Professional Documents
Culture Documents
Cellphone
Cellphone
Patrick Mutabazi
Patrick Mutabazi
+ Follow
Abstract:
As we live in the digital age, SIM cards are essential to our daily
activities because they provide easy communication and access to a
variety of mobile services. These tiny chips conceal a sophisticated array
of file components that are important to their operation. This article
explores the function, relevance, and convoluted universe of SIM card
file components. I want to provide a thorough grasp of how these parts
contribute to the efficient operation of mobile devices by exposing the
layers of information held within a SIM card.
Introduction
There is a secret world within these little chips, even though the majority
of us are only familiar with the physical component of a SIM card, which
is frequently plugged into a specific slot on our gadgets. The complex file
components that make up SIM cards are the key to our mobile
connectivity. These file components are in charge of handling and
preserving important data, including everything from network-specific
settings to data used for personal identification.
Different sizes of SIM cards are available, including normal, micro, nano,
and embedded SIMs (eSIMs). Older phones often use standard SIM cards
because they are the largest. Smaller than conventional SIM cards, micro
SIM cards are more frequently utilised in contemporary phones. The
newest smartphones employ nano SIM cards, which are the smallest SIM
card size. The most recent type of SIM card is an embedded SIM(eSIM).
However, the latest kid on the block is iSIM(Integrated Subscriber
Identity Module).
Physical Characteristics:
ii).
Integrated Circuit Card Identifier (ICCID): Each SIM card has an IC
CID, which is a special number that serves as its primary identity.
SIM cards are unique to a specific mobile network provider. In order for
them to function perfectly with their network, the operator provisions and
customises them. Each SIM card has information unique to the operator
on it, like the name of the network and access codes.
A new SIM card must be activated by the network provider after purchase.
The IMSI and ICCID of the SIM card are connected to the subscriber's
account after activation. By purchasing a new SIM card from the network
provider and transferring the subscriber's information to it, a lost or
damaged SIM card can be replaced.
The top-level file component on a SIM card is called the Master File
(MF). In addition to acting as the root directory, it offers the structure for
managing and organising other file components. The MF includes details
about the organisation of the file system on the SIM card, including
where specific files are located and their connections to other files.
Dedicated Files (DF) are specific SIM card directories that contain files
for a given functionality or application. Each DF acts as a container for
related Elementary Files (EF) and is given a special file identifier (FID)
to identify it.
Numerous features, including the phonebook, SMS messages, network
settings, service providers, and more, can be represented by DFs. They
offer a hierarchical file organisation, making it simpler to manage and
access specific data on the SIM card.
iv). EF-SMS: Messages from the Short Message Service are stored here,
enabling text message sending and receiving.
v). EF-LOCI: Identifiers for the current location region and the network
are stored here along with the location information.
The file system on the SIM card is set up like a tree, with the MF at the
root and the DFs and EFs acting as the branches and leaves, respectively.
The SIM card replies appropriately by supplying the requested
information or carrying out the requested function after receiving orders
from the device identifying the desired file or data element to access.
The file control information defines the access conditions that apply to
file components. The security and privacy of the data saved on the SIM
card are ensured by these rules, which specify who is permitted to access,
write, or modify the data within a file.
The most important file on a SIM card is called the Master File (MF). In
addition to acting as the root directory, it offers the framework for
classifying and managing other file components. The MF includes details
on the SIM card's file system, including where specific files are located
and how they relate to one another.
The characteristics of the SIM card and the standards put in place by the
mobile network operator can affect how the MF is structured.
b). File Control Information (FCI): Important details about the MF,
including its size, access restrictions, and file structure, are contained in
the FCI. It offers the information required for the device to use the file
system and communicate with other file components.
c). DF List: References to Dedicated Files (DF) kept in the MF are listed
in the DF List. It serves as a directory, enabling the device to access
particular DFs and the Elementary Files (EF) that are contained within
them.
The MF's role is to give the file system on the SIM card a hierarchical
structure and management framework. It plays a critical function in
preserving the integrity and structure of the data on the SIM card and
serves as the entry point for accessing other file components.
For the SIM card to operate properly and to connect with the mobile
network, vital data must be present in the Master File (MF).
With the help of linked Elementary Files (EF) and Dedicated Files (DF),
which are specialised folders on the SIM card, data is organised in an
organised manner. These DFs serve various purposes and functionalities
within the SIM card ecosystem.
e). DF-SMS: This Dedicated File only contains functionality for the
Short Message Service (SMS). It might contain EFs for SMS messages,
such as EF-SMS and EF-SMSP (SMS Parameters).
f). DF-PROV: The operator settings, service provider details, and access
point names (APNs) for data services are just a few examples of the
network-specific provisioning data that must be stored in this Dedicated
File.
Dedicated Files (DF) are essential for managing and organising particular
groups of data on the SIM card. They perform a number of tasks and
offer a structured hierarchy for storing related Elementary Files (EF).
i). Data Organisation: DFs offer a logical arrangement of the data on the
SIM card. They group similar EFs together, which makes it simpler to
find and manage particular kinds of information. For instance, the DF-
TELECOM arranges EFs that are connected to communications,
including phonebook entries and SMS messages.
ii). Access Control: In their File Control Information (FCI), DFs can
specify precise access restrictions. To maintain security and privacy,
these restrictions specify who is permitted to access, write, or alter data
within the DF. Access control procedures aid in safeguarding private data
kept in the DFs.
The smallest data storage components inside a SIM card are called
Elementary Files (EF). They maintain specific data pertaining to
particular functions or data components.
v). EF-LOCI: The location area and network IDs are stored in the
Location Information (LOCI) file. It is employed for network registration
and location updates.
vi). EF-SPN: The name of the service provider connected to the SIM
card is kept in the Service Provider Name (SPN) file.
Important information required for the operation of the SIM card and the
communication between the device and the mobile network is stored in
Elementary Files (EF).
The mobile network standards' stated instructions and protocols are used
to access and modify the data stored in Elementary Files. These files
include crucial data that makes communication, network access, and
other SIM card functions easier.
i). PIN Code: To authenticate the user and grant access to the SIM card,
a PIN code is a numerical password. A gadget usually asks the user to
enter the PIN code when it is turned on or a SIM card is inserted. In the
event that the SIM card is lost or stolen, the PIN code aids in preventing
unauthorised access. The settings or SIM card management menus on a
device are typically where users may set and modify their PIN codes.
ii). PUK Code: When the PIN number is repeatedly input incorrectly, the
PUK code, a special code linked to the SIM card, is used to unlock or
unblock the SIM card. The SIM card becomes locked and needs the PUK
code to be unlocked if a user repeatedly enters wrong PIN codes. The
mobile network operator often provides the PUK code, however customer
support can also supply it.
The PIN and PUK codes must be kept confidential and must not be given
to unauthorised people. These codes secure the user's private information
and the services connected to the SIM card by acting as a barrier to
unauthorised access to the SIM card.
a). EF-Ki: The secret key required to authenticate the SIM card to the
mobile network is stored in the Authentication Key (Ki) file. In order to
provide secure network access and avoid unauthorised SIM card cloning,
the Ki is a crucial element.
d). EF-ACC: Specific Elementary Files (EFs) on the SIM card have their
access control settings stored in the Access Control Class (ACC) file. The
ACC file establishes the permissions and access rights for various file
types and aids in restricting access to sensitive data.
e). EF-ACM: For billing purposes, the Accumulated Call Metre (ACM)
file keeps account of call length and consumption. It aids in tracking and
controlling voice call consumption and related costs.
The communication between the device and the mobile network as well
as the overall security and integrity of the SIM card are aided by these
authentication and security files. They guard against fraudulent activities
and unauthorised access attempts and make sure that only approved users
and devices may use the SIM card's functionality.
A technology called SIM Toolkit (STK) enables the SIM card to run
programmes and offer interactive services to the user. It makes it possible
for particular programmes and services to be run directly from the SIM
card without the need for the device's operating system. On the user's
device, there is normally a special menu that can be used to access the
SIM Toolkit programmes.
b). EF-STK: The main file linked to SIM Toolkit apps is the EF-STK file.
It keeps the SIM Toolkit Toolkit Menu Structure (TMS), which specifies
the SIM Toolkit menu's hierarchical structure. The TMS outlines the
menu items, their placement, and the actions that go with each one.
c). EF-UST: Details about the SIM Toolkit apps that are available on the
SIM card are contained in the User Service Table (UST) file. It contains
details like the names of the applications, file names, and access
restrictions.
Together, these file parts make it possible for SIM Toolkit apps to run
and offer interactive services to the user. By providing easy access to
various value-added services and personalised content through the SIM
card, the SIM Toolkit applications improve the user experience.
It's vital to remember that the specific file components and their
functionality can change based on the characteristics of the SIM card, the
needs of the mobile network operator, and the installed SIM Toolkit
programmes.
1). Master File (MF): The root directory of the SIM card file system is
the Master File. It is the entry point for navigating to additional file
components. The MF contains Dedicated Files (DFs) and Elementary
Files (EFs), and is recognised by the Application Identifier (AID) "3F00."
2). Dedicated Files (DFs): Within the file system, DFs are folders that
compile linked EFs. They give data a hierarchical organisation and serve
particular functions like phonebook, telecommunications, or SIM Toolkit
functionality.
3). Elementary Files (EFs): The smallest data storage units on a SIM
card are called EFs. For example, they may hold information like ICCID,
IMSI, phonebook entries, or SMS messages, which are specific details
connected to certain functions or data items.
The DFs and EFs are organised within the MF, which serves as the root
directory in the file system structures' hierarchical organisation. This
layout enables effective data access and management inside the SIM card.
i). Application Identifier (AID): Each DF and EF inside the SIM card is
given a different identification number, or AID. It aids in identifying and
differentiating various file components and is frequently expressed as a
hexadecimal value.
ii). File Identifier (FID): Each DF and EF inside of its parent DF are
given a special identification number called a FID. It aids in identifying
and locating particular files within the file system and is expressed as a
hexadecimal value.
Note: You should be aware that the file system architecture and naming
conventions may change slightly based on the characteristics of the SIM
card, including the SIM card type (e.g., SIM, USIM, or ISIM), the SIM
card standard (e.g., GSM, UMTS, or LTE), and the particular
requirements of mobile network operators.
The physical dimensions and form factor of SIM cards have changed over
time.
Here are the different types of SIM cards that have been introduced:
Mini-SIM (2FF):
A smaller version of the full-size SIM card was launched as the mini-SIM,
sometimes referred to as the 2nd Form Factor (2FF) or standard SIM card.
Its measurements are 25 mm by 15 mm by 0.76 mm, and it immediately
rose to the top spot among SIM card sizes.
Micro-SIM (3FF):
The micro-SIM, also known as the third form factor (3FF), was produced
in response to the demand for smaller devices and components. Its
measurements are 15.00 mm by 12.00 mm by 0.76 mm, and it allowed
mobile devices to get further smaller.
Nano-SIM (4FF):
The nano-SIM, sometimes referred to as the 4th Form Factor (4FF), was
developed to support further tiny devices while maintaining a SIM card's
essential features. Its measurements are 12.30 mm 8.80 mm 0.67 mm,
making it the most popular SIM card size in current smartphones and
gadgets.
e). Virtual SIM: Virtual SIM solutions, which allow users to have
several SIM profiles on a single physical SIM card or eSIM, may become
more common. Users no longer require numerous physical SIM cards to
switch between various mobile networks and plans because to this
technology.
f). iSIM: Integrated SIM (iSIM) is a brand-new kind of SIM card that is
physically attached to the device's modem chip or primary processor.
This makes it more dependable, more affordable, and smaller than
conventional SIM cards or eSIMs. IoT (Internet of Things)-related small
devices can benefit from iSIMs in terms of security, logistics, and
production ease.
In SIM card forensics, data is extracted and analysed from SIM cards in
order to compile evidence for forensic purposes.
1. SIM Card Readers: Hardware tools called SIM card readers allow for
the direct extraction of data from the SIM card and are connected to a
computer. They normally use specialised software to read the contents of
the SIM card, including the file system and file components.
2. Mobile Forensic Tools: Data can be extracted from SIM cards using
mobile forensic technologies like forensic software or forensic suites. The
device into which the SIM card is put or specialised SIM card readers can
be used by these instruments to connect with the SIM card.
2. SMS and MMS Analysis: Examining SMS and MMS messages saved
on a SIM card might reveal details about conversations, contacts,
timestamps, and potentially useful evidence relevant to a case. This can
be extremely important in investigations involving threats, harassment,
fraud, and other illegal activity.
7. Deleted Data Recovery: SMS messages, phone logs, and other file
components that may have been destroyed unintentionally or accidently
can be recovered using SIM card forensics techniques. Data recovery can
yield important evidence for investigations.
Conclusion
In conclusion therefore, an essential component of a mobile phone's
operating system are the files on a SIM card. They serve as a means of
user identification and authentication, data storage, and communication
security for mobile phones
SIM cards are necessary for mobile communication networks since they
enable many functions and store crucial data. The SIM card's structure is
made up of the Master File, Dedicated Files, and Elementary Files, which
store important information about security, user data, and apps developed
using the SIM Toolkit.
The Toolkit Menu Structure, User Service Table, and Proactive SIM Data
are file components of the SIM Toolkit apps, which enable interactive
services.
Smaller SIM card form factors, higher eSIM use, improved functionality
and security, and expanded use in IoT devices are possible future
developments.
The efficient use of SIM card file components in areas like law
enforcement, digital forensics, and mobile network operations depends on
an understanding of their forensic applications.