TS 101 206-7 : 1.3.1
Current
The latest, up-to-date edition.
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Physical characteristics of the SM
5 Electronic signals and transmission protocols
6 Logical model for SM
7 General concepts
7.1 General security principles
7.2 SM Life cycle
7.3 Configuration of the system
7.4 SM security functions
8 Description of the functions of a SM
8.1 Functions without MAC
8.2 Functions used to compute a cryptogram or MAC
8.3 Functions verifying cryptograms or MAC
8.4 Functions for downloading of keys from the
SM to the UC
8.5 Functionality on SM - EW interface
8.6 Linking functions with keys
8.7 Limitations of the usage of keys
9 Data elements
9.1 Data for SM identification
9.2 UC data
9.3 Status conditions returned by the SM
Annex A (normative): The case of a SM in the
form of an IC card
A.1 Purpose
A.2 General requirements of a SM in the
form of an IC card
A.3 Card architecture
A.4 Description of files
A.5 Commands
A.6 Status conditions returned by the SM
A.7 Functions for downloading of keys from
SM to UC
Annex B (informative): Scenarios for SM in the
form of an IC card
B.1 Key diversification procedure
B.2 Authentication of UC by the SM
B.3 Authentication of SM by the UC
B.4 Compute MAC for protected mode
(message authentication)
B.5 Verify MAC command
B.6 UPDATE (SM)
B.7 Secure transfer of units from UC to SM
B.8 Secure transfer of units from SM to UC
(reload)
B.9 Scenarios for downloading keys
Bibliography
History
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.