Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

1

SIM CARDS

ID-1 SIM CARD

16.48 mm

Plug-In SIM 6.25 mm 54 mm

85.6 mm

Plug-in SIM CARD

CCO

CONTACTS

15 mm

25 mm
5

File Structure of SIM Card


MF

EF0

EF1

EF2

EF3

DF1

DF2

EF1

EF2

SF1

EF1

SF2

EF1

EF2

EF1

EF2

Access condition ALWays

Description The file can be accessed by any software resident on the card or off the card

CHV1

The file can be accessed only after CHV1 has been correctly presented, or if CHV1 checking is disabled. The disabling of CHV1 checking may be inhibited by GSM administration. The file can be accessed only after CHV2 has been correctly presented.CHV2 is used to disable CHV1 checking and thus unlock the SIM card. Reserved for use by GSM administration. Off-card software cannot access the data or program . On-card software may access the file.
7

CHV2

ADM NEVer

The SIM card provides storage capability for : * Administrative information * ID Card identification * SIM Service table * IMSI * Location information * Encryption keys and encryption key sequence no. * BCCH information * Access control class * Forbidden PLMNs * HPCMN search period * Language preference * Phase identification
8

SIM card may also optionally provide storage capacity for: * PLPN selector * Cell broadcast message identifier selection * Abbreviated dialing no/supplementary service control * Fixed dialing no/supplementary service control * MSISDN no * Last no dialed * Called party sub address * Short messages & associated parameters * Accumulated call meter , accumulated call meter max value, price per unit, & currency table.
9

A SIM comprises a micro-controller it has 5Kb of ROM and 2kb of EPROM and it is divided into different distinct zones: The manufacturer zone: The chip is programmed with the manufacturer identity and the component number of the chip. The secret zone: This zone contains data that cant be read or over-written. This data control the access to the functions activating the card, the sender key, the key proving service, and the code carrying key. Status zone: Stores the keys needed to access the protected data. Confidential zone: This zone holds the permanent protected data which is only accessible via the sender key or the code carrying key ( authentication and ciphering algorithms.) The transaction zone : After personalization of the card, this area stores subscriber data that can be accessed with or without a key (PIN), according to the conditions written in the manufacturers zone. The open zone: This zone contains the non-confidential data that can be freely read. Operating Voltage: 5 Volt 3 Volt 1.8 Volt

10

11

12

You might also like