Information Technology Reference
In-Depth Information
and from 0 to up to 255 bytes of data. A response
APDU is sent by the UICC to the off-card entity
after processing the specific task defined in the
command APDU and should contain a mandatory
2-byte status word and from 0 to up to 256 bytes
of data. The servlet is a web application which
provides not only the processing of the requested
operations but also the web-based UI which can be
shown in the web browser in the off-card entity.
The servlet on the UICC communicates with the
off-card entities via HTTP and in the same way
there are two kinds of HTTP:HTTP requests and
HTTP responses. Currently, most UICC-based
applications are developed as the form of applets.
In the view of hardware characteristics of
UICC, the current UICC card usually consists of
16 or 32 bit CPU, CCP (Crypto Co-Processor),
ROM, 5KB RAM, 256KB EEPROM and ISO
9600bps I/O circuits. This kind of UICC card had
been already commercialized and widely utilized
globally. These days, due to the brilliant enhance-
ment of IC technologies, the UICC performance is
evolving to the level of the mobile terminals. These
UICC cards support 32-bit CPU and enhanced
CCP to improve the cryptographic processing
capabilities. It also utilizes tens kilobytes of RAM,
hundreds kilobytes of NOR flash and megabytes
or gigabytes of NAND flash to enlarge the storage
capacities. Due to the enlargement of capacity of
UICC, the dimension of stored data in the UICC
also increases drastically. To exchanges the large
dimension of data, the high-speed interface such
as 1.0 MBps IC-USB between UICC card and the
phones is facilitated.
With a respect to the UICC-based security ser-
vice, three memories, EEPROM, NOR flash and
NAND flash should be carefully considered since
the softwares for security services such as applet
and servlet are installed in these areas. Therefore,
lack of those memories yields the incapability
of loading and installing more services. Figure
1 depicts the hardware architecture of two kinds
of UICC mentioned above.
UICC-based security services such as the
transport service, the debit card service, etc. usu-
ally require the contactless interface between the
off-card entities where the UICC is inserted and
the RF readers such as ATMs and so forth. For
these contactless use cases, the NFC (Near Field
Communication) technology is defined as the
global standard. The characteristics of this con-
tactless technology can be defined as the ETSI
Figure 1. The Hardware Architecture of UICCs
Search WWH ::




Custom Search