification 2.1 Compliance Packages [9]
`is optional.
`
`Remote Application Management commandsshall be executed according to table 9.1 of GlobalPlatform Card
`Specification [4].
`
`The TAR value allocated for the Issuer Security Domain are defined in TS 101 220[5].
`
`The concept of embedding APDUs in a commandpacketand the Additional Response data in a response packet shall be
`as defined in the previous clauses describing the Compact and expanded Remote Application data format.
`
`The Compact and expanded Remote Application data formats shall be distinguished by different TAR values.
`
`The Minimum Security Level of a RAM Application shall require at least integrity using CC or DS.
`
`ETSI
`
`IPR2022-01240
`Apple EX1045 Page 11
`
`IPR2022-01240
`Apple EX1045 Page 11
`
`

`

`Release 6
`
`12
`
`ETSI TS 102 226 V6.12.0 (2005-09)
`
`A complying card shall support at least the DES CBC algorithm for cryptographic computations.
`
`8.1
`
`Remote application management application behaviour
`
`Remote Load File loading, Application installation, Load File removal, Application removal, Application
`locking/unlocking, Application information retrieval shall be compliant to GlobalPlatform Card Specification [4].
`
`As a RAM Application is a Receiving Application per clause 4, application selection (SELECT command) and
`commanddispatching as described in GlobalPlatform Card Specification [4] do not apply to Remote Application
`Management.
`
`8.2
`
`Commandscoding and description
`
`Commandsandresponsesshall be coded according to GlobalPlatform Card Specification [4] unless otherwise specified
`in the present specification.
`
`Secure messaging shall be based on TS 102 225 [1]. Therefore secure messaging as defined in GlobalPlatform Card
`Specification [4] shall not apply to RAM APDU commandsand responses(e.g. MAC shall not be presentin the
`commanddata field). In addition the class byte shall indicate that an APDU commandincludes no secure messaging.
`
`The logical channel numberindicated in the class byte shall be zero.
`
`Commandstatus words placed in the Additional Response Data element of the Response Packetshall be coded
`according to the GlobalPlatform Card Specification [4].
`
`8.2.1
`
`Commands
`
`The standardized commandsarelisted in table 8.1.
`
`Table 8.1: Application management commands
`
`for Menu parameters
`
`GET DATA as case 2 command
`GET DATA as case 4 command
`
`Support of the STORE DATA commanddescribed in GlobalPlatform Card Specification [4] is optional.
`
`The Response Data shall be placed in the Additional Response Data element of the Response Packet.
`
`8.2.1.1
`
`DELETE
`
`The removal of Applications, of Executable Load Files, and of Executable Load Files and its related Applications shall
`be supported.
`
`The warning status word '6200' (Application has been logically deleted) as defined in Open Platform Card
`Specification 2.0.1 [8] may be returned.
`
`8.2.1.2
`
`SET STATUS
`
`The managementof Applications, Issuer Security Domain and Security Domains Life Cycle States shall be supported.
`
`ETSI
`
`IPR2022-01240
`Apple EX1045 Page 12
`
`IPR2022-01240
`Apple EX1045 Page 12
`
`

`

`Release 6
`
`13
`
`ETSI TS 102 226 V6.12.0 (2005-09)
`
`8.2.1.3
`
`INSTALL
`
`INSTALL[for load], INSTALL[forinstall] and INSTALL[for make selectable] commandsshall be supported.
`
`In addition the support of the combined[for install and make selectable] within the same INSTALL commandis
`mandatory.
`
`8.2.1.3.1
`
`INSTALL[for load]
`
`A card supporting DAP verification shall support the Load File Data Block Hash according to GlobalPlatform Card
`Specification [4].
`
`NOTE:
`
`The exact generation of the DAP wasnot defined in previous releases of the present document.
`Inter-operability with previous releases should be handled with care.
`
`If present, the Load Parameter Field of the INSTALL[for load] commandshall be coded according to GlobalPlatform
`Card Specification [4].
`
`If the System Specific parameters "Non volatile code space limit" (Tag 'C6'), "Volatile data space limit" (Tag 'C7') and
`"Non volatile data space limit" (Tag 'C8') are present, the UICC shall be able to handle them.
`
`8.2.1.3.2
`
`INSTALL[for install]
`
`If present, the Install Parameter Field of the INSTALL[for install] command shall be coded according to
`GlobalPlatform Card Specification [4].
`
`If the Sys

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket