31 series - USAT security
The USAT security procedures carry out the following functions:
- They secure the data that are exchanged between an external application and a USAT application on the UICC.
- They secure the commands and responses that are exchanged, using the USAT interpreter, between an external application and the UICC.
The ETSI specifications can be downloaded here.
|APDU||Application protocol data unit|
|ETSI||European telecommunications standards institute|
|UICC||Universal integrated circuit card|
|USAT||USIM application toolkit|