Description
Elementary File 7.1 is a fundamental component within the UICC's file system, as standardized in 3GPP TS 31.122 and TS 31.127. It resides under the Telecom Application Directory (TELECOM) or a dedicated application directory, structured as a linear fixed file. The file's primary role is to store access control rules for applications, such as the Universal Subscriber Identity Module (USIM) or IP Multimedia Services Identity Module (ISIM), ensuring that only authorized entities can perform specific operations. Each record in EF 7.1 contains key fields: the Access Rule Reference (ARR), which points to a rule set; the Security Protocol Identifier (SPI), specifying the cryptographic protocol for secure messaging; and the Access Rule, which defines conditions like always allowed, never allowed, or allowed only under specific authentication scenarios. The file is managed by the UICC's operating system, which interprets these rules during application runtime.
Architecturally, EF 7.1 integrates with the UICC's security framework, interacting with the Card Application Toolkit (CAT) and the security domain. When an application attempts an operation—such as establishing a network connection or accessing sensitive data—the UICC's operating system consults EF 7.1 to evaluate the associated ARR and SPI. The SPI determines whether commands must be secured using mechanisms like Secure Channel Protocol 80 (SCP80) or SCP81, ensuring integrity and confidentiality. The ARR then references a rule set, possibly stored in another elementary file like EF ARR, which details permissions based on factors like subscriber identity or network conditions. This layered approach decouples rule definition from enforcement, providing flexibility for operators to update policies without modifying application logic.
In operation, EF 7.1 enables fine-grained access control, crucial for scenarios like remote provisioning (e.g., via OTA platforms) and IoT deployments. For instance, in M2M devices, EF 7.1 can restrict network access to specific applications unless authenticated by a backend server, preventing unauthorized usage. The file's structure supports multiple records, allowing different rules per application or service. Its management involves standardized commands like SELECT, READ, and UPDATE, often executed through OTA mechanisms by the network operator. By centralizing access rules, EF 7.1 reduces the attack surface on the UICC, as applications cannot bypass these checks, thereby enhancing overall network security and compliance with operator policies.
Purpose & Motivation
EF 7.1 was introduced in 3GPP Release 8 to address growing security and management challenges in UICC-based systems, particularly with the rise of M2M communications and diverse applications beyond traditional voice services. Prior to its standardization, access control on UICCs was often application-specific or loosely defined, leading to inconsistencies and vulnerabilities. Operators needed a unified mechanism to enforce security policies across multiple applications—such as USIM, ISIM, or proprietary applets—especially for remote management and IoT devices where physical access is limited. EF 7.1 provides a standardized way to store and enforce access rules, ensuring that only authenticated entities can perform critical operations, thereby mitigating risks like unauthorized network access or data tampering.
The creation of EF 7.1 was motivated by the limitations of earlier UICC architectures, which lacked granular, centralized access control. In pre-Rel-8 systems, security often relied on ad-hoc implementations, making it difficult for operators to manage devices at scale or update policies dynamically. EF 7.1 solves this by integrating with 3GPP's security framework, enabling operators to define rules via OTA updates and enforce them consistently. This is essential for IoT deployments, where devices may operate in untrusted environments and require strict access controls to prevent misuse. By standardizing EF 7.1, 3GPP facilitated interoperability across vendors and devices, supporting secure, scalable management of UICC applications in evolving networks like LTE and 5G.
Key Features
- Stores Access Rule Reference (ARR) for linking to detailed permission sets
- Includes Security Protocol Identifier (SPI) to specify cryptographic protocols like SCP80/81
- Enforces fine-grained access control for UICC applications via linear fixed file structure
- Supports remote management through OTA updates for dynamic policy changes
- Integrates with UICC security domains to ensure tamper-resistant rule enforcement
- Enables scalable security for M2M and IoT devices by centralizing access rules
Evolution Across Releases
Introduced EF 7.1 as a standardized elementary file in 3GPP TS 31.122 and TS 31.127, defining its structure for access control on UICCs. It included initial capabilities for storing ARR and SPI fields to manage application permissions, supporting secure messaging protocols. This provided a foundation for consistent security enforcement in LTE and M2M networks, addressing gaps in earlier UICC architectures.
Defining Specifications
| Specification | Title |
|---|---|
| TS 31.122 | 3GPP TR 31.122 |
| TS 31.127 | 3GPP TR 31.127 |