ETSI - TS 102 223
Smart Cards; Card Application Toolkit (CAT)
|Publication Date:||1 May 2014|
The present document defines the interface between the UICC and the terminal, and mandatory terminal procedures, specifically for "NAA Card Application Toolkit".
The Card Application Toolkit (CAT) is a set of generic commands and procedures for use by the ICC, irrespective of the access technology of the network. Within the scope of the present document, the UICC refers here to an ICC which supports at least one application in order to access a network. This application is called here Network Access Application (NAA).
The ICC is considered as a platform, which is either based on TS 102 221  or TS 102 600 , here called "3G platform", or TS 151 011 , here called "2G platform".
NAA can be:
• a USIM application, as defined in TS 131 102 , which can reside only on a 3G platform;
• a SIM application, as defined in TS 151 011 , which can reside either on a 3G or a 2G platform;
• a TSIM application, as defined in TS 100 812 [i.2], which can reside only on a 3G platform;
• a ISIM application, as defined in TS 131 103 , which can reside only on a 3G platform;
• a CSIM application, as defined in 3GPP2 C.S0065-B ;
• an R-UIM application, as defined in 3GPP2 C.S0023-D ; or
• other applications residing on a 3G platform or a 2G platform. Specifying the interface is to ensure interoperability between an ICC and a terminal independently of the respective manufacturers and operators.
The present document specifies as well mechanisms in order to expand the generic set of commands and procedures by access technology specific ones.
The present document defines:
• the commands;
• the application protocol;
• the mandatory requirements on the ICC and terminal for each procedure.
The present document does not specify any aspects related to the administrative management phase. Any internal technical realization of either the ICC or the terminal are only specified where these reflect over the interface. The present document does not specify any of the security algorithms that may be used.