
1.What s the expansion of SIM ?
A subscriber identity module or subscriber identification module
2.What information does a SIM store?
unique serial number (ICCID)
securely stores the service-subscriber key (IMSI)
security authentication and ciphering information
temporary information related to the local network
a list of the services the user has access to
two passwords (PIN for usual use and PUK for unlocking).
At present A micro-SIM has :
Allowance for multiple simultaneous applications accessing the card through logical channels
Mutual authentication as a way to eliminate carrier spoofing by allowing the SIM card to authenticate the cell tower to which it is connecting
PIN protection with hierarchical PIN management with a universal PIN, an application PIN and a local PIN
Expanded phonebook storage on the SIM card with entries for email, second name, and groups

3.First sim cards were of the size__
SIM cards were first made the same size as a credit card (85.60 mm × 53.98 mm × 0.76 mm). Presently to 25 mm × 15 mm.
4.First sim was made in
The first SIM card was made in 1991 by Munich smart card maker Giesecke & Devrient, who sold the first 300 SIM cards to Finnish wireless network operator Radiolinja.
5.SIM operates at what voltage?
There are three operating voltages for SIM cards: 5 V, 3 V and 1.8 V
(ISO/IEC 7816-3 classes A, B and C, respectively).
The operating voltage of the majority of SIM cards launched before 1998 was 5 V.
SIM cards produced subsequently are compatible with 3 V and 5 V or with 1.8 V and 3 V.
6.Wht are the two types of Dual SIM phones?
The first allows one to switch between the SIMs, whilst the second allows both SIMs to be active simultaneously.
7.What are the SIM operating systems ?
They come in two main types: native and Java Card.
Native SIMs are based on proprietary, vendor-specific software, whereas the Java Card SIMs are based on standards, particularly Java Card, which is a subset of the Java programming language specifically targeted at embedded devices.
Java Card allows the SIM to contain programs that are hardware independent and interoperable.
8.What is I C C ID?
Each SIM is internationally identified by its Integrated circuit card identifier (ICCID). ICCIDs are stored in the SIM cards and are also engraved or printed on the SIM card body during a process called personalization. The ICCID is defined by the ITU-T recommendation E.118 as the Primary Account Number.
Its layout is based on ISO/IEC 7812. According to E.118, the number is up to 19 digits long, including a single check digit calculated using the Luhn algorithm. However, the GSM Phase defined the ICCID length as 10 octets with operator-specific structure.
The number is composed of the following subparts:
Issuer identification number (IIN)
Maximum of seven digits:
Major industry identifier (MII), 2 fixed digits, 89 for telecommunication purposes.
Country code, 1-3 digits, as defined by ITU-T recommendation E.164.
Issuer identifier, 1-4 digits.
Individual account identification
Individual account identification number. Its length is variable but every number under one IIN will have the same length.
Check digit
Single digit calculated from the other digits using the Luhn algorithm.
With the GSM Phase 1 specification using 10 octets into which ICCID is stored as packed BCD, the data field has room for 20 digits with hexadecimal 'F' being used as filler when necessary.
In practice, this means that on GSM SIM cards there are 20-digit (19+1) and 19-digit (18+1) ICCIDs in use, depending upon the issuer. However, a single issuer always uses the same size for its ICCIDs.
To confuse matters more, SIM factories seem to have varying ways of delivering electronic copy of SIM personalization datasets. Some datasets are without the ICCID checksum digit, others are with the digit.
What is International mobile subscriber identity (IMSI)?
SIM cards are identified on their individual operator networks by a unique IMSI. Mobile operators connect mobile phone calls and communicate with their market SIM cards using their IMSIs. The format is:
The first 3 digits represent the Mobile Country Code (MCC).
The next 2 or 3 digits represent the Mobile Network Code (MNC). 3-digit MNC codes are allowed by E.212 but are mainly used in the United States and Canada.
The next digits represent the mobile station identification number. Normally there will be 10 digits but would be fewer in the case of a 3-digit MNC or if national regulations indicate that the total length of the IMSI should be less than 15 digits.

What is Authentication key (Ki)?
The Ki is a 128-bit value used in authenticating the SIMs on the mobile network. Each SIM holds a unique Ki assigned to it by the operator during the personalization process. The Ki is also stored in a database (known as Authentication Center or AuC) on the carrier's network.
The SIM card is designed not to allow the Ki to be obtained using the smart-card interface. Instead, the SIM card provides a function, Run GSM Algorithm, that allows the phone to pass data to the SIM card to be signed with the Ki. This, by design, makes usage of the SIM card mandatory unless the Ki can be extracted from the SIM card, or the carrier is willing to reveal the Ki. In practice, the GSM cryptographic algorithm for computing SRES_2 (see step 4, below) from the Ki has certain vulnerabilities[citation needed] that can allow the extraction of the Ki from a SIM card and the making of a duplicate SIM card.
How is the Authentication process carried out? :
When the Mobile Equipment starts up, it obtains the International Mobile Subscriber Identity (IMSI) from the SIM card, and passes this to the mobile operator requesting access and authentication. The Mobile Equipment may have to pass a PIN to the SIM card before the SIM card will reveal this information.
The operator network searches its database for the incoming IMSI and its associated Ki.
The operator network then generates a Random Number (RAND, which is a nonce) and signs it with the Ki associated with the IMSI (and stored on the SIM card), computing another number known as Signed Response 1 (SRES_1).
The operator network then sends the RAND to the Mobile Equipment, which passes it to the SIM card. The SIM card signs it with its Ki, producing SRES_2, which it gives to the Mobile Equipment along with encryption key Kc. The Mobile Equipment passes SRES_2 on to the operator network.
The operator network then compares its computed SRES_1 with the computed SRES_2 that the Mobile Equipment returned. If the two numbers match, the SIM is authenticated and the Mobile Equipment is granted access to the operator's network. Kc is used to encrypt all further communications between the Mobile Equipment and the network.
How is the Location area identified?
The SIM stores network state information, which is received from the Location Area Identity (LAI). Operator networks are divided into Location Areas, each having a unique LAI number. When the device changes locations, it stores the new LAI to the SIM and sends it back to the operator network with its new location. If the device is power cycled, it will take data off the SIM, and search for the previous LAI. This saves time by avoiding having to search the whole list of frequencies that the telephone normally would.
How is SMS messages and contacts stored?
Most SIM cards will orthogonally store a number of SMS messages and phone book contacts. The contacts are stored in simple 'Name and number' pairs: entries containing multiple phone numbers and additional phone numbers will usually not be stored on the SIM card. When a user tries to copy such entries to a SIM the handset's software will break them up into multiple entries, discarding any information that isn't a phone number. The number of contacts and messages stored depends on the SIM; early models would store as few as 5 messages and 20 contacts while modern SIM cards can usually store over 250 contacts.
SIM card sizes
SIM card Standard reference Length (mm) Width (mm) Thickness (mm)
Full-size ISO/IEC 7810:2003, ID-1 85.60 53.98 0.76
Mini-SIM ISO/IEC 7810:2003, ID-000 25.00 15.00 0.76
Micro-SIM ETSI TS 102 221 V9.0.0, Mini-UICC 15.00 12.00 0.76
The micro-SIM was developed by the European Telecommunications Standards Institute along with SCP, 3GPP (UTRAN/GERAN), 3GPP2 (CDMA2000), ARIB, GSMAssociaton (GSMA SCaG and GSMNA), GlobalPlatform, Liberty Alliance, and the Open Mobile Alliance (OMA) for the purpose of fitting into devices otherwise too small for a mini-SIM card.[2][5]
The form factor was mentioned in the Dec 1998 3GPP SMG9 UMTS Working Party, which is the standards-setting body for GSM SIM cards,[6] and the form factor was agreed upon in late 2003.[7]
The micro-SIM was created with backwards compatibility in mind. The major issue with backwards compatibility was the contact area of the chip. Retaining the same contact area allows the micro-SIM to be compatible with the previous, larger SIM readers through the use of plastic cutout surrounds. The SIM was also designed to run at the same speed (5 MHz) as the previous version. The same size and positions of pins resulted in numerous
"How-to" tutorials and YouTube video with detailed instructions how to cut a mini-SIM card to micro-SIM size with a sharp knife or scissors. These tutorials became very popular among first owners of iPad 3G after its release on April 30, 2010 and iPhone 4 on June 24, 2010.[8]
The chairman of EP SCP, Dr. Klaus Vedder, said[7]
"With this decision, we can see that ETSI has responded to a market need from ETSI customers, but additionally there is a strong desire not to invalidate, overnight, the existing interface, nor reduce the performance of the cards. EP SCP expect to finalise the technical realisation for the third form factor at the next SCP plenary meeting, scheduled for February 2004."
[edit]Developments of SIM
A virtual SIM is a mobile phone number provided by a mobile network operator that does not require a SIM card to connect phone calls to a user's mobile phone.
USIM (Universal Subscriber Identity Module) is an application for UMTS mobile telephony running on a UICC smart card which is inserted in a 3G mobile phone. There is a common misconception to call the UICC itself a USIM, but the USIM is merely a logical entity on the physical card. It stores user subscriber information, authentication information and provides storage space for text messages and phone book contacts. The phone book on a UICC has been greatly enhanced. For authentication purposes, the USIM stores a long-term pre-shared secret key, which is shared with the Authentication Center (AuC) in the network. The USIM also verifies a sequence number that must be within a range using a window mechanism to avoid replay attacks, and is in charge of generating the session keys to be used in the confidentiality and integrity algorithms of the KASUMI block cipher in UMTS. The equivalent of USIM on CDMA networks is CSIM.

[edit]Usage in mobile phone standards
SIM card for Thuraya satellite phone
The use of SIM cards is mandatory in GSM devices.
The satellite phone networks Iridium, Thuraya and Inmarsat's BGAN also use SIM cards. Sometimes these SIM cards work in regular GSM phones and also allow GSM customers to roam in satellite networks by using their own SIM card in a satellite phone.
KDDI's au IC-Card
NTT DoCoMo's FOMA Card
Japan's 2G PDC system (which will be completely shut down by 2012; SoftBank Mobile has already shut down PDC from March 31, 2010) also specifies a SIM, but this has never been implemented commercially. The specification of the interface between the Mobile Equipment and the SIM is given in the RCR STD-27 annex 4. The Subscriber Identity Module Expert Group was a committee of specialists assembled by the European Telecommunications Standards Institute (ETSI) to draw up the specifications (GSM 11.11) for interfacing between smart cards and mobile telephones. In 1994, the name SIMEG was changed to SMG9.
Japan's current and next generation cellular systems are based on W-CDMA (UMTS) and CDMA2000 and all use SIM cards.
[edit]Rival systems
Many CDMA-based devices do not include any removable card, and the service is bound to a unique identifier contained in the handset itself.
The equivalent of a SIM in UMTS is called the Universal Integrated Circuit Card (UICC), which runs a USIM application, while the Removable User Identity Module (R-UIM) is more popular in CDMA-based devices e.g. CDMA2000. The UICC is still colloquially called a SIM card.[citation needed]
[edit]SIM and carriers
The SIM card introduced a new and significant business opportunity of mobile telecoms operator/carrier business of the mobile virtual network operator (MVNO) which does not own or operate a cellular telecoms network, but which leases capacity from one of the network operators, and only provides a SIM card to its customers. MVNOs first appeared in Denmark, Hong Kong, Finland and the UK and today exist in over 50 countries, including most of Europe, USA, Canada, Australia and parts of Asia, and account for approximately 10% of all mobile phone subscribers around the world.
On some networks, the mobile phone is locked to its carrier SIM card, meaning that only the specific carrier's SIM cards will work. This is more common in markets where mobile phones are heavily subsidised by the carriers, and the business model depends on the customer staying with the service provider for a minimum term (typically, 12 or 24 months). Common examples are the GSM networks in the USA, Canada, Australia, the UK and Poland. Many businesses offer the ability to remove the SIM lock from a phone, effectively making it possible to then use the phone on any network by inserting a different SIM card. Mostly, GSM and 3G mobile handsets can easily be unlocked and used on any suitable network with any SIM card.
In countries where the phones are not subsidised e.g. Italy and Belgium, all phones are unlocked. Where the phone is not locked to its SIM card, the users can easily switch networks by simply replacing the SIM card of one network with that of another while using only one phone. This is typical, for example, among users who may want to optimise their telecoms traffic by different tariffs to different friends on different networks.
No comments:
Post a Comment