Green Card (Shenzhen) Co. Ltd
Green Card (Shenzhen) Co. Ltd
SIM Cards, Used for Mobile Communication Network Operate on the Global System
  • SIM Cards, Used for Mobile Communication Network Operate on the Global System
  • SIM Cards, Used for Mobile Communication Network Operate on the Global System
SIM Cards, Used for Mobile Communication Network Operate on the Global System
SIM Cards, Used for Mobile Communication Network Operate on the Global System

SIM Cards, Used for Mobile Communication Network Operate on the Global System

Payment Type:
T/T, PayPal
Quantity:

Your message must be between 20 to 2000 characters

Contact Now
Basic Info
Basic Info
Payment Type: T/T, PayPal
Product Description
Product Description
  • Introduction:
    • 64K GSM SIM cards
    • Can write IMSI, ICCID, SID, NID, PIN, PUK AMD, AKEY, SMSC technological information into card
  • Structure and type:
    • SIM card is a smart card with a microprocessor and it consists of the following modules:
      • CPU
      • Program memory (ROM)
      • Working memory (RAM)
      • Data memory (EPROM or E2PROM)
      • Serial communication module
      • These five modules must be integrated into an integrated circuit (IC), other wise their safety would be threatened
      • This is because the chip connections may become illegal access and misappropriation of SIM cards important clues
  • In practice, there are two different forms of SIM cards with the same functions:
    • Full-size SIM card (commonly known as big card), this form of SIM cards, similar to IC card
    • The card has since been shrunk to the standard size of 25 x15mm
    • Embedded SIM card (commonly known as small card), the size of only 25 x 15mm, is a semi-permanent packed to the cards in the mobile station equipment
    • Two cards have installed waterproof, wear-resistant, anti-static contact with high-accuracy and reliability characteristics
    • Cryptographic algorithm and secret key in SIM card:
    • The most sensitive information of SIM card is the crypto graphical gorithm A3, A8, secret Ki, PIN, PUK and Kc
    • A3, A8 algorithm were written into the SIM card in the producing process, and most people could not read A3, A8 algorithm
    • HN code could be settled by the phone owners
    • PUK code is held by the operator
    • Kc was derived in the process of encryption from Ki
  • PIN and PUK:
    • PIN personal identification number
    • 2 PINs exist (PIN 1 and PIN 2)
    • Limited attempts on PIN access
    • PUK-PIN unblocking code
    • Resetting PUK, resets PIN and the attempt counter
    • Too many attempts on PUK blocks use permanently
  • CPU:
    • Program memory (ROM)
    • Working memory (RAM)
    • Data memory (EPROM or E2PROM)
    • Serial communication module
  • 64K GSM SIM cards
  • Can write IMSI, ICCID, SID, NID, PIN, PUK AMD, AKEY, SMSC technological information into card
  • SIM card is a smart card with a microprocessor and it consists of the following modules:
    • CPU
    • Program memory (ROM)
    • Working memory (RAM)
    • Data memory (EPROM or E2PROM)
    • Serial communication module
    • These five modules must be integrated into an integrated circuit (IC), other wise their safety would be threatened
    • This is because the chip connections may become illegal access and misappropriation of SIM cards important clues
  • CPU
  • Program memory (ROM)
  • Working memory (RAM)
  • Data memory (EPROM or E2PROM)
  • Serial communication module
  • These five modules must be integrated into an integrated circuit (IC), other wise their safety would be threatened
  • This is because the chip connections may become illegal access and misappropriation of SIM cards important clues
  • Full-size SIM card (commonly known as big card), this form of SIM cards, similar to IC card
  • The card has since been shrunk to the standard size of 25 x15mm
  • Embedded SIM card (commonly known as small card), the size of only 25 x 15mm, is a semi-permanent packed to the cards in the mobile station equipment
  • Two cards have installed waterproof, wear-resistant, anti-static contact with high-accuracy and reliability characteristics
  • Cryptographic algorithm and secret key in SIM card:
  • The most sensitive information of SIM card is the crypto graphical gorithm A3, A8, secret Ki, PIN, PUK and Kc
  • A3, A8 algorithm were written into the SIM card in the producing process, and most people could not read A3, A8 algorithm
  • HN code could be settled by the phone owners
  • PUK code is held by the operator
  • Kc was derived in the process of encryption from Ki
  • PIN personal identification number
  • 2 PINs exist (PIN 1 and PIN 2)
  • Limited attempts on PIN access
  • PUK-PIN unblocking code
  • Resetting PUK, resets PIN and the attempt counter
  • Too many attempts on PUK blocks use permanently
  • Program memory (ROM)
  • Working memory (RAM)
  • Data memory (EPROM or E2PROM)
  • Serial communication module
  • Send your message to this supplier

    • Ms.  Zhu

    • Enter between 20 to 4,000 characters.

    Related Keywords

    Related Keywords