nfc handset test book 04 june 2018 - gsma.com · gsm association non-confidential nfc handset test...

606
GSM Association Non-confidential Official Document TS.27 - NFC Handset Test Book V13.0 Page 1 of 606 NFC Handset Test Book Version 13.0 04 June 2018 This is a Non-binding Permanent Reference Document of the GSMA Security Classification: Non-confidential Access to and distribution of this document is restricted to the persons permitted by the security classification. This document is confidential to the Association and is subject to copyright protection. This document is to be used only for the purposes for which it has been supplied and information contained in it must not be disclosed or in any other way made available, in whole or in part, to persons other than those permitted under the security classification without the prior written approval of the Association. Copyright Notice Copyright © 2018 GSM Association Disclaimer The GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not accept any responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document. The information contained in this document may be subject to change without prior notice. Antitrust Notice The information contain herein is in full compliance with the GSM Association’s antitrust compliance policy.

Upload: doliem

Post on 27-Aug-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidential

Official Document TS.27 - NFC Handset Test Book

V13.0 Page 1 of 606

NFC Handset Test BookVersion 13.0

04 June 2018

This is a Non-binding Permanent Reference Document of the GSMA

Security Classification: Non-confidentialAccess to and distribution of this document is restricted to the persons permitted by the security classification. This document is confidential to theAssociation and is subject to copyright protection. This document is to be used only for the purposes for which it has been supplied andinformation contained in it must not be disclosed or in any other way made available, in whole or in part, to persons other than those permittedunder the security classification without the prior written approval of the Association.

Copyright NoticeCopyright © 2018 GSM Association

DisclaimerThe GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not acceptany responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document.The information contained in this document may be subject to change without prior notice.

Antitrust NoticeThe information contain herein is in full compliance with the GSM Association’s antitrust compliance policy.

Page 2: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 2 of 606

Table of Contents

1 Introduction 81.1 Overview 81.2 Scope and Test Book structure 81.2.1 Test Book scope 91.3 Definition of Terms 101.4 Abbreviations 121.4.1 Power mode definition 141.5 Document Cross-References 141.6 Conventions 17

2 Test environment 182.1 Applicability 182.1.1 Format of the table of optional features 182.1.2 Format of the applicability table 192.1.3 Status and Notations of the Applicability Table 192.1.4 Table of optional features 202.1.5 Applicability Table 23

Vendor 442.2 General consideration 452.2.1 Test specifications 452.2.2 SIMalliance Open Mobile API 452.2.3 Pass criterion 462.2.4 Future study 462.2.5 Test Cases “Direction” 462.3 Tests with measurement and physical settings 472.4 Reference Transaction 472.5 Test Equipment 482.5.1 UICC 482.5.2 Requirements for UMTS Network Simulator 502.5.3 Common applications 502.5.4 Tag Testing 552.5.5 Reader equipment 592.5.6 NFC Controller and UI application triggering 592.5.7 Test Set-Up for OTA communication 602.5.8 Card emulation testing 612.6 Common procedures 612.6.1 Setting the default AID route 612.6.2 Procedure to identify the size of the AID routing table of a DUT 632.6.3 Procedure to send a transaction event 662.6.4 Procedure to check if the UICC is accessible 67

3 NFC Features 683.1 General overview 683.2 Conformance requirements 683.3 Reader/Writer mode 69

2.1.6 Information to be provided by the

Page 3: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 3 of 606

3.3.1 General overview 693.3.2 Conformance requirements 703.3.3 Test Cases 703.4 Card emulation mode 1033.4.1 General overview 1033.4.2 Conformance requirements 1033.4.3 Test Cases 1033.5 Core and Common features 1253.5.1 General overview 1253.5.2 Conformance requirements 1253.5.3 Test Cases 125

4 VOID 1295 Secure Element Access Control 130

5.1 General overview 1305.2 Conformance requirements 1305.3 Test Cases 1315.3.1 GP SE Access Control 1315.3.2 GP SE Access Control - Refresh tag 1435.3.3 GP SE Access Control – ADF_PKCS#15 and DF PKCS#15 1455.3.4 GP SE Access Control – PKCS#15 selection via EF_DIR 1475.3.5 GP SE Access Control – Configuration limits 1485.3.6 GP SE Access Control – No access 1515.4 GP SE Access Control – GP Test Plan 156

6 Secure Element Access API 1576.1 General overview 1576.2 Conformance requirements 1576.3 Test Cases 1586.3.1 SIMalliance APIs 1586.3.2 Prevent access to basic channel. 1586.3.3 VOID 1596.3.4 VOID 1596.3.5 VOID 1596.3.6 SIMalliance “getVersion” API 1596.3.7 SIMalliance APIs for eSE 159

7 Multiple Card Emulation Environment 1617.1 General overview 1617.2 Conformance requirements 1617.3 Test Cases 1627.3.1 VOID 1627.3.2 VOID 1627.3.3 VOID 1627.3.4 VOID 1627.3.5 VOID 1627.3.6 VOID 162

Page 4: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 4 of 606

7.3.7 Multiple CE Environments 1627.3.8 Active Card Emulation in Multiple CE Environments / Card Emulation 1707.3.9 Size of the CLF AID Routing table 174

8 UI Application triggering 1758.1 General overview 1758.2 Conformance requirements 1758.3 Test Cases 1768.3.1 EVT_TRANSACTION 1768.3.2 Permissions 1778.3.3 Intent management 1788.3.4 Application’s triggering order 1818.3.5 Triggering on HCI event EVT_CARD_DEACTIVATED 1848.3.6 Triggering on HCI event EVT_FIELD_OFF 185

9 VOID 18610 VOID 18611 Mobile Device APN management 187

11.1 General overview 18711.2 Conformance requirements 18711.3 Test Cases 18711.3.1 OPEN CHANNEL 18711.3.2 CLOSE CHANNEL 19511.3.3 RECEIVE DATA 19911.3.4 SEND DATA 212

12 Remote Management of NFC Services 22312.1 General overview 22312.2 Conformance requirements 22312.3 Basic Remote Management 22312.3.1 General overview 22312.3.2 Conformance requirements 22412.3.3 Test Cases 22412.4 Remote Management use cases 32312.4.1 General overview 32312.4.2 Conformance requirements 32312.4.3 Test Cases 323

13 General Device Support 35113.1 General Overview 35113.2 Conformance requirements 35113.3 Test Cases 35113.3.1 Secure Element Access API in Radio OFF State 35113.3.2 Enabled / Disabled states 35313.3.3 Modem and UICC over APDU exchange 35513.3.4 Modem retrieves the response data to the SELECT command 35513.3.5 Modem supports 19 logical channels 35613.3.6 Long APDU handling 356

Page 5: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 5 of 606

13.3.7 Terminal Capability TAG 82 35913.3.8 Reselect previously non-existing applet 36013.3.9 Retrieve CIN and IIN from eSE ISD by mobile application 361

14 VOID 36115 Android specific test cases 362

15.1 General overview 36215.2 Conformance requirements 36215.3 NFC Features 37215.3.1 General overview 37215.3.2 Conformance requirements 37215.3.3 Test Cases 37315.4 Accessing the Secure Elements 38015.4.1 General overview 38015.4.2 Conformance requirements 38015.4.3 Test Cases 38115.5 NFC Transaction Events 38915.5.1 General overview 38915.5.2 Conformance requirements 38915.5.3 Test Cases 39215.6 VOID 40515.7 Multiple Card Emulation Environment 40515.7.1 General overview 40515.7.2 Conformance requirements 40515.7.3 Test Cases 41115.8 Platform Dependant Properties 52915.8.1 General overview 52915.8.2 Conformance requirements 53015.8.3 Test Cases 53015.9 Security 53415.9.1 General overview 53415.9.2 Conformance requirements 53415.9.3 Test Cases 535

16 BlackBerry specific test cases 54017 Windows Phone specific test cases 54018 VOID 54019 Other OS specific test cases 540Annex A Reference Application 541

A.1 Description 541A.2 AID 541A.3 Structure File 541A.4 Commands Permitted 541A.4.1 SELECT 541A.4.2 READ BINARY 542A.4.3 UPDATE BINARY 542

Page 6: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 6 of 606

A.4.4 EXTERNAL AUTHENTICATE 542A.5 Source Code (Java) 543

Annex B Reference to other test plan 544B.1 SIMalliance 544B.2 EMVCo 548B.3 VOID 548B.4 ETSI TS 102 613 SWP 548B.5 ETSI TS 102 622 [10] HCI 552B.6 ETSI TS 102.384 [13], 3GPP 31.124 554B.7 Void 557B.8 GP Secure Element Access Control 557B.9 NFC Forum Tag Operation, Analog and Digital Testing 577B.9.1 Tag Operation 577B.9.2 Analog Tests 578B.9.3 Digital Tests 580B.10 ETSI TS 102 221 UICC-Terminal interface 581

Annex C Reference Tags - Real NFC Tags 582Annex D NFC Device Implementation statement (Informative) 583Annex E Test Case configuration files 584

E.1 Reference PKCS#15 files 584E.1.1 Directory file (EF_DIR) 584E.1.2 Object Directory File (EF_ODF) 584E.1.3 Data Object Directory File (EF_DODF) 584E.1.4 Certificate Directory File (EF_CDF) 585E.2 Reference GSMA files for PKCS#15 structure 586E.2.1 Certificate Files 586E.2.2 Access Control Files 587E.3 AIDs referenced by PKCS#15 files 587E.4 Specific configuration files for test case 5.3.1.1 587E.5 Specific configuration files for test case 5.3.1.2 588E.6 Specific configuration files for test case 5.3.1.3 588E.7 Specific configuration files for test case 5.3.1.4 588E.8 Specific configuration files for test case 5.3.1.5 589E.9 Specific configuration files for test case 5.3.1.6 589E.10 Specific configuration files for test case 5.3.1.7 590E.11 Specific configuration files for test case 5.3.1.8 590E.12 Specific configuration files for test case 5.3.1.9 590E.13 Specific configuration files for test case 5.3.2.1 591E.14 Specific configuration files for test case 5.3.2.1 Step5 591E.15 Specific configuration files for test case 5.3.2.2 592E.16 Specific configuration files for test case 5.3.3.1 592E.17 Specific configuration files for test case 5.3.3.1 592E.18 Specific configuration files for test case 5.3.4.1 593E.19 Specific configuration files for test case 5.3.5.1 593

Page 7: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 7 of 606

E.20 Specific configuration files for test case 5.3.5.2 594E.21 Specific configuration files for test case 5.3.6.2 595E.22 Specific configuration files for test case 5.3.6.3 595E.23 Specific configuration files for test case 5.3.6.4 595E.24 Specific configuration files for test case 5.3.6.5 596E.25 Specific configuration files for test case 8.3.4.1 596E.26 Specific configuration files for test case 8.3.4.2 596E.27 Specific configuration files for test case 8.3.4.3 597

Annex F Configuration for Device with eSE 598F.1 Installation parameters for the GSMA applets 599F.2 Installation parameters for the SIMalliance applets 599F.3 Installation parameters for the GP ARA applet 600

Annex G Document History 601

Page 8: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 8 of 606

1 Introduction

1.1 OverviewThe main aim of the GSMA NFC activities is to accelerate the commercial launch of SE(Secure Element) based NFC services in a number of markets by ensuring interoperabilityof services.

It may not be possible to perform all the test cases currently defined in TS.27 using aneUICC or an eSE (Embedded Secure Element).

The NFC Test Book stream is part of GSMA NFC activities. The participating GSMA TSGmembers have developed a set of test cases to be used for testing primarily the SE basedNFC functionality within a Mobile Device. These tests have been collated in this “Test Book”and provide test case descriptions against the requirements listed in the GSMA TS.26 NFCHandset Requirements document [1].

The NFC Test Book contains test cases for the following versions of TS.26:

GSMA TS.26 NFC Handset Requirements V5.0 [1a] GSMA TS.26 NFC Handset Requirements V6.0 [1b] GSMA TS.26 NFC Handset Requirements V7.0 [1c] GSMA TS.26 NFC Handset Requirements V8.0 [1d] GSMA TS.26 NFC Handset Requirements V9.0 [1e] GSMA TS.26 NFC Handset Requirements V10.0 [1f] GSMA TS.26 NFC Handset Requirements V11.0 [1g] GSMA TS.26 NFC Handset Requirements V12.0 [1h] GSMA TS.26 NFC Handset Requirements V13.0 [1]

This document includes an applicability table providing an indication whether test cases arerelevant for a specific device operating system.

The Test Book is developed in such a way that the test case descriptions are generic, butprovide repeatable instructions so that any accredited Test Lab can implement these testcases without further clarification.

The Test Lab will be responsible for running the test cases (which are tool specific) as setout in the Test Book.

1.2 Scope and Test Book structureThis document is intended for:

Parties which develop test tools and platforms Test Labs / Test Houses which execute the testing Vendors, Device & chipset Manufacturers Operators

The Test Book consists of a set of test cases relevant for testing a device which isimplementing SE based NFC services (i.e. devices implementing SWP protocol). The

Page 9: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 9 of 606

testing scope is related to selected parts of the NFC enabled device and is further detailedbelow.

The test cases specified within the Test Book are either specified fully, step by step or referto existing publicly available test standards. For the test cases from other organizations, aunique reference to the specification and test case is provided.

For each test case specified or referred to within this Test Book, there is a reference to oneor more requirements from the TS.26 GSMA NFC Handset Requirements document. [1]

1.2.1 Test Book scopeThe scope of testing is identified below with the reference architecture for a NFC enableddevice with SE NFC services.

Figure 1.1: Reference architecture for a NFC enabled device with SE NFC services

The overall structure of the Test Book is based on the interfaces as identified in thearchitecture showing relevant NFC related components. The first section starts with the Tagand Card reader interface, stepping through the different device components and ending atthe Mobile network related features. This gives the following structure:

Page 10: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 10 of 606

1. Introduction2. Test Environment3. NFC Features

a) Reader / Writer modeb) Card emulation modec) Core and common features

4. VOID (reserved for future test cases)5. Secure Element Access Control6. Secure Element Access API7. Multiple Card Emulation Environment8. UI Application Triggering9. VOID (reserved for future test cases)10. VOID (reserved for future test cases)11. Mobile Device APN Management12. Remote Management of NFC Services

a) Basic Remote Managementb) Remote Management use cases

13. General Device Support14. VOID (reserved for future test cases)15. Android specific test cases16. Blackberry specific test cases17. Microsoft Windows specific test cases18. VOID19. Other OS specific test cases

Annexes

Other OS specific test cases can be added based on contributions.

1.3 Definition of Terms

Term Description

Active UICC Profile When the physical UICC is a standard UICC: the UICC itself.When the physical UICC is an eUICC: the combination of the EnabledProfile and the eUICC onto which the Profile has been provisioned.

Card EmulationEnvironment

A Card Emulation Environment is an execution environment usedtogether with a NFC controller to manage a Card Emulation transaction. Itcan be a Secure Element (e.g. UICC, embedded Secure Element ormicro-SD) or an application running in a device host.

Embedded UICC A removable or non-removable UICC which enables the remote and/orlocal management of Profiles in a secure way.NOTE: The term originates from “embedded UICC”.

Default Route The route to be used by the NFC controller for APDUs transmission whenan AID is not found in the routing table.

Page 11: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 11 of 606

Term Description

Device

In the context of this specification, the term Device is used to representany electronic equipment supporting NFC functionality into which a UICC-based NFC Secure Element can be inserted, and that provides acapability for a server to reach the UICC through an Over The Air (OTA)channel.

DistanceThis refers to the distance from the back of the device to Point of SaleNFC antenna or to Tag surface.

Factory Reset

The action of the user to perform “device reset” to restore the factoryconfiguration of the device.Note: The information on how to perform a factory reset shall be providedby the device manufacturer.

Issuer SecurityDomain

According to GlobalPlatform Card Specification: “The primary on-cardentity providing support for the control, security, andcommunication requirements of the card administrator (typically the CardIssuer)”

Multiple Active CEEsmodel

A model where the device can activate several CEE at the same time. RFtraffic can be provided to a CEE based on routing mechanisms.Note: an implementation may support Multiple Active CEEs model inBattery Operational Mode and Single Active CEE model in Battery Low orPower-Off Mode.

Operator

Refers to a Mobile Network Operator who provides the technical capabilityto access the mobile environment using an Over The Air (OTA)communication channel. The OPERATOR is also the UICC Issuer. AnOPERATOR provides a UICC OTA Management System, which is alsocalled the OTA Platform.

Powered Off The device was turned OFF by the end-user or the device is in battery lowmode or the device is in battery power-off mode.

Screen Lock The device functionality can only be accessed via a user intervention.

Screen OFFThe battery of the device is in Battery Operational Mode and the screen ofthe device was turned off either by the end-user or automatically by thedevice after a timeout.

Screen ON The battery of the device is in Battery Operational Mode and the screen ofthe device was turned on by the end-user (i.e. the screen is active).

Secure Element

A SE is a tamper-resistant component which is used to provide security,confidentiality, and multiple application environments required to supportvarious business models. In TS.27, the term SE includes UICC, eUICCand eSE.

Sensitive API An API which shall be protected from malicious use.

Single Active CEEmodel

A model where the device only activates one CEE at a time. Other CEEs,if available, are not active.

Switched OFF The device was turned OFF by the end-user or the device is in battery lowmode or the device is in battery power-off mode.

Page 12: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 12 of 606

Term Description

Test Book Document describing the test cases that allow testing the requirementslisted in the GSMA TS.26 NFC Handset Requirements [1]

Test Lab This refers to a test lab which will run the test cases according to the TestBook for testing NFC Devices.

Vendor Device manufacturer

Table 1.1: Definition of Terms

1.4 Abbreviations

Acronyms Description

AC Access Control

ACCF Access Control Conditions File

ACMF Access Control Main File

ACRF Access Control Rules File

ADF Application Dedicated File

AID Application Identifier

APDU Application Protocol Data Unit

API Application Programming Interface

APN Access Point Network

BIP Bearer Independent Protocol

C-APDU Command APDU

CE Card Emulation

CEE Card Emulation Environment

CEN European Committee for Standardization

CLF Contactless Frontend

CS Circuit Switched

DODF Data Object Directory File

DUT Device Under Test

EMV EMV specifications and related testing processes are managed byEMVCo. (Europay, MasterCard, Visa)

eSE Embedded Secure Element

ETSI European Telecommunication Standards Institute

eUICC A removable or non-removable UICC which enables the remote and/orlocal management of Profiles in a secure way.NOTE: The term originates from "embedded UICC".

EVT Event

FFS For Future Study

Page 13: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 13 of 606

Acronyms Description

GCF Global Certification Scheme

HCE Host Card Emulation

HCI Host Controller Interface

IEC International Electrotechnical Commission

ISD Issuer Security Domain

ISO International Organization for Standardization

JCP Java Community Process

JSR Java Specification Request

JVM Java Virtual Machine

ME Mobile Equipment

MIDP Mobile Information Device Profile

MNO Mobile Network Operator

MO Mobile Originated

MT Mobile Terminated

NFC Near Field Communication

ODM Original Device Manufacturer

OEM Original Equipment Manufacturer

OS Operating System

PCD Proximity Coupling Device

PC/SC PC SmartCard reader

PKCS Public Key Cryptographic Standard

PoR Proof of Receipt

PoS Point of Sale

PS Packet Switched

R-APDU Response APDU

RIL Radio Interface Layer

RTD Record Type Definition

RTS Routing Table Size

SCWS Smart Card Web Server

SE Secure Element

SIM Subscriber Identity Module

SP Service Provider

STA Smart Ticketing Alliance

SW Status Word

Page 14: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 14 of 606

Acronyms Description

SWP Single Wire Protocol

UI User Interface

UICC Universal Integrated Circuit Card (USIM)

USS UMTS System Simulator

Table 1.2: Abbreviations

1.4.1 Power mode definitionThis section gives the definition for different battery modes for the support NFC services asshown in Figure 1.2.

Figure 1.2: Battery power levels within the NFC mobile devices

Term Description

Battery OperationalMode

The battery of the DUT has sufficient power to support all functions in themobile devices.

Battery Low Mode

The battery of the DUT has reached “Battery Low Threshold” at which thedisplay and most functionalities of the DUT are automatically switched off,except the clock and a few remaining functions. The battery of the DUT onlyhas sufficient power to support NFC controller to function.

Battery Power-offMode

The battery of the DUT has reached “Battery Power-off threshold” at whichthere is no residual power to support NFC controller to function. No functionsare available in the DUT. The NFC controller can function if power is providedvia the contactless interface (i.e. powered by the field).

Table 1.3: Battery Power Levels

1.5 Document Cross-References

Ref Title

[1] GSMA TS.26 NFC Handset Requirements v13.0

Page 15: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 15 of 606

Ref Title

[1a] GSMA TS.26 NFC Handset Requirements v5.0

[1b] GSMA TS.26 NFC Handset Requirements v6.0

[1c] GSMA TS.26 NFC Handset Requirements v7.0

[1d] GSMA TS.26 NFC Handset Requirements v8.0

[1e] GSMA TS.26 NFC Handset Requirements v9.0

[1f] GSMA TS.26 NFC Handset Requirements v10.0

[1g] GSMA TS.26 NFC Handset Requirements v11.0

[1h] GSMA TS.26 NFC Handset Requirements v12.0

[2] VOID

[3] VOID

[4] VOID

[5] SIMalliance OMAPI Transport API Test Specification V2.2 and Errata

[6] SIMalliance – Open Mobile API specification V3.2 and Second Errata, or later(backwards compatible)

[6a] GlobalPlatform Open Mobile API Specification v3.3 (Doc reference number isGPD_SPE_075) or later

[7] Global Platform – Secure Element Access Control V1.0

[8] ETSI TS 102 221 (V13.1.0 or later) – UICC-Terminal interface – Physical and logicalcharacteristics

[9] ETSI TS 102 613 (V11.0.0 or later) – UICC – Contactless Front-end (CLF) Interface –Part 1: Physical and data link layer characteristics

[10] ETSI TS 102 622 (V13.0.0 or later) – UICC – Contactless Front-end (CLF) Interface –Host Controller Interface (HCI)

[11] ETSI TS 102 694-1 (V10.2.0 or later) – Test specification for the Single Wire Protocol(SWP) interface; Part 1: Terminal features

[12] ETSI TS 102 695-1 (V12.1.0 or later) - Test specification for the Host Controller Interface(HCI); Part 1: Terminal features

[13] ETSI TS 102 384 (V10.3.0 or later) – Card Application Toolkit (CAT) conformancespecification

[14] VOID

[15] GCF WI – 35 – USAT Testing

[16] GCF WI – 133 – SWP/HCI

[17] VOID

[18] VOID

[19] NFC Forum-TS-Analog 2.0NFC Forum-TS-Digital 1.1 (or later)NFC Forum-TS-Activity-1.1 (or later)

Page 16: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 16 of 606

Ref TitleNFCForum-TS-T1T-1.0 (or later)NFCForum-TS-T2T-1.0 (or later)NFCForum-TS-T3T-1.0 (or later)NFCForum-TS-T4T-1.0 (or later)NFC Forum Device Requirements 2.0 (or later)NFC Forum-TS-NDEF 1.0 (or later)NFC Forum-TS-NCI - 1.1 (or later)NFC Forum certification release 11.0 (or later)

[20] 3GPP TS 31.121 (V13.4.0 or later) – UICC-terminal interface; Universal SubscriberIdentity Module (USIM) application test specification

[21] 3GPP TS 31.124 (V13.5.0 or later) – Mobile Equipment (ME) conformance testspecification; Universal Subscriber Identity Module Application Toolkit (USAT)conformance test specification

[22] ETSI TS 102 223 (V12.0.0 or later) – Smart Cards; Card Application Toolkit (CAT)

[23] ETSI TS 102 226 (V13.0.0 or later) – Smart Cards ;Remote APDU structure for UICCbased applications

[24] ETSI TS 102 127 (V6.13.0 or later) – Smart Cards; Transport protocol for CATapplications; Stage 2

[25] 3GPP TS 34.108 (V13.0.0 or later) – Common test environments for User Equipment(UE); Conformance testing

[26] GCF WI – 190 – SWP/HCI Enhancements for UICC Based NFC Services

[27] GlobalPlatform – SEAC DeviceSide Test Plan v1.0.6

[28] ISO/IEC 18092:2013 Information technology -- Telecommunications and informationexchange between systems -- Near Field Communication -- Interface and Protocol(NFCIP-1)

[29] X.509 Certificate is published as ITU recommendation ITU-T X.509 (formerly CCITTX.509) and ISO/IEC/ITU 9594-8.It defines a standard certificate format for public key certificates and certificationvalidation.

[30] NFC Forum Test Cases For Type 1 Tag Operation v1.2 (or later)

[31] NFC Forum Test Cases For Type 2 Tag and Type 2 Tag Operation v1.0 (or later)

[32] NFC Forum Test Cases For Type 3 Tag and Type 3 Tag Operation v1.0 (or later)

[33] NFC Forum Test Cases For Type 4 Tag and Type 4 Tag Operation v1.0 (or later)

[34] 3GPP TS 31.116 (Release V14.0.0 or later) Remote APDU (Application Protocol DataUnit) Structure for (Universal) Subscriber Identity Module (U)SIM Toolkit applications

[35] ISO/IEC 7816-3: 2006 or later "Identification cards - Integrated circuit cards - Part 3:Cards with contacts - Electrical interface and transmission protocols".

[36] 3GPP TS 36.508 (V13.1.0 or later) – LTE; Evolved Universal Terrestrial Radio Access(E-UTRA) and Evolved Packet Core (EPC); Common test environments for UserEquipment (UE) conformance testing

Page 17: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 17 of 606

Ref Title

[37] VOID

[38] EMV Contactless Communication Protocol Specification, Book D, Version 2.6 (or later)

[39] EMV Mobile Product Level 1 Type Approval, Interoperability Testing Requirements,Version 1.0 (or later)

[40] NFC Forum Test Cases for Analog v2.0

[41] ETSI TS 102 230-1 (V11.0.0 or later) - Smart Cards ; UICC-Terminal interface Physical,electrical and logical test specificationTest specification of [8]

[42] GSMA: SGP12 v2.0 NFC Multi Protocol for Interoperability

[43] “SIMalliance Test Applets for OMAPI Test Specification for Transport API v2.2 andErrata” available at http://simalliance.org/handset/handset-technical-releases/

[44] GitHubGlobalPlatform sample ARA applet available athttps://github.com/GlobalPlatform/OMAPI-ARA-Applet

[45] Android OMAPI documentation :https://developer.android.com/reference/android/se/omapi/package-summary.html

Table 1.4: Document Cross-References

1.6 Conventions

As per IETF Requirements terminology, reference RFC 2119, the following terms have thefollowing meaning.

Term Description

SHALL Denotes a mandatory requirement

SHOULD Denotes a recommendation

MAY Denotes Optional

Table 1.5: Conventions

Page 18: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 18 of 606

2 Test environment

2.1 ApplicabilityThe purpose of this section is to confirm whether a test case as defined in the TS.27 isapplicable.

For test cases defined in referenced specifications, the corresponding applicability isdefined in the referenced specifications.

The applicability depends on the features supported in the device and/or on the OperatingSystem.

This section consists of 6 tables which are the normative tables:

Table 2.4, 2.5 and 2.7 are to be completed by device supplier and test house respectively:

Table 2.4: “Optional features”: This is a template with features (devicecharacteristics) optional for the device to support. This table should be completed bythe supplier of the device. The completed template can be input for the compilationof list of applicable test cases from table 2.5.

Table 2.5: “Applicability Table”: This is a template which can be used to establish thelist of applicable test cases depending on the supported features and the OperatingSystem. The table provide a “Support” Column which should be used to state theestablished applicability complied from the conditional expressions.

Table 2.7: “Device default configuration”. Additional device information used for thetesting.

Table 2.1, 2.2, 2.3 and 2.6 explain the format and content of Table 4 and 5.

Table 2.1, 2.2 and 2.3: These tables explain the columns, the format and statusnotifications used in Table 4 and 5.

Table 2.6: “Conditional Items”: This is a list of conditional (Boolean) expressions tobe evaluated by the test house. The expressions are evaluated based on Table 4Optional Features and used to establish the complete list of applicable test cases forthe device to be tested.

The format and usage of applicability definition follow the description within ETSIspecifications e.g. ETSI TS 102 694-1 [11], but simplified to only cover the scope of TS.27.

2.1.1 Format of the table of optional features

The columns in table of optional features have the following meaning:

Column Meaning

Item Unique numbering of each optional feature

OptionalFeature

The name of the optional feature supported or not supported by the deviceimplementation.

Page 19: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 19 of 606

Column Meaning

Support The support columns are to be filled in by the supplier of the device. The followingcommon notations can be used:Y The feature is supported by the device.N The feature is not supported by the device.

Mnemonic The mnemonic column contains mnemonic identifiers for each item which is a shortname for the optional feature.

Table 2.1: Format of the table of optional features

2.1.2 Format of the applicability tableThe format of the Applicability table is defined in the table below.

The columns in Table 2.5 have the following meaning:

Column Meaning

Test case The “Test case” column gives a unique reference to the test case.

Test Case Title The “Test Case Title” column gives the title of the test case.

TS.26 Versions The "TS.26 versions" column gives the item in the "Test Case title" column theapplicable requirements version:

- Version x.y “onwards”: if the requirement is applicable from this TS.26version and for the later versions

“Up to” Version x.y: if the requirement is applicable until this TS.26 version andit has been changed or replaced for the later TS.26 versions

Test caseapplicability

The “Test case applicability” column indicates which test cases are applicableper given Device Operating System. Several different status notifications canbe used in this column. They are defined in the table in section 2.1.3.

Applicable This column can be used to state the final applicability for each test casederived from the conditional expressions. Completion of this column shall beeither “Yes” or “No”.

Table 2.2: Format of the applicability table

The Applicability Table does not include test cases in the status FFS. The FFS test casesare only included in the complete list of test cases in Annex D.1.

2.1.3 Status and Notations of the Applicability TableThe “Device Operating System” columns show the status of the entries as follows:

The following notations are used for the status column:

Status Description

Page 20: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 20 of 606

Status Description

M

Mandatory – the test case is mandatory for a device implementation using thegiven Operating System.If the test case refers to an external specification, there might be severaladditional test cases required. This means the specific applicability of eachunderlying test cases has to be evaluated according to the applicability withinthe external specification. For example if an “M” is stated in the TS.27, it doesnot necessarily mean that all the underlying test cases are applicable.

FFS See section 2.2.4

N/A

Not Applicable – the test case is not applicable for a device using the givenOperating System, i.e. the test is not required.N/A is considered as a permanent “Not Applicable” test case compared toTNR, see below.

TNR

Test Not Ready – the test case is not available in this version of TS.27 for adevice using the given Operating System. This means in a future version ofTS.27, the test case is expected to be updated to support the specificOperating System or a new test case will be defined.

Ci

Conditional – the requirement on the capability (“M”, “O” or “N/A”) depends onthe support of other optional or conditional items. “i” is an integer identifying aunique conditional status expression which is defined immediately following thetable. For nested conditional expressions, the syntax "IF ... THEN (IF ... THEN... ELSE...) ELSE … " is to be used to avoid ambiguities.

Table 2.3: Status and Notations

2.1.4 Table of optional featuresThe supplier of the implementation shall state the support of possible options in Table 4.See clause Error! Reference source not found. for the format of Table 4. Items indicatedas O_XYZ (for example, O_SCWS) refer to features supported by the device.

Item Optional Feature Support Mnemonic (short namefor the optional feature)

1 VOID

2 Support of LTE/IMS O_LTE/IMS

3 Support of LTE with fallback to 2G/3G O_LTE/2G-3G

4 Support of read/write NFC Tag atdistance > 1,0cm and ≤ 2,0cm

O_TAG_DISTANCE 2CM

5 Support of read/write NFC Tag atdistance > 2,0cm and≤ 3,0cm, see note5

O_TAG_DISTANCE_3CM

6 Support of read/write NFC Tag atdistance > 3,0cm and ≤ 4,0cm, see note4

O_TAG_DISTANCE_4CM

Page 21: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 21 of 606

Item Optional Feature Support Mnemonic (short namefor the optional feature)

7 Support of battery low mode, see note 2 O_BAT_LOW

8 Support of battery off mode, see notes 2and 3

O_BAT_OFF

9 Support of multiple SE O_MUL_SE

10 Support of Multiple APN O_MULTI_APN

11 Terminal executes User confirmationphase before sending PDP contextactivation request

O_User_Confirm_Before_PDP_Context_Request

12 Support of Multiple Active CEEs modelin Battery Operational Mode

O_MULTI_CEE_ON

13 Support of Single Active Card EmulationEnvironment in Battery OperationalMode

O_Single_Active_CEE

14 Default route selection user menu isprovided by the DUT

O_DEFAULT_ROUTE_SELECTION_BY_USER_MENU

15 The NFC status is persistent across DUTpower off and power on

O_NFC _PERSISTENCE

16 DUT supports API to select and switchthe Active CEE (see note 6)

O_API_SWITCH_CEE

17 Support of Card Emulation for FeliCa onUICC (see note 7)

O_CARD_EM_FELICA_UICC

18 Support of MIFARE ClassicReader/Writer

O_MIFARE_CLASSIC_RW

19 Support of MIFARE DESFireReader/Writer

O_MIFARE_DESFIRE_RW

20 Terminal supports Short MessageService (SMS) MT over CS (see note 8and 10)

pc_SMS_CS_MT

21 Terminal supports Short MessageService (SMS) MO over CS (see note 9and 10)

pc_SMS_CS_MO

22 Terminal supports Short MessageService (SMS) MT over PS (see note 8and 10)

pc_SMS_PS_MT

23 Terminal supports Short MessageService (SMS) MO over PS (see note 9and 10)

pc_SMS_PS_MO

Page 22: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 22 of 606

Item Optional Feature Support Mnemonic (short namefor the optional feature)

24 Preferred buffer size supported by theterminal for Open Channel command isgreater than 0 byte and less than 65535bytes

O_BUFFER_SIZE

25 VOID

26 Support of REQ_143 (see Note 11) O_REQ_143

27 DUT implements Android versions beforeOS 6.0 Marshmallow (Marshmallow isnot included)

O_BEFORE_ANDROID_MARSHMALLOW

28 Support of complete functionality of theGSMA Android NFC API as defined inTS.26 v8.0 or later (see note 12)

O_ANDROID_API_V8_OR_LATER

29 Support of TS26 version 9.0 (see note14)

O_TS26_VERSION_9

30 Support of TS26 version 10.0 (see note14)

O_TS26_VERSION_10

31 DUT implements Android versions beforeOS 7.0 Nougat (Nougat is not included)

O_BEFORE_ANDROID_NOUGAT

32 DUT implements GSMA Android NFCAPI (See note 15)

O_GSMA_API

33 DUT contains eSE (see note 16) O_eSE

34 DUT implements Android versions beforeP (P is not included)

O_BEFORE_ANDROID_P

Note 1: In order to reflect current industry implementation, test cases with read/write distance > 1cmare optional for this version

Note 2: For options O_BAT_LOW and O_BAT_OFF the DUT shall support at least one of theseoptions or both.

Note 3: If the device supports O_BAT_OFF, the device manufacturer must supply details of how toenter this state

Note 4: If option O_TAG_DISTANCE_4CM is supported, then O_TAG_DISTANCE_2CM andO_TAG_DISTANCE_3CM must be supported.Note 5: If option O_TAG_DISTANCE_3CM is supported, then O_TAG_DISTANCE_2CM must besupportedNote 6: For Android, if the device supports O_Single_Active_CEE, then O_API_SWITCH_CEE mustbe supported.Note 7: As per TS26_NFC_REQ_009, TS26_NFC_REQ_009.1, TS26_NFC_REQ_025 andTS26_NFC_REQ_025.1: O_CARD_EM_FELICA_UICC was optional until 31st July 2015; from 1stAugust 2015, it is now mandatory.Note 8: IF pc_SMS_PS_MT is supported, then pc_SMS_CS_MT is optional, ELSE pc_SMS_CS_MTis mandatoryNote 9: IF pc_SMS_PS_MO is supported, then pc_SMS_CS_MO is optional, ELSE pc_SMS_CS_MOis mandatory

Page 23: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 23 of 606

Item Optional Feature Support Mnemonic (short namefor the optional feature)

Note 10: The options pc_SMS_CS_MT, pc_SMS_CS_MO, pc_SMS_PS_MT and pc_SMS_PS_MOare related to the test cases in Chapter 12.3.3.9.Note 11: O_REQ_143 is used in section 2.6.1. For devices supporting TS.26 v8.0 or later andO_MULTI_CEE_ON, it is mandatory that the device supports this option, as O_REQ_143 ismandatory from TS.26 v8.0. For devices supporting versions of TS.26 before v8.0, support ofO_REQ_143 is optional.Note 12: O_ANDROID_API_V8_OR_LATER is used in test cases in section 15. For devicessupporting TS.26 v8.0 or later, support of O_ANDROID_API_V8_OR_LATER is mandatory. Fordevices supporting versions of TS.26 before v8.0, support of O_ANDROID_API_V8_OR_LATER isoptional.If a device indicates support of the GSMA Android NFC API as defined in a particular version ofTS.26, it shall support the complete functionality of the API as defined in that version.Note 13: VOID.Note 14: For devices supporting TS.26 v9.0 or later, the device shall support exactly one of theO_TS26_VERSION_X options. Additionally:

For devices supporting TS.26 v9.0 the support of O_TS26_VERSION_9 is mandatory.

For devices supporting TS.26 v10.0 the support of O_TS26_VERSION_10 is mandatory.Note 15: For devices supporting TS.26 v5.0 to v10.0, the support of O_GSMA_API is mandatory. Fordevices supporting TS.26 v11.0 or later, the support of O_GSMA_API is optional.Note 16: Devices containing eSE shall be configured according to Annex F.

Table 2.4: Optional Features

2.1.5 Applicability Table

The table below specifies the applicability of each test case to the device under test. Seeclause 2.1.2 for the format of Table.

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

3.3.3.1 NFC Forum Type 1 Tag – Read NFCTag

5.0onwards

M M M FFS

3.3.3.2 NFC Forum Type 2 Tag – Read NFCTag

5.0onwards

M M M FFS

3.3.3.3 NFC Forum Type 3 Tag – Read NFCTag

5.0onwards

M M M FFS

3.3.3.4 NFC Forum Type 4 Tag – Read NFCTag

5.0onwards

M M M FFS

3.3.3.5.1 NFC Forum Type 1 Tag – Write NFCTag – Test Sequence No 1

5.0onwards

M M M FFS

Page 24: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 24 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

3.3.3.5.2 NFC Forum Type 1 Tag – Write NFCTag – Test Sequence No 2

5.0onwards

FFS FFS FFS FFS

3.3.3.6 NFC Forum Type 2 Tag – Write NFCTag

5.0onwards

M M M FFS

3.3.3.7 NFC Forum Type 3 Tag – Write NFCTag

5.0onwards

M M M FFS

3.3.3.8 NFC Forum Type 4 Tag – Write NFCTag

5.0onwards

M M M FFS

3.3.3.9.1 Distance for NFC Type 1 Tag readingTest Sequence No 1: Distance for NFCType 1 Tag Reading – 0,0cm

5.0onwards

M M M FFS

3.3.3.9.2 Distance for NFC Type 1 Tag readingTest Sequence No 2: Distance for NFCType 1 Tag Reading – 0,5cm

5.0onwards

M M M FFS

3.3.3.9.3 Distance for NFC Type 1 Tag readingTest Sequence No 3: Distance for NFCType 1 Tag reading – 1,0cm

5.0onwards

M M M FFS

3.3.3.9.4 Distance for NFC Type 1 Tag readingTest Sequence No 4: Distance for NFCType 1 Tag Reading – 2,0cm

5.0onwards

C015 C015 C015 FFS

3.3.3.9.5 Distance for NFC Type 1 Tag readingTest Sequence No 5: Distance for NFCType 1 Tag Reading – 3,0cm

6.0onwards

C016 C016 C016 FFS

3.3.3.9.6 Distance for NFC Type 1 Tag readingTest Sequence No 6: Distance for NFCType 1 Tag Reading – 4,0cm

6.0onwards

C017 C017 C017 FFS

3.3.3.10.1 Distance for NFC Type 2 Tag readingTest Sequence No 1: Distance for NFCType 2 Tag Reading – 0,0cm

5.0onwards

M M M FFS

3.3.3.10.2 Distance for NFC Type 2 Tag readingTest Sequence No 2: Distance for NFCType 2 Tag Reading – 0,5cm

5.0onwards

M M M FFS

3.3.3.10.3 Distance for NFC Type 2 Tag readingTest Sequence No 3: Distance for NFCType 2 Tag reading – 1,0cm

5.0onwards

M M M FFS

Page 25: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 25 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

3.3.3.10.4 Distance for NFC Type 2 Tag readingTest Sequence No 4: Distance for NFCType 2 Tag Reading – 2,0cm

5.0onwards

C015 C015 C015 FFS

3.3.3.10.5 Distance for NFC Type 2 Tag readingTest Sequence No 5: Distance for NFCType 2 Tag Reading – 3,0cm

6.0onwards

C016 C016 C016 FFS

3.3.3.10.6 Distance for NFC Type 2 Tag readingTest Sequence No 6: Distance for NFCType 2 Tag Reading – 4,0cm

6.0onwards

C017 C017 C017 FFS

3.3.3.11.1 Distance for NFC Type 3 Tag readingTest Sequence No 1: Distance for NFCType 3 Tag Reading – 0,0cm

5.0onwards

M M M FFS

3.3.3.11.2 Distance for NFC Type 3 Tag readingTest Sequence No 2: Distance for NFCType 3 Tag Reading – 0,5cm

5.0onwards

M M M FFS

3.3.3.11.3 Distance for NFC Type 3 Tag readingTest Sequence No 3: Distance for NFCType 3 Tag reading – 1,0cm

5.0onwards

M M M FFS

3.3.3.11.4 Distance for NFC Type 3 Tag readingTest Sequence No 4: Distance for NFCType 3 Tag Reading – 2,0cm

5.0onwards

C015 C015 C015 FFS

3.3.3.11.5 Distance for NFC Type 3 Tag readingTest Sequence No 5: Distance for NFCType 3 Tag Reading – 3,0cm

6.0onwards

C016 C016 C016 FFS

3.3.3.11.6 Distance for NFC Type 3 Tag readingTest Sequence No 6: Distance for NFCType 3 Tag Reading – 4,0cm

6.0onwards

C017 C017 C017 FFS

3.3.3.12.1 Distance for NFC Type 4A Tag readingTest Sequence No 1: Distance for NFCType 4 TagA Reading – 0,0cm

5.0onwards

M M M FFS

3.3.3.12.2 Distance for NFC Type 4A Tag readingTest Sequence No 2: Distance for NFCType 4 TagA Reading – 0,5cm

5.0onwards

M M M FFS

3.3.3.12.3 Distance for NFC Type 4A Tag readingTest Sequence No 3: Distance for NFCType 4 TagA reading – 1,0cm

5.0onwards

M M M FFS

Page 26: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 26 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

3.3.3.12.4 Distance for NFC Type 4A Tag readingTest Sequence No 4: Distance for NFCType 4 TagA Reading – 2,0cm

5.0onwards

C015 C015 C015 FFS

3.3.3.12.5 Distance for NFC Type 4A Tag readingTest Sequence No 5: Distance for NFCType 4 TagA Reading – 3,0cm

6.0onwards

C016 C016 C016 FFS

3.3.3.12.6 Distance for NFC Type 4A Tag readingTest Sequence No 6: Distance for NFCType 4 TagA Reading – 4,0cm

6.0onwards

C017 C017 C017 FFS

3.3.3.13.1 Distance for NFC Type 4B Tag readingTest Sequence No 1: Distance for NFCType 4 TagB Reading – 0,0cm

5.0onwards

M M M FFS

3.3.3.13.2 Distance for NFC Type 4B Tag readingTest Sequence No 2: Distance for NFCType 4 TagB Reading – 0,5cm

5.0onwards

M M M FFS

3.3.3.13.3 Distance for NFC Type 4B Tag readingTest Sequence No 3: Distance for NFCType 4 TagB reading – 1,0cm

5.0onwards

M M M FFS

3.3.3.13.4 Distance for NFC Type 4B Tag readingTest Sequence No 4: Distance for NFCType 4 TagB Reading – 2,0cm

5.0onwards

C015 C015 C015 FFS

3.3.3.13.5 Distance for NFC Type 4B Tag readingTest Sequence No 5: Distance for NFCType 4 TagB Reading – 3,0cm

6.0onwards

C016 C016 C016 FFS

3.3.3.13.6 Distance for NFC Type 4B Tag readingTest Sequence No 5: Distance for NFCType 4 TagB Reading – 4,0cm

6.0onwards

C017 C017 C017 FFS

3.3.3.14 NFC Type 1 Tag reading performance 5.0onwards

M M M FFS

3.3.3.15 NFC Type 2 Tag reading performance 5.0onwards

M M M FFS

3.3.3.16 NFC Type 3 Tag reading performance 5.0onwards

M M M FFS

3.3.3.17 NFC Type 4A Tag reading performance 5.0onwards

M M M FFS

Page 27: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 27 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

3.3.3.18 NFC Type 4B Tag reading performance 5.0onwards

M M M FFS

3.3.3.19 NFC Tag handling during an active datatransfer.

5.0onwards

M M M FFS

3.3.3.24 NFC Forum Tag Operations Test Cases 6.0onwards

M M M FFS

3.3.3.25 NFC Forum Test Cases for Analog (allvalid versions)

8.0onwards

M M M FFS

3.3.3.27 NFC Forum Test Cases for Analog 2.0only

10.0.onwards

M M M FFS

3.3.3.28 Extended Length APDU handling 11.0.onwards

M M M FFS

3.4.3.1.1 Card Emulation enabled as soon asNFC hardware is onTest Sequence No.1

5.0onwards

M M M FFS

3.4.3.1.2 Card Emulation enabled as soon asNFC hardware is onTest sequence No 2

5.0onwards

C014 C014 C014 FFS

3.4.3.1.3 Card emulation in device on but inscreen locked

12.0onwards

M M M FFS

3.4.3.1.4 Card emulation in device on but screenoff

12.0onwards

M M M FFS

3.4.3.2 NFC during Standby time 5.0onwards

C005 C005 C005 FFS

3.4.3.3.1 Verify that device is able to performCard Emulation Mode A, CardEmulation Mode B and CLT Atransaction either in Battery Power Offor Battery Low modesTest sequence No 1: Card EmulationMode Type A in Battery Power Offmode

5.0onwards

C006 C006 C006 FFS

Page 28: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 28 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

3.4.3.3.2 Verify that device is able to performCard Emulation Mode A, CardEmulation Mode B and CLT Atransaction either in Battery Power Offor Battery Low modesTest sequence No 2: Card EmulationMode Type B in Battery Power Offmode

5.0onwards

C006 C006 C006 FFS

3.4.3.3.4 Verify that device is able to performCard Emulation Mode A, CardEmulation Mode B and CLT Atransaction either in Battery Power Offor Battery Low modesTest sequence No 4: Card EmulationMode Type A in Battery Low Mode

5.0onwards

C005 C005 C005 FFS

3.4.3.3.5 Verify that device is able to performCard Emulation Mode A, CardEmulation Mode B and CLT Atransaction either in Battery Power Offor Battery Low modesTest sequence No 5: Card EmulationMode Type B in Battery Low Mode

5.0onwards

C005 C005 C005 FFS

3.4.3.4 Distance for card emulation 5.0onwards

M M M FFS

3.4.3.5 Distance for card emulation in BatteryPower-off Mode (0cm)

5.0onwards

C006 C006 C006 FFS

3.4.3.6 Distance for card emulation in BatteryPower-off Mode (0.5cm)

5.0onwards

C006 C006 C006 FFS

3.4.3.7 Distance for card emulation in BatteryPower-off Mode (1cm)

5.0onwards

C006 C006 C006 FFS

3.4.3.8 Distance for card emulation in BatteryPower-off Mode (1.5cm)

5.0onwards

C006 C006 C006 FFS

3.4.3.9 Distance for card emulation in BatteryPower-off Mode (2cm)

5.0onwards

C006 C006 C006 FFS

3.4.3.10 Distance for card emulation in BatteryPower-low Mode (0cm)

5.0onwards

C005 C005 C005 FFS

3.4.3.11 Distance for card emulation in BatteryPower-low Mode (0.5cm)

5.0onwards

C005 C005 C005 FFS

Page 29: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 29 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

3.4.3.12 Distance for card emulation in BatteryPower-low Mode (1cm)

5.0onwards

C005 C005 C005 FFS

3.4.3.13 Distance for card emulation in BatteryPower-low Mode (1.5cm)

5.0onwards

C005 C005 C005 FFS

3.4.3.14 Distance for card emulation in BatteryPower-low Mode (2cm)

5.0onwards

C005 C005 C005 FFS

3.4.3.15 Distance for card emulation in BatteryPower- operational Mode (0cm)

5.0onwards

M M M FFS

3.4.3.16 Distance for card emulation in BatteryPower- operational Mode (0.5cm)

5.0onwards

M M M FFS

3.4.3.17 Distance for card emulation in BatteryPower- operational Mode (1cm)

5.0onwards

M M M FFS

3.4.3.18 Distance for card emulation in BatteryPower- operational Mode (1.5cm)

5.0onwards

M M M FFS

3.4.3.19 Distance for card emulation in BatteryPower- operational Mode (2cm)

5.0onwards

M M M FFS

3.4.3.20.1 Card emulation with switched off device(0cm)

11.0onwards

M M M FFS

3.4.3.20.2 Card emulation with switched off device(0.5cm)

11.0onwards

M M M FFS

3.4.3.20.3 Card emulation with switched off device(1cm)

11.0onwards

M M M FFS

3.4.3.20.4 Card emulation with switched off device(1.5cm)

11.0onwards

M M M FFS

3.4.3.20.5 Card emulation with switched off device(2cm)

11.0onwards

M M M FFS

3.4.3.21 Extended Length APDU handling 11.0onwards

M M M FFS

3.5.3.1 SWP Compliance testing 5.0onwards

M M M FFS

3.5.3.2 HCI Compliance testing 5.0onwards

M M M FFS

3.5.3.3 SWP Stress test 5.0onwards

M M M FFS

3.5.3.4 Switch mode 5.0onwards

M M M FFS

Page 30: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 30 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

3.5.3.5 RF Analog Protocol compliance 5.0onwards

M M M FFS

3.5.3.7 RF Digital Protocol compliance 11onwards

M M M FFS

5.3.1.1 GP SE Access Control – TestSequence 1

5.0onwards

M TNR TNR FFS

5.3.1.2 GP SE Access Control – TestSequence 2

5.0onwards

M TNR TNR FFS

5.3.1.3 GP SE Access Control – TestSequence 3

5.0onwards

M TNR TNR FFS

5.3.1.4 GP SE Access Control – TestSequence 4

5.0onwards

M TNR TNR FFS

5.3.1.5 GP SE Access Control – TestSequence 5

5.0onwards

C029 TNR TNR FFS

5.3.1.6 GP SE Access Control – TestSequence 6

5.0onwards

C029 TNR TNR FFS

5.3.1.7 GP SE Access Control – TestSequence 7

5.0onwards

C029 TNR TNR FFS

5.3.1.8 GP SE Access Control – TestSequence 8

5.0onwards

M TNR TNR FFS

5.3.1.9 GP SE Access Control – TestSequence 9

5.0onwards

M TNR TNR FFS

5.3.2 GP SE Access Control - Refresh tag 5.0onwards

M TNR TNR FFS

5.3.3 GP SE Access Control –ADF_PKCS#15 and DF PKCS#15

5.0onwards

M TNR TNR FFS

5.3.4 GP SE Access Control – PKCS#15selection via EF_DIR

5.0onwards

M TNR TNR FFS

5.3.5 GP SE Access Control – Configurationlimits

5.0onwards

M TNR TNR FFS

5.3.6 GP SE Access Control – No access 5.0onwards

M TNR TNR FFS

5.4 GP SE Access Control – GP Test PlanSee Note 1 at the end of the table.

5.0onwards

M TNR TNR FFS

Page 31: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 31 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

6.3.1 SIMalliance APIs SeeAnnex

B.1

M N/A FFS FFS

6.3.6.1 SIMalliance “getVersion” API 10.0onwards

M N/A FFS FFS

6.3.7 SIMalliance APIs for eSE SeeAnnex

B.1

C028 N/A FFS FFS

7.3.7.1 Multiple CE Environments TestSequence No 1: Default route UICC,contactless session with unregisteredAID

6.0onwards

C019 N/A N/A FFS

7.3.7.2 Multiple CE Environments TestSequence No 2: Default route HCE,contactless session with unregisteredAID

6.0onwards

C018 N/A N/A FFS

7.3.7.3 Multiple CE Environments TestSequence No 3: Default route UICC,off-host AID

6.0onwards

C019 N/A N/A FFS

7.3.7.4 Multiple CE Environments TestSequence No 4: Default route HCE, off-host AID

6.0onwards

C018 N/A N/A FFS

7.3.7.5 Multiple CE Environments TestSequence No 5: Default route UICC,AID conflict, off-host service selected

6.0onwards

C019 N/A N/A FFS

7.3.7.6 Multiple CE Environments TestSequence No 6: Default route HCE, AIDconflict, off-host service selected

6.0onwards

C018 N/A N/A FFS

7.3.7.7 Multiple CE Environments TestSequence No 7: Default route UICC,off-host service selected in Tap&Pay

6.0onwards

C019 N/A N/A FFS

7.3.7.8 Multiple CE Environments TestSequence No 8: Default route HCE, off-host service selected in Tap&Pay

6.0onwards

C018 N/A N/A FFS

7.3.7.9 Multiple CE Environments TestSequence No 9: Default route UICC,HCE service selected in Tap&Pay

6.0onwards

C019 N/A N/A FFS

Page 32: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 32 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

7.3.7.10 Multiple CE Environments TestSequence No 10: Default route HCE,HCE service selected in Tap&Pay

6.0onwards

C018 N/A N/A FFS

7.3.8.2 Active Card Emulation in Multiple CEEnvironments / Card EmulationSequence No 2: REQ_065 for NFCA

6.0onwards

C019 C019 C019 FFS

7.3.8.3 Active Card Emulation in Multiple CEEnvironments / Card EmulationSequence No 3: REQ_118.2 for NFCA

6.0onwards

C019 C019 C019 FFS

7.3.8.4 Active Card Emulation in Multiple CEEnvironments / Card EmulationSequence No 4: REQ_118.2 for NFCB

6.0onwards

C019 C019 C019 FFS

7.3.8.5 Active Card Emulation in Multiple CEEnvironments / Card EmulationSequence No 5: REQ_118.1 andREQ_162.1 for NFCA

6.0onwards

C019 C019 C019 FFS

7.3.8.6 Active Card Emulation in Multiple CEEnvironments / Card EmulationSequence No 6: REQ_065 for NFCB

6.0onwards

C019 C019 C019 FFS

7.3.8.9 Active Card Emulation in Multiple CEEnvironments / Card EmulationSequence No 9: REQ_118.2 andREQ_162.1 for NFCA

9.0onwards

C019 C019 C019 FFS

7.3.8.10 Active Card Emulation in Multiple CEEnvironments / Card EmulationSequence No 10: REQ_118.2 andREQ_162.1 for NFCB

9.0onwards

C019 C019 C019 FFS

7.3.8.11 Active Card Emulation in Multiple CEEnvironments / Card EmulationSequence No 11: REQ_177 for NFCA

11.0onwards

C019 C019 C019 FFS

7.3.9 Size of the CLF AID Routing table 10.0onwards

M M M FFS

8.3.1 EVT_TRANSACTION 5.0onwards

M M M FFS

8.3.2 Permissions 5.0onwards

C022 N/A N/A FFS

8.3.3 Intent management 5.0onwards

M N/A N/A FFS

Page 33: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 33 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

8.3.4.1 Application’s triggering order – TestSequence 1

5.0onwards

C029 N/A N/A FFS

8.3.4.2 Application’s triggering order – TestSequence 2

5.0onwards

C029 N/A N/A FFS

8.3.4.3 Application’s triggering order – TestSequence 3

5.0onwards

M N/A N/A FFS

8.3.5 Triggering on HCI eventEVT_CARD_DEACTIVATED

5.0onwards

M TNR TNR FFS

8.3.6 Triggering on HCI eventEVT_FIELD_OFF

5.0onwards

M TNR TNR FFS

11.3.1.1 OPEN CHANNELTest Sequence 1: (OPEN CHANNEL –Default APN Always-ON – Multiple APNsupported – with different APN)

5.0onwards

C008 C008 C008 FFS

11.3.1.2 OPEN CHANNEL11.3.1.2 Test Sequence 2: (OPENCHANNEL – Default APN Always-ON –Only Single APN supported – withdifferent APN)

5.0onwards

C009 C009 C009 FFS

11.3.1.3 OPEN CHANNELTest Sequence 3: (OPEN CHANNEL –Default APN Always-ON – APN empty)

5.0onwards

M M M FFS

11.3.1.4 OPEN CHANNELTest Sequence No 4: (OPENCHANNEL – Default APN Always-ON –APN empty- Default Bearer Type used)

5.0onwards

M M M FFS

11.3.2.1 CLOSE CHANNELTest Sequence 1: (CLOSE CHANNEL –Default APN Always-ON – Multiple APNsupported – with different APN-SUCCESSFUL)

5.0onwards

C008 C008 C008 FFS

11.3.2.2 CLOSE CHANNELTest Sequence 2: (CLOSE CHANNEL –Default APN Always-ON – Only SingleAPN supported – with different APN-SUCCESSFUL)

5.0onwards

C009 C009 C009 FFS

Page 34: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 34 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

11.3.2.3 CLOSE CHANNELTest Sequence 3: (CLOSE CHANNEL –Default APN Always-ON – APN empty-SUCCESSFUL)

5.0onwards

M M M FFS

11.3.2.4 CLOSE CHANNELTest Sequence No 4: (CLOSECHANNEL – Default APN Always-ON –APN empty- SUCCESSFUL- DefaultBearer Type Used)

5.0onwards

M M M FFS

11.3.3.1 RECEIVE DATATest Sequence 1: (RECEIVE DATA –Default APN Always-ON – Multiple APNsupported – with different APN)

5.0onwards

C008 C008 C008 FFS

11.3.3.2 RECEIVE DATATest Sequence 2: (RECEIVE DATA –Default APN Always-ON – Only SingleAPN supported – with different APN)

5.0onwards

C009 C009 C009 FFS

11.3.3.3 RECEIVE DATATest Sequence 3: (RECEIVE DATA –Default APN Always-ON – APN empty)

5.0onwards

M M M FFS

11.3.3.4 RECEIVE DATATest Sequence 4: (RECEIVE DATA –Default APN Always-ON – APN empty-Default Bearer Type used)

5.0onwards

M M M FFS

11.3.4.1 SEND DATATest Sequence 1: (SEND DATA –Default APN Always-ON – Multiple APNsupported –with different APN-BUFFER FULLY USED)

5.0onwards

C008 C008 C008 FFS

11.3.4.2 SEND DATATest Sequence 2: (SEND DATA –Default APN Always-ON – Only SingleAPN supported – with different APN-BUFFER FULLY USED)

5.0onwards

C009 C009 C009 FFS

11.3.4.3 SEND DATATest Sequence 3: (SEND DATA –Default APN Always-ON – APN empty-BUFFER FULLY USED)

5.0onwards

M M M FFS

Page 35: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 35 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

11.3.4.4 SEND DATATest Sequence 4: (SEND DATA –Default APN Always-ON – APN empty-BUFFER FULLY USED- Default BearerType used)

5.0onwards

M M M FFS

12.3.3.1 Remote management in BIP 5.0onwards

M M M FFS

12.3.3.2.1 OPEN CHANNELTest Sequence No 1: (OPENCHANNEL, No APN, immediate linkestablishment, Default Bearer forrequested transport layer, No localaddress, no alpha identifier)

5.0onwards

M M M FFS

12.3.3.2.2 OPEN CHANNELTest sequence No 2: (OPENCHANNEL, with APN, immediate linkestablishment, Default Bearer forrequested transport layer, no alphaidentifier)

5.0onwards

M M M FFS

12.3.3.2.3 OPEN CHANNELTest Sequence No 3: (OPENCHANNEL, with alpha identifier,immediate link establishment, DefaultBearer for requested transport layer)

5.0onwards

M M M FFS

12.3.3.2.4 OPEN CHANNELTest Sequence No 4: (OPENCHANNEL, with null alpha identifier,immediate link establishment, DefaultBearer for requested transport layer)

5.0onwards

M M M FFS

12.3.3.2.5 OPEN CHANNELTest Sequence No 5: (OPENCHANNEL, command performed withmodifications (buffer size), immediatelink establishment, Default Bearer forrequested transport layer)

5.0onwards

C020 C020 C020 FFS

Page 36: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 36 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

12.3.3.2.6 OPEN CHANNELTest Sequence No 6A: (OPENCHANNEL, user rejection, immediatelink establishment, Default Bearer forrequested transport layer, opencommand with alpha identifier,)

5.0onwards

C010 C010 C010 FFS

12.3.3.2.7 OPEN CHANNELTest Sequence No 6B: (OPENCHANNEL, User rejection, immediatelink establishment, Default Bearer forrequested transport layer, opencommand with alpha identifier)

5.0onwards

C011 C011 C011 FFS

12.3.3.3 CLOSE CHANNEL 5.0onwards

M M M FFS

12.3.3.4 RECEIVE DATA 5.0onwards

M M M FFS

12.3.3.5 SEND DATA 5.0onwards

M M M FFS

12.3.3.6 GET CHANNEL STATUS 5.0onwards

M M M FFS

12.3.3.7 Data available event 5.0onwards

M M M FFS

12.3.3.8 Channel Status event 5.0onwards

M M M FFS

12.3.3.9.1 SMS-PP Data DownloadTest Sequence No 1: (SMS-PP –followed by Open channel –Send/Receive data)

6.0onwards

M M M FFS

12.3.3.9.2 SMS-PP Data DownloadTest Sequence No 2: (SMS-PP – SendSM – followed by Open channel –Send/Receive data)

6.0onwards

M M M FFS

12.3.3.9.3 SMS-PP Data DownloadTest Sequence No 3: (SMS-PP – SendSM – followed by Open channel –Send/Receive data with timermanagement)

6.0onwards

M M M FFS

Page 37: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 37 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

12.3.3.9.5 Test Sequence No 4: (SMS-PP - Openchannel - Send/Receive data - SendSM with More Time)

9.0onwards

M M M FFS

12.3.3.9.6 Test Sequence No 5: (SMS-PP - Openchannel - Send/Receive data - SendSM without More Time)

9.0onwards

M M M FFS

12.3.3.10 Concurrent BIP channels 5.0onwards

M M M FFS

12.3.3.11 Contents of the TERMINAL PROFILE 5.0onwards

M M M FFS

12.3.3.12.1 OPEN CHANNEL – Terminal connectedto Wi-FiTest Sequence No 1: (OPENCHANNEL, Terminal connected to Wi-Fi-APN empty-Default Bearer Typeused)

5.0onwards

M M M FFS

12.3.3.12.2 OPEN CHANNEL – Terminal connectedto Wi-FiTest Sequence No 2: (OPENCHANNEL, Terminal connected to Wi-Fi-APN empty-GPRS Bearer Typeused)

5.0onwards

M M M FFS

12.3.3.13.1 CLOSE CHANNEL – Terminalconnected to Wi-FiTest Sequence No 1: (CLOSECHANNEL, Terminal connected to Wi-Fi-APN empty-Default Bearer Typeused)

5.0onwards

M M M FFS

12.3.3.13.2 CLOSE CHANNEL – Terminalconnected to Wi-FiTest Sequence No 2: (CLOSECHANNEL, Terminal connected to Wi-Fi-APN empty-GPRS Bearer Typeused)

5.0onwards

M M M FFS

12.3.3.14 RECEIVE DATA – Terminal connectedto Wi-FiTest Sequence No 1: (RECEIVE DATA,Terminal connected to Wi-Fi-APNempty-Default Bearer Type used)

5.0onwards

M M M FFS

Page 38: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 38 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

12.3.3.15 SEND DATA – Terminal connected toWi-FiTest Sequence No 1: (SEND DATA,Terminal connected to Wi-Fi-APNempty-Default Bearer Type used)

5.0onwards

M M M FFS

12.4.3.1 Contactless transaction during BIPsession

5.0onwards

M M M FFS

12.4.3.2.1 Receiving and accepting a voice callduring BIP CAT-TP data transfer

5.0onwards

M M M FFS

12.4.3.2.3 Voice Call made from the device duringBIP CAT-TP session

5.0onwards

M M M FFS

12.4.3.2.5 BIP CAT-TP data transfer during aVoice Call is established

5.0onwards

M M M FFS

12.4.3.3.1 Test Sequence No 1: OTA data Loadingwithout PoR requested by OTA server

5.0onwards

M M M FFS

12.4.3.3.2 Test Sequence No 2: OTA data Loadingwith PoR requested by OTA server

5.0onwards

M M M FFS

12.4.3.3.5 Test Sequence No 5: OTA data Loadingwith PoR requested by OTA server onlyon error

5.0onwards

M M M FFS

12.4.3.4 Secure Element Access during BIPsession

5.0onwards

M M M FFS

12.4.3.5 SMS and Internet Connection duringOTA data Loading

5.0onwards

M M M FFS

13.3.1 Secure Element Access API in RadioOff State

5.0onwards

M TNR TNR FFS

13.3.2 Enabled / Disabled states 5.0onwards

M M M FFS

13.3.3 Modem and UICC over APDUexchange

5.0onwards

M TNR TNR FFS

13.3.4 Modem retrieves the response data tothe SELECT command

8.0onwards

M TNR TNR FFS

13.3.5 Modem supports 19 logical channels 8.0onwards

M TNR TNR FFS

13.3.6.1 Get Response APDU segmented fromUICC (Case2 Command)

9.0onwards

M M M FFS

Page 39: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 39 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

13.3.6.2 Get Response APDU segmented fromUICC (Case4 Command)

9.0onwards

M M M FFS

13.3.6.3 Long APDU answer from UICC (Case2Command)

11.0onwards

M M M FFS

13.3.6.4 Long APDU command + answer fromUICC (Case4 Command)

11.0onwards

M M M FFS

13.3.7 Terminal Capability TAG 82 9.0onwards

M M M FFS

13.3.8 Reselect previously non-existing applet 10.0onwards

M M M FFS

13.3.9 Retrieve CIN and IIN from eSE ISD bymobile application

12.0onwards

C028 C028 C028 FFS

15.3.3.1 Shared library 6.0onwards

C023 N/A N/A N/A

15.3.3.2 Getting an instance of the “NFCcontroller” class

5.0onwards

C023 N/A N/A N/A

15.3.3.3 Getting the status of the NFC Controller 5.0onwards

C023 N/A N/A N/A

15.3.3.4 Enabling the NFC Controller 6.0onwards

C023 N/A N/A N/A

15.4.3.1 Open Mobile Service layer API 6.0onwards

M N/A N/A N/A

15.4.3.2 SIMAlliance OMAPI & GP accessControl just after device boot

6.0onwards

M N/A N/A N/A

15.4.3.3 Getting the list of available SecureElements

8.0onwards

C023 N/A N/A N/A

15.4.3.4.1 Usage of identical SE Names acrossdevice components

8.0onwards

C024 N/A N/A N/A

15.4.3.4.2 Usage of identical SE Names acrossdevice components (without usingGSMA APIs)

11.0onwards

C018 N/A N/A N/A

15.5.3.1 Switching to “Multicast” Mode 6.0onwards

C030 N/A N/A N/A

15.5.3.2 Receiving EVT Transaction from“BroadcastReceiver”

6.0onwards

C030 N/A N/A N/A

Page 40: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 40 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

15.5.3.3 Checking EVT Transaction data sentthrough “BroadcastReceiver”

6.0onwards

C030 N/A N/A N/A

15.5.3.4 Test EVT Transaction event shall behandled only by the appropriateapplication

5.0onwards

C029 N/A N/A N/A

15.5.3.5 Application Permission for Open MobileAPI

6.0onwards

C029 N/A N/A N/A

15.5.3.6 EVT Transaction is received only by theappropriate application based on priorityscheme

8.0onwards

C029 N/A N/A N/A

15.7.3.1 Dynamic AIDs Registration APIs –“com.gsma.services.nfc.NfcController”class

6.0onwards

C024 N/A N/A N/A

15.7.3.2 Dynamic AIDs Registration APIs –“com.gsma.services.nfc.OffHostService”class

6.0onwards

C024 N/A N/A N/A

15.7.3.3 Dynamic AIDs Registration APIs –“com.gsma.services.nfc.AidGroup”class

6.0onwards

C024 N/A N/A N/A

15.7.3.4.1 “Long press” on “Tap&Pay” menuentries – Test Sequence No 1

6.0onwards

C024 N/A N/A N/A

15.7.3.4.2 “Long press” on “Tap&Pay” menuentries - Test Sequence No 2

6.0onwards

C024 N/A N/A N/A

15.7.3.5 Routing in Multiple CEE model 6.0onwards

C024 N/A N/A N/A

15.7.3.6.1 AID Conflict Resolution mechanism –Test Sequence No 1

6.0onwards

C024 N/A N/A N/A

15.7.3.6.2 AID Conflict Resolution mechanism -Test Sequence No 2

11.0onwards

C018 N/A N/A N/A

15.7.3.7.1 Test Sequence No 1: Applicationuninstalled

6.0onwards

C024 N/A N/A N/A

15.7.3.7.2 Test Sequence No 2: Applicationdisabled and re-enabled

9.0onwards

C018 N/A N/A N/A

15.7.3.7.3 Test Sequence No 3: Applicationuninstalled (without using GSMA API)

11.0onwards

C018 N/A N/A N/A

Page 41: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 41 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

15.7.3.8.1 Routing update when Application isupdated / upgraded in Multiple CEEmodel - Test Sequence No 1

6.0onwards

C024 N/A N/A N/A

15.7.3.8.2 Routing update when Application isupdated / upgraded in Multiple CEEmodel – Test Sequence No 2

6.0onwards

C018 N/A N/A N/A

15.7.3.8.3 Routing update when Application isupdated / upgraded in Multiple CEEmodel - Test Sequence No 3

11.0onwards

C018 N/A N/A N/A

15.7.3.9.1 NFC Controller routing table – TestSequence No 1

6.0 to 8.0 C018 N/A N/A N/A

15.7.3.9.3 NFC Controller routing table – TestSequence No 3

6.0onwards

C024 N/A N/A N/A

15.7.3.9.4 NFC Controller routing table – TestSequence No 4

6.0onwards

C024 N/A N/A N/A

15.7.3.9.5 NFC Controller routing table – TestSequence No 5

11.0onwards

C018 N/A N/A N/A

15.7.3.9.6 NFC Controller routing table – TestSequence No 6

11.0onwards

C018 N/A N/A N/A

15.7.3.10.1 Tap&Pay menu – routing of APDUs forpayment services – Test Sequence No1

8.0onwards

C018 N/A N/A N/A

15.7.3.10.2 Tap&Pay menu – routing of APDUs forpayment services – Test Sequence No2

8.0onwards

C018 N/A N/A N/A

15.7.3.10.3 Tap&Pay menu – routing of APDUs forpayment services – Test Sequence No3

11.0onwards

C018 N/A N/A N/A

15.7.3.11.1 Dynamic & Automatic switch of AIDdefault route – Test Sequence No 1

8.0onwards

C018 N/A N/A N/A

15.7.3.11.2 Dynamic & Automatic switch of AIDdefault route - Test Sequence No 2

8.0onwards

C024 N/A N/A N/A

15.7.3.11.3 Dynamic & Automatic switch of AIDdefault route – Test Sequence No 3

11.0onwards

C018 N/A N/A N/A

15.7.3.12.1 Routing in Multiple CEE model withoutusing GSMA API – Test Sequence No 1

6.0onwards

C018 N/A N/A N/A

Page 42: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 42 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

15.7.3.12.2 Routing in Multiple CEE model withoutusing GSMA API – Test Sequence No 2

11.0onwards

C018 N/A N/A N/A

15.7.3.12.3 Routing in Multiple CEE model withoutusing GSMA API – Test Sequence No 3

11.0onwards

C018 N/A N/A N/A

15.7.3.12.4 Routing in Multiple CEE model withoutusing GSMA API – Test Sequence No 4

11.0onwards

C018 N/A N/A N/A

15.7.3.12.5 Routing in Multiple CEE model withoutusing GSMA API – Test Sequence No 5

11.0onwards

C018 N/A N/A N/A

15.7.3.12.6 Routing in Multiple CEE model withoutusing GSMA API – Test Sequence No 6

11.0onwards

C018 N/A N/A N/A

15.7.3.12.7 Routing in Multiple CEE model withoutusing GSMA API – Test Sequence No 7

11.0onwards

C018 N/A N/A N/A

15.7.3.12.8 Routing in Multiple CEE model withoutusing GSMA API – Test Sequence No 8

11.0onwards

C018 N/A N/A N/A

15.7.3.12.9 Routing in Multiple CEE model withoutusing GSMA API – Test Sequence No 9

11.0onwards

C018 N/A N/A N/A

15.7.3.12.10 Routing in Multiple CEE model withoutusing GSMA API – Test Sequence No10

11.0onwards

C018 N/A N/A N/A

15.7.3.13 Routing in Multiple CEE model with eSE 11.0onwards

C027 N/A N/A N/A

15.7.3.14 Routing in Multiple CEE model with eSEin Battery Low Mode

11.0onwards

C027 N/A N/A N/A

15.7.3.15 nonAID based services registration andconflict management

11.0onwards

C027 N/A N/A N/A

15.8.3.1 “getVersion” API 6.0onwards

C023 N/A N/A N/A

15.8.3.2.1 “getProperty” API – Test Sequence No1: OMAPI

6.0onwards

C023 N/A N/A N/A

15.8.3.2.2 “getProperty” API – Test Sequence No2: MULTIPLE_ACTIVE_CEE

6.0onwards

C023 N/A N/A N/A

15.8.3.2.3 “getProperty” API – Test Sequence No3: HCI_SWP, BATTERY_LOW_MODE

6.0onwards

C023 N/A N/A N/A

Page 43: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 43 of 606

Test case Test Case Title

TS.26versions

Test case applicability Applicable

And

roid

Win

dow

s

Bla

ckB

erry

Oth

ers

Yes / No

15.8.3.2.4 “getProperty” API - Test Sequence No4: BATTERY_POWER_OFF_MODE,FELICA, MIFARE_CLASSIC,MIFARE_DESFIRE

6.0 to 8.0 C023 N/A N/A N/A

15.8.3.2.5 “getProperty” API - Test Sequence No5: Invalid argument

6.0onwards

C023 N/A N/A N/A

15.8.3.2.6 “getProperty” API - Test Sequence No6: BATTERY_POWER_OFF_MODE,FELICA, MIFARE_CLASSIC,MIFARE_DESFIRE

9.0onwards

C023 N/A N/A N/A

15.9.3.1 Permissions 6.0onwards

M N/A N/A N/A

15.9.3.2 APDU Logs 9.0onwards

M N/A N/A N/A

Note 1: (See Test case 5.4): A limitation in relation to the test platform validation has been identified in the area of full OSsupport for GP SEAC test cases section 5.4. The TNR is a temporary solution until the industry has identified a permanentsolution, the applicability of 5.4 will be reviewed for the next version of TS.27 and change to “M” (Mandatory) if possible.The industry including the involved stakeholders will in timely manner work on a solution in order to obtain full OS supportfor GP SEAC test cases section 5.4 within reasonable time schedule.

Table 2.5: Applicability of tests

Conditionalitem

Condition

C001 VOID

C002 VOID

C003 VOID

C004 VOID

C005 IF (O_BAT_LOW) THEN M ELSE N/A

C006 IF (O_BAT_OFF) THEN M ELSE N/A

C007 VOID

C008 IF (O_MULTI_APN) THEN M ELSE N/A

C009 IF (NOT_O_MULTI_APN) THEN M ELSE N/A

C010 IF (O_User_Confirm_Before_PDP_Context_Request) THEN M ELSE N/A

C011 IF NOT (O_User_Confirm_Before_PDP_Context_Request) THEN M ELSE N/A

Page 44: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 44 of 606

Conditionalitem

Condition

C012 VOID

C013 VOID

C014 IF (O_NFC _PERSISTENCE) THEN M ELSE N/A

C015 IF (O_TAG_DISTANCE_2CM) THEN M ELSE N/A

C016 IF (O_TAG_DISTANCE_3CM) THEN M ELSE N/A

C017 IF (O_TAG_DISTANCE_4CM) THEN M ELSE N/A

C018 IF (O_MULTI_CEE_ON) THEN M ELSE N/A

C019 IF (O_MULTI_CEE_ON AND(O_DEFAULT_ROUTE_SELECTION_BY_USER_MENU OR O_REQ_143)) THENM ELSE N/A

C020 IF (O_BUFFER_SIZE) THEN M ELSE N/A

C021 VOID

C022 IF (O_BEFORE_ANDROID_MARSHMALLOW) THEN M ELSE N/A

C023 IF (O_GSMA_API) THEN M ELSE N/A

C024 IF (O_MULTI_CEE_ON AND O_GSMA_API) THEN M ELSE N/A

C025 IF (O_ Single_Active_CEE AND O_GSMA_API) THEN M ELSE N/A

C026 IF (O_MUL_SE AND O_Single_Active_CEE AND O_API_SWITCH_CEE ANDO_GSMA_API) THEN M ELSE N/A

C027 IF (O_MULTI_CEE_ON AND O_eSE) THEN M ELSE N/A

C028 IF (O_eSE) THEN M ELSE N/A

C029 IF (O_BEFORE_ANDROID_P) THEN M ELSE N/A

C030 IF (O_GSMA_API AND O_BEFORE_ANDROID_P) THEN M ELSE N/A

Table 2.6: Conditional items referenced by Table 2.5

VendorThe Vendor shall provide information with respect to Device default configuration.2.1.6 Information to be provided by the

Page 45: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 45 of 606

Item Description Value Status

1 Preferred buffer size supported by the terminal for OpenChannel command

C

2 The value of the Issuer Identification Number of the eSEas personalized in the ISD

C

3 The value of the Card Image Number of the eSE aspersonalized in the ISD

C

Note: Conditional values shall be provided if the corresponding option is supported in Table 4:Options

Table 2.7: Device default configuration

2.2 General considerationFor the purpose of the test execution and unless specified, the UICC is the active SecureElement by default and the Access Control configuration provides full access to any AIDsfrom any mobile application. If the DUT supports O_MULTI_CEE_ON and unless otherwisespecified in the Test Case, the UICC shall stay accessible by declaring all required UICCAIDs in the “other” category of an OffHostService.

Test descriptions are independent.

For each test described in this document, a chapter provides a general description of theinitial conditions valid for the whole test. This description is completed by specificconfigurations to each individual sub-case.

After completing the test, the configuration is reset before the execution of the following test.

2.2.1 Test specificationsThe GSMA NFC Handset Test Book refers to test specifications developed by otherorganisations (EMVCo, ISO, ETSI, 3GPP, Global Platform, NFC Forum, OMA andSIMalliance). These organisations defined their own requirements for test benches, testapplicability and pass criteria’s.

The GSMA fully relies on these test specifications for the purpose of the GSMA NFCHandset Test Book and requires these test to be performed. In the scope of the GSMAevaluation a list of tests will have to be conducted and are listed in Annex D.

When determining the applicability of the test cases for the DUT in each of these externaltest specifications, those device options with GSMA Status set to M in the relevant sub-section of Annex B should be set to Supported in the device options in the external testspecification.

2.2.2 SIMalliance Open Mobile APIThe SIMalliance Open Mobile API specification [6] is defined in an object oriented language-manner and may not be applicable for some OS platforms. Therefore, this Test Book isbased on the SIMalliance specification for test steps description and pass criteria.

The mapping from Open Mobile API errors to Java based exceptions shall be as follows:

Page 46: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 46 of 606

SIMalliance error Java based exception

IOError java.io.IOException

SecurityError java.lang.SecurityException

NoSuchElementError java.util.NoSuchElementException

IllegalStateError java.lang.IllegalStateException

IllegalParameterError java.lang.IllegalArgumentException

Table 2.8: Mapping from Open Mobile API errors to Java based exceptions

2.2.3 Pass criterionA test execution is considered as successful only if the test procedure was fully carried outsuccessfully.

A test execution is considered as failed if the tested feature provides an unexpectedbehaviour.

A test execution is considered as non-conclusive when the pass criteria cannot beevaluated due to issues during the setup of the initial conditions.

2.2.4 Future studySome of the test cases described in this Test Book are FFS (For Future Study). This meansthat some clarifications are expected at the requirement level to conclude on a test method.

2.2.5 Test Cases “Direction”Test cases includes a “Direction” column. Different test platform elements (mobileapplication, NFC tags, UICC,) are involved in the test cases execution. This information isprovided to clarify the test platform elements between which a test step is performed.

These elements or “actors” used over this document are listed in the table below:

Actor Description

DUT Represents the Device Under Test according to the definition of Deviceprovided in section 1.3

MERepresents the Mobile Equipment as defined in section 1.3. This is asynonym for the DUT, used in certain test cases for consistency withexternal specifications.

User Represents the User as defined in section 1.3

Tag Represents an NFC Tag according to section 2.5.4 “Tag testing”

PCDRepresents the contactless reader equipment.It follows requirements in section 2.5.6 “Reader equipment”

UICC Represents the UICC as defined in section 2.5.1 of this test book

AppRepresents the software application installed on the DUT to interact as theapplicative level and check the capabilities of the DUT according to theOperating System

Page 47: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 47 of 606

Actor Description

USS Represents a system simulating the mobile network

Server Represents the OTA server able to send data over the air. This should bepart of the test environment defined in section 2.5.8

Table 2.9: Definition of Test Case “Direction”

2.3 Tests with measurement and physical settingsPart of this testing refers to measurement or physical positions:

Transaction duration measurement Power consumption measurement Distance between the DUT and a NFC tag or a contactless reader (reader and target

are centred to each other).

For test cases relative to these characteristics, all relevant information to allow identifyingthe severity of detected issues must be added in the test report.

2.4 Reference TransactionTo ascertain correct implementation by the DUT of the card emulation mode as described[1], a reference transaction will be used.

The reference transaction is executed using a contactless reader as follows:

The transaction always starts with putting DUT into reader RF field. Then the readerestablishes the contactless connection with the DUT. Afterwards the following APDUs willbe exchanged. For each command, the test tool shall check that the expected response isreturned by the DUT.

Command Expected response

Select by AID A0000005595000000000000052414441 SW: '90 00'

Select by File ID (5F00) SW: '90 00'

Select by File ID (1F00) SW: '90 00'

Read Binary Response data: 128 bytes with value'00'SW: '90 00'

Update Binary (with 128 bytes with value 0xFF) SW: '90 00'

Read Binary Response data: 128 bytes with value'FF'SW: '90 00'

Update Binary (with 128 bytes with value 0x00) SW: '90 00'

External Authenticate SW: '90 00'

Table 2.10: List of expected responses by the DUT

Page 48: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 48 of 606

The transaction always ends with a DESELECT and finally the removal of DUT from readerRF field.

For this purpose, a UICC application will be used as a part of the test equipment.

Annex A of this document proposes a description of the application and its correspondingsource code. In case of the simulated UICC the complete behaviour of this referencedapplication shall be simulated. The parts related to each single test shall be simulatedaccording to the description given in the specific test case.

2.5 Test EquipmentThis chapter aims at describing different test tools for evaluation of the subsequent testpackages. Names assigned to these applications are also used in the test casedescriptions.

Implementation of these applications remains the responsibility of the provider.Nevertheless, a description of the test equipment used for testing (brand name, modelname and version) will be provided as a part of the test report.

The .cap files mentioned within this document provide description of the UICC behaviour,which can be either simulated or a real UICC. The simulation of the behaviour remainslanguage-independent. The test equipment/case manufacturer could use other means togain the same behaviour as specified in the Java .cap files.

2.5.1 UICCFor all the tests described in this GSMA NFC Handset Test Book, a UICC/eUICC must beused. For most of the test sequences described in this document the UICC has an importantrole in the test bench and should be managed by Test Labs as test tool.

The test environment can be implemented via use of real UICCs or via simulatedenvironment for UICCs.

The following terms for test environment are used:

Real UICC: A real UICC is used during testing. Typically this is a physicallyavailable UICCs provided by UICC manufacturers.

Simulated UICC: The UICC is emulated with a simulator which provides correspondingfunctionalities as a valid UICC.

In order to ensure best possible traceability and reproducibility of test results, the followingsections define requirements for the different test environments.

2.5.1.1 Requirements for UICC environmentIf the test cases in this NFC Handset Test Book are implemented using UICCs, therequirements for test environment described in this section shall be fulfilled.

The UICC (simulated or real) shall act as a valid UICC according to the followingspecifications:

Page 49: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 49 of 606

[8]: ETSI TS 102 221:"Smart Cards; UICC-Terminal interface; Physical and logicalcharacteristic".

[9]: ETSI TS 102 613:"Smart Cards; UICC-Contactless Front-end (CLF) Interface;Part 1: Physical and data link layer characteristic".

[10]: ETSI TS 102 622:"Smart Cards; UICC-Contactless Front-end (CLF) Interface;Host Controller Interface (HCI)".

In particular, during test procedure execution, the UICC shall respect the electrical andsignalling conditions for all UICC contacts within the limits given by ETSI TS 102 613 [9], TS102 221 [8] and ETSI TS 102 622 [10]). The accuracy of the UICC simulator’s settings shallbe taken into account when ensuring this.

The UICC (simulated or real) shall be connected to the device under test (DUT) and shallprovide functionalities specified below:

Shall support card emulation, reader and connectivity gates as specified in ETSI TS102622 [10].

Shall support card emulation in both full power mode and low power mode, asspecified in ETSI TS 102 613 [9] and ETSI TS 102 622 [10] for Type A, Type B andType F.

Shall support CLT mode in full power mode and in low power mode, as specified inETSI TS 102 613 [9] and ETSI TS 102 622 [10].

Shall support GlobalPlatform Secure Element Access Control both for ARA and ARFmechanism

Shall support BIP and APN as specified in 3GPP TS 31.124 [21] Shall provide all necessary information (Specification, ADM codes) to manage the

card content and the file system

In addition to the above listed requirements the UICC simulator shall implement thefollowing functionalities:

Shall fulfil the requirements for SWP/HCI as specified in ETSI TS 102 694-1 [11]clause 4.4, and ETSI TS 102 695-1 [12] clause 4.4

Shall fulfil the requirements for Remote Management of NFC Services and for MobileDevice APN as specified in 3GPP TS 31.121 [20] clause 4.1 and in 3GPP TS 31.124[21] in 27.22.2A, 27.22.2B and 27.22.2C.

Shall implement the behaviour for the device interface commands in the scope of theSecure Element Access Control related device tests (e.g.: GET_DATA [all],GET_DATA [specific] for ARA)

For the case 4 APDU exchanges utilizing T=0 transmission protocol and originatingfrom the Secure Element Access API when the UICC is required to return an R-APDU with response data and with SW=’62 XX’ or SW=’63 XX’ in response to acase 4 C-APDU, the UICC simulator shall be able to implement both the ISO andETSI behaviour:

Behaviour recommended by ISO: send first a “61 XX” and then - after receivingGET RESPONSE command from the device - the data with the warning statusword

Page 50: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 50 of 606

Behaviour recommended by ETSI: send first SW warning instead of 61 XX andfollow the procedure as described in Annex C of [8].

Note: Unless otherwise specified the ISO behaviour is used.

2.5.1.2 UICC Form FactorAll UICC form factors, as specified in ETSI TS 102 221 [8] chapter 4.0; shall be provided bythe simulated and real UICC environment.

2.5.2 Requirements for UMTS Network SimulatorFor Basic Remote Management of NFC Services (section 12.3) and Mobile Device APNManagement (section 11) test execution, the test equipment shall fulfil the requirementsspecified in 3GPP TS 34.108 [25] clause 4. Network simulator set up for other sections isdefined in the relevant chapters.

2.5.3 Common applicationsThe following applications are common to different test packages.

2.5.3.1 UICC Applications ReferenceApplication.cap: A UICC application according to the description in

Error! Reference source not found., which can be used to run the referencetransaction. The source code of this application is available at:

https://github.com/GSMATerminals/NFC-Test-Book-Public

APDU_TestApplication.cap: Based on the ReferenceApplication.cap, thisapplication allows managing different APDU answers. The application sendsEVT_TRANSACTION on the EVT_FIELD_OFF event. The application implementsthe sequence used by the MobileApplication (defined in Chapter 2.5.3.2):

On APDU Case 1 => 0x0001[P1]00

returns SW1-SW2

On APDU Case 2 => 0x0002[P1]00[Le]

returns [Data field Le bytes long] only if SW1 = 0x62 or 0x63 or 0x90 + SW1-SW2

On APDU Case 3 => 0x0003[P1]00[Lc][Data field Lc bytes long]

returns SW1-SW2

On APDU Case 4 => 0x0004[P1] 00[Lc] [Data field Lc bytes long] [Le]

returns [Data field Le bytes long] only if SW1 = 0x62 or 0x63 or 0x90 + SW1-SW2

Depending of [P1] in the APDU command; the application will return thecorresponding SW1-SW2.

Page 51: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 51 of 606

[P1] SW1-SW2

0x00 0x9000

0x01 0x6200

0x02 0x6202

0x03 0x6280

0x04 0x6281

0x05 0x6282

0x06 0x6283

0x07 0x6284

0x08 0x6285

0x09 0x6286

0x0A 0x62F1

0x0B 0x62F2

0x0C 0x6300

0x0D 0x6381

0x0E 0x63C2

0x0F 0x6310

0x10 0x63F1

0x11 0x63F2

0x12 0x6400

0x13 0x6401

0x14 0x6402

0x15 0x6480

0x16 0x6500

0x17 0x6581

0x18 0x6800

0x19 0x6881

0x1A 0x6882

0x1B 0x6883

0x1C 0x6884

0x1D 0x6900

0x1E 0x6900

0x1F 0x6981

0x20 0x6982

0x21 0x6983

Page 52: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 52 of 606

[P1] SW1-SW2

0x22 0x6984

0x23 0x6985

0x24 0x6986

0x25 0x6987

0x26 0x6988

0x27 0x6A00

0x28 0x6A80

0x29 0x6A81

0x2A 0x6A82

0x2B 0x6A83

0x2C 0x6A84

0x2D 0x6A85

0x2E 0x6A86

0x2F 0x6A87

0x30 0x6A88

0x31 0x6A89

0x32 0x6A8A

Table 2.11: Status Word

APDU_TestApplication_card_deactivated.cap: a modified version of theAPDU_TestApplication.cap. This application sends EVT_TRANSACTION only on theEVT_CARD_DEACTIVATED event.

2.5.3.2 Device Applications MobileApplication: A device application allowing the following access to the UICC:

Open Logical Channel via Select AID

SELECT_BY_DF_name on AID01

Send APDU Case 1 => 0x0001[P1]00

Nominal expected response is SW1-SW2

Send APDU Case 2 => 0x0002[P1]0000

Nominal expected response is [Data field of 0xFF bytes long] only if SW1 =0x62 or 0x63 or 0x90 + SW1-SW2

Send APDU Case 3 => 0x0003[P1]00FF [Data field of 0xFF bytes long]

Page 53: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 53 of 606

Nominal expected response is SW1-SW2

Send APDU Case 4 => 0x0004[P1]00FF [Data field of 0xFF bytes long] FF

Nominal expected response is [Data field of 0xFF bytes long] only if SW1 =0x62 or 0x63 or 0x90 + SW1-SW2

Additionally the application will allow sending APDUs with all the other ClassInstruction pairs [CLAINS] from 0x0000 to 0xFEFF excluding INS = 0x70, 0x6x,0x9x for all CLA

Send all CLA/INS pairs => 0x[CLAINS]000010 [Data field of 0x10 bytes long]

o Nominal expected response is [Data field of 0x10 bytes long] + SW1-SW2

[P1] identifies the sub case.

o When not specified in the test case, [P1] equals 0x00 meaning defaultSW1-SW2 is 90 00.

For testing purpose, 2 or 3 occurrences of the application will be created:

GSMA_Mobile_App_SP1_signed signed with a private key corresponding totest certificate #1

GSMA_Mobile_App_SP2_signed signed with a private key corresponding totest certificate #2

MobileApplication is considered as launched if it is selected and started by the User.

On Android Devices supporting Multiple Card Environment the AIDs of the instances ofReferenceApplication.cap shall be registered to UICC with “Other” category for each testcase where the ReferenceApplication.cap (or derivative) is used.

NOTE: The AID registration does not apply to test cases in section 15.7.

On Android Devices supporting Multiple Card Environment the AIDs of the instances ofAPDU_TestApplication.cap shall be registered to UICC with “other” category for each testcase where the APDU_TestApplication.cap (or derivative) is used.

NOTE: The AID registration does not apply to test cases in section 15.7.

On Android Devices supporting Multiple Card Environment the AIDs of the instances ofAPDU_TestApplication_card_deactivated.cap shall be registered to UICC with “other”category for each test case where the APDU_TestApplication_card_deactivated.cap (orderivative) is used.

NOTE: The AID registration does not apply to test cases in section 15.7.

Android OS versionFor devices based on Android version prior to Android P the relevant Device Application:

• shall use the SIMalliance Open Mobile API; and

2.5.3.2.1

Page 54: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 54 of 606

• shall apply the TS.26 requirements for transaction events and permissions whichare applicable for “before Android P”.

For devices based on Android P or following Android releases the relevant DeviceApplication:

• shall use “android.se.omapi” package. For details see [45]

• shall apply the TS.26 requirements for transaction events and permissions whichare applicable for “Android P onwards”.

Unless stated otherwise it is allowed to use the same Device Application for both devicesbefore Android P and devices based on Android P or following Android releases.

2.5.3.3 Other Applications APDU application: A software application running on a PC connected to a

contactless reader. This application will be used to send C-APDU to the DUT andget the corresponding R-APDU.

2.5.3.4 LogicallyThe reference PKCS#15 structures are using the following AID´s:

AID_REF = ‘A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 41’

AID01 = ‘A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31’

AID02 = ‘A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 32’

AID03 = ‘A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 33’

2.5.3.5 eSE ApplicationsNote: these applications are mandatory only if the DUT supports O_eSE. See Annex F forthe configuration of a device with eSE.

Applet1: SE application returning “4f 46 46 48 4f 53 54” + SW90 00 for theSELECT by AID command. This application is available at:

https://github.com/GSMATerminals/NFC-Test-Book-Public/

Under eSE TestApplet/build Applet2: SE application returning “48 43 45” + SW90 00 for the SELECT by AID

command. This application is available at:

https://github.com/GSMATerminals/NFC-Test-Book-Public/

Under eSE TestApplet/build

Applet3: SE application returning “65 53 45” + SW90 00 for the SELECT by AIDcommand. This application is available at:

https://github.com/GSMATerminals/NFC-Test-Book-Public/

Under eSE TestApplet/build

Page 55: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 55 of 606

2.5.4 Tag TestingThe test environment described in this GSMA NFC Handset Test Book can be implementedto use real Tags or simulated Tags.

The following terms for test environment are used:

Real Tags: A real Tag is used during testing. Typically this is a physicallyavailable Tag provided by Tag manufacturers. A list of reference RealTags are defined in Annex C.

Simulated Tags: The Tag is emulated with a simulator which provides correspondingfunctionalities as specified by the NFC Forum. It is provided by testtool manufacturers.

2.5.4.1 Common positioning of Device and TagA number of the test cases require the use of a Tag which shall be positioned relative to theDUT. Contactless communication between the device and the Tag is part of the verdictevaluation of the test cases. Therefore it is essential that a minimum set of positions aredefined in order to ensure the test cases are executed in a reproducible way.

The following are definitions for DUT and Tag:

DUT antenna reference point:

This is the position on the DUT which will provide the optimal performance of theNFC antenna. If the device includes an indication to the user of the position of theNFC antenna (see TS26_NFC_REQ_107), the position as indicated to the usershall be used. Otherwise, this point shall be provided by the device manufacturerfor testing purposes; the reference point shall be marked on the outside cover ofthe device.

Tag antenna reference point:

This is the position at the Tag where the antenna performance is optimal. For areal Tag this point is provided by the Tag vendor or measured by the testlaboratory. For a reader/listener antenna, the point is provided by the vendor ofthe antenna.

Positioning of DUT and Tag for test cases where there is no requirement to the distancebetween DUT and Tag, the DUT and Tag are positioned as follows:

The DUT and Tag are placed with their antenna reference points located as close aspossible to each other taking into account the form factor of the DUT.

The DUT and Tag are positioned both in a vertical position as default position. I.e.with a traditional DUT form factor and a Tag with ID1 form factor, the positioning willbe as below:

Page 56: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 56 of 606

Figure 2.1: Tag and DUT antenna reference point

The DUT and Tag is positioned in parallel plans as possible due to form factor of theDUT. Ideally the position will look like:

Figure 2.2: Antenna positioning

The positioning shall provide optimal antenna coupling between DUT and Tag.

The following conditions shall be fulfilled to limit the impact of external noise by executing allcontactless tests in the present test specification:

The external interferences sources:

Metal objects or any other interference elements shall be kept at least 15cm from the TestSystem.

Any magnetic field shall not be present in a volume of 1 meter around the Test System; e.g.no other antennas, contactless terminals, cell phones, etc.

The DUT and the Tag must be placed so that the radio communication can correctly takeplace.

2.5.4.2 Distance specific positioning

Figure 2.3: “z” distance

Page 57: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 57 of 606

For the test cases specifying exact distance between DUT and Tag, the distance is thevertical distance between DUT and Tag antenna reference points. The following distancesare used during distance testing:

z = 0,0cm z = 0,5cm z = 1,0cm z = 2,0cm z = 3,0cm z = 4,0cm

The distance setting accuracy: +/- 0,05cm

The distance z is measured from the device outside cover to the Tag independent if theantenna is located inside the DUT.

For test cases not specifying a distance between DUT and Tag, the default distance is z =0,0cm between DUT and Tag antenna reference point.

2.5.4.3 Tag requirementsNFC Forum Type 1 Tag:

Provide the functionality specified in NFCForum TS Type 1 Tag [19]

NFC Forum Type 2 Tag:

Provide the functionality specified in NFCForum TS Type 2 Tag [19]

NFC Forum Type 3 Tag:

Provide the functionality specified in NFCForum TS Type 3 Tag [19]

NFC Forum Type 4A Tag:

Provide the functionality specified in NFCForum TS Type 4 Tag [19]

NFC Forum Type 4B Tag:

Provide the functionality specified in NFCForum TS Type 4 Tag [19]

2.5.4.4 Tag Read/Write ApplicationsThe following applications are dedicated to NFC tag related test cases.

NFC Tag application: An external tag reader and writer with application for tag contentread verification and for tag writing of reference tags. The tag reader/writer shall supportNFC Forum Type 1-4 tags, as specified in NFC Forum Tag Operation Specifications [19].

NFC Tag mobile application: A mobile application based on the operating systemstandardized APIs for tag reading and writing. This application is typically provided by thedevice Vendor or by the test tool manufacturer.

Page 58: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 58 of 606

Reference NFC Tags: A set of reference NFC tags (Type 1, 2, 3 and 4) as specified inAnnex C.

2.5.4.5 Reference NFC tag contentThe following NFC Tag content will be used when not otherwise specified

Reference NFC Tag Content

“vCard” Type: “text/x-vCard”BEGIN:VCARDVERSION:2.1N:Smith;John;;;FN:John SmithTEL;CELL: 332312345678END:VCARD

“URI” Type: “U”file://test

“Text” Type: “T”Encoding: UTF-8Lang: “en-US”“Hello, world!”

“SmartPoster” (launch browser) Type: “Sp”TextType: “T”Encoding: UTF-8Lang: “en-US”Test: “GSMA Website”URIType: “U”http://www.gsma.com

“SmartPoster” (SMS Sending) Type: “Sp”URIType: “U”sms:332312345678?body=Hello, world!

“SmartPoster” (phone call) Type: “Sp”TextType: “T”Encoding: UTF-8Lang: “en-US”Test: “John Smith”URIType: “U”Tel: 442312345678

Page 59: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 59 of 606

Reference NFC Tag Content

“SmartPoster” (email) Type: “Sp”URIType: “U”mailto:[email protected]?subject=emailsubject&body=email contentTextType: “T”Encoding: UTF-8Lang: “en-US”Test: “email title”

Table 2.12: NFC Tags content

NOTE 1: For NFC Type 2 Tag, these tag contents represent either static or dynamicmemory layouts.

NOTE 2: For NFC Type 1 Tag, these tag contents represent dynamic memorylayouts. NFC Type 1 Tag with Static Memory Layout is FFS.

2.5.4.6 NFC Forum Analog TestsSupport of the GSMA Transport requirements using NFC protocol requires the inclusion ofNFC Forum’s Analog Specification to ensure interoperability. References to the NFC ForumDigital Protocol and Activity Specifications are added for completeness as devices need tobe compliant to all three technical specifications in order to support the transport testingrequirements covered by the suite of NFC Forum Analog test cases.

2.5.5 Reader equipmentThe contactless reader shall support the NFC Forum type A and B functionality.

2.5.6 NFC Controller and UI application triggeringFor NFC Controller and UI application triggering, specific test applications will be defined inthe initial conditions of the tests.

See section 2.5.3.2.1 for further requirements for Android applications for transactionevents.

Unless otherwise specified, when EVT_TRANSACTION is used for triggering a certainapplication, the event shall be received by the application within 30 seconds from the pointthat this event has been sent by the UICC. In the case where no application is expected toreceive the event, the test tool shall wait for 60 seconds.

(NOTE: These times are specified for this version of the test book for testimplementation purposes. Normative times are expected to be defined by the TSG NFCHandset Requirement Group in a future version of TS.26)

Page 60: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 60 of 606

Unless otherwise specified, when a card emulation session is present within a testprocedure, the test shall be carried out with Card emulation Type A as specified in [9] and[10].

2.5.7 Test Set-Up for OTA communicationA real OTA Platform connected to the network’s backend communicates through the RadioAccess Network and the Device with the UICC.

The communication network shall be LTE only as specified in 3GPP TS 36.508 [36] clause4 or with 3G/2G fallback according to the capability of the DUT.

To allow for testing in a lab environment, some of the real world components may bereplaced by simulations:

OTA Server may be replaced by a software simulation. Radio Access Network may be replaced by a system simulator. UICC may be replaced by a simulated UICC.

Such a setup does not require any Internet or Intranet connection. It allows for deepdiagnosis insights into all involved components. It also enables manipulation of any of thecomponents, e.g. for failure simulation.

Figure 2.4: Test Environment

For delivering the SMS push to the UICC, the real world OTA platform will use an SMPPgateway. For ease of testing the real world OTA platform can be replaced by a simulatedenvironment, this should also be simulated by the control PC.

There might be high volume data transmissions through a data channel between the UICCand the OTA Platform, e.g. when deploying an applet of ~100k from the OTA platform to theUICC.

Page 61: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 61 of 606

2.5.8 Card emulation testing

2.5.8.1 Common positioning of Reader and DeviceThe provisions of section 2.5.4.1 apply with the tag and tag antenna reference point beingreplaced by the reader and reader antenna reference point.

2.5.8.2 Distance specific positioningThe provisions of section 2.5.4.2 apply with the tag and tag antenna reference point beingreplaced by the reader and reader antenna reference point and only with distances up to2.0cm.

2.6 Common procedures

2.6.1 Setting the default AID routeThis section applies only to devices which support O_MULTI_CEE_ON

Various test cases indicate that the default AID route should be set to HCE or to UICC. Thissection addresses how to achieve that condition for devices with different attributesaccording to the following logic:

If the DUT supports O_DEFAULT_ROUTE_SELECTION_BY_USER_MENU then thedefault AID route shall be set using the user menu.

If the DUT supports O REQ143 then the default AID route shall be set using the proceduresdefined in Sections 2.6.1.1, 2.6.1.2.

If the DUT uses Android OS and supports O_MULTI_CEE_ON, but does not support eitherO_DEFAULT_ROUTE_SELECTION_BY USER_MENU or O_REQ_143 then the defaultAID route is expected to be HCE by default.

2.6.1.1 Procedure to ensure the default AID route is HCE with O_REQ_143The aim of this procedure is to provide a method in order to ensure that the default AIDroute on the DUT is set to HCE.

This procedure is intended to be executed as part of a referencing test case.

When this procedure has been successfully completed, Dynamic Other Host will beinstalled, 255 AIDs (TestAIDHCE xx) will be registered, and the default route will be set toHCE.

Note: This procedure shall be run even if the default AID route of the device is already HCE,in order to fill up the routing table with AIDs.

Initial conditions: DUT is powered ON and device is unlocked and the screen ON

Applications needed: Dynamic_Other_Host: An application able to register a configurable list non-payment

AID on the HOST (HCE) using the dynamic registration API.

Page 62: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 62 of 606

AIDs generated by the application SHALL be AIDs of 16 byte matching the followingtemplate:

The 1st byte of the TestAIDHCE xx shall be increased by one bit for eachconsecutive AID starting from 0x01.

The 16th byte of the TestAIDHCE xx shall be set to “0x01” The other bytes of the AID shall be set according to the table below:

AIDbyte 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

value

0x01 forTestAIDHCE010x02 forTestAIDHCE02…0x64 forTestAIDHCE100

…..

0xFF forTestAIDHCE255

0x02

0x03

0x04

0x05

0x06

0x07

0x08

0x09

0x10

0x11

0x12

0x13

0x14

0x15

0x01

Step Direction Sequence Expected Result

1 UserDUT

Install ApplicationDynamic_Other_Host

Installation successful

2 UserDUT

Use Dynamic_Other_Host and register255 Host AIDs

No error while registering the AIDs

Table 2.13: Procedure to ensure the default AID route is HCE

2.6.1.2 Procedure to ensure the default AID route is UICC with O_REQ_143The aim of this procedure is to provide a method in order to ensure that the default AIDroute on the DUT is set to UICC.

This procedure is intended to be executed as part of a referencing test case.

When this procedure has been successfully completed, Dynamic_Other_OffHost will beinstalled, 255 AIDs (TestAIDUICC xx) will be registered, and the default route will be set toUICC.

Note: This procedure shall be run even if the default AID route of the device is alreadyUICC, in order to fill up the routing table with AIDs.

Initial conditions: DUT is powered ON and device is unlocked and the screen is ON

Applications needed:

Page 63: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 63 of 606

Dynamic_Other_OffHost: An application able to register a configurable list of non-paymentAID on the OffHost UICC using the registerAIDsForService() method of Android API. Itdefines an “OffHost” other service in its Manifest.

AIDs generated by the application SHALL be AIDs of 16 byte matching the followingtemplate:

The 1st byte of the TestAIDUICC xx shall be increased by one bit for eachconsecutive AID starting from 0x01.

The 16th byte of the TestAIDUICC xx shall be set to “0x02” The other bytes of the AID shall be set according to the table below:

AIDbyte 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

value

0x01 forTestAIDUICC010x02 forTestAIDUICC02…0x64 forTestAIDUICC100

…..

0xFF forTestAIDUICC255

0x02

0x03

0x04

0x05

0x06

0x07

0x08

0x09

0x10

0x11

0x12

0x13

0x14

0x15

0x02

Step Direction Sequence Expected Result

1 UserDUT

Install ApplicationDynamic_Other_OffHost

Installation successful

2 UserDUT

Use Dynamic_Other_OffHost andregister 255 OffHost AIDs using theregisterAIDsForService method

registerAidsForService method returns aboolean for success

Table 2.14: Procedure to ensure the default AID route is UICC

2.6.2 Procedure to identify the size of the AID routing table of a DUTThe purpose of this procedure is to provide a method in order to know the maximumnumber of 16 bytes AID that can be inserted in the AID routing table of a DUT beforereaching an AID routing overflow.

This procedure implies that TS26_NFC_REQ_143 is implemented on the DUT in order towork. So it is advised to ensure this requirement is implemented before applying theprocedure.

This method is applicable at any time on the device as long as initial conditions are met.

This procedure is intended to be executed independently of any test case.

Initial conditions:

Page 64: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 64 of 606

The UICC contains a cardlet with a known AID [referred as AID01]. AID01 is different from the AIDs generated by any application installed and only

available on the UICC AID01 is not registered to the Host using a device application (neither in manifest nor

dynamically) Device is powered ON and device is unlocked and the screen is on All NFC applications on the device are uninstalled except applications that are

preinstalledThe following three initial conditions need to be executed in this order: Set the default AID route to HCE (See section 2.6.1.1) Unregister all AIDs Run the procedure 2.6.4 to determine if the UICC is accessible:

o If the UICC is accessible the run 2.6.2.1o Otherwise run 2.6.2.2

2.6.2.1 Default AID Route is UICC after unregistering of all AIDs

Step Direction Sequence Expected Result

1 UserDUT

Define a counter NDefine a counter S (Start)=1Define a counter E (End)=255

2 UserDUT

Install ApplicationDynamic_Other_Host

Installation successful

3 AppDUT Use “Dynamic_Other_Host” to registerE AIDs

4 User DUT

Run the procedure 2.6.4 on AID01 If the UICC is accessible

Exit this procedure and considerthe calling test case as failed

5 AppDUT Unregister all AIDs.Set back the default AID route toUICC (see section 2.6.1.2)Unregister all AIDs

The default route is UICC

6 AppDUT Set N=[(S+E)/2] (only the integervalue is to be taken into account) andUse "Dynamic_Other_Host" to registerN AIDs

7 UserDUT

Run the procedure 2.6.4 on AID01 IF the UICC is accessible then

set S=N+1 Go to step 9

ELSE

set E=N-1

Page 65: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 65 of 606

Step Direction Sequence Expected Result

8 AppDUT Unregister all AIDs.Set back the default AID route toUICC (see section 2.6.1.2)Unregister all AIDs

The default route is UICC

9 Loop Repeat steps 6 to 8 while S<E

10 AppDUT Unregister all AIDs.Use "Dynamic_Other_Host" to registerS AIDs

11 UserDUT

Run the procedure 2.6.4 on AID01 IF the UICC is accessible then

RTS = SELSE

RTS = S-1

12 UserDUT

Uninstall “Dynamic_Other_Host”application

Table 2.15: Procedure to identify the size of the AID routing table of a DUT wheninitial Default Route is UICC

2.6.2.2 Default Route is HCE after unregistering of all AIDs

Applications needed:

Dynamic_Other_OffHost: as described in 2.6.1.2.

Step Direction Sequence Expected Result

1 UserDUT

Define a counter N,Define a counter S (Start)=1,Define a counter E (End)=255.

2 UserDUT

Install ApplicationDynamic_Other_OffHost

Installation successful

3 AppDUT use “Dynamic_Other_OffHost” toregister E AIDs usingregisterAidsForService method

registerAidsForService method returns aboolean for success

4 User DUT

Run the procedure 2.6.4 on AID01 If the UICC is not accessible

Exit this procedure and considerthe calling test case as failed

5 AppDUT Unregister all AIDs,set back the default AID route to HCE(see section 2.6.1.1).Unregister all AIDs

The default route is HCE

Page 66: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 66 of 606

Step Direction Sequence Expected Result

6 AppDUT Set N=[(S+E)/2] (only the integervalue is to be taken into account),unregister all AIDs,use "Dynamic_Other_OffHost" toregister N AIDs usingregisterAidsForService method

registerAidsForService method returns aboolean for success

7 UserDUT

Run the procedure 2.6.4 on AID01 IF the UICC is not accessible then

set S=N+1 Go to step 9

ELSE

set E=N-1

8 AppDUT Unregister all AIDs,set back the default AID route to HCE(see section 2.6.1.1).Unregister all AIDs

The default route is HCE

9 Loop Repeat steps 6 to 8 while S<E

10 AppDUT Unregister all AIDs,use "Dynamic_Other_OffHost" toregister S AIDs usingregisterAidsForService method

registerAidsForService method returns aboolean for success

11 UserDUT

Run the procedure 2.6.4 on AID01 IF the UICC is not accessible then

RTS = SELSE

RTS = S-1

12 UserDUT

Uninstall “Dynamic_Other_OffHost”application

Table 2.16: Procedure to identify the size of the AID routing table of a DUT wheninitial Default Route is HCE

NOTE: RTS = the number of 16 bytes AIDs that can be contained in the NFC AIDRouting table of the DUT

2.6.3 Procedure to send a transaction eventVarious test cases require the sending of a transaction event (EVT Transaction).Depending on the approach and for sake of clarity, sending a transaction event isconsidered as a single test step. Nevertheless, each time this step applies in a TC, thefollowing procedure must be executed.

This procedure is intended to be executed as part of a referencing test case.

Direction Sequence Expected Result

Page 67: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 67 of 606

Direction Sequence Expected Result

PCD Power on RF field

PCDDUT

Perform RF protocol initialisation

PCDDUT

Using the APDU application, send aSELECT command with [AIDxx]

APDU Application receives Status Word90 00

PCD Power off RF field

DUT UICC

Send EVT_FIELD_OFF

The card application sendsEVT_TRANSACTION to the mobileapplication

[Expected result]

Table 2.16: Procedure to send transaction event

[AIDxx] has to be replaced by the AID from the step calling this procedure. [Expected result] is the expected result detailed in the test case

as expected result of the step calling this procedure. On Android Devices supporting Multiple Card Emulation Environment the [AIDxx]

needs to be registered to the UICC with “other” category so that the eventtransaction procedure can be successfully performed. Note: This AID registrationdoes not apply to test cases in section 15.7.

2.6.4 Procedure to check if the UICC is accessibleVarious test cases require the sending of a select command to check that the UICC isaccessible on the contactless interface.For sake of clarity, this check is considered as a single test step. Nevertheless, each timethis step applies in a TC, the following procedure must be executed using a specific AIDparameter.

This procedure is intended to be executed as part of a referencing TC.

Step Direction Sequence Expected Result

1 User DUT

While the field is off, place the DUT inthe area where the field will bepowered on

2 User PCD

Power on the field

3 PCD DUT

Send “SELECT APDU” command with[AIDxx] as parameter

IF SW = 9000 then

The UICC is accessibleELSE

The UICC is not accessible

4 User PCD

Power off the field

Page 68: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 68 of 606

Table 2.17: Procedure to check if the UICC is accessible

[AIDxx] has to be replaced by the AID from the step calling this procedure. The UICC contains a cardlet with a known AID referred as [AIDxx].[AIDxx] is not available on any host service.

3 NFC Features

3.1 General overviewThis chapter addresses the NFC features covering the contactless interfaces between thedevice and NFC Tag and Reader respectively as well as the interface between NFCcontroller and UICC (SWP/HCI).

The test cases are grouped in three sub sections covering respectively NFC Read/WriteMode section, Card Emulation Mode testing and NFC core functions including the SWP/HCItesting.

The list of conformance requirements tested within this section is listed in the table insection Error! Reference source not found..

3.2 Conformance requirementsTS26_NFC_REQ_006 The NFC controller SHALL support SWP (Single Wire Protocol) interface with

the UICC as per ETSI TS 102.613.

TS26_NFC_REQ_007 The NFC controller SHALL support HCI with the UICC as per ETSI TS 102 622

TS26_NFC_REQ_008 Contactless tunnelling (CLT=A) mode SHALL be supported for SWP (per ETSITS 102 613).

TS26_NFC_REQ_009.1 Contactless tunnelling (CLT=F) mode SHALL be supported for SWP (perETSI TS 102 613).

TS26_NFC_REQ_010 The device interface with UICC SHOULD support Class B

TS26_NFC_REQ_011 The device interface with UICC SHALL support Class C

TS26_NFC_REQ_014 The device interface with UICC SHALL support DEACTIVATED followed bysubsequent SWP interface activation in full power mode.

TS26_NFC_REQ_015 The NFC controller SHOULD support both windows size set to 3 and set to 4.

TS26_NFC_REQ_020 If NFC was enabled, when the mobile device is automatically switched off, andenters battery low mode, the mobile device SHALL be able to perform 15transactions in card emulation within the following 24 hours.

TS26_NFC_REQ_021 If NFC is enabled, NFC transactions SHALL be possible either in battery poweroff or battery low mode. Note: This is important for public transport services.

TS26_NFC_REQ_025 The mobile device SHALL support Card-emulation as per NFC Forum TS-Analog, TS-Digital and TS-Activity Specifications.

TS26_NFC_REQ_026 Card Emulation mode SHALL be enabled when the NFC is turned on.

TS26_NFC_REQ_027 For Card emulation mode the read distance SHALL be in the 0cm – 2cms range

Page 69: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 69 of 606

for battery operational mode, battery low or power off mode.

TS26_NFC_REQ_033 The mobile device SHALL support Reader/Writer Mode as per NFC Forum TS-Analog, TS-Digital and TS-Activity Specifications.

TS26_NFC_REQ_034 The mobile device SHALL support NFC Forum Type 1 Tag as specified in NFCForum Type 1 Tag Operation Specification.

TS26_NFC_REQ_035 The mobile device SHALL support NFC Forum Type 2 Tag as specified in NFCForum Type 2 Tag Operation Specification.

TS26_NFC_REQ_036 The mobile device SHALL support NFC Forum Type 3 Tag as specified in NFCForum Type 3 Tag Operation Specification.

TS26_NFC_REQ_037 The mobile device SHALL support NFC Forum Type 4 Tag as specified in NFCForum Type 4 Tag Operation Specification.

TS26_NFC_REQ_038 Reader mode events SHALL be routed exclusively to the UICC or the Applicationprocessor.

TS26_NFC_REQ_039 The default routing for the reader mode events SHALL be via the Applicationprocessor.

TS26_NFC_REQ_040 The NFC Controller SHOULD support Reader Mode as per ETSI TS 102 622

TS26_NFC_REQ_041 The device SHALL support automatic and continuous switching between cardemulation and reader mode.

TS26_NFC_REQ_042 A transaction time SHALL take 500ms or less for TAG message length notexceeding 100 bytes. The transaction time is defined from the start of the frameof the first RF command receiving an answer, to the end of the frame of theresponse to the last received RF command by a device, where the RF commandis used to read the content in a tag

TS26_NFC_REQ_043 The mobile device SHALL be able to read/write the NFC Forum Smart PosterRTD.

TS26_NFC_REQ_044 The TAG SHALL be read at a distance of 1 cm and at distances between 0 to 1cm.Note This requirement will be tested with a TAG Test Reference system agreedin the Test Book group.

TS26_NFC_REQ_110 The Tag SHOULD be read at a distance from 1 cm to 4 cm.Note: This requirement will be tested with a Tag Test Reference system agreedin the Test Book group.

TS26_NFC_REQ_157 The device SHALL implement the requirements of the EMV ContactlessCommunication Protocol Specification, Book D.

3.3 Reader/Writer mode

3.3.1 General overviewThis chapter addresses the functions of the device for NFC Tag reading and writingaccording to the NFC Forum specification testing on application level in sections 3.3.3.1 –3.3.3.8 and testing lower level functionality in section 3.3.3.24. A limited set of distancesbetween device and NFC Tag is covered in section 3.3.3.9 – 3.3.3.13. Readingperformance and general reader mode testing are covered in sections 3.3.3.14 – 3.3.3.23.

Page 70: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 70 of 606

The list of conformance requirements tested within this section is listed in the table insection Error! Reference source not found..

3.3.2 Conformance requirementsTS26_NFC_REQ_034 The mobile device SHALL support NFC Forum Type 1 Tag, as specified in NFC

Forum Type 1 Tag Operation Specification. This requirement applies to bothprotocol and application level.

TS26_NFC_REQ_035 The mobile device SHALL support NFC Forum Type 2 Tag, as specified in NFCForum Type 2 Tag Operation Specification. This requirement applies to bothprotocol and application level.

TS26_NFC_REQ_036 The mobile device SHALL support NFC Forum Type 3 Tag, as specified in NFCForum Type 3 Tag Operation Specification. This requirement applies to bothprotocol and application level.

TS26_NFC_REQ_037 The mobile device SHALL support NFC Forum Type 4 Tag, as specified in NFCForum Type 4 Tag Operation Specification. This requirement applies to bothprotocol and application level.

TS26_NFC_REQ_038 A reader mode events SHALL be routed exclusively to the UICC or theApplication processor.

TS26_NFC_REQ_039 The default routing for the reader mode events SHALL be via the Applicationprocessor.

TS26_NFC_REQ_040 The NFC Controller SHOULD support Reader Mode as per ETSI TS 102 622

TS26_NFC_REQ_042 A transaction time SHALL take 500ms or less for TAG message length notexceeding 100 bytes. The transaction time is defined from the start of the frameof the first RF command receiving an answer, to the end of the frame of theresponse to the last received RF command by a device, where the RF commandis used to read the content in a tag

TS26_NFC_REQ_043 The mobile device SHALL be able to read/write the NFC Forum Smart PosterRTD.

TS26_NFC_REQ_044 The Tag SHALL be read at a distance of 1 cm and at distances between 0 to 1cm.Note: This requirement will be tested with a Tag Test Reference system

TS26_NFC_REQ_110 The Tag SHOULD be read at a distance from 1 cm to 4 cm.Note: This requirement will be tested with a Tag Test Reference system agreedin the Test Book group.

TS26_NFC_REQ_160 The mobile device SHALL support APDU transmission case 1, 2, 3 & 4 includingExtended Length Field support as defined in ISO/IEC 7816-4 with 32767 bytescommand and response data field size for the Reader/Writer mode.

3.3.3 Test Cases

3.3.3.1 NFC Forum Type 1 Tag – Read NFC TagTest Purpose

To ensure the DUT allows reading of NFC Forum Type 1 Tag as specified in NFC ForumType 1 Tag Operation Specification.

Page 71: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 71 of 606

Referenced requirement

TS26_NFC_REQ_034

Test execution:

This test case should be executed using reference NFC tag or simulated NFC tag. An application is installed on the DUT able to read the specified Tag format. This

application is provided with the default DUT software or a reference application isinstalled

Initial Conditions

The DUT is powered on NFC is enabled in the DUT The test shall be executed for each of the following tag contents to perform the test:

NFC Type 1 Tag is personalized with a “vCard” NFC Type 1 Tag is personalized with a “URI” NFC Type 1 Tag is personalized with a “Text”

In case of using reference tag: configuration and personalization of tags shallbe performed independently of the DUT.

The DUT is not placed in the Read Range (more than 50cm from the Tag).

Test Sequence No 1

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 UserDUT

Place DUT in NFC read range If the DUT requests Tag contents to beaccepted, the user shall accept thisrequest.

2 DUT App

The DUT to read the tag content The tag content is correctly received bythe application.

3 UserDUT

Remove the DUT from the read range None

4 UserDUT

Repeat steps 1 through 3 for each tagcontent specified in the initialconditions in 3.3.3.1 for the Type 1Tag

None

3.3.3.2 NFC Forum Type 2 Tag – Read NFC TagTest Purpose

To ensure the DUT allows reading of NFC Forum Type 2 Tag with SmartPoster RTD(Record Type Definition) as specified in NFC Forum Type 2 Tag Operation Specification.

3.3.3.1.1

Page 72: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 72 of 606

Referenced requirement

TS26_NFC_REQ_035 TS26_NFC_REQ_043

Test execution:

This test case should be executed using reference NFC tag or simulated NFC tag. An application is installed on the DUT able to read the specified Tag format. This

application is provided with the default DUT software or a reference application isinstalled.

Initial Conditions

The DUT is powered on NFC is enabled in the DUT The following tag content should be configured to perform the test:

NFC Type 2 Tag is personalized with a “SmartPoster” (launch browser) In case of using reference tag: configuration and personalization of tags shall

be performed independently of the DUT.

The DUT is not placed in the Read Range (more than 50cm from the Tag).

Test Sequence No 1

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 UserDUT

Place DUT in NFC read range If the DUT requests Tag contents to beaccepted, the user shall accept thisrequest.

2 DUT App

The DUT to read the tag content The tag content is correctly received bythe application.

3 UserDUT

Remove the DUT from the read range None

3.3.3.3 NFC Forum Type 3 Tag – Read NFC TagTest Purpose

To ensure the DUT allows reading of NFC Forum Type 3 Tag with SmartPoster RTD(Record Type Definition) as specified in NFC Forum Type 3 Tag Operation Specification.

Referenced requirement

TS26_NFC_REQ_036 TS26_NFC_REQ_043

Test execution:

3.3.3.2.1

Page 73: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 73 of 606

This test case should be executed using reference NFC tag or simulated NFC tag. An application is installed on the DUT able to read the specified Tag format. This

application is provided with the default DUT software or a reference application isinstalled.

Initial Conditions

The DUT is powered on NFC is enabled in the DUT The following tag content should be configured and used in the following order to

perform the test: NFC Type 3 Tag is personalized with a “SmartPoster” (SMS Sending)

In case of using reference tag: configuration and personalization of tags shallbe performed independently of the DUT.

The DUT is not placed in the Read Range (more than 50cm from the Tag).

Test Sequence No 1

nt l ondtonsIiiaC ii

onNe

Step Direction Sequence Expected Result

1 UserDUT

Place DUT in NFC read range If the DUT requests Tag contents to beaccepted, the user shall accept thisrequest.

2 DUT App

The DUT to read the tag content The tag content is correctly received bythe application

3 UserDUT

Remove the DUT from the read range None

3.3.3.4 NFC Forum Type 4 Tag – Read NFC TagTest Purpose

To ensure the DUT allows reading of NFC Forum Type 4A Tag and Type 4B platforms withSmartPoster RTD (Record Type Definition) as specified in NFC Forum Type 4A & 4B TagOperation Specification.

Referenced requirement

TS26_NFC_REQ_037 TS26_NFC_REQ_043

Test execution:

This test case should be executed using reference NFC tag or simulated NFC tag.

3.3.3.3.1

Page 74: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 74 of 606

An application is installed on the DUT able to read the specified Tag format. Thisapplication is provided with the default DUT software or a reference application isinstalled.

Initial Conditions

The DUT is powered on NFC is enabled in the DUT In case of using reference tag: configuration and personalization of tags shall be

performed independently of the DUT. The DUT is not placed in the Read Range (more than 50cm from the Tag).

Test Sequence No 1: Type 4A Tag

nt l ondtonsIiiaC ii

The tag content should be configured as below:

NFC Type 4A Tag - NFC Tag is personalized with a “SmartPoster” (phone call)

Step Direction Sequence Expected Result

1 UserDUT

Place DUT in NFC read range If the DUT requests Tag contents to beaccepted, the user shall accept thisrequest.

2 DUT App

The DUT to read the tag content The tag content is correctly received bythe application.

3 UserDUT

Remove the DUT from the read range None

Test Sequence No 2: Type 4B TagInitial Conditions

The tag content should be configured as below:

NFC Type 4B Tag - NFC Tag is personalized with a “SmartPoster” (email)

Step Direction Sequence Expected Result

1 UserDUT

Place DUT in NFC read range If the DUT requests Tag contents to beaccepted, the user shall accept thisrequest.

2 DUT App

The DUT to read the tag content The tag content is correctly received bythe application.

3 UserDUT

Remove the DUT from the read range None

3.3.3.5 NFC Forum Type 1 Tag – Write NFC TagTest Purpose

3.3.3.4.1

3.3.3.4.2

Page 75: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 75 of 606

To ensure the DUT allows writing of NFC Forum Type 1 Tag with a URI or Text RTD(Record Type Definition) as specified in NFC Forum Type 1 Tag Operation Specification.

Referenced requirement

TS26_NFC_REQ_034

Test execution:

This test case should be executed using reference NFC tag or simulated NFC tag. An application is installed on the DUT able to write the specified Tag format. This

application is provided with the default DUT software or a reference application isinstalled

Initial Conditions

The DUT is powered on NFC is enabled in the DUT Tag empty initialized with Dynamic memory layout The DUT is not placed in the Write Range (more than 50cm from the Tag).

Test Sequence No 1: Dynamic

nt l ondtonsIiiaC ii

Write the following tag content:

Initial condition for NFC Type 1 Tag - NFC Tag will be personalized with a URI or Text.

Step Direction Sequence Expected Result

1 UserDUT

Place DUT in the NFC write range

2 AppDUTDUT Tag

Use the application to write to NFCType 1 Tag

The DUT writes to NFC Type 1 Tag.

3 UserDUT

Remove the DUT from the write range None

4 User Verify that tag content was writtencorrectly by reading it.

The tag content is correctly written by theDUT.The Tag content is verified independentlyof the DUT

Test Sequence No 2: StaticNote: This test case is FFS due to the unknown availability of NFC Type 1 Tag, with staticmemory layout.

Initial Conditions

3.3.3.5.1

3.3.3.5.2

Page 76: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 76 of 606

Write the following tag content:

Initial Condition for NFC Type 1 Tag - NFC Tag will be personalized with a URI or Text.

Step Direction Sequence Expected Result

1 UserDUT

Place DUT in the NFC write range

2 AppDUTDUT Tag

Use the application to write to NFCType 1 Tag

The DUT writes NFC Type 1 Tag.

3 UserDUT

Remove the DUT from the write range None

4 User Verify that tag content was writtencorrectly by reading it

The tag content is correctly written by theDUT.The Tag content shall be verifiedindependently of the DUT

3.3.3.6 NFC Forum Type 2 Tag – Write NFC TagTest Purpose

To ensure the DUT allows writing of NFC Forum Type 2 Tag with SmartPoster RTD (RecordType Definition) as specified in NFC Forum Type 2 Tag Operation Specification.

Referenced requirement

TS26_NFC_REQ_035 TS26_NFC_REQ_043

Test execution:

This test case should be executed using the reference NFC tag or simulated NFCtag.

An application is installed on the DUT able to write the specified Tag format. Thisapplication is provided with the default DUT software or a reference application isinstalled

Initial Conditions

The DUT is powered on NFC is enabled in the DUT The tag contents shall be configured to perform the test as following:

Initial conditions for Test Sequence No #1: Type 2 Tag empty is initialized withDynamic memory layout

Initial conditions for Test Sequence No #2: Type 2 Tag empty is initialized withStatic memory layout

Page 77: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 77 of 606

The DUT is not placed in the Write Range (more than 50cm from the Tag).

Test Sequence No 1: Dynamic

nt l ondtonsIiiaC ii

Write the following tag content:

NFC Type 2 Tag - NFC Tag will be personalized with a “SmartPoster” (SMS)

Step Direction Sequence Expected Result

1 UserDUT

Place DUT in the NFC write range

2 AppDUTDUT Tag

Use the application to write to NFCType 2 Tag

The DUT writes to NFC Type 2 Tag.

3 UserDUT

Remove the DUT from the write range None

4 User Verify that tag content was writtencorrectly by reading it

The tag content is correctly written by theDUT.The Tag content shall be verifiedindependently of the DUT

Test Sequence No 2: Static

Initial Conditions

Write the following tag content:

NFC Type 2 Tag - NFC Tag will be personalized with a “SmartPoster” (SMS)

Step Direction Sequence Expected Result

1 UserDUT

Place DUT in the NFC write range

2 AppDUTDUT Tag

Use the application to write to NFCType 2 Tag

The DUT writes to NFC Type 2 Tag.

3 UserDUT

Remove the DUT from the write range None

4 User Verify that tag content was writtencorrectly by reading it

The tag content is correctly written by theDUT.The Tag content shall be verifiedindependently of the DUT

3.3.3.6.1

3.3.3.6.2

Page 78: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 78 of 606

3.3.3.7 NFC Forum Type 3 Tag – Write NFC TagTest Purpose

To ensure the DUT allows writing of NFC Forum Type 3 Tag with SmartPoster RTD (RecordType Definition) as specified in NFC Forum Type 3 Tag Operation Specification.

Referenced requirement

TS26_NFC_REQ_036 TS26_NFC_REQ_043

Test execution:

This test case should be executed using reference NFC tag or simulated NFC tag. An application is installed on the DUT able to write the specified Tag format. This

application is provided with the default DUT software or a reference application isinstalled

Initial Conditions

The DUT is powered on NFC is enabled in the DUT The Tag should be in initialized state and shall not bear any NDEF message The DUT is not placed in the Write Range (more than 50cm from the Tag).

Test Sequence No 1

nt l ondtonsIiiaC ii

Write the following tag content:

NFC Type 3 Tag - NFC Tag will be personalized with a “SmartPoster” (SMS Sending)

Step Direction Sequence Expected Result

1 UserDUT

Place DUT in the NFC write range

2 AppDUTDUT Tag

Use the application to write to NFCType 3 Tag

The DUT writes to NFC Type 3 Tag.

3 UserDUT

Remove the DUT from the write range None

4 User Verify that tag content was writtencorrectly by reading it

The tag content is correctly written by theDUT.The Tag content shall be verifiedindependently of the DUT

3.3.3.8 NFC Forum Type 4 Tag – Write NFC TagTest Purpose

3.3.3.7.1

Page 79: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 79 of 606

To ensure the DUT allows writing of NFC Forum Type 4A Tag and Type 4B withSmartPoster RTD (Record Type Definition) as specified in NFC Forum Type 4 TagOperation Specification.

Referenced requirement

TS26_NFC_REQ_037 TS26_NFC_REQ_043

Test execution:

This test case should be executed using reference NFC tag or simulated NFC tag. An application is installed on the DUT able to write the specified Tag format. This

application is provided with the default DUT software or a reference application isinstalled

Initial Conditions

The DUT is powered on NFC is enabled in the DUT The following tag contents shall be configured to perform the test as following:

Initial conditions for Test Sequence No 1: Empty initialized Type 4A Tag Initial conditions for Test Sequence No 2: Empty initialized Type 4B Tag

The DUT is not placed in the Write Range (more than 50cm from the Tag).

Test Sequence No 1: Type 4A Tag

nt l ondtonsIiiaC ii

Write the following tag content:

For NFC Type 4A Tag - NFC Tag is blank and will be personalized with a “SmartPoster”(Browser)

Direction Sequence Expected Result

1 UserDUT

Place DUT in the NFC write range

2 AppDUTDUT Tag

Use the application to write to NFCType 4A Tag.

The DUT writes to NFC Type 4A Tag.

3 UserDUT

Remove the DUT from the write range None

3.3.3.8.1

Page 80: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 80 of 606

Direction Sequence Expected Result

4 User Verify that tag content was writtencorrectly by reading it

The tag content is correctly written by theDUT.The Tag content shall be verifiedindependently of the DUT

Test Sequence No 2: Type 4B Tag

nt l ondtonsIiiaC ii

Write the following tag content:

For NFC Type 4B Tag - NFC Tag is blank and will be personalized with a “SmartPoster”(Phone Call)

Step Direction Sequence Expected Result

1 UserDUT

Place DUT in the NFC write range

2 AppDUTDUT Tag

Use the application to write to NFCType 4B Tag

The DUT writes to NFC Type 4B Tag.

3 UserDUT

Remove the DUT from the write range None

4 User Verify that tag content was writtencorrectly by reading it

The tag content is correctly written by theDUT.The Tag content shall be verifiedindependently of the DUT

3.3.3.9 Distance for NFC Type 1 Tag readingTest Purpose

This test case verifies the correct interpretation of NFC Type 1 Tag with RTD (Record TypeDefinition) by the DUT from 0 to 1cm, optional 2 to 4cm

Referenced requirement

TS26_NFC_REQ_044 TS26_NFC_REQ_110

Initial Conditions

Antenna reference point may be marked on the outside of the DUT NFC Tags Type 1 with RTD “Text” is available

Test Sequence No 1: Distance for NFC Type 1 Tag Reading - 0,0cmInitial Conditions

3.3.3.8.2

3.3.3.9.1

Page 81: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 81 of 606

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 0 cm from the NFC Tag withRTD “Text”

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 2: Distance for NFC Type 1 Tag Reading - 0,5cm

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 0,5 cm from the NFC Tag withRTD “Text”

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 3: Distance for NFC Type 1 Tag Reading - 1,0cmInitial Conditions

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3.3.3.9.2

3.3.3.9.3

Page 82: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 82 of 606

Step Direction Sequence Expected Result

3 Place the DUT with the best couplingpoint at 1 cm from the NFC Tag withRTD “Text”

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 4: Distance for NFC Type 1 Tag Reading - 2cm

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 2 cm from the NFC Tag withRTD “Text”

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 5: Distance for NFC Type 1 Tag Reading - 3,0cmInitial Conditions

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 3 cm from the NFC Tag withRTD “Text”

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 6: Distance for NFC Type 1 Tag Reading - 4,0cmInitial Conditions

None

3.3.3.9.4

3.3.3.9.5

3.3.3.9.6

Page 83: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 83 of 606

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 4 cm from the NFC Tag withRTD “Text”

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

3.3.3.10 Distance for NFC Type 2 Tag readingTest Purpose

This test case verifies the correct interpretation of NFC Type 2 Tag with RTD (Record TypeDefinition) by the DUT from 0 to 1cm, optional 2 to 4cm.

Referenced requirement

TS26_NFC_REQ_044 TS26_NFC_REQ_110

Initial Conditions

Antenna reference point may be marked on the outside of the DUT NFC Tags Type 2 with RTD “SmartPoster” (launch browser) is available

Test Sequence No 1: Distance for NFC Type 2 Tag Reading - 0,0cm

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 0 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 2: Distance for NFC Type 2 Tag Reading - 0,5cmInitial Conditions

3.3.3.10.1

3.3.3.10.2

Page 84: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 84 of 606

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 0,5 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 3: Distance for NFC Type 2 Tag Reading - 1,0cm

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 1 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 4: Distance for NFC Type 2 Tag Reading - 2,0cmInitial Conditions

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 2 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

3.3.3.10.3

3.3.3.10.4

Page 85: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 85 of 606

Step Direction Sequence Expected Result

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 5: Distance for NFC Type 2 Tag Reading - 3,0cm

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 3 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 6: Distance for NFC Type 2 Tag Reading - 4,0cmInitial Conditions

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 4 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

3.3.3.11 Distance for NFC Type 3 Tag readingTest Purpose

This test case verifies the correct interpretation of NFC Type 3 Tag with RTD (Record TypeDefinition) by the DUT from 0 to 1cm, optional 2 to 4cm

Referenced requirement

3.3.3.10.5

3.3.3.10.6

Page 86: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 86 of 606

TS26_NFC_REQ_044 TS26_NFC_REQ_110

Initial Conditions

Antenna reference point may be marked on the outside of the DUT NFC Tags Type 3 with RTD “SmartPoster” (launch browser) is available

Test Sequence No 1: Distance for NFC Type 3 Tag Reading - 0,0cm

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 0 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 2: Distance for NFC Type 3 Tag Reading - 0,5cmInitial Conditions

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 0,5 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 3: Distance for NFC Type 3 Tag Reading - 1,0cmInitial Conditions

None

3.3.3.11.1

3.3.3.11.2

3.3.3.11.3

Page 87: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 87 of 606

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 1 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 4: Distance for NFC Type 3 Tag Reading - 2cm

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 2 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 5: Distance for NFC Type 3 Tag Reading - 3,0cmInitial Conditions

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 3 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

3.3.3.11.4

3.3.3.11.5

Page 88: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 88 of 606

Step Direction Sequence Expected Result

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 6: Distance for NFC Type 3 Tag Reading – 4,0cm

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 4 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

3.3.3.12 Distance for NFC Type 4A Tag readingTest Purpose

This test case verifies the correct interpretation of NFC Type 4A Tag with RTD (RecordType Definition) by the DUT from 0 to 1cm, optional 2 to 4cm

Referenced requirement

TS26_NFC_REQ_044 TS26_NFC_REQ_110

Initial Conditions

Antenna reference point may be marked on the outside of the DUT NFC Type 4A Tag with RTD “SmartPoster” (launch browser) is available

Test Sequence No 1: Distance for NFC Type 4A Tag Reading - 0,0cmInitial Conditions

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

3.3.3.11.6

3.3.3.12.1

Page 89: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 89 of 606

Step Direction Sequence Expected Result

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 0 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 2: Distance for NFC Type 4A Tag Reading - 0,5cm

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 0,5 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 3: Distance for NFC Type 4A Tag Reading - 1,0cmInitial Conditions

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 1 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

3.3.3.12.2

3.3.3.12.3

Page 90: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 90 of 606

Test Sequence No 4: Distance for NFC Type 4A Tag Reading - 2cm

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 2 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 5: Distance for NFC Type 4A Tag Reading - 3,0cmInitial Conditions

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 3 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 6: Distance for NFC Type 4A Tag Reading – 4,0cmInitial Conditions

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3.3.3.12.4

3.3.3.12.5

3.3.3.12.6

Page 91: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 91 of 606

Step Direction Sequence Expected Result

3 Place the DUT with the best couplingpoint at 4 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

3.3.3.13 Distance for NFC Type 4B Tag readingTest Purpose

This test case verifies the correct interpretation of NFC Type 4B Tag with RTD (RecordType Definition) by the DUT from 0 to 1cm, optional 2 to 4cm

Referenced requirement

TS26_NFC_REQ_044 TS26_NFC_REQ_110

Initial Conditions

Antenna reference point may be marked on the outside of the DUT NFC Tags Type 4B with RTD “SmartPoster” (launch browser) is available

Test Sequence No 1: Distance for NFC Type 4B Tag Reading - 0,0cm

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 0 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 2: Distance for NFC Type 4B Tag Reading - 0,5cmInitial Conditions

None

Step Direction Sequence Expected Result

3.3.3.13.1

3.3.3.13.2

Page 92: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 92 of 606

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 0,5 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 3: Distance for NFC Type 4B Tag Reading - 1,0cm

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 1 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 4: Distance for NFC Type 4B Tag Reading - 2cmInitial Conditions

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 2 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

3.3.3.13.3

3.3.3.13.4

Page 93: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 93 of 606

Step Direction Sequence Expected Result

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 5: Distance for NFC Type 4B Tag Reading - 3,0cm

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 3 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

Test Sequence No 6: Distance for NFC Type 4B Tag Reading – 4,0cmInitial Conditions

None

Step Direction Sequence Expected Result

1 Using NFC Tag application, read thetag content

None

2 Remove the NFC Tag from the DUTand close the application NFC Tagapplication

The NFC Tag is read out

3 Place the DUT with the best couplingpoint at 4 cm from the NFC Tag withRTD “SmartPoster” (launch browser)

None

4 Confirm tag reading The tag is automatically read and theinformation retrieved is identical to step 2

3.3.3.14 NFC Type 1 Tag reading performanceTest Purpose

To ensure a tag reading takes 500ms or less on a NFC Type 1 Tag for a Tag messagelength not exceeding 100 bytes

Referenced requirement

3.3.3.13.5

3.3.3.13.6

Page 94: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 94 of 606

TS26_NFC_REQ_042

Initial Conditions

RF spy tool able to measure the transaction time.

Time for transaction is measured between:

The SoF of the first RF command receiving an answer (for ex: Wake Up) The EoF of the answer of the last RF command used to read the content.

The way to present the DUT in front of the tag is done in such a way that the number ofcommunication issues is minimized. For the purpose of this testing, tag content exchangedwill have a length of 100 bytes.

Test Sequence No 1

nt l ondtonsIiiaC ii

NFC Type 1 Tag is personalized with RTD “Text”

Step Direction Sequence Expected Result

1 Start the RF spy None

2 Read a NFC Type 1 Tag NFC Tag content is read

3 As soon as the DUT prompts the enduser, stop the RF spy

Time for transaction is less than 500ms

3.3.3.15 NFC Type 2 Tag reading performanceTest Purpose

To ensure a tag reading takes 500ms or less on a NFC Type 2 Tag for a Tag messagelength not exceeding 100 bytes

Referenced requirement

TS26_NFC_REQ_042

Initial Conditions

RF spy tool able to measure the transaction time.

Time for transaction is measured between:

The SoF of the first RF command receiving an answer (for ex: Wake Up) The EoF of the answer of the last RF command used to read the content.

The way to present the DUT in front of the tag is done in such a way that the number ofcommunication issues is minimized.

For the purpose of this testing, tag content exchanged will have a length of 100 bytes.

3.3.3.14.1

Page 95: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 95 of 606

Test Sequence No 1

nt l ondtonsIiiaC ii

NFC Type 2 Tag is personalized with RTD “SmartPoster” (launch browser)

Step Direction Sequence Expected Result

1 Start the RF spy None

2 Read a NFC Type 2 Tag NFC Tag content is read

3 As soon as the DUT prompts the enduser, stop the RF spy

Time for transaction is less than 500ms

3.3.3.16 NFC Type 3 Tag reading performanceTest Purpose

To ensure a tag reading takes 500ms or less on a NFC Type 3 Tag for a Tag messagelength not exceeding 100 bytes

Referenced requirement

TS26_NFC_REQ_042

Initial Conditions

RF spy tool able to measure the transaction time.

Time for transaction is measured between:

The SoF of the first RF command receiving an answer (for ex: Wake Up) The EoF of the answer of the last RF command used to read the content.

The way to present the DUT in front of the tag is done in such a way that the number ofcommunication issues is minimized.

For the purpose of this testing, tag content exchanged will have a length of 100 bytes.

Test Sequence No 1Initial Conditions

NFC Type 3 Tag is personalized with RTD “SmartPoster” (launch browser)

Step Direction Sequence Expected Result

1 Start the RF spy None

2 Read a NFC Type 3 Tag NFC Tag content is read

3 As soon as the DUT prompts the enduser, stop the RF spy

Time for transaction is less than 500ms

3.3.3.15.1

3.3.3.16.1

Page 96: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 96 of 606

3.3.3.17 NFC Type 4A Tag reading performanceTest Purpose

To ensure a tag reading takes 500ms or less on a NFC Type 4A Tag for a Tag messagelength not exceeding 100 bytes

Referenced requirement

TS26_NFC_REQ_042

Initial Conditions

RF spy tool able to measure the transaction time.

Time for transaction is measured between:

The SoF of the first RF command receiving an answer (for ex: Wake Up) The EoF of the answer of the last RF command used to read the content.

The way to present the DUT in front of the tag is done in such a way that the number ofcommunication issues is minimized.

For the purpose of this testing, tag content exchanged will have a length of 100 bytes.

Test Sequence No 1

nt l ondtonsIiiaC ii

NFC Type 4A Tag is personalized with RTD “SmartPoster” (launch browser)

Step Direction Sequence Expected Result

1 Start the RF spy None

2 Read a NFC Type 4A Tag NFC Tag content is read

3 As soon as the DUT prompts the enduser, stop the RF spy

Time for transaction is less than 500ms

3.3.3.18 NFC Type 4B Tag reading performanceTest Purpose

To ensure a tag reading takes 500ms or less on a NFC Type 4B Tag for a Tag messagelength not exceeding 100 bytes

Referenced requirement

TS26_NFC_REQ_042

Initial Conditions

RF spy tool able to measure the transaction time.

Time for transaction is measured between:

3.3.3.17.1

Page 97: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 97 of 606

The SoF of the first RF command receiving an answer (for ex: Wake Up) The EoF of the answer of the last RF command used to read the content.

The way to present the DUT in front of the tag is done in such a way that the number ofcommunication issues is minimized.

For the purpose of this testing, tag content exchanged will have a length of 100 bytes.

Test Sequence No 1

nt l ondtonsIiiaC ii

NFC Type 4B Tag is personalized with RTD “SmartPoster” (launch browser)

Step Direction Sequence Expected Result

1 Start the RF spy None

2 Read a NFC Type 4B Tag NFC Tag content is read

3 As soon as the DUT prompts the enduser, stop the RF spy

Time for transaction is less than 500ms

3.3.3.19 NFC Tag handling during an active data transferTest Purpose

To ensure that during an active data transfer (data exchanged over the mobile network) theDUT SHOULD still be able to handle NFC tags accordingly and inform the user of readtags.

Referenced requirement

TS26_NFC_REQ_034

Initial Conditions

NFC Forum Type 1 Tag with content as described in Section 2.5.4.5 is available fortesting (i.e. vCard, URI or Text).

Set up a network simulator for supported network technology as defined in chapter 2.5.8.

One default APN is configured on the DUT and the related PDN connection to this APN hasalready been established.

Immediate link establishment,

Bearer Type 03 (Default Bearer for requested transport layer)

No alpha identifier

Test data with a size of 60k Bytes to induce OTA Load duration in CAT-TP Also, the DUT with a test phone number which can be called and permits to maintain

the call for several minutes is necessary. Prior to this test the device shall have been powered ON and ISO7816 initialization

has been completed.

3.3.3.18.1

Page 98: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 98 of 606

Tests shall be made based on the capability of the DUT (Example: For LTEdevice, test shall use LTE; otherwise, use 3G).

Test Sequence No 1

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 ServerDUTDUT Server

Perform Push SMS procedure asdefined in section 12.4.3.7.1

2 Server DUT

Transfer 60k Bytes of data to the DUTthrough channel 1 using the DUT'sport number, which was retrievedwithin step 1The data shall be constructed suchthat each portion of the data can beunambiguously identified whenreceived by the UICC.

3 DUT UICC

ENVELOPE: EVENT DOWNLOAD –Data Available (Reception of datafrom the server, 60K Bytes of data inthe DUT buffer)

91 XX

4 UICC DUT

PROACTIVE COMMAND: ReceiveData 12.1 (with channel data length of0xFF)

5 DUT UICC

TERMINAL RESPONSE: RECEIVEDATA 12.1

TR Successful Channel data contains thestart of the expected data from the server.91 XX

6 Read a NFC tag NFC Tag is read

7 Repeat steps 8 to 9 until the complete60k Bytes of data have been receivedby the UICC.Additional ENVELOPE: EVENTDOWNLOAD – Data Availablecommands may be sent by the DUT inbetween successive PROACTIVECOMMAND: Receive Datacommands.

8 UICC DUT

PROACTIVE COMMAND: ReceiveData 12.1 (with channel data length ofYY according to the amount of dataavailable)

3.3.3.19.1

Page 99: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 99 of 606

Step Direction Sequence Expected Result

9 DUT UICC

TERMINAL RESPONSE: RECEIVEDATA 12.1

TR Successful Channel data contains theremainder of the expected data from theserver.91 XX

10 UICC DUT

PROACTIVE COMMAND: CLOSECHANNEL 12.1

11 DUT UICC

TERMINAL RESPONSE: CLOSECHANNEL 12.1

[Command performed successfully]TR Successful + 90 00

Logically

Same as PROACTIVE COMMAND: SEND DATA 12.1 in clause 12.4.3.2.1.

Same as TERMINAL RESPONSE: SEND DATA 12.1 in clause 12.4.3.2.1.

Same as, ENVELOPE: EVENT DOWNLOAD - Data available 12.1 in clause 12.4.3.2.1.

Same as PROACTIVE COMMAND: RECEIVE CHANNEL 12.1 in clause 12.4.3.2.1.

Same as TERMINAL RESPONSE: RECEIVE CHANNEL 12.1 in clause 12.4.3.2.1.

Same as PROACTIVE COMMAND: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1.

Same as TERMINAL RESPONSE: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1.

3.3.3.20 VOID

3.3.3.21 VOID

3.3.3.22 VOID

3.3.3.23 VOID

3.3.3.24 NFC Forum Tag Operation Test CasesThis chapter addresses the inclusion of selected NFC Forum Tag test cases to ensure adevice is able to Read and Write to any of the Tags called out in TS.27. Incorporation ofthese additional NFC Forum test cases improves the depth of coverage for test casesinvolving reading and writing to tags, checking for supported payload with tags, errorredundancy with tags, timing parameters and that a device may work with future Tags usedin the current test scenarios.

Test Purpose

To ensure the DUT follows the NFC Forum Specifications for reading and writing to any ofthe required Tag types.

These tests should be performed prior to Test Cases 3.3.3.1 through 3.3.3.19, which testonly the application level of a device’s read and write operation.

Page 100: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 100 of 606

Referenced requirement

TS26_NFC_REQ_034 TS26_NFC_REQ_035 TS26_NFC_REQ_036 TS26_NFC_REQ_037

Related Specs/Docs:

NFCForum Test Cases For Type 1 Tag Operation [30]NFCForum Test Cases For Type 2 Tag and Type 2 Tag Operation [31]NFCForum Test Cases For Type 3 Tag and Type 3 Tag Operation [32]NFCForum Test Cases For Type 4 Tag and Type 4 Tag Operation [33]

Test Procedure

The DUT shall pass the Test Cases with ID REQ from the NFC Forum related specs/docsabove. The set of applicable test cases is referenced in Table B.9.1, Table B.9.2, TableB.9.3, and Table B.9.4.

3.3.3.25 NFC Forum Test Cases for Analog (all valid versions)This chapter addresses the inclusion of NFC Forum Test Cases for Analog. Incorporation ofthe NFC Forum Analog test cases establishes an appropriate test coverage for NFC-A,NFC-B and NFC-F technologies in polling and listening modes. The associated test casescover Test Cases for Analog test specification versions.

Referenced requirement

TS26_NFC_REQ_042

Related Specs/Docs:

NFCForum-TS-Analog-2.0 NFC Forum Test Cases for Analog V2.0 [40] NFC Forum Device Requirements- 2.0 (or later)

Test Procedure

The DUT shall pass the Test Cases with ID REQ from the NFC Forum related specs/docsabove. The set of applicable test cases is referenced in Table B.9.5.

3.3.3.26 VOID

3.3.3.27 NFC Forum Test Cases for Analog V2.0 onlyThis chapter addresses the inclusion of the specific NFC Forum Test Cases for AnalogV2.0. With this version of the Analog Test Cases, interoperability of NFC mobile deviceswith transport fare management infrastructures according to ISO/IEC14443 andISO/IEC18092 will be supported.

Page 101: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 101 of 606

Referenced requirement

TS26_NFC_REQ_042

Related Specs/Docs:

NFC Forum-TS-Analog [19] NFC Forum Test Cases for Analog [40] NFC Forum Device Requirements [19]

Test Procedure

The DUT shall pass the Test Cases with ID REQ from the NFC Forum related specs/docsabove. The set of applicable test cases is referenced in Table B.9.7.

3.3.3.28 Extended Length APDU handlingTest Purpose

To ensure the DUT allows writing and reading of NFC Forum Type 4A Tag resulting incommunication using extended length APDUs.

This test only test the Tag to 2048 bytes as there are currently no commercial Tagsavailable which support 32767 bytes.

Referenced requirement

TS26_NFC_REQ_160

Test execution:

This test case should be executed using reference NFC tag or simulated NFC tag. An application is installed on the DUT able to write the specified Tag format. This

application is provided with the default DUT software or a reference application isinstalled

Initial Conditions

The DUT is powered on NFC is enabled in the DUT The Tag is an empty initialized Type 4A Tag The DUT is not placed in the Write Range (more than 50cm from the Tag).

Page 102: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 102 of 606

Test Sequence No 1: Write 2048 bytes to Type 4A Tag

nt l ondtonsIiiaC ii

Write the following tag content:

For NFC Type 4A Tag - NFC Tag is blank and will be personalized with a payload resultingin an APDU containing 2048 command data payload.

Direction Sequence Expected Result

1 UserDUT

Place DUT in the NFC write range

2 AppDUTDUT Tag

Use the application to write to NFCType 4A Tag using an extendedlength APDU

The DUT writes to NFC Type 4A Tag.

3 UserDUT

Remove the DUT from the write range None

4 User Verify that tag content was writtencorrectly by reading it

The tag content is correctly written by theDUT.The Tag content shall be verifiedindependently of the DUT

Test Sequence No 2: Read 2048 bytes from Type 4A TagInitial Conditions

Write the following tag content:

For NFC Type 4A Tag - NFC Tag contains a NDEF with a payload resulting in an APDUcontaining 2048 response data.

Direction Sequence Expected Result

1 UserDUT

Place DUT in the NFC write range

2 AppDUTDUT Tag

Use the application to read from NFCType 4A Tag using an extendedlength APDU

The DUT reads from NFC Type 4A Tag.

3 UserDUT

Remove the DUT from the write range None

4 User Verify that tag content was readcorrectly by comparing it to thepersonalization

The tag content is correctly read by theDUT.

3.3.3.28.1

3.3.3.28.2

Page 103: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 103 of 606

3.4 Card emulation mode

3.4.1 General overviewThis section addresses the requirements for card emulation mode. This includes basic testcases for card emulation in normal mode as well as under different battery modes anddistances.

The list of conformance requirements tested within this section is listed in the table insection Error! Reference source not found..

3.4.2 Conformance requirementsTS26_NFC_REQ_020 If NFC was enabled, when the mobile device is automatically switched off, and

enters battery low mode, the mobile device SHALL be able to perform 15transactions in card emulation within the following 24 hours.

TS26_NFC_REQ_021 If NFC is enabled, NFC transactions SHALL be possible either in batterypower off or battery low mode. Note: This is important for public transportservices.

TS26_NFC_REQ_026 Card Emulation mode SHALL be enabled as soon as the NFC is turned on.

TS26_NFC_REQ_027 For Card emulation mode the read distance SHALL be in the 0cm – 2cmsrange for battery operational mode, battery low or power off mode.

TS26_NFC_REQ_157 The device SHALL implement the requirements of the EMV ContactlessCommunication Protocol Specification, Book D.

TS26_NFC_REQ_158 Card emulation mode SHALL support APDU transmission case 1, 2, 3 & 4 asdefined in ISO/IEC 7816-4 including Extended Length Field support.Command and response data field size minimum of 2048 bytes SHALL besupported.Note 1: Currently, the support for extended length APDU is not a commonfeature of NFC-UICC. At this point in time, NFC-UICC in the field typicallydon’t support extended length APDU. Both handset architecture and NFC-UICC have to be compliant in order for the device to support the extendedlength APDU feature.Note 2: The implementation of the protocol and the mechanisms leading to theuse of the extended length APDU option according to ISO/IEC 7816-4 have tobe ensured by a negotiation between the contactless reader and the selectedapplication in the NFC-UICC.

TS26_NFC_REQ_174 If NFC was enabled when the device is switched off by the user, the deviceSHALL be able to perform card emulation transactions.

3.4.3 Test Cases

3.4.3.1 Card Emulation enabled as soon as NFC hardware is onTest Purpose

To verify if card emulation mode works on the device as soon as the device is on.

Referenced requirement

Page 104: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 104 of 606

TS26_NFC_REQ_026

Initial Conditions

ReferenceApplication.cap managing the reference transaction with AID_REFselectable into the reference UICC.

APDU Application to send APDUs according to the reference transaction.

Test Sequence No 1: Card emulation available after bootInt l ondtonsiiaC ii

None.

Step Direction Sequence Expected Result

1 UserDUTDUT UICC

Power On the DUT and wait until theUICC has completed HCI sessioninitialization

The HCI initialization is performedcorrectly

2 UserDUT

Enable NFC in the DUT DUT indicates NFC is on

3 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

None

4 UserPCD

Power on the field None

5 PCDDUTDUT UICC

Perform the reference transactionusing a contactless reader

The reference transaction is performedsuccessfully

Test Sequence No 2: Card emulation available after reboot

Initial Conditions

None

Step Direction Sequence Expected Result

1 UserDUTDUT UICC

Power On the DUT and wait until theUICC has completed HCI sessioninitialization

The HCI initialization is performedcorrectly

2 UserDUT

Enable the NFC on the DUT None

3 UserDUT

Power off the DUT None

3.4.3.1.1

3.4.3.1.2

Page 105: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 105 of 606

Step Direction Sequence Expected Result

4 UserDUT

Power on the DUT None

5 UserDUT

Check that NFC is on DUT indicates NFC is on

6 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

None

7 UserPCD

Power on the field None

8 PCDDUTDUT UICC

Perform the reference transactionusing a contactless reader

The reference transaction is performedsuccessfully

Test Sequence No 3: Card emulation when device is on but in screen

lockde

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 UserDUTDUT UICC

Power On the DUT and wait until theUICC has completed HCI sessioninitialization

The HCI initialization is performedcorrectly

2 UserDUT

(if not enabled) Enable the NFC on theDUT

None

3 User-DUT

Lock the screen of the device andensure that the screen is on

lockscreen is shown on the DUT

4 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

None

5 UserPCD

Power on the field None

6 PCDDUTDUT UICC

Perform the reference transactionusing a contactless reader

The reference transaction is performedsuccessfully

Test Sequence No 4: Card emulation when device on but screen off

Initial Conditions

3.4.3.1.3

3.4.3.1.4

Page 106: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 106 of 606

None

Step Direction Sequence Expected Result

1 UserDUTDUT UICC

Power On the DUT and wait until theUICC has completed HCI sessioninitialization

The HCI initialization is performedcorrectly

2 UserDUT

(if not enabled) Enable the NFC on theDUT

None

3 User-DUT

Switch off the screen of the DUT The screen is switched off.

4 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

None

5 UserPCD

Power on the field None

6 PCDDUTDUT UICC

Perform the reference transactionusing a contactless reader

The reference transaction is performedsuccessfully

3.4.3.2 NFC during Standby timeTest Purpose

To ensure the NFC transaction in card emulation mode is possible during 24 hours after theDUT automatically powered off due to a low battery level.

DUT SHALL accept 15 correct reference transactions.

Referenced requirement

TS26_NFC_REQ_020

Initial Conditions

ReferenceApplication.cap managing the reference transaction with AID_REFselectable into the reference UICC.

APDU Application to send APDUs according to the reference transaction. NFC is enabled on the DUT

Test Sequence No 1

nt l ondtonsIiiaC ii

The DUT enters Battery Low Mode

3.4.3.2.1

Page 107: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 107 of 606

Step Direction Sequence Expected Result

1 Execute the reference transaction inloop mode

The DUT must manage the referencetransaction 15 timesNote: The 15th transaction shall beperformed within the last 5 minutesbefore the expiry of the 24 hours.

3.4.3.3 Verify that device is able to perform Card Emulation Mode A, CardEmulation Mode B and CLT A transaction either in Battery Power Off orBattery Low mode

Test Purpose

To ensure the NFC transaction in card emulation mode is possible in Battery Power offMode or in Battery Low Mode.

Referenced requirement

TS26_NFC_REQ_021

Initial Conditions

ReferenceApplication.cap managing the reference transaction with AID_REFselectable into the reference UICC.

APDU Application to send APDUs according to the reference transaction. NFC is enabled on the DUT

Test Sequence No 1: Card Emulation Mode Type A in Battery Power

ff odO m e

nt l ondtonsIiiaC ii

The DUT is in Battery Power Off mode.

Step Direction Sequence Expected Result

1 Perform the reference transaction typeA using a contactless reader

Verify that the reference transaction issuccessfully performed

Test Sequence No 2: Card Emulation Mode Type B in Battery PowerOff mode

Initial Conditions

The DUT is in Battery Power Off mode.

Step Direction Sequence Expected Result

1 Perform the reference transaction typeB using a contactless reader

Verify that the reference transaction issuccessfully performed

Test Sequence No 3: CLT (A) in Battery Power Off modeFFS

3.4.3.3.1

3.4.3.3.2

3.4.3.3.3

Page 108: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 108 of 606

Test Sequence No 4: Card Emulation Mode Type A in Battery Low

odMe

nt l ondtonsIiiaC ii

The DUT is in Battery Low mode.

Step Direction Sequence Expected Result

1 Perform the reference transaction typeA using a contactless reader

Verify that the reference transaction issuccessfully performed

Test Sequence No 5: Card Emulation Mode Type B in Battery LowMode

Initial Conditions

The DUT is in Battery Low mode

Step Direction Sequence Expected Result

1 Perform the reference transaction typeB using a contactless reader

Verify that the reference transaction issuccessfully performed

Test Sequence No 6: CLT (A) in Battery Low ModeFFS

3.4.3.4 Distance for card emulationTest Purpose

To ensure that in card emulation mode, the communication is ok in a range from 0cmto 2cm (antenna side) in Battery Operational Mode

Referenced requirement

TS26_NFC_REQ_027 TS26_NFC_REQ_157

Initial Conditions

None

Test Procedure

Distance for card emulation is tested as part of the test cases referenced in AnnexError! Reference source not found. and tested in Error! Reference source notfound.

3.4.3.5 Distance for card emulation in Battery Power-off Mode (0cm)Test Purpose

3.4.3.3.4

3.4.3.3.5

3.4.3.3.6

Page 109: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 109 of 606

To ensure that in card emulation mode, the communication is ok at 0cm (antenna side) withBattery Power-off Mode

Referenced requirement

TS26_NFC_REQ_027

Initial Conditions

HCI Initialization was correctly performed in previous operating session NFC is enabled in DUT Card emulation is enabled in the DUT DUT is in Battery Power-off Mode ReferenceApplication.cap managing the reference transaction with AID_REF

selectable into the reference UICC. APDU Application to send APDUs according to the reference transaction. While the field is off, the DUT is set to 0cm of the reference contactless reader at the

best coupling point between DUT and contactless reader. In order to support testing- the antenna reference point may be marked on the DUT.

Test Sequence No 1

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 UserPCD

Power on the field None

2 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

3.4.3.6 Distance for card emulation in Battery Power-off Mode (0.5cm)Test Purpose

To ensure that in card emulation mode, the communication is ok at 0.5cm (antenna side)with Battery Power-off Mode

Referenced requirement

TS26_NFC_REQ_027

Initial Conditions

HCI initialization was correctly performed in previous operating session NFC is enabled in the DUT Card emulation is enabled in the DUT. DUT is in Battery Power-off Mode.

3.4.3.5.1

Page 110: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 110 of 606

ReferenceApplication.cap managing the reference transaction with AID_REFselectable into the reference UICC.

APDU Application to send APDUs according to the reference transaction. While the field is off, the DUT is set to 0.5cm of the reference contactless reader at

the best coupling point between DUT and contactless reader. In order to supporttesting - the antenna reference point may be marked on the DUT.

Test Sequence No 1

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 UserPCD

Power on the field None

2 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

3.4.3.7 Distance for card emulation in Battery Power-off Mode (1cm)Test Purpose

To ensure that in card emulation mode, the communication is ok at 1cm (antenna side) withBattery Power-off Mode

Referenced requirement

TS26_NFC_REQ_027

Initial Conditions

HCI initialization was correctly performed in previous operating session NFC is enabled in the DUT Card emulation is enabled in the DUT DUT is in Battery Power-off Mode ReferenceApplication.cap managing the reference transaction with AID_REF

selectable into the reference UICC. APDU Application to send APDUs according to the reference transaction. While the field is off, the DUT is set to 1cm of the reference contactless reader at the

best coupling point between DUT and contactless reader. In order to support testing- the antenna reference point may be marked on the DUT.

Test Sequence No 1Initial Conditions

None

3.4.3.6.1

3.4.3.7.1

Page 111: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 111 of 606

Step Direction Sequence Expected Result

1 UserPCD

Power on the field None

2 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

3.4.3.8 Distance for card emulation in Battery Power-off Mode (1.5cm)Test Purpose

To ensure that in card emulation mode, the communication is ok at 1.5cm (antenna side)with Battery Power-off Mode.

Referenced requirement

TS26_NFC_REQ_027

Initial Conditions

HCI initialization was correctly performed in previous operating session NFC is enabled in the DUT Card emulation is enabled in the DUT DUT is in Battery Power-off Mode ReferenceApplication.cap managing the reference transaction with AID_REF

selectable into the reference UICC. APDU Application to send APDUs according to the reference transaction. While the field is off, the DUT is set to 1.5cm of the reference contactless reader at

the best coupling point between DUT and contactless reader. In order to supporttesting - the antenna reference point may be marked on the DUT.

Test Sequence No 1

ntIi

l ondtonsiaC ii

None

Step Direction Sequence Expected Result

1 UserPCD

Power on the field None

2 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

3.4.3.9 Distance for card emulation in Battery Power-off Mode (2cm)Test Purpose

3.4.3.8.1

Page 112: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 112 of 606

To ensure that in card emulation mode, the communication is ok at 2cm (antenna side) withBattery Power-off Mode

Referenced requirement

TS26_NFC_REQ_027

Initial Conditions

HCI initialization was correctly performed in previous operating session NFC is enabled in the DUT Card emulation is enabled in the DUT DUT is in Battery Power-off Mode ReferenceApplication.cap managing the reference transaction with AID_REF

selectable into the reference UICC. APDU Application to send APDUs according to the reference transaction. While the field is off, the DUT is set to 2cm of the reference contactless reader at the

best coupling point between DUT and contactless reader. In order to support testing- the antenna reference point may be marked on the DUT.

Test Sequence No 1

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 UserPCD

Power on the field None

2 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

3.4.3.10 Distance for card emulation in Battery Power-low Mode (0cm)Test Purpose

To ensure that in card emulation mode, the communication is ok at 0cm (antenna side) withBattery Power-low Mode

Referenced requirement

TS26_NFC_REQ_027

Initial Conditions

HCI initialization was correctly performed in previous operating session NFC is enabled in the DUT Card emulation is enabled in the DUT. DUT is in Battery Power-low Mode.

3.4.3.9.1

Page 113: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 113 of 606

ReferenceApplication.cap managing the reference transaction with AID_REFselectable into the reference UICC.

APDU Application to send APDUs according to the reference transaction. While the field is off, the DUT is set to 0cm of the reference contactless reader at the

best coupling point between DUT and contactless reader. In order to support testing- the antenna reference point may be marked on the DUT.

Test Sequence No 1

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 UserPCD

Power on the field None

2 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

3.4.3.11 Distance for card emulation in Battery Power-low Mode (0.5cm)Test Purpose

To ensure that in card emulation mode, the communication is ok at 0.5cm (antenna side)with Battery Power-low Mode.

Referenced requirement

TS26_NFC_REQ_027

Initial Conditions

HCI initialization was correctly performed in previous operating session NFC is enabled in the DUT Card emulation is enabled in the DUT. DUT is in Battery Power-low Mode ReferenceApplication.cap managing the reference transaction with AID_REF

selectable into the reference UICC. APDU Application to send APDUs according to the reference transaction. While the field is off, the DUT is set to 0.5cm of the reference contactless reader at

the best coupling point between DUT and contactless reader. In order to supporttesting - the antenna reference point may be marked on the DUT.

Test Sequence No 1Initial Conditions

None

3.4.3.10.1

3.4.3.11.1

Page 114: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 114 of 606

Step Direction Sequence Expected Result

1 UserPCD

Power on the field None

2 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

3.4.3.12 Distance for card emulation in Battery Power-low Mode (1cm)Test Purpose

To ensure that in card emulation mode, the communication is ok at 1cm (antenna side) withBattery Power-low Mode

Referenced requirement

TS26_NFC_REQ_027

Initial Conditions

HCI initialization was correctly performed in previous operating session NFC is enabled in the DUT Card emulation for is enabled in the DUT. DUT is in Battery Power-low Mode. ReferenceApplication.cap managing the reference transaction with AID_REF

selectable into the reference UICC. APDU Application to send APDUs according to the reference transaction. While the field is off, the DUT is set to 1cm of the reference contactless reader at the

best coupling point between DUT and contactless reader. In order to support testing- the antenna reference point may be marked on the DUT.

Test Sequence No 1

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 UserPCD

Power on the field None

2 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

3.4.3.12.1

Page 115: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 115 of 606

3.4.3.13 Distance for card emulation in Battery Power-low Mode (1.5cm)Test Purpose

To ensure that in card emulation mode, the communication is ok at 1.5cm (antenna side)with Battery Power-low Mode

Referenced requirement

TS26_NFC_REQ_027

Initial Conditions

HCI initialization was correctly performed in previous operating session NFC is enabled in the DUT Card emulation is enabled in the DUT. DUT is in Battery Power-low Mode. ReferenceApplication.cap managing the reference transaction with AID_REF

selectable into the reference UICC. APDU Application to send APDUs according to the reference transaction. While the field is off, the DUT is set to 1.5cm of the reference contactless reader at

the best coupling point between DUT and contactless reader. In order to supporttesting - the antenna reference point may be marked on the DUT.

Test Sequence No 1

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 UserPCD

Power on the field None

2 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

3.4.3.14 Distance for card emulation in Battery Power-low Mode (2cm)Test Purpose

To ensure that in card emulation mode, the communication is ok at 2cm (antenna side) withBattery Power-low Mode

Referenced requirement

TS26_NFC_REQ_027

Initial Conditions

3.4.3.13.1

Page 116: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 116 of 606

HCI initialization was correctly performed in previous operating session NFC is enabled in the DUT Card emulation is enabled in the DUT. DUT is in Battery Power-low Mode. ReferenceApplication.cap managing the reference transaction with AID_REF

selectable into the reference UICC. APDU Application to send APDUs according to the reference transaction. While the field is off, the DUT is set to 2cm of the reference contactless reader at the

best coupling point between DUT and contactless reader. In order to support testing- the antenna reference point may be marked on the DUT.

Test Sequence No 1

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 UserPCD

Power on the field None

2 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

3.4.3.15 Distance for card emulation in Battery Power-operational Mode (0cm)Test Purpose

To ensure that in card emulation mode, the communication is ok at 0cm (antenna side) withBattery Power-operational Mode

Referenced requirement

TS26_NFC_REQ_027

Initial Conditions

DUT is powered on and the DUT is in Battery Power-operational Mode HCI initialization is correctly performed. NFC is enabled in the DUT. Card emulation is enabled in the DUT. ReferenceApplication.cap managing the reference transaction with AID_REF

selectable into the reference UICC. APDU Application to send APDUs according to the reference transaction. While the field is off, the DUT is set to 0cm of the reference contactless reader at the

best coupling point between DUT and contactless reader. In order to support testing- the antenna reference point may be marked on the DUT.

3.4.3.14.1

Page 117: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 117 of 606

Test Sequence No 1

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 UserPCD

Power on the field None

2 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

3.4.3.16 Distance for card emulation in Battery Power-operational Mode (0.5cm)Test Purpose

To ensure that in card emulation mode, the communication is ok at 0.5cm (antenna side)with Battery Power-operational Mode

Referenced requirement

TS26_NFC_REQ_027

Initial Conditions

DUT is powered on and the DUT is in Battery Power-operational Mode HCI initialization is correctly performed. NFC is enabled in the DUT. Card emulation is enabled in the DUT. ReferenceApplication.cap managing the reference transaction with AID_REF

selectable into the reference UICC. APDU Application to send APDUs according to the reference transaction. While the field is off, the DUT is set to 0.5cm of the reference contactless reader at

the best coupling point between DUT and contactless reader. In order to supporttesting - the antenna reference point may be marked on the DUT.

Test Sequence No 1Initial Conditions

None

Step Direction Sequence Expected Result

1 UserPCD

Power on the field None

3.4.3.15.1

3.4.3.16.1

Page 118: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 118 of 606

Step Direction Sequence Expected Result

2 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

3.4.3.17 Distance for card emulation in Battery Power-operational Mode (1cm)Test Purpose

To ensure that in card emulation mode, the communication is ok at 1cm (antenna side) withBattery Power-operational Mode.

Referenced requirement

TS26_NFC_REQ_027

Initial Conditions

DUT is powered on and the DUT is in Battery Power-operational Mode HCI initialization is correctly performed. NFC is enabled in the DUT. Card emulation is enabled in the DUT. ReferenceApplication.cap managing the reference transaction with AID_REF

selectable into the reference UICC. APDU Application to send APDUs according to the reference transaction. While the field is off, the DUT is set to 1cm of the reference contactless reader at the

best coupling point between DUT and contactless reader. In order to support testing- the antenna reference point may be marked on the DUT.

Test Sequence No 1

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 UserPCD

Power on the field None

2 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

3.4.3.18 Distance for card emulation in Battery Power-operational Mode (1.5cm)Test Purpose

To ensure that in card emulation mode, the communication is ok at 1.5cm (antenna side)with Battery Power-operational Mode.

3.4.3.17.1

Page 119: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 119 of 606

Referenced requirement

TS26_NFC_REQ_027

Initial Conditions

DUT is powered on and the DUT is in Battery Power-operational Mode. HCI initialization is correctly performed. NFC is enabled in the DUT. Card emulation is enabled in the DUT. ReferenceApplication.cap managing the reference transaction with AID_REF

selectable into the reference UICC. APDU Application to send APDUs according to the reference transaction. While the field is off, the DUT is set to 1.5cm of the reference contactless reader at

the best coupling point between DUT and contactless reader. In order to supporttesting - the antenna reference point may be marked on the DUT.

Test Sequence No 1

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 UserPCD

Power on the field None

2 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

3.4.3.19 Distance for card emulation in Battery Power-operational Mode (2cm)Test Purpose

To ensure that in card emulation mode, the communication is ok at 2cm (antenna side) withBattery Power-operational Mode

Referenced requirement

TS26_NFC_REQ_027

Initial Conditions

DUT is powered on and the DUT is in Battery Power-operational Mode HCI initialization is correctly performed NFC is enabled in the DUT Card emulation is enabled in the DUT. ReferenceApplication.cap managing the reference transaction with AID_REF

selectable into the reference UICC. APDU Application to send APDUs according to the reference transaction.

3.4.3.18.1

Page 120: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 120 of 606

While the field is off, the DUT is set to 2cm of the reference contactless reader at thebest coupling point between DUT and contactless reader. In order to support testing- the antenna reference point may be marked on the DUT.

Test Sequence No 1

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 UserPCD

Power on the field None

2 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

3.4.3.20 Card emulation with switched off deviceTest Purpose

To ensure that card emulation mode is working when the device is switched off

Referenced requirement

TS26_NFC_REQ_020 TS26_NFC_REQ_174

Initial Conditions

DUT is powered on and the DUT is in Battery Power-operational Mode HCI initialization is correctly performed NFC is enabled in the DUT Card emulation is enabled in the DUT. ReferenceApplication.cap managing the reference transaction with AID_REF

selectable into the reference UICC. APDU Application to send APDUs according to the reference transaction.

Test Sequence No 1: Distance 0 cmInitial Conditions

None

Step Direction Sequence Expected Result

1 UserPCD

Power off the device the device is powered off

2 UserDUT

While the field is off, place the DUT at0cm of area where the field will bepowered on.

None

3.4.3.19.1

3.4.3.20.1

Page 121: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 121 of 606

Step Direction Sequence Expected Result

3 UserPCD

Power on the field None

4 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

5 PCDDUTDUT UICC

Repeat Step 4 2 times Reference transaction is performedsuccessfully 2 times

Test Sequence No 2: Distance 0.5 cm

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 UserPCD

Power off the device the device is powered off

2 UserDUT

While the field is off, place the DUT at0.5cm of area where the field will bepowered on.

None

3 UserPCD

Power on the field None

4 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

5 PCDDUTDUT UICC

Repeat Step 4 2 times Reference transaction is performedsuccessfully 2 times

Test Sequence No 3: Distance 1 cmInitial Conditions

None

Step Direction Sequence Expected Result

1 UserPCD

Power off the device the device is powered off

3.4.3.20.2

3.4.3.20.3

Page 122: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 122 of 606

Step Direction Sequence Expected Result

2 UserDUT

While the field is off, place the DUT at1cm of area where the field will bepowered on.

None

3 UserPCD

Power on the field None

4 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

5 PCDDUTDUT UICC

Repeat Step 4 2 times Reference transaction is performedsuccessfully 2 times

Test Sequence No 4: Distance 1.5 cm

nt lIiia

ondtonsC ii

None

Step Direction Sequence Expected Result

1 UserPCD

Power off the device the device is powered off

2 UserDUT

While the field is off, place the DUT at1.5cm of area where the field will bepowered on.

None

3 UserPCD

Power on the field None

4 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

5 PCDDUTDUT UICC

Repeat Step 4 2 times Reference transaction is performedsuccessfully 2 times

3.4.3.20.4

Page 123: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 123 of 606

Test Sequence No 5: Distance 2 cm

nt l ondtonsIiiaC ii

None

Step Direction Sequence Expected Result

1 UserPCD

Power off the device the device is powered off

2 UserDUT

While the field is off, place the DUT at2cm of area where the field will bepowered on.

None

3 UserPCD

Power on the field None

4 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully

5 PCDDUTDUT UICC

Repeat Step 4 2 times Reference transaction is performedsuccessfully 2 times

3.4.3.21 Extended Length APDU handlingTest Purpose

To ensure correct handling of extended length encoded APDUs when working in cardemulation mode.

Referenced requirement

TS26_NFC_REQ_158

Initial Conditions

An instance of the UICC application APDU_TestApplication.cap with AID01 isselectable.

The APDU application defined in 2.5.3.3 is used to send APDU commands. In the NFC Controller the default AID route is set to UICC (see section 2.6.1) NFC is enabled in the DUT Card emulation is enabled in the DUT. The UICC used for testing SHALL support extended length APDU.

Test Sequence No 1: Get Response APDU with 2048 byte data field(Case 2)

3.4.3.20.5

3.4.3.21.1

Page 124: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 124 of 606

Step Direction Sequence Expected Result

1 User ->DUT

While the field is off, place theDUT in the area where the field willbe powered on

2 User ->PCD

Power on the field

3 PCD ->DUT

Using the APDU application,send a SELECT command withAID01

APDU Application receives StatusWord 90 00

4 PCD ->DUT

APDU application sends anextended case 2 command with Le

= 0x0800

APDU Application receives data fieldcontaining 2048 bytes and aSW:9000

Test Sequence No 2: Send Command APDU with 2048 byte data field

( s 4)Cae

Step Direction Sequence Expected Result

1 User ->DUT

While the field is off, place theDUT in the area where the field willbe powered on

2 User ->PCD

Power on the field

3 PCD ->DUT

Using the APDU application,send a SELECT command withAID01

APDU Application receives StatusWord 90 00

4 PCD ->DUT

APDU application sends anextended case 4 command with Lc

= 0x000800 and Le = 0x0800 and2048 bytes of command data

APDU Application receives data fieldcontaining 2048 bytes and aSW:9000

3.4.3.21.2

Page 125: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 125 of 606

3.5 Core and Common features

3.5.1 General overviewThis section addresses the requirements for the core NFC controller and for the commonfunctions between Reader/Writer and Card emulation mode. This also includes theSWP/HCI and RF protocol compliance.

The list of conformance requirements tested within this section is listed in the table insection Error! Reference source not found..

3.5.2 Conformance requirementsTS26_NFC_REQ_006 The NFC controller SHALL support SWP (Single Wire Protocol) interface with

the UICC as per ETSI TS 102.613.

TS26_NFC_REQ_007 The NFC controller SHALL support HCI with the UICC as per ETSI TS 102.622.

TS26_NFC_REQ_008 Contactless tunnelling (CLT=A) mode SHALL be supported for SWP (per ETSITS 102.613).

TS26_NFC_REQ_009.1 Contactless tunnelling (CLT=F) mode SHALL be supported for SWP (perETSI TS 102 613).

TS26_NFC_REQ_010 The device interface with UICC SHOULD support Class B.

TS26_NFC_REQ_011 The device interface with UICC SHALL support Class C.

TS26_NFC_REQ_014 The device interface with UICC SHALL support DEACTIVATED followed bysubsequent SWP interface activation in full power mode.

TS26_NFC_REQ_015 The NFC controller SHOULD support both windows size set to 3 and set to 4.

TS26_NFC_REQ_025 The mobile device SHALL support Card-emulation as per NFC Forum TS-Analog, TS-Digital and TS-Activity Specifications.

TS26_NFC_REQ_033 The mobile device SHALL support Reader/Writer Mode as per NFC Forum TS-Analog, TS-Digital and TS-Activity Specifications.

TS26_NFC_REQ_041 The device SHALL support automatic and continuous switching between cardemulation and reader mode.

3.5.3 Test Cases

3.5.3.1 SWP Compliance testingTest Purpose

To ensure the device conforms to Single Wire Protocol specification

Referenced requirement

TS26_NFC_REQ_006 TS26_NFC_REQ_008 TS26_NFC_REQ_009.1 TS26_NFC_REQ_010 TS26_NFC_REQ_011 TS26_NFC_REQ_014

Page 126: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 126 of 606

TS26_NFC_REQ_015

Method of Test

Related Specs/Docs: ETSI TS 102.613 |9]

Test Procedure

The DUT shall pass all applicable test cases referenced in Table B.4.2 and Table B.4.3.

3.5.3.2 HCI Compliance testingTest Purpose

To ensure the device conforms to Host Controller Interface specification

Referenced requirement

TS26_NFC_REQ_007

Related Specs/Docs: ETSI TS 102 622 [10]

Test Procedure

The DUT shall pass all applicable test cases referenced in Table B.5.2 and Table B.5.3.

3.5.3.3 SWP Stress testTest Purpose

To ensure the DUT manages 100 transactions consecutively

Referenced requirement

TS26_NFC_REQ_006

Initial Conditions

The DUT is powered on HCI initialization has been performed successfully. NFC is enabled on the DUT Card Emulation is enabled in the DUT ReferenceApplication.cap managing the reference transaction with AID_REF

selectable into the reference UICC. APDU Application to send APDUs according to the reference transaction.

Test Sequence No 1

nt l ondtonsIiiaC ii

None

3.5.3.3.1

Page 127: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 127 of 606

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

None

2 UserPCD

Power on the field None

3 PCDDUTDUT UICC

Execute the reference transaction inloop mode (100 loops)

The reference transaction is performedcorrectly 100 times consecutively.

3.5.3.4 Switch modeTest Purpose

To ensure the DUT is able to automatically and continuously switch between card emulationmode and reader emulation mode.

Referenced requirement

TS26_NFC_REQ_041

Initial Conditions

The DUT is on HCI initialization has been correctly performed UICC application with AID01 selectable A Type 1 Tag with the RTD “Text” content The Tag and the reader are separated by at least 50cm The NFC is enabled

Test Sequence No 1

nt l ondtonsIiiaC ii

Backlight is on. DUT not locked.

Step Direction Sequence Expected Result

1 Place the DUT in front of the Tag toread

Tag reading ok

2 Set the DUT in front of the contactlessreader then send aSELECT_BY_DF_name AID01

APDU application receives Status word90 00

3 Place the DUT in front of the Tag toread

Tag reading ok

4 Set the DUT in front of the contactlessreader then send aSELECT_BY_DF_name AID01

APDU application receives Status word90 00

3.5.3.4.1

Page 128: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 128 of 606

Step Direction Sequence Expected Result

5 Place the DUT in front of the Tag toread

Tag reading ok

6 Set the DUT in front of the contactlessreader then send aSELECT_BY_DF_name AID01

APDU application receives Status word90 00

7 Place the DUT in front of the Tag toread

Tag reading ok

8 Set the DUT in front of the contactlessreader then send aSELECT_BY_DF_name AID01

APDU application receives Status word90 00

9 Place the DUT in front of the Tag toread

Tag reading ok

10 Set the DUT in front of the contactlessreader then send aSELECT_BY_DF_name AID01

APDU application receives Status word90 00

3.5.3.5 RF Analog Protocol complianceTest Purpose

To ensure that a mobile device is compliant with NFCForum-TS-Analog [19] specificationsfor card and reader emulation modes.

Referenced requirement

TS26_NFC_REQ_025 TS26_NFC_REQ_033

Related Specs/Docs: NFC Forum-TS-Analog [19]Test Procedure

The DUT shall pass all the test cases referenced in Table B.9.2.1, Table B.9.2.2 and TableB.9.2.3.

3.5.3.6 VOID

3.5.3.7 RF Digital Protocol complianceTest Purpose

To ensure that a mobile device is compliant with NFCForum-TS-Digital Protocol [19] andNFCForum TS Activity [19] specifications for card and reader emulation modes.

Referenced requirement

TS26_NFC_REQ_025 TS26_NFC_REQ_033

Related Specs/Docs: NFC Forum-TS-Digital Protocol [19]; NFC Forum Activity [19]

Page 129: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 129 of 606

Test Procedure

The RF Digital Protocol compliance is tested by the test cases referenced in Annex B.9.3.

4 VOID

Page 130: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 130 of 606

5 Secure Element Access Control

5.1 General overviewThis chapter addresses the implementation of the Secure Element Access Controlmechanism according to the GlobalPlatform Secure Element Access Control [7] standard. Itwill grant or refuse the communication to/from applets stored in the UICC SE.

The list of conformance requirements tested within this section is listed in the table insection Error! Reference source not found..

Note: The current version of this test book covers usage of Access Rule Files in someselected aspects.

5.2 Conformance requirementsTS26_NFC_REQ_082 Open OS devices SHALL provide access control as per GlobalPlatform,

Secure Element Access Control specification for each available SE.

TS26_NFC_REQ_083 When no access control data (files or applets) is found on a SE the OSSHALL deny access to this SE.

TS26_NFC_REQ_084 The OS implementation SHALL support the use of the GlobalPlatformSecure Element Access Control enforcer to manage Transaction Eventsoriginating from a Secure Element and SHALL ensure that this event ismade available only to authorised OS applications.

TS26_NFC_REQ_122 Access Control Enforcer SHALL cache the rules from the Secure Element(ARF mechanism or ARA with GET DATA[ALL]).

TS26_NFC_REQ_122.2 When the Access Control Enforcer checks if the Access Rules have beenupdated, the cache SHALL only be refreshed if the “Refresh Tag” isupdated.

TS26_NFC_REQ_150.1 When several activities registered for the “EVT_TRANSACTION”, theframework SHALL follow the priority scheme described below:

1. “Android:priority” level defined in the Intent Filter SHALL becompared

2. First installed application package (APK) has a higher priority

Note: Only priority <0 are possible for non privileged application, as perAndroid AOSP code(https://android.googlesource.com/platform/frameworks/base/+/5585dd971e265cbb3a515bb759710646c5bc6f63)

TS26_NFC_REQ_152 The NFC stack SHALL therefore use internal “Access Control” API tocheck that the recipient activity has been signed with an authorisedcertificate. This check is performed at the time the event is being forwardedfrom the lower layers to the target application.

TS26_NFC_REQ_152.2 If no application is authorised as per “Access Control” check, then theevent SHALL be discarded by the framework.

Page 131: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 131 of 606

5.3 Test CasesFollowing initial conditions are applicable for all SE Access Control tests in this section,unless it is otherwise specified for a particular test case.

General Initial Conditions

Two instances of the UICC application APDU_TestApplication.cap with AID01 and AID02are selectable.

For that purpose, MobileApplication is registered for EVT_TRANSACTION handling fromAID01 and AID02 and implements the functions “Select AID01” and “Select AID02” as it isspecified in section 2.

The application is duplicated with different signature configurations as it is specified insection 2 and respectively named:

GSMA_AC_Mobile_App_SP1_signed GSMA_AC_Mobile_App_SP2_signed

For devices based on Android version prior to Android PGSMA_AC_Mobile_App_SP1_signed is installed first.

For devices based on AndroidP or following Android releases TS26_NFC_REQ_150and TS26_NFC_REQ_150.1 are not applicable. It results that the installation order is notconsidered by the device when mobile applications are triggered. The Test Tool shallnot check the triggering order.

Note1: Steps performed through the contactless interface (e.g. step 17 and 25 in TestSequence 1) ensure for each test that the application on the mobile is correctly triggeredby an NFC event.

Initial state: Power off RF field and no applications should be started manually on the DUT.APDU_TestApplication.cap is not selected on UICC.

5.3.1 GP SE Access ControlTest Purpose

To ensure the Open OS device provide API for Access Control as per Global PlatformSpecification GPD_SE_Access_Control for:

Secure Element Access APINFC Event

Referenced requirement

TS26_NFC_REQ_082 TS26_NFC_REQ_083 TS26_NFC_REQ_084 TS26_NFC_REQ_150.1 TS26_NFC_REQ_152 TS26_NFC_REQ_152.2

Page 132: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 132 of 606

5.3.1.1 Test Sequence No 1: Single app access to all AIDsInitial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF (Application Dedicated File) with a DODF (Data Object Directory File)present and valid

an ACMF (Access Control Main File) is present and valid an ACRF (Access Control Rules File) is present and valid and contains a rule for “all

other AIDs” (a rule for all Secure Element applications that are not explicitlyprotected by a specific rule) and a path for one ACCF containing SP1 hash condition

SP1 has full access to all AIDs

The reference PKCS#15 structure is in Annex E.

Note: Annex B.8 of this document lists the test cases from the GlobalPlatform - SEACDeviceSide Test Plan [27]. Test cases referenced as 5.4.29.16, 5.4.29.2 and 5.4.27.1provide test steps that are now similar to steps 1 to 8 of this test case. Redundancies will behandled in a later version of this Test Book.

Step Direction Sequence Expected Result

1 LaunchGSMA_AC_Mobile_App_SP1_signed

2 Call "Select AID01" function SELECT command is successful andcall to "Select AID01" function returnssuccessfully

3 Call "Select AID02" function SELECT command is successful andcall to "Select AID02" function returnssuccessfully

4 CloseGSMA_AC_Mobile_App_SP1_signed

5 LaunchGSMA_AC_Mobile_App_SP2_signed

6 Call "Select AID01" function Call is unsuccessful, returning anerror indicating that the accesscontrol rights are not granted

7 Call "Select AID02" function Call is unsuccessful, returning anerror indicating that the accesscontrol rights are not granted

8 CloseGSMA_AC_Mobile_App_SP2_signed

9 PCD Power on RF field

10 PCDDUT

Perform RF protocol initialisation

Page 133: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 133 of 606

Step Direction Sequence Expected Result

11 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU application receives StatusWord 90 00

12 PCD Power off RF field

13 DUTUICC

Send EVT_FIELD_OFF

14 The APDU_TestApplication.cap sendsEVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

GSMA_AC_Mobile_App_SP1_signed is launched

15 CloseGSMA_AC_Mobile_App_SP1_signed

16 repeat steps 9 to 15 with AID02 instead ofAID01

GSMA_AC_Mobile_App_SP1_signed is launched

5.3.1.2 Test Sequence No 2: All apps access to single AIDInitial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid an ACRF is present and valid and contains a specific target rule for AID01 and a

path for one ACCF. The ACCF is present and contains no hash condition (accessallowed for mobile apps)

AID01 is always accessible, no access allowed for any other AID

The reference PKCS#15 structure is in Annex E.

Note: Annex B.8 of this document lists the test cases from the GlobalPlatform - SEACDeviceSide Test Plan [27]. Test cases referenced as 5.4.29.10 provides test steps thatare similar to steps 1 to 8 of this test case. Redundancies will be handled in a laterversion of this Test Book.

Step Direction Sequence Expected Result

1 LaunchGSMA_AC_Mobile_App_SP1_signed

2 Call "Select AID01" function Call is successful

3 Call "Select AID02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

4 CloseGSMA_AC_Mobile_App_SP1_signed

Page 134: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 134 of 606

Step Direction Sequence Expected Result

5 LaunchGSMA_AC_Mobile_App_SP2_signed

6 Call "Select AID01" function Call is successful

7 Call "Select AID02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

8 CloseGSMA_AC_Mobile_App_SP2_signed

9 PCD Power on RF field

10 PCDDUT

Perform RF protocol initialisation

11 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives StatusWord 90 00

12 PCD Power off RF field

13 DUTUICC

Send EVT_FIELD_OFF

14 The APDU_TestApplication.cap sendsEVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

GSMA_AC_Mobile_App_SP1_signedis launched

15 CloseGSMA_AC_Mobile_App_SP1_signed

16 repeat steps 9 to 15 with AID02 insteadof AID01

No application is triggered

5.3.1.3 Test Sequence No 3: All apps access to all AIDsInitial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid an ACRF is present and valid and contains a rule for all other AIDs and a path for

one ACCF. The ACCF is present and contains no hash condition (access allowed formobile apps)

all applications have full access to all AIDs

The reference PKCS#15 structure is in Annex E.

Note: Annex B.8 of this document lists the test cases from the GlobalPlatform - SEACDeviceSide Test Plan [27]. Test cases referenced as 5.4.29.22 provides test steps that aresimilar to steps 1 to 8 of this test case. Redundancies will be handled in a later version ofthis Test Book.

Page 135: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 135 of 606

Step Direction Sequence Expected Result

1 LaunchGSMA_AC_Mobile_App_SP1_signed

2 Call "Select AID01" function Call is successful

3 Call "Select AID02" function Call is successful

4 CloseGSMA_AC_Mobile_App_SP1_signed

5 LaunchGSMA_AC_Mobile_App_SP2_signed

6 Call "Select AID01" function Call is successful

7 Call "Select AID02" function Call is successful

8 CloseGSMA_AC_Mobile_App_SP2_signed

9 PCD Power on RF field

10 PCDDUT

Perform RF protocol initialisation

11 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

12 PCD Power off RF field

13 DUTUICC

Send EVT_FIELD_OFF

14 The APDU_TestApplication.capsends EVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

GSMA_AC_Mobile_App_SP1_signed islaunched

15 CloseGSMA_AC_Mobile_App_SP1_signed

16 repeat steps 9 to 15 with AID02instead of AID01

GSMA_AC_Mobile_App_SP1_signed islaunched

5.3.1.4 Test Sequence No 4: Single app access to single AIDInitial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid an ACRF is present and valid and contains a specific target rule for AID01 and a

path for one ACCF containing SP1 hash condition

only access to AID01 by SP1 is allowed

Page 136: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 136 of 606

The reference PKCS#15 structure is in Annex E.

Note: Annex B.8 of this document lists the test cases from the GlobalPlatform - SEACDeviceSide Test Plan [27]. Test cases referenced as 5.4.29.2 and 5.4.27.1 provide teststeps that are similar to steps 1 to 8 of this test case. Redundancies will be handled in alater version of this Test Book.

Step Direction Sequence Expected Result

1 LaunchGSMA_AC_Mobile_App_SP1_signed

2 Call "Select AID01" function Call is successful

3 Call "Select AID02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

4 CloseGSMA_AC_Mobile_App_SP1_signed

5 LaunchGSMA_AC_Mobile_App_SP2_signed

6 Call "Select AID01" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

7 Call "Select AID02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

8 CloseGSMA_AC_Mobile_App_SP2_signed

9 PCD Power on RF field

10 PCDDUT

Perform RF protocol initialisation

11 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

12 PCD Power off RF field

13 DUTUICC

Send EVT_FIELD_OFF

14 The APDU_TestApplication.capsends EVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

GSMA_AC_Mobile_App_SP1_signed islaunched

15 CloseGSMA_AC_Mobile_App_SP1_signed

16 repeat steps 9 to 15 with AID02instead of AID01

No application is triggered

Page 137: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 137 of 606

5.3.1.5 Test Sequence No 5: Multiple apps access to single AID, single ACCF,installation order

Initial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid an ACRF is present and valid and contains

one specific target rule for AID01 and a path for one ACCF containing SP1 hashcondition

one specific target rule for AID01 and a path for one ACCF containing SP2 hashcondition

only access to AID01 by SP1 and SP2 is allowed

The reference PKCS#15 structure is in Annex E.

Note: Annex B.8 of this document lists the test cases from the GlobalPlatform - SEACDeviceSide Test Plan [27]. Test cases referenced as 5.4.29.8 and 5.4.27.1 provide teststeps that are similar to steps 1 to 8 of this test case. Redundancies will be handled in alater version of this Test Book.

Step Direction Sequence Expected Result

1 LaunchGSMA_AC_Mobile_App_SP1_signed

2 Call "Select AID01" function Call is successful

3 Call "Select AID02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

4 CloseGSMA_AC_Mobile_App_SP1_signed

5 LaunchGSMA_AC_Mobile_App_SP2_signed

6 Call "Select AID01" function Call is successful

7 Call "Select AID02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

8 CloseGSMA_AC_Mobile_App_SP2_signed

9 PCD Power on RF field

10 PCDDUT

Perform RF protocol initialisation

Page 138: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 138 of 606

Step Direction Sequence Expected Result

11 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

12 PCD Power off RF field

13 DUTUICC

Send EVT_FIELD_OFF

14 The APDU_TestApplication.capsends EVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

GSMA_AC_Mobile_App_SP1_signed islaunched (first installed application)

15 CloseGSMA_AC_Mobile_App_SP1_signed

16 repeat steps 9 to 15 with AID02instead of AID01

No application is triggered

5.3.1.6 Test Sequence No 6: Multiple apps access to single AID, separate ACCFs,installation order

Initial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid an ACRF is present and valid and contains a specific target rule for AID01 and a

path for one ACCF containing SP1 hash condition and SP2 hash condition.

SP1 and SP2 can access AID01 only

The reference PKCS#15 structure is in Annex E.

Note: Annex B.8 of this document lists the test cases from the GlobalPlatform - SEACDeviceSide Test Plan [27]. Test cases referenced as 5.4.31.3 provides test steps that aresimilar to steps 1 to 8 of this test case. Redundancies will be handled in a later version ofthis Test Book.

Step Direction Sequence Expected Result

1 LaunchGSMA_AC_Mobile_App_SP1_signed

2 Call "Select AID01" function Call is successful

3 Call "Select AID02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

4 CloseGSMA_AC_Mobile_App_SP1_signed

Page 139: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 139 of 606

Step Direction Sequence Expected Result

5 LaunchGSMA_AC_Mobile_App_SP2_signed

6 Call "Select AID01" function Call is successful

7 Call "Select AID02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

8 CloseGSMA_AC_Mobile_App_SP2_signed

9 PCD Power on RF field

10 PCDDUT

Perform RF protocol initialisation

11 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

12 PCD Power off RF field

13 DUTUICC

Send EVT_FIELD_OFF

14 The APDU_TestApplication.capsends EVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

GSMA_AC_Mobile_App_SP1_signed islaunched (first installed application)

15 CloseGSMA_AC_Mobile_App_SP1_signed

16 Repeat steps 9 to 15 with AID02instead of AID01

No application is triggered

5.3.1.7 Test Sequence No 7: Multiple apps access to all AIDs, installation orderInitial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid an ACRF is present and valid and contains

one rule “8200” and a path for one ACCF containing SP1 hash condition one rule “8200” and a path for one ACCF containing SP2 hash condition

SP1 and SP2 have full access to all AIDs

The reference PKCS#15 structure is in Annex E.

Note: Annex B.8 of this document lists the test cases from the GlobalPlatform - SEACDeviceSide Test Plan [27]. Test cases referenced as 5.4.29.10 provides test steps that are

Page 140: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 140 of 606

similar to steps 1 to 8 of this test case. Redundancies will be handled in the next version ofthis Test Book.

Step Direction Sequence Expected Result

1 LaunchGSMA_AC_Mobile_App_SP1_signed

2 Call "Select AID01" function Call is successful

3 Call "Select AID02" function Call is successful

4 CloseGSMA_AC_Mobile_App_SP1_signed

5 LaunchGSMA_AC_Mobile_App_SP2_signed

6 Call "Select AID01" function Call is successful

7 Call "Select AID02" function Call is successful

8 CloseGSMA_AC_Mobile_App_SP2_signed

9 PCD Power on RF field

10 PCDDUT

Perform RF protocol initialisation

11 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

12 PCD Power off RF field

13 DUTUICC

Send EVT_FIELD_OFF

14 The APDU_TestApplication.capsends EVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

GSMA_AC_Mobile_App_SP1_signed islaunched (first installed application)

15 CloseGSMA_AC_Mobile_App_SP1_signed

16 Repeat steps 9 to 15 with AID02instead of AID01

GSMA_AC_Mobile_App_SP1_signed islaunched

5.3.1.8 Test Sequence No 8: Single app access to multiple AIDsInitial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid an ACRF is present and valid and contains

Page 141: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 141 of 606

one specific target rule for AID01 and a path for one ACCF containing SP1 hashcondition

one specific target rule for AID02 and a path for the same ACCF

SP1 has access to AID01 and AID02

The reference PKCS#15 structure is in Annex E.

Step Direction Sequence Expected Result

1 LaunchGSMA_AC_Mobile_App_SP1_signed

2 Call "Select AID01" function Call is successful

3 Call "Select AID02" function Call is successful

4 CloseGSMA_AC_Mobile_App_SP1_signed

5 LaunchGSMA_AC_Mobile_App_SP2_signed

6 Call "Select AID01" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

7 Call "Select AID02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

8 CloseGSMA_AC_Mobile_App_SP2_signed

9 PCD Power on RF field

10 PCDDUT

Perform RF protocol initialisation

11 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

12 PCD Power off RF field

13 DUTUICC

Send EVT_FIELD_OFF

14 The APDU_TestApplication.capsends EVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

GSMA_AC_Mobile_App_SP1_signed islaunched

15 CloseGSMA_AC_Mobile_App_SP1_signed

16 Repeat steps 9 to 15 with AID02instead of AID01

GSMA_AC_Mobile_App_SP1_signed islaunched

Page 142: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 142 of 606

5.3.1.9 Test Sequence No 9: Single app access to single AID, further empty ACCFrule

Initial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid an ACRF is present and valid and contains

one specific target rule for AID01 and a path for one ACCF containing SP1 hashcondition

one specific target rule for AID01 and a path for one ACCF. The ACCF containsno hash condition (access allowed for mobile apps)

only access to AID01 by SP1 is allowed

The reference PKCS#15 structure is in Annex E.

Note: Annex B.8 of this document lists the test cases from the GlobalPlatform - SEACDeviceSide Test Plan [27]. Test cases referenced as 5.4.32.2 provides test steps that aresimilar to steps 1 to 8 of this test case. Redundancies will be handled in the next version ofthis Test Book.

Step Direction Sequence Expected Result

1 LaunchGSMA_AC_Mobile_App_SP1_signed

2 Call "Select AID01" function Call is successful

3 Call "Select AID02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

4 CloseGSMA_AC_Mobile_App_SP1_signed

5 LaunchGSMA_AC_Mobile_App_SP2_signed

6 Call "Select AID01" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

7 Call "Select AID02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

8 CloseGSMA_AC_Mobile_App_SP2_signed

9 PCD Power on RF field

Page 143: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 143 of 606

Step Direction Sequence Expected Result

10 PCDDUT

Perform RF protocol initialisation

11 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

12 PCD Power off RF field

13 DUTUICC

Send EVT_FIELD_OFF

14 The APDU_TestApplication.capsends EVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

GSMA_AC_Mobile_App_SP1_signed islaunched

15 CloseGSMA_AC_Mobile_App_SP1_signed

16 Repeat steps 9 to 15 with AID02instead of AID01

No application is triggered

5.3.2 GP SE Access Control - Refresh tagTest Purpose

To ensure the DUT does not read all the Access Control rules when the refresh tag is notset.

Referenced requirement

TS26_NFC_REQ_082 TS26_NFC_REQ_083 TS26_NFC_REQ_122 TS26_NFC_REQ_122.2

Initial Conditions

An instance of the UICC application APDU_TestApplication.cap with AID01 isselectable.

MobileApplication is installed on the DUT and implements a function “SelectAID01”.

The application is signed with test certificate SP1(GSMA_Mobile_App_SP1_signed).

5.3.2.1 Test Sequence No 1: Refresh tag not updated, refresh tag updatedInitial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid

Page 144: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 144 of 606

an ACRF is present and valid and contains a specific target rule for AID01 and apath for one ACCF containing an empty hash condition

only access to AID01 is allowed

The reference PKCS#15 structure is in Annex E.

Step Direction Sequence Expected Result

1 Using the MobileApplication, selectAID01

Call is successful

2 Start the ISO7816 spy

3 Using the MobileApplication, selectAID01

Call is successful

4 Stop the spy. The log can be used to verify whether theDUT checks the "refresh tag". If afterreading the PKCS#15 structure, a logicalchannel has been opened then check theDUT closes the logical channel at the endof the reading. The whole content of thePKCS#15 is not read.

5 Change the UICC configuration withthe following:PKCS#15 ADF with a DODF present

and validan ACMF is present and validan ACRF is present and valid and

contains a specific target rule forAID01 and a path for one ACCFcontaining an entry with acorrupted certificate (wrong length)

The reference PKCS#15 structure is inAnnex E.

6 Start the ISO7816 spy

7 Using the MobileApplication, selectAID01

Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

8 Stop the spy.

5.3.2.2 Test Sequence No 2: Device rebootedInitial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid

Page 145: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 145 of 606

an ACRF is present and valid and contains a specific target rule for AID01 and apath for one ACCF containing an empty hash condition

only access to AID01 is allowed

The reference PKCS#15 structure is in Annex E.

Step Direction Sequence Expected Result

1 Using the MobileApplication, selectAID01

Call is successful

2 Power off the DUT

3 Start the ISO7816 spy

4 Power on the DUT

5 Using the MobileApplication, selectAID01

Call is successful

6 Stop the spy. The log can be used to verify whether theDUT read the whole content during thefirst access to the PKCS#15 content.

5.3.3 GP SE Access Control – ADF_PKCS#15 and DF PKCS#15Test Purpose

To ensure the DUT correctly manages card configuration with a PKCS#15 ADF selectableand another DF PKCS#15 available in EF_DIR

Referenced requirement

TS26_NFC_REQ_082

Initial Conditions

Only the following versions of the MobileApplication are used for these tests:

GSMA_AC_Mobile_App_SP1_signed GSMA_AC_Mobile_App_SP2_signed

5.3.3.1 Test Sequence No 1Initial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid an ACRF is present and valid and contains a specific target rule for AID01 and a

path for one ACCF containing a SP1 hash condition

Page 146: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 146 of 606

EF_DIR contains a reference to PKCS#15 DF structure containing a specifictarget rule for AID02 and a path for one ACCF containing a SP2 hash condition

only access to AID01 by SP1 is allowed

The reference PKCS#15 structure is in Annex E.

Step Direction Sequence Expected Result

1 LaunchGSMA_AC_Mobile_App_SP1_signed

2 Call "Select AID01" function Call is successful

3 Call "Select AID02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

4 CloseGSMA_AC_Mobile_App_SP1_signed

5 LaunchGSMA_AC_Mobile_App_SP2_signed

6 Call "Select AID01" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

7 Call "Select AID02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

8 CloseGSMA_AC_Mobile_App_SP2_signed

9 PCD Power on RF field

10 PCDDUT

Perform RF protocol initialisation

11 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

12 PCD Power off RF field

13 DUTUICC

Send EVT_FIELD_OFF

14 The APDU_TestApplication.capsends EVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

GSMA_AC_Mobile_App_SP1_signed islaunched

15 CloseGSMA_AC_Mobile_App_SP1_signed

16 repeat steps 9 to 15 with AID02instead of AID01

No application is triggered

Page 147: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 147 of 606

5.3.4 GP SE Access Control – PKCS#15 selection via EF_DIRTest Purpose

To ensure the DUT correctly manages card configuration without PKCS#15 AID. Accordingto GP specification, if the selection of the PKCS#15 AID fails, the DUT selects the EF_DIRto locate a PKCS#15 DF

Referenced requirement

TS26_NFC_REQ_082

Initial Conditions

Only the following versions of the MobileApplication are used for these tests:

GSMA_AC_Mobile_App_SP1_signed GSMA_AC_Mobile_App_SP2_signed

5.3.4.1 Test Sequence No 1Initial Conditions for test #1

The following configuration is loaded into the UICC:

ADF PKCS#15 is absent EF_DIR contains a reference to PKCS#15 DF structure containing a specific target

rule for AID01 and a path for one ACCF containing a SP1 hash condition

only access to AID01 by SP1 is allowed

The reference PKCS#15 structure is in Annex E.

Step Direction Sequence Expected Result

1 LaunchGSMA_AC_Mobile_App_SP1_signed

2 Call "Select AID01" function Call is successful

3 Call "Select AID02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

4 CloseGSMA_AC_Mobile_App_SP1_signed

5 LaunchGSMA_AC_Mobile_App_SP2_signed

6 Call "Select AID01" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

7 Call "Select AID02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

Page 148: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 148 of 606

Step Direction Sequence Expected Result

8 CloseGSMA_AC_Mobile_App_SP2_signed

9 PCD Power on RF field

10 PCDDUT

Perform RF protocol initialisation

11 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

12 PCD Power off RF field

13 DUTUICC

Send EVT_FIELD_OFF

14 The APDU_TestApplication.capsends EVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

GSMA_AC_Mobile_App_SP1_signed islaunched

15 CloseGSMA_AC_Mobile_App_SP1_signed

16 repeat steps 9 to 15 with AID02instead of AID01

No application is triggered

5.3.5 GP SE Access Control – Configuration limitsTest Purpose

To ensure the DUT correctly manages card configuration with large contents.

Referenced requirement

TS26_NFC_REQ_082

Initial Conditions

Only the following versions of the MobileApplication are used for these tests:

GSMA_AC_Mobile_App_SP1_signed GSMA_AC_Mobile_App_SP2_signed

5.3.5.1 Test Sequence No 1: Many hash conditionsInitial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid an ACRF is present and valid and contains

one specific target rule for AID01 and a path for one ACCF containing 10 dummyhash conditions and a SP1 hash condition

Page 149: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 149 of 606

one specific target rule for AID02 and a path for one ACCF containing 10 dummyhash conditions and a SP2 hash condition

access to AID01 by SP1 is allowed – access to AID02 by SP2 is allowed

The reference PKCS#15 structure is in Annex E.

Note: Annex B.8 of this document lists the test cases from the GlobalPlatform - SEACDeviceSide Test Plan [27]. Test cases referenced as 5.4.31.1 provide test steps that aresimilar to steps 1 to 8 of this test case. For a sake of clarity, redundancies will be handled inthe next version of this Test Book.

Step Direction Sequence Expected Result

1 LaunchGSMA_AC_Mobile_App_SP1_signed

2 Call "Select AID01" function Call is successful

3 Call "Select AID02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

4 CloseGSMA_AC_Mobile_App_SP1_signed

5 LaunchGSMA_AC_Mobile_App_SP2_signed

6 Call "Select AID01" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

7 Call "Select AID02" function Call is successful

8 CloseGSMA_AC_Mobile_App_SP2_signed

9 PCD Power on RF field

10 PCDDUT

Perform RF protocol initialisation

11 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

12 PCD Power off RF field

13 DUTUICC

Send EVT_FIELD_OFF

14 The APDU_TestApplication.capsends EVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

GSMA_AC_Mobile_App_SP1_signed islaunched

15 CloseGSMA_AC_Mobile_App_SP1_signed

Page 150: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 150 of 606

Step Direction Sequence Expected Result

16 Repeat steps 9 to 15 with AID02instead of AID01

GSMA_AC_Mobile_App_SP2_signed islaunched

5.3.5.2 Test Sequence No 2: Many rulesInitial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid an ACRF is present and valid and contains one specific target rule for AID01 and a path for one ACCF containing 1 dummy hash

condition and a SP1 hash condition one specific target rule for AID02 and a path for one ACCF containing 1 dummy hash

condition and a SP2 hash condition 48 rules “A0XX04XX[dummy AIDs]” and a path for one ACCF containing 2 dummy

hash conditions

o access to AID01 by SP1 is allowed – access to AID02 by SP2 is allowed

The reference PKCS#15 structure is in Annex E.

Note: Annex B.8 of this document lists the test cases from the GlobalPlatform – SEACDeviceSide Test Plan [27]. Test cases referenced as 5.4.31.2 provide test steps that aresimilar to steps 1 to 8 of this test case. For a sake of clarity, redundancies will be handled inthe next version of this Test Book.

Step Direction Sequence Expected Result

1 LaunchGSMA_AC_Mobile_App_SP1_signed

2 Call "Select AID01" function Call is successful

3 Call "Select AID02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

4 CloseGSMA_AC_Mobile_App_SP1_signed

5 LaunchGSMA_AC_Mobile_App_SP2_signed

6 Call "Select AID01" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

7 Call "Select AID02" function Call is successful

Page 151: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 151 of 606

Step Direction Sequence Expected Result

8 CloseGSMA_AC_Mobile_App_SP2_signed

9 PCD Power on RF field

10 PCDDUT

Perform RF protocol initialisation

11 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

12 PCD Power off RF field

13 DUTUICC

Send EVT_FIELD_OFF

14 The APDU_TestApplication.capsends EVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

GSMA_AC_Mobile_App_SP1_signed islaunched

15 CloseGSMA_AC_Mobile_App_SP1_signed

16 Repeat steps 9 to 15 with AID02instead of AID01

GSMA_AC_Mobile_App_SP2_signed islaunched

5.3.6 GP SE Access Control – No accessTest Purpose

To ensure the DUT denies the access to

Secure Element Access API NFC Event when no PKCS#15 structure is available

Referenced requirement

TS26_NFC_REQ_083

Initial Conditions

An instance of the UICC application APDU_TestApplication.cap with AID01 is selectable.

For that purpose, MobileApplication is registered for EVT_TRANSACTION handling fromAID01 and implements a function “Select AID01”.

The application is signed with test certificate SP1 (GSMA_AC_Mobile_App_SP1_signed).

5.3.6.1 Test Sequence No 1: PKCS#15 ADF absentInitial Conditions

The following configuration is loaded into the UICC:

Page 152: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 152 of 606

ADF PKCS#15 is absent EF_DIR does not contain references to PKCS#15 structure

Note: Annex B.8 of this document lists the test cases from the GlobalPlatform - SEACDeviceSide Test Plan [27]. Test cases referenced as 5.4.1.2 provide test steps that aresimilar to steps 1 to 8 of this test case. For a sake of clarity, redundancies will be handled inthe next version of this Test Book.

Step Direction Sequence Expected Result

1 LaunchGSMA_AC_Mobile_App_SP1_signed

2 Call "Select AID01" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

3 CloseGSMA_AC_Mobile_App_SP1_signed

4 PCD Power on RF field

5 PCDDUT

Perform RF protocol initialisation

6 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

7 PCD Power off RF field

8 DUTUICC

Send EVT_FIELD_OFF

9 The APDU_TestApplication.capsends EVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

No application is triggered

5.3.6.2 Test Sequence No 2: ACRF absentInitial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid ACRF is absent

The reference PKCS#15 structure is in Annex E.

Note: Annex B.8 of this document lists the test cases from the GlobalPlatform - SEACDeviceSide Test Plan [27]. Test cases referenced as 5.4.1.9 provide test steps that are

Page 153: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 153 of 606

similar to steps 1 to 8 of this test case. For a sake of clarity, redundancies will be handled inthe next version of this Test Book.

Step Direction Sequence Expected Result

1 LaunchGSMA_AC_Mobile_App_SP1_signed

2 Call "Select AID01" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

3 CloseGSMA_AC_Mobile_App_SP1_signed

4 PCD Power on RF field

5 PCDDUT

Perform RF protocol initialisation

6 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

7 PCD Power off RF field

8 DUTUICC

Send EVT_FIELD_OFF

9 The APDU_TestApplication.capsends EVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

No application is triggered

5.3.6.3 Test Sequence No 3: ACRF emptyInitial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid ACRF is present but without any rule entry

The reference PKCS#15 structure is in Annex E.

Note: Annex B.8 of this document lists the test cases from the GlobalPlatform - SEACDeviceSide Test Plan [27]. Test cases referenced as 5.4.1.14 provide test steps that aresimilar to steps 1 to 8 of this test case. For a sake of clarity, redundancies will be handled inthe next version of this Test Book.

Step Direction Sequence Expected Result

Page 154: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 154 of 606

Step Direction Sequence Expected Result

1 LaunchGSMA_AC_Mobile_App_SP1_signed

2 Call "Select AID01" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

3 CloseGSMA_AC_Mobile_App_SP1_signed

4 PCD Power on RF field

5 PCDDUT

Perform RF protocol initialisation

6 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

7 PCD Power off RF field

8 DUTUICC

Send EVT_FIELD_OFF

9 The APDU_TestApplication.capsends EVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

No application is triggered

5.3.6.4 Test Sequence No 4: Corrupted certificate, wrong lengthInitial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid an ACRF is present and valid and contains a specific target rule for AID01 and a

path for one ACCF containing an entry with a corrupted certificate (wrong length)

The reference PKCS#15 structure is in Annex E.

Note: Annex B.8 of this document lists the test cases from the GlobalPlatform - SEACDeviceSide Test Plan [27]. Test cases referenced as 5.4.1.16 provide test steps that aresimilar to steps 1 to 8 of this test case. For a sake of clarity, redundancies will be handled inthe next version of this Test Book.

Step Direction Sequence Expected Result

1 LaunchGSMA_AC_Mobile_App_SP1_signed

Page 155: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 155 of 606

Step Direction Sequence Expected Result

2 Call "Select AID01" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

3 CloseGSMA_AC_Mobile_App_SP1_signed

4 PCD Power on RF field

5 PCDDUT

Perform RF protocol initialisation

6 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

7 PCD Power off RF field

8 DUTUICC

Send EVT_FIELD_OFF

9 The APDU_TestApplication.capsends EVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

No application is triggered

5.3.6.5 Test Sequence No 5: Corrupted certificate, invalid contentInitial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid an ACRF is present and valid and contains a specific target rule for AID01 and a

path for one ACCF containing an entry with a corrupted certificate (original ACCFpadded with two 0x00 bytes)

The reference PKCS#15 structure is in Annex E.

Step Direction Sequence Expected Result

1 LaunchGSMA_AC_Mobile_App_SP1_signed

2 Call "Select AID01" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

3 CloseGSMA_AC_Mobile_App_SP1_signed

4 PCD Power on RF field

Page 156: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 156 of 606

Step Direction Sequence Expected Result

5 PCDDUT

Perform RF protocol initialisation

6 PCDDUT

Start APDU application by sending aSELECT command with AID01

APDU Application receives Status Word90 00

7 PCD Power off RF field

8 DUTUICC

Send EVT_FIELD_OFF

9 The APDU_TestApplication.capsends EVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

No application is triggered

5.4 GP SE Access Control – GP Test PlanTest Purpose

To ensure the device provide API for Access Control as per Global Platform SpecificationGPD_SE_Access_Control

Referenced requirement

TS26_NFC_REQ_082 TS26_NFC_REQ_083

Related Specs/Docs: GlobalPlatform - SEAC DeviceSide Test Plan [27]

The DUT shall pass the Test Cases with ID REQ from GlobalPlatform - SEAC DeviceSideTest Plan [27], the set of applicable test cases is referenced in Table Error! Referencesource not found..

Page 157: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 157 of 606

6 Secure Element Access API

6.1 General overviewThis chapter addresses the implementation of the Mobile Device APIs according to theSIMalliance Open Mobile API specification or equivalent. The objective is to verify mobileapplications can access different Secure Elements in a mobile device such as SIMs andeSEs.

The list of conformance requirements tested within this section is listed in the table insection Error! Reference source not found..

6.2 Conformance requirementsTS26_NFC_REQ_045.1 Modem SHALL support all lengths of AID from 5 bytes to 16 bytes as

defined in ISO/IEC 7816-4.

TS26_NFC_REQ_047 OS implementations SHALL provide an API for communicating with allNFC SE inside the device (UICC, eUICC, eSE).

TS26_NFC_REQ_047.1 Communication with SEs SHALL be done through the logical channels.

TS26_NFC_REQ_047.2 Communication with the Active UICC Profile SHALL prevent access tobasic channel (channel 0).

TS26_NFC_REQ_047.3 The API SHALL implement the SIMalliance Open Mobile API transportlayer or provide an equivalent set of features.Note: SIMalliance OMAPI specification does not define values forEventTypes. This is a known issue and is expected to be addressed in afuture version of the SIMalliance OMAPI specification.For implementations based on the current version of TS.26, thefollowing values SHALL be used for EventTypes:

Reader:IOErrorEventType = (int) 0x1001Reader:SEInsertedEventType = (int) 0x2001Reader:SERemovalEventType = (int) 0x2002

It is anticipated that a future version of the SIMalliance OMAPIspecification will use the same values as specified above.

TS26_NFC_REQ_070 For embedded SE, Secure Element Name SHALL be eSE[number] (e.g.eSE/eSE1, eSE2, etc.).

TS26_NFC_REQ_114 For all APDU exchanges originating from the Secure Element AccessAPI the Modem driver SHALL forward warning status codes (SW=62XXor 63XX) directly to the application level without any change.

TS26_NFC_REQ_155 For all APDU exchanges originating from the Secure Element AccessAPI the Modem driver SHALL allow the mobile application to perform aGET RESPONSE after any warning status code (SW=62XX or 63XX) issent back by the UICC.

TS26_NFC_REQ_186 This requirement is applicable from Android P onwards.The device SHALL implement GlobalPlatform Open Mobile API usingthe “android.se.omapi” namespace.

Note: this requirement fulfils the generic requirements

Page 158: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 158 of 606

TS26_NFC_REQ_047, TS26_NFC_REQ_047.1,TS26_NFC_REQ_047.2 TS26_NFC_REQ_047.3 andTS26_NFC_REQ_183.

6.3 Test Cases

6.3.1 SIMalliance APIsTest Purpose

To ensure the DUT follows the SIMalliance specification for the Transport API part of theOpen Mobile API.

Referenced requirement

TS26_NFC_REQ_045.1 TS26_NFC_REQ_047 TS26_NFC_REQ_047.1 TS26_NFC_REQ_047.3 TS26_NFC_REQ_069 TS26_NFC_REQ_114 TS26_NFC_REQ_155 TS26_NFC_REQ_186

Related Specs/Docs: SIMalliance - Open Mobile API specification [6]

The DUT shall pass the test cases referenced in Table Error! Reference source notfound..2.

6.3.2 Prevent access to basic channel.Test Purpose

APDU APIs SHALL prevent access to basic channel (channel 0).

Referenced requirement

TS26_NFC_REQ_047.2

Method of Test

For devices supporting the Open Mobile API, the DUT shall pass the Test Case ID7 inClause 6.4.6 from Open Mobile API test specification, the full set of applicable test cases isreferenced in Table Error! Reference source not found..2.

Page 159: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 159 of 606

6.3.3 VOID

6.3.4 VOID

6.3.5 VOID

6.3.6 SIMalliance “getVersion” APITest PurposeEnsure DUT implements correctly the method used to retrieve the version of theSIMalliance Open Mobile APIs available in the device

TS26_NFC_REQ_047 TS26_NFC_REQ_047.3

Related Specs/Docs: SIMalliance - Open Mobile API specification [6]

6.3.6.1 Test Sequence No 1

Initial Conditions An instance of the “seService” class has been retrieved successfully by the

application and is not null

Step Direction Sequence Expected Result

1 AppDUT

From the “seService” instance call“getVersion” method

No exception thrown by the systemIF DUT supports O_TS26_VERSION_10:The version number returned is 3.2, orlater

6.3.7 SIMalliance APIs for eSETest Purpose

To ensure the DUT follows the SIMalliance specification for the Transport API part of theOpen Mobile API for eSE.

Referenced requirement

TS26_NFC_REQ_047 TS26_NFC_REQ_047.1 TS26_NFC_REQ_070 TS26_NFC_REQ_186

Related Specs/Docs: SIMalliance - Open Mobile API specification [6]

The DUT shall pass the following test cases referenced in Table Error! Reference sourcenot found..2.:

6.3.1.6.3.1eSE 6.3.1.6.3.3eSE

Page 160: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 160 of 606

6.3.1.6.4.7eSE 6.3.1.6.5.6eSE 6.3.1.6.5.7eSE

The column “ISO Command Expectation” is out of the scope, because the test tool has nodirect physical access to the eSE and it is not possible to verify the APDU communicationwith the eSE.

Page 161: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 161 of 606

7 Multiple Card Emulation Environment

7.1 General overviewThis chapter addresses the requirements for Multiple Card Emulation Environment supportwhen the device has the capacity to handle further Secure Elements to the UICC.

The list of conformance requirements tested within this section is listed in the table insection Error! Reference source not found..

7.2 Conformance requirementsTS26_NFC_REQ_065 The device SHALL provide a routing mechanism using the following

priority: AID, then default AID route, then RF protocol and then RFtechnology.

TS26_NFC_REQ_068 The device SHALL provide a mechanism to handle AID Conflict.

TS26_NFC_REQ_068.02 When managing AIDconflict resolution, the device SHALL follow theend-user preferences.Note: In case of a Basic Device, end-user preference may have beenset via a paired device or from a connected PC. The way this isachieved is out of scope of this document.

TS26_NFC_REQ_117 In Multiple Active CEE model, the UICC SHALL be one of the activeCEEs if the inserted UICC supports SWP.

TS26_NFC_REQ_118.1 At first power up or factory reset the device SHALL set the route forNFCA and NFCB technologies (as defined in NFC Forum specification)to the UICC.

TS26_NFC_REQ_118.2 At first power up or factory reset the device SHALL set the route forISO_DEP protocol (as defined in NFC Forum specification) to the UICC.

TS26_NFC_REQ_162 When a NFC Reader explicitly selects a NFC Service by its AID but theAID is not defined in the NFC Controller’s routing table, the NFCController SHALL route the transaction to the Card EmulationEnvironment identified as Default AID route.

TS26_NFC_REQ_162.1 The default AID route SHALL be independent of any other routesconfigured in the NFC controller (such as those for RF Protocol (forexample: ISO_DEP, T1t, T2t, T3t) or RF Technology (for example:NFC A, NFC B, NFC F))

TS26_NFC_REQ_167 The NFC controller SHALL support at least 16 AIDs of 16 bytes in therouting table.Note: 16 AIDs is the minimum expected and in the future therequirement might be updated.

TS26_NFC_REQ_177 In other cases, the RF parameters profile “Profile 1” as defined inchapter 3.1.2.2 of GSMA SGP.12 SHALL apply

Page 162: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 162 of 606

7.3 Test Cases

7.3.1 VOID

7.3.2 VOID

7.3.3 VOID

7.3.4 VOID

7.3.5 VOID

7.3.6 VOID

7.3.7 Multiple CE EnvironmentsTest Purpose

Check the UICC is an active Card Emulation Environment in Multiple Card EmulationEnvironments models.

Referenced requirement

TS26_NFC_REQ_068 TS26_NFC_REQ_068.1 TS26_NFC_REQ_117 TS26_NFC_REQ_162

Initial Conditions

The DUT is powered on HCI initialization has been performed successfully NFC is enabled in the DUT No applications should be started manually on the DUT ReferenceApplication.cap for managing the reference transaction with AID_REF is

installed and selectable on the UICC APDU Application to send APDUs according to the reference transaction. No off_host_apdu_service and/or host_apdu_service shall be registered with

AID_REF in the CLF routing table.

7.3.7.1 Test Sequence No 1: Default route UICC, contactless session withunregistered AID

Initial Conditions

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

In the NFC Controller the default AID route is set to UICC (see section 2.6.1) The AID_REF is not registered.

Step Direction Sequence Expected Result

Page 163: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 163 of 606

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

2 PCD Power on RF field

3 PCDDUT

Perform RF protocol initialisation

4 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully with UICC as CEE.

7.3.7.2 Test Sequence No 2: Default route HCE, contactless session withunregistered AID

Initial Conditions

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

In the NFC Controller the default AID route is set to HCE (see section 2.6.1) The AID_REF is not registered.

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

2 PCD Power on RF field

3 PCDDUT

Perform RF protocol initialisation

4 PCDDUTDUT UICC

Execute the reference transaction The DUT returns SW indicating errorcode on the select AID command.No APDU shall be forwarded to the UICC.

7.3.7.3 Test Sequence No 3: Default route UICC, off-host AIDInitial Conditions

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

App01: an android application which registers in its Manifest anoff_host_apdu_service for AID_REF and specifies the category as “other”.

Step Direction Sequence Expected Result

Page 164: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 164 of 606

Step Direction Sequence Expected Result

1 UserDUT

Install App01 The application is installed successfully

2 UserDUT

In the NFC Controller set the defaultAID route to UICC (see section 2.6.1)..

3 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

4 PCD Power on RF field

5 PCDDUT

Perform RF protocol initialisation

6 PCDDUTDUT UICC

Execute the reference transactionFor AID_REF

Reference transaction is performedsuccessfully with UICC as CEE.

7.3.7.4 Test Sequence No 4: Default route HCE, off-host AIDInitial Conditions

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

App01: an android application which registers in its Manifest anoff_host_apdu_service for AID_REF and specifies the category as “other”.

Step Direction Sequence Expected Result

1 UserDUT

Install App01 The application is installed successfully

2 UserDUT

In the NFC Controller set the defaultAID route to HCE. (see section 2.6.1)

3 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

4 PCD Power on RF field

5 PCDDUT

Perform RF protocol initialisation

6 PCDDUTDUT UICC

Execute the reference transaction forAID_REF.

Reference transaction is performedsuccessfully with UICC as CEE.

Page 165: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 165 of 606

7.3.7.5 Test Sequence No 5: Default route UICC, AID conflict, off-host serviceselected

Initial Conditions

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

App01: an android application which registers in its Manifest anoff_host_apdu_service for AID_REF and specifies the category as “other”.

App02: an android application which registers in its Manifest a host_apdu_service(HCE) for AID_REF and specifies the category as “other”. This App manages thereference transaction.

Step Direction Sequence Expected Result

1 UserDUT

Install App01 The application is installed successfully

2 UserDUT

In the NFC Controller set the defaultAID route to UICC. (see section 2.6.1)

3 UserDUT

Install App02 The application is installed successfully

4 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

None

5 PCD Power on RF field

6 PCDDUT

Perform RF protocol initialisation

7 PCDDUTDUT UICC

Execute the reference transaction • Reference transaction fails• the DUT shall prompt the user with a

pop-up, asking to select the desiredapplication (Conflict of AIDs as thesame AID is registered towards bothUICC and HCE)

8 UserDUT

Select App01

9 PCD Power off RF field

10 PCD Power on RF field

11 PCDDUT

Perform RF protocol initialisation

12 PCDDUTDUT UICC

Execute the reference transaction forAID.

Reference transaction is performedsuccessfully with UICC as CEE.

Page 166: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 166 of 606

7.3.7.6 Test Sequence No 6: Default route HCE, AID conflict, off-host serviceselected

Initial Conditions

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

App01: an android application which registers in its Manifest anoff_host_apdu_service for AID_REF and specifies the category as “other”.

App02: an android application which registers in its Manifest a host_apdu_service(HCE) for AID_REF and specifies the category as “other”. This App manages thereference transaction.

Step Direction Sequence Expected Result

1 UserDUT

Install App01 The application is installed successfully

2 UserDUT

In the NFC Controller set the defaultAID route to HCE. (see section 2.6.1)

3 UserDUT

Install App02 The application is installed successfully

4 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

5 PCD Power on RF field

6 PCDDUTDUT UICC

Perform RF protocol initialisation

7 PCDDUTDUT UICC

Execute the reference transaction • Reference transaction fails• the DUT shall prompt the user with a

pop-up, asking to select the desiredapplication (Conflict of AIDs as thesame AID is registered towards bothUICC and HCE)

8 UserDUT

Select App01

9 UserPCD

Power off the field

10 UserPCD

Power on the field

11 PCDDUTDUT UICC

Start card emulation session Contactless Session is started

Page 167: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 167 of 606

Step Direction Sequence Expected Result

12 PCDDUTDUT UICC

Execute the reference transaction forAID_REF

Reference transaction is performedsuccessfully with UICC as CEE.

7.3.7.7 Test Sequence No 7: Default route UICC, off-host service selected inTap&Pay

Initial Conditions

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

App01: an android application which registers in its Manifest anoff_host_apdu_service for AID_REF and specifies the category as “payment”.

App02: an android application which registers in its Manifest at thehost_apdu_service (HCE) for AID_REF and specifies the category as “payment”.This App manages the reference transaction.

Step Direction Sequence Expected Result

1 UserDUT

Install App01. The application is installed successfully

2 UserDUT

In the NFC Controller set the defaultAID route to UICC. (see section 2.6.1)

3 UserDUT

Install App02 The application is installed successfully

4 UserDUT

Select App01 in the Tap&Pay menu App01 is selected as Tap&Pay.

5 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

6 PCD Power on RF field

7 PCDDUT

Perform RF protocol initialisation

8 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully with UICC as CEE.The DUT shall NOT prompt the user witha pop-up.

7.3.7.8 Test Sequence No 8: Default route HCE, off-host service selected inTap&Pay

Initial Conditions

Page 168: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 168 of 606

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

App01: an android application which registers in its Manifest anoff_host_apdu_service for AID_REF and specifies the category as “payment”.

App02: an android application which registers in its Manifest a host_apdu_service(HCE) for AID_REF and specifies the category as “payment”. This App manages thereference transaction.

Step Direction Sequence Expected Result

1 UserDUT

Install App01 The application is installed successfully

2 UserDUT

In the NFC Controller set the defaultAID route to HCE. (see section 2.6.1)

3 UserDUT

Install App02 The application is installed successfully

4 UserDUT

Select the App01 in the Tap&Paymenu

App01 is selected as Tap&Pay.

5 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

6 PCD Power on RF field

7 PCDDUT

Perform RF protocol initialisation

8 PCDDUTDUT UICC

Execute the reference transaction Reference transaction is performedsuccessfully with UICC as CEE.DUT shall NOT prompt the user with apop-up.

7.3.7.9 Test Sequence No 9: Default route UICC, HCE service selected in Tap&PayInitial Conditions

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

App01: an android application which registers in its Manifest anoff_host_apdu_service for AID_REF and specifies the category as “payment”.

App02: an android application which registers in its Manifest a host_apdu_service(HCE) for AID_REF and specifies the category as “payment”. This App manages thereference transaction

Step Direction Sequence Expected Result

Page 169: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 169 of 606

Step Direction Sequence Expected Result

1 UserDUT

Install App01 The application is installed successfully

2 UserDUT

In the NFC Controller set the defaultAID route to UICC. (see section 2.6.1)

3 UserDUT

Install App02. The application is installed successfully

4 UserDUT

Select App02 in the Tap&Pay menu App02 is selected as Tap&Pay.

5 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

6 PCD Power on RF field

7 PCDDUT

Perform RF protocol initialisation

8 PCDDUTDUT UICC

Execute the reference transactionFor AID_REF

Reference transaction is performedsuccessfully with HCE as CEE.The DUT shall NOT prompt the user witha pop-up, since the HCE applet willanswer to the AID Select.

7.3.7.10 Test Sequence No 10: Default route HCE, HCE service selected in Tap&PayInitial Conditions

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

App01: an android application which registers in its Manifest anoff_host_apdu_service for AID_REF and specifies the category as “payment”.

App02: an Android application which registers in its Manifest a host_apdu_service(HCE) for AID_REF and specifies the category as “payment”. This App manages thereference transaction

Step Direction Sequence Expected Result

1 UserDUT

Install App01 The application is installed successfully

2 UserDUT

In the NFC Controller set the defaultAID route to HCE. (see section 2.6.1)

The default Card Emulation Environmentis now HCE.

3 UserDUT

Install App02. The application is installed successfully

4 UserDUT

Select App02 in the Tap&Pay menu App02 is selected as Tap&Pay.

Page 170: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 170 of 606

Step Direction Sequence Expected Result

5 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

6 PCD Power on RF field

7 PCDDUT

Perform RF protocol initialisation

8 PCDDUTDUT UICC

Execute the reference transactionFor AID_REF

Reference transaction is performedsuccessfully with HCE as CEE.The DUT shall NOT prompt the user witha pop-up, since the HCE applet willanswer to the AID Select.

7.3.8 Active Card Emulation in Multiple CE Environments / Card EmulationTest Purpose

Test that after initial power up or factory reset NFC communication is routed to the UICC bydefault and RF parameters are properly set by the device.

Referenced requirement

TS26_NFC_REQ_065 TS26_NFC_REQ_118.1 TS26_NFC_REQ_118.2 TS26_NFC_REQ_162.1 TS26_NFC_REQ_177

7.3.8.1 VOID

7.3.8.2 Test Sequence No 2: REQ_065 for NFCAInitial Conditions

The NFC reader is polling in type A only or provide a mechanism to make sure theNFC transaction will be performed using RF type A.

The default AID route is set to HCE (see section 2.6.1) The routing table of the CLF contains an entry for an Applet identified by [AID01] and

route for AID01 is set to UICC Install an Applet with [AID01] on the UICC implementing External Authenticate

according to Annex A.4.4.

Step Direction Sequence Expected Result

1 Use a contactless reader to explicitlyselect this Applet by AID01

Status Word 90 00 is received by thecontactless reader

2 Send EXTERNAL AUTHENTICATE(acc to Annex A.4.4) using thecontactless reader

Status Word 90 00 is received by thecontactless reader

Page 171: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 171 of 606

7.3.8.3 Test Sequence No 3: REQ_118.2 for NFCA

Initial Conditions If the phone supports a mechanism to change the default technology, protocol or

Default AID route, then do a factory reset before the test The NFC reader is polling in type A only or provide a mechanism to make sure the

NFC transaction will be performed using RF type A. Install an applet on the UICC implementing External Authenticate according to Annex

A.4.4, implicitly selectable via NFCA. Note: The reader shall not explicitly select theApplet by AID

The default AID route is set to UICC (see section 2.6.1)

Step Direction Sequence Expected Result

1 Send EXTERNAL AUTHENTICATE(acc to Annex A.4.4) using acontactless readerNote: The reader shall access theapplet without explicitly selecting it byAID.

Status Word 90 00 is received by thecontactless reader

7.3.8.4 Test Sequence No 4: REQ_118.2 for NFCBInitial Conditions

If the phone supports a mechanism to change the default technology, protocol orDefault AID route, then do a factory reset before the test

The NFC reader is polling in type B only or provide a mechanism to make sure theNFC transaction will be performed using RF type B.

Install an applet on the UICC implementing External Authenticate according to AnnexA.4.4, implicitly selectable via NFCB. Note: The reader shall not explicitly select theApplet by AID

The default AID route is set to UICC (see section 2.6.1)

Step Direction Sequence Expected Result

1 Send EXTERNAL AUTHENTICATE(acc to Annex A.4.4) using acontactless readerNote: The reader shall access theapplet without explicitly selecting it byAID.

Status Word 90 00 is received by thecontactless reader

7.3.8.5 Test Sequence No 5: REQ_118.1 and REQ_162.1 for NFCAInitial Conditions

If the phone supports a mechanism to change the default technology, protocol orDefault AID route, then do a factory reset before the test

The NFC reader is polling in type A only or provide a mechanism to make sure theNFC transaction will be performed using RF type A.

The NFC reader is establishing an ISO 14443-3 communication over type A.

Page 172: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 172 of 606

Install an Applet on the UICC, to handle CLT=A mode or use an intrinsic UICCmechanism (e.g. MIFARE Classic)

The default AID route is set to HCE (see section 2.6.1)

Step Direction Sequence Expected Result

1 Use a contactless reader to exchangecommand with this applet whileremaining at ISO 14443-3communication level (e.g. a MIFAREclassic reader).

Status Word 90 00 is returned

7.3.8.6 Test Sequence No 6: REQ_065 for NFCBInitial Conditions

The NFC reader is polling in type B only or provide a mechanism to make sure theNFC transaction will be performed using RF type B.

Install an Applet with [AID01] on the UICC implementing External Authenticateaccording to Annex A.4.4

The default AID route is set to HCE (see section 2.6.1) The routing table of the CLF contains an entry with [AID01] and route for AID01 is set

to UICC

Step Direction Sequence Expected Result

1 Use a contactless reader to explicitlyselect this Applet by its AID

Status Word 90 00 is received by thecontactless reader

2 Send EXTERNAL AUTHENTICATE(acc to Annex A.4.4) using acontactless reader

Status Word 90 00 is received by thecontactless reader

7.3.8.7 VOID

7.3.8.8 VOID

7.3.8.9 Test Sequence No 9: REQ_118.2 and REQ_162.1 for NFCA

Initial Conditions If the phone supports a mechanism to change the default technology, protocol or

Default AID route, then do a factory reset before this test. The NFC reader is polling in type A only or provide a mechanism to make sure the

NFC transaction will be performed using RF type A. Install an Applet on the UICC implementing External Authenticate according to

Annex A.4.4, implicitly selectable via NFCA. Note: The reader shall not explicitlyselect the Applet by AID.

The default AID route is set to HCE (see section 2.6.1.)

Step Direction Sequence Expected Result

Page 173: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 173 of 606

Step Direction Sequence Expected Result

1 Send EXTERNAL AUTHENTICATE(acc to Annex A.4.4) using acontactless readerNote: The reader shall access theapplet without explicitly selecting it byAID.

Status Word 90 00 is received by thecontactless reader

7.3.8.10 Test Sequence No 10: REQ_118.2 and REQ_162.1 for NFCBInitial Conditions

If the phone supports a mechanism to change the default technology, protocol orDefault AID route, then do a factory reset before this test.

The NFC reader is polling in type B only or provide a mechanism to make sure theNFC transaction will be performed using RF type B.

Install an Applet on the UICC implementing External Authenticate according toAnnex A.4.4, implicitly selectable via NFCB. Note: The reader shall not explicitlyselect the Applet by AID.

The default AID route is set to HCE (see section 2.6.1.)

Step Direction Sequence Expected Result

1 Send EXTERNAL AUTHENTICATE(acc to Annex A.4.4) using acontactless readerNote: The reader shall access theapplet without explicitly selecting it byAID.

Status Word 90 00 is received by thecontactless reader

7.3.8.11 Test Sequence No 11: REQ_177 for NFCAInitial Conditions

The NFC reader is polling in type A only or provide a mechanism to make sure theNFC transaction will be performed using RF type A.

The default AID route is set to HCE (see section 2.6.1) The routing table of the CLF contains an entry for an Applet identified by [AID01] and

route for AID01 is set to UICC Install an Applet with [AID01] on the UICC implementing External Authenticate

according to Annex A.4.4. When activated the Applet requests the Contactlessparameters according to “Basic profile” in Table 2 of GSMA SGP12 [42]

Step Direction Sequence Expected Result

1 Use a contactless reader to explicitlyselect this Applet by AID01

Status Word 90 00 is received by thecontactless reader

Page 174: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 174 of 606

Step Direction Sequence Expected Result

2 Send EXTERNAL AUTHENTICATE(acc to Annex A.4.4) using thecontactless reader

Status Word 90 00 is received by thecontactless reader

3 PCDDUT

The test tool verifies the followingcontactless protocol parameters:GP Tag ‘80’ – UID (LV)GP Tag ‘81’ - SAKGP Tag ‘82’ - ATQAGP Tag ‘83’ – ATS (LV)GP Tag ’84 - FWI/SFGIGP Tag ‘85’ – CID supportGP Tag ‘86’ - Data_Rate Max

The values of these parameters arematching the values of profile 2 asdefined in Table 3 of GSMA SGP12 [42]

7.3.9 Size of the CLF AID Routing tableTest Purpose

Ensure that the device supports at least 16 AIDs of 16 bytes inside the AID routing table ofthe CLF as specified in TS26

Referenced requirement

TS26_NFC_REQ_167

7.3.9.1 Test Sequence No 1: Size of the CLF AID Routing

Step Direction Sequence Expected Result

1 Apply procedure described in Section2.6.2

RTS value SHALL be greater than ORequal to 16

Page 175: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 175 of 606

8 UI Application triggering

8.1 General overviewThis chapter addresses the UI application triggering. The aim is to ensure the NFCcontroller is able to trigger the appropriate UI application.

The list of conformance requirements tested within this section is listed in the table insection Error! Reference source not found..

8.2 Conformance requirementsTS26_NFC_REQ_069 For UICC, Secure Element Name SHALL be SIM[smartcard slot] (e.g. SIM/SIM1,

SIM2… SIMn).

TS26_NFC_REQ_071 The device SHALL support HCI event EVT_TRANSACTION as per ETSI TS 102622

TS26_NFC_REQ_072 The OS implementation SHALL provide a mechanism to inform authorised OSapplications of Transaction Events and this SHALL include the Secure Elementname and the AID of the applet which triggered the transaction andPARAMETERS holding the payload conveyed by the HCI EVT_TRANSACTIONevent.

TS26_NFC_REQ_096 Before Android P Transaction event data SHALL be set in the following extendedfield:

com.gsma.services.nfc.extra.AIDByteArray

Contains the card “ApplicationIdentifier” [optional]

com.gsma.services.nfc.extra.DATAByteArray

Payload conveyed by the HCI event“EVT_TRANSACTION”

TS26_NFC_REQ_129 Before Android P a Transaction Event (EVT_TRANSACTION) SHALL betriggered based on the following information:

Action com.gsma.services.nfc.action.TRANSACTION_EVENT

Mime type -

URI nfc://secure:0/<SEName>/<AID>- SEName reflects the originating SE It must becompliant with SIMalliance Open Mobile API- AID reflects the originating UICC applet identifier

TS26_NFC_REQ_131 Before Android P, the device SHALL ensure that the application has thefollowing permission before forwarding a Transaction event to the application:

NFCController

android.permission.NFC

TransactionEvent

com.gsma.services.nfc.permission.TRANSACTION_EVENT

TS26_NFC_REQ_150 Before Android P in “Unicast” mode, “EVT_TRANSACTION” event SHALL bereceived by only one activity.

TS26_NFC_REQ_150.1 Before Android P when several activities registered for the

Page 176: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 176 of 606

“EVT_TRANSACTION”, the framework SHALL follow the priority schemedescribed below:

1. “Android:priority” level defined in the Intent Filter SHALL be compared2. First installed application package (APK) has a higher priority

Note: Only priority <0 are possible for non privileged application, as per AndroidAOSP code

(https://android.googlesource.com/platform/frameworks/base/+/5585dd971e265cbb3a515bb759710646c5bc6f63)

TS26_NFC_REQ_187 This requirement is applicable from Android P onwards.

Transaction Event is provided natively by Android.

A Transaction Event (EVT_TRANSACTION) SHALL be triggered based on thefollowing information:

Action android.nfc.action.TRANSACTION_DETECTED

Mime type -

URI nfc://secure:0/<SEName>/<AID>- SEName reflects the originating SEIt must be compliant with SIMalliance Open Mobile API- AID reflects the originating UICC applet identifier

TS26_NFC_REQ_188

This requirement is applicable from Android P onwards.Transaction event data SHALL be set in the following extended field:

android.nfc.extra.AIDByteArray

Contains the card “Application Identifier” ]

android.nfc.extra.DATAByteArray

Payload conveyed by the HCI event

“EVT_TRANSACTION” [optional]

android.nfc.extra.SECURE_ELEMENT_NAMEString

Indicates the Secure Element on which thetransaction occurred.

eSE1...eSEn for Embedded Secure Elements,SIM1...SIMn for UICC, etc. ]

8.3 Test Cases

8.3.1 EVT_TRANSACTIONTest Purpose

To ensure the DUT correctly handles the EVT_TRANSACTION event as per the ETSI 102622 [10] specification

Referenced requirement

TS26_NFC_REQ_071

Initial Conditions

Page 177: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 177 of 606

Related Specs/Docs: ETSI TS 102 622 [10]

The DUT shall pass the Test Case 5.8.2.3.5.2 from ETSI TS 102 695-1, the full set ofapplicable test cases is referenced in Annex B4.

8.3.2 PermissionsTest Purpose

To ensure the DUT correctly manages the Android mechanism of permissions relative toNFC.

Referenced requirement

TS26_NFC_REQ_131

Initial Conditions

The application is registered for EVT_TRANSACTION handling from AID01 withcom.gsma.services.nfc.action.TRANSACTION_EVENT

8.3.2.1 Test Sequence No 1: NFC and TRANSACTION_EVENT declaredInitial Conditions

The following permission is declared in the Mobile Application manifest:

android.permission.NFC

com.gsma.services.nfc.permission.TRANSACTION_EVENT

Step Direction Sequence Expected Result

1 UserDUT

Install the Android application DUT shall prompt the user to authorizethe application installation indicating theNFC permission

8.3.2.2 Test Sequence No 2: NFC not declared, TRANSACTION_EVENT declaredInitial Conditions

The following permission is declared in the Mobile Application manifest:

com.gsma.services.nfc.permission.TRANSACTION_EVENT

The following permission is NOT declared in the Mobile Application manifest:

android.permission.NFC

Step Direction Sequence Expected Result

1 UserDUT

Install the Android application DUT does not require the user toauthorize the NFC permission

Page 178: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 178 of 606

8.3.2.3 Test Sequence No 3: NFC declared, TRANSACTION_EVENT not declared

Initial ConditionsThe following permission is declared in the Mobile Application manifest:

android.permission.NFC

The following permission is NOT declared in the Mobile Application manifest:

com.gsma.services.nfc.permission.TRANSACTION_EVENT

Step Direction Sequence Expected Result

1 UserDUT

Install the Android application DUT shall prompt the user to authorizethe application installation indicating theNFC permission.

8.3.3 Intent managementTest PurposeTo ensure the DUT correctly manages the Android mechanism of intents.

Referenced requirement

TS26_NFC_REQ_069 TS26_NFC_REQ_096 TS26_NFC_REQ_129 TS26_NFC_REQ_187 TS26_NFC_REQ_188

Initial Conditions

The DUT is powered on HCI initialization has been performed successfully NFC is enabled in the DUT Three instances of the UICC application APDU_TestApplication.cap with AID01,

AID02 and AID03 are selectable. Different mobile applications must be used for devices before Android P and for

devices based on Android P or following Android releases:

For devices before Android P the mobile application registers in its manifest forEVT_TRANSACTION handling from AID01 and AID02 only withcom.gsma.services.nfc.action.TRANSACTION_EVENT

For devices based on Android P or following Android releases the mobileapplication registers in its manifest for EVT_TRANSACTION handling from AID01and AID02 only with android.nfc.action.TRANSACTION_DETECTED.

No applications should be started manually on the DUT

8.3.3.1 Test Sequence No 1: EVT_TRANSACTION, no data

Initial Conditions

Page 179: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 179 of 606

None

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

2 PCD Power on RF field

3 PCDDUT

Perform RF protocol initialisation

4 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

5 PCD Power off RF field

6 DUT ->UICC

Send EVT_FIELD_OFF

7 UICCDUT

UICC sends EVT_TRANSACTIONwith AID01

Application is triggered and receives thetransaction event and URI format is thefollowing:• nfc://secure:0/SE_Name/AID with• AID equals to AID01• SE_Name according to SIMalliance

open mobile API specification

8 AppDUT

Open OMAPI session with the readernamed “SE_NAME” returned in step 7

Session is opened successfully

9 DUTUICC

Call the “Select AID01” function Application with AID01 is selected

10 DUT UICC

Send APDU Case 4 P1 = 0x00’XX 04 00 00 FF’ <Data field of 255

bytes> FF

Expected response returned from“SE_Name” is:R-APDU – data field of 255 bytes, SW1,

SW2

8.3.3.2 Test Sequence No 2: EVT_TRANSACTION, with data

Initial ConditionsNone

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

2 PCD Power on RF field

3 PCDDUT

Perform RF protocol initialisation

Page 180: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 180 of 606

Step Direction Sequence Expected Result

4 PCDDUT

Using the APDU application, send aSELECT command with AID02

APDU Application receives Status Word90 00

5 PCD Power off RF field

6 DUT ->UICC

Send EVT_FIELD_OFF

7 UICCDUT

UICC sends EVT_TRANSACTIONwith AID02 with data (0x20 bytes long)

Application is triggered and receives thetransaction event with additional data(0x20 bytes long). The URI format is thefollowing:• nfc://secure:0/SE_Name/AID with• AID equals to AID02SE_Name according to SIMalliance openmobile API specification• On devices before Android P the

received data is retrieved fromcom.gsma.services.nfc.extra.DATA

• On devices with Android P or later thereceived data is retrieved fromandroid.nfc.extra.DATA

8 AppDUT

Open OMAPI session with the readernamed “SE_NAME” returned in step 7

Session is opened successfully

9 DUTUICC

Call the “Select AID02” function Application with AID02 is selected andSW 90 00 is returned by SE_Name

10 DUT UICC

Send APDU Case 4 P1 = 0x00’XX 04 00 00 FF’ <Data field of 255

bytes> FF

Expected response returned from reader“SE_Name” is:R-APDU – data field of 255 bytes, SW1,

SW2

8.3.3.3 Test Sequence No 3: EVT_TRANSACTION, application not registered forAID

Initial ConditionsNone

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

2 PCD Power on RF field

3 PCDDUT

Perform RF protocol initialisation

Page 181: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 181 of 606

Step Direction Sequence Expected Result

4 PCDDUT

Using the APDU application, send aSELECT command with AID03

APDU Application receives Status Word90 00

5 PCD Power off RF field

6 DUT ->UICC

Send EVT_FIELD_OFF

7 UICCDUT

UICC sends EVT_TRANSACTIONwith AID03

Application doesn’t receive thetransaction event

8.3.4 Application’s triggering orderTest Purpose

Check the launch, and order of launch of the applications; check that for the sameHCI_Event, which calls 2 applications, only the first installed one answers, and that noapplication is launched when an event does not refer to any AID.

Referenced requirement TS26_NFC_REQ_150 TS26_NFC_REQ_150.1

Initial Conditions The DUT is powered on HCI initialization has been performed successfully NFC is enabled in the DUT Install GSMA_Mobile_App_UIA #1 first

- GSMA_Mobile_App_UIA #1 signed with a private key corresponding to test certificate #1defined to be woken up on HCI Events from AID01 and AID02

Install GSMA_Mobile_App_UIA #2

- GSMA_Mobile_App_UIA_#2 signed with a private key corresponding to test certificate #2

defined to be woken up on HCI Events from AID02

Three instances of the APDU_TestApplication.cap (respectively with AID01, AID02 andAID03).

No applications should be started manually on the DUT

8.3.4.1 Test Sequence No 1: First installed application triggered

Initial Conditions

The following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid

Page 182: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 182 of 606

an ACRF is present and valid and contains a rule for all other AIDs and a path forone ACCF containing an empty hash condition

all applications have full access to all AIDsThe reference PKCS#15 structure is in Annex E.

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

2 PCD Power on RF field

3 PCDDUT

Perform RF protocol initialisation

4 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

5 PCD Power off RF field

6 DUT UICC

Send EVT_FIELD_OFF

7 UICCDUT

UICC sends EVT_TRANSACTIONwith AID01

GSMA_Mobile_App_UIA_#1 is launched

8 UserDUT

Close the applicationGSMA_Mobile_App_UIA_#1

Application is closed

9 UserDUT

Repeat steps 2 – 6 with AID02 insteadof AID01

10 UICCDUT

UICC sends EVT_TRANSACTIONwith AID02

GSMA_Mobile_App_UIA_#1 is launched

11 UserDUT

Close the applicationGSMA_Mobile_App_UIA_#1

Application is closed

12 UserDUT

Repeat steps 2 – 6 with AID03 insteadof AID01

13 UICCDUT

UICC sends EVT_TRANSACTIONwith AID03

No mobile application is launched

8.3.4.2 Test Sequence No 2: Different AID

Initial ConditionsThe following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid an ACRF is present and valid and contains a rule for all other AIDs and a path for

one ACCF containing an empty hash condition all applications have full access to all AIDs

Install another GSMA_Mobile_App_UIA_#3

Page 183: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 183 of 606

- GSMA_Mobile_App_UIA_#3 signed with a private key corresponding to test certificate #1defined to be woken up on HCI Events from all AIDs

The reference PKCS#15 structure is in Annex E.

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

2 PCD Power on RF field

3 PCDDUT

Perform RF protocol initialisation

4 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

5 PCD Power off RF field

6 DUTUICC

Send EVT_FIELD_OFF

7 UICC sends EVT_TRANSACTIONwith AID01

GSMA_Mobile_App_UIA_#1 is launched

8 UserDUT

Close the applicationGSMA_Mobile_App_UIA_#1

Application is closed

9 UserDUT

Repeat steps 2 – 6 with AID02 insteadof AID01

10 UICCDUT

UICC sends EVT_TRANSACTIONwith AID02

GSMA_Mobile_App_UIA_#1is launched

11 UserDUT

Close the applicationGSMA_Mobile_App_UIA_#1

Application is closed

12 UserDUT

Repeat steps 2 – 6 with AID03 insteadof AID01

13 UICCDUT

UICC sends EVT_TRANSACTIONwith AID03

GSMA_Mobile_App_UIA_#3 is launched

8.3.4.3 Test Sequence No 3: Single application has SEAC access

Initial ConditionsThe following configuration is loaded into the UICC:

PKCS#15 ADF with a DODF present and valid an ACMF is present and valid an ACRF is present and valid and contains a rule for all other AIDs and a path for

one ACCF containing SP2 hash condition SP2 has full access to all AIDs

The reference PKCS#15 structure is in Annex E.

Page 184: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 184 of 606

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

2 PCD Power on RF field

3 PCDDUT

Perform RF protocol initialisation

4 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

5 PCD Power off RF field

6 DUT UICC

Send EVT_FIELD_OFF

7 UICCDUT

UICC sends EVT_TRANSACTIONwith AID01

No mobile application is launched

8 UserDUT

Repeat steps 2 – 6 with AID02 insteadof AID01

9 UICCDUT

UICC sends EVT TRANSACTION withAID02

GSMA_Mobile_App_UIA_#2 is launched

10 UserDUT

Close the applicationGSMA_Mobile_App_UIA_#2

Application is closed

11 UserDUT

Repeat steps 2 – 6 with AID03 insteadof AID01

12 UICCDUT

UICC sends EVT TRANSACTION withAID03

No mobile application is launched

8.3.5 Triggering on HCI event EVT_CARD_DEACTIVATEDTest Purpose

To ensure the device is able to launch the mobile application on EVT_TRANSACTIONwhen a HCI EVT_CARD_DEACTIVATED event is processed by the CLF.

Referenced requirement

TS26_NFC_REQ_071 TS26_NFC_REQ_072

Initial Conditions The DUT is powered on HCI initialisation has been performed successfully NFC is enabled in the DUT APDU_TestApplication_card_deactivated is installed on the UICC and is

selectable with AID01 MobileApplication is installed on the DUT and is launched on EVT_TRANSACTION

from AID01

Page 185: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 185 of 606

No applications should be started manually on the DUT.

8.3.5.1 Test Sequence No 1

Initial ConditionsNone

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

None

2 PCD Power on RF field

3 PCDDUT

Perform RF protocol initialisation

4 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

5 PCDDUT

The APDU application sends acontactless DESELECT

None

6 DUT UICC

The DUT sends EVT_CARD_DEACTIVED

None

7 UICCDUT

UICC sends EVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

MobileApplication is launched and theintent received indicates reception ofEVT_TRANSACTION with AID01

8.3.6 Triggering on HCI event EVT_FIELD_OFFTest PurposeTo ensure the device is able to launch the mobile application on EVT_TRANSACTIONwhen a HCI EVT_FIELD_OFF event is processed by the CLF.

Referenced requirement TS26_NFC_REQ_071 TS26_NFC_REQ_072

Initial Conditions The DUT is powered on HCI initialization has been performed successfully NFC is enabled in the DUT APDU_TestApplication is installed on the UICC and is selectable with AID01 MobileApplication is installed on the DUT and is launched on EVT_TRANSACTION

from AID01 No applications should be started manually on the DUT. APDU_TestApplication is not selected on UICC.

8.3.6.1 Test Sequence No 1

Initial Conditions

Page 186: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 186 of 606

None

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

None

2 PCD Power on RF field

3 PCDDUT

Perform RF protocol initialisation

4 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

5 PCD Power off RF field

6 DUT UICC

Send EVT_ FIELD_OFF

7 UICCDUT

The UICC sendsEVT_TRANSACTION toGSMA_AC_Mobile_App_SP1_signed

MobileApplication is launched and theintent received indicates the reception ofEVT_TRANSACTION with AID01

9 VOID

10 VOID

Page 187: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 187 of 606

11 Mobile Device APN management

11.1 General overviewThis chapter addresses the APN management by the device according to ETSIspecifications.

The list of conformance requirements tested within this section is listed in the table insection Error! Reference source not found..

11.2 Conformance requirementsTS26_NFC_REQ_075 For mobile devices supporting multiple APNs, the device SHALL be able to

set-up an Active UICC Profile OTA channel using the APN information thatis provided in the OPEN CHANNEL command.

TS26_NFC_REQ_076 For devices which are configured as "Always-ON" and only support asingle APN, the APN information provided in the OPEN CHANNELcommand SHALL be ignored and the device SHALL use the device defaultAPN.

TS26_NFC_REQ_077 If the APN information provided by the network in the OPEN CHANNELcommand is empty the device SHALL always use the device default APN.

11.3 Test Cases

11.3.1 OPEN CHANNELTest PurposeTo verify OPEN CHANNEL related to Default APN Always

Referenced requirement TS26_NFC_REQ_075 TS26_NFC_REQ_076 TS26_NFC_REQ_077

Initial ConditionsOne default APN is configured on the DUT and the related PDN connection to this APN hasbeen already established.

11.3.1.1 Test Sequence No 1: (OPEN CHANNEL - Default APN Always-ON - MultipleAPN supported - with different APN)

Initial ConditionsNone

Page 188: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 188 of 606

Step Direction Sequence Expected Result

1 ME ME is connected to the USS and thefirst PDN to the APN for “Always onconnection” (web.network.com) hasbeen already established.

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 11.1.1

3 MEUICC FETCH

4 UICCME

PROACTIVE COMMAND: OPENCHANNEL 11.1.1

5 MEUser

The ME may display channel openinginformation

6 ME USS PDP context activation request

7 USS ME PDP context activation accept

8 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 11.1.1

[Command performed successfully]

PROACTIVE COMMAND: OPEN CHANNEL 11.1.1

Logically:

Command details

Command number: 1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device: ME

Bearer

Bearer type: GPRS/UTRAN packet service/ E-UTRAN

Bearer parameter:

Precedence Class: 02

Delay Class: 04

Reliability Class: 02

Peak throughput class: 05

Mean throughput class: 31

Packet data protocol: 02 (IP)

Buffer

Buffer size: 1024

Network access name (APN):web99.test-nfc1.com

Page 189: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 189 of 606

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 11.1.1

Logically:

Command details

Command number: 1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status: Channel identifier 1 and link established or PDP contextactivated

Bearer Description:

Bearer type: GPRS/UTRAN packet service/ E-UTRAN

Bearer parameter:

Precedence Class: 02

Delay Class: 04

Reliability Class: 02

Peak throughput class: 05

Mean throughput class: 31

Packet data protocol: 02 (IP)

Buffer size 1024

11.3.1.2 Test Sequence No 2: (OPEN CHANNEL - Default APN Always–ON - OnlySingle APN supported - with different APN)

Initial ConditionsNone

Page 190: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 190 of 606

Step Direction Sequence Expected Result

1 ME ME is connected to the USS and thefirst PDN to the APN for “Always onconnection” (web.network.com) hasbeen already established.

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 11.2.1

3 MEUICC FETCH

4 UICCME

PROACTIVE COMMAND: OPENCHANNEL 11.2.1

5 MEUser

The ME may display channelopening information

6 ME USS The terminal shall not send a PDPcontext activation request

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 11.2.1

[Command performed successfully]

PROACTIVE COMMAND: OPEN CHANNEL 11.2.1

Logically:

Command details

Command number: 1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device: ME

Bearer

Bearer type: GPRS/UTRAN packet service/ E-UTRAN

Bearer parameter:

Precedence Class: 02

Delay Class: 04

Reliability Class: 02

Peak throughput class: 05

Mean throughput class: 31

Packet data protocol: 02 (IP)

Buffer

Page 191: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 191 of 606

Buffer size: 1024

Network access name (APN): web99.test-nfc1.com

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 11.2.1

Logically:

Command details

Command number: 1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status: Channel identifier 1 and link established or PDPcontext activated

Bearer Description:

Bearer type: GPRS/UTRAN packet service/ E-UTRAN

Bearer parameter:

Precedence Class: 02

Delay Class: 04

Reliability Class: 02

Peak throughput class: 05

Mean throughput class: 31

Packet data protocol: 02 (IP)

Buffer

Buffer size 1024

11.3.1.3 Test Sequence No 3: (OPEN CHANNEL - Default APN Always-ON - APNempty)

Initial ConditionsNone

Page 192: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 192 of 606

Step Direction Sequence Expected Result

1 ME ME is connected to the USS and thefirst PDN to the APN for “Always onconnection” (web.network.com) hasbeen already established.

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 11.3.1

3 MEUICC FETCH

4 UICCME

PROACTIVE COMMAND: OPENCHANNEL 11.3.1

5 MEUser

The ME may display channelopening information

6 ME USS The terminal shall not send a PDPcontext activation request

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 11.3.1

[Command performed successfully]

PROACTIVE COMMAND: OPEN CHANNEL 11.3.1

Logically:

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device:ME

Bearer

Bearer type: GPRS/UTRAN packet service/ E-UTRAN

Bearer parameter:

Precedence Class: 02

Delay Class: 04

Reliability Class: 02

Peak throughput class: 05

Mean throughput class: 31

Packet data protocol: 02 (IP)

Buffer

Buffer size: 1024

UICC/ME interface transport level

Transport format: UDP

Page 193: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 193 of 606

Port number: 44444

Data destination address: 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 11.3.1

Logically:

Command details

Command number: 1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status Channel identifier 1 and link established or PDP contextactivated

Bearer description

Bearer type: GPRS/UTRAN packet service/ E-UTRAN

Bearer parameter:

Precedence Class: 02

Delay Class: 04

Reliability Class: 02

Peak throughput class: 05

Mean throughput class: 31

Packet data protocol: 02 (IP)

Buffer

Buffer size: 1024

11.3.1.4 Test Sequence No 4: (OPEN CHANNEL - Default APN Always-ON - APNempty- Default Bearer Type used)

Initial ConditionsNone

Page 194: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 194 of 606

Step Direction Sequence Expected Result

1 ME ME is connected to the USS and thefirst PDN to the APN for “Always onconnection” (web.network.com) hasbeen already established.

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 UICCME

PROACTIVE COMMANDPENDING: OPEN CHANNEL 11.4.1

3 MEUICC FETCH

4 UICCME

PROACTIVE COMMAND: OPENCHANNEL 11.4.1

5 MEUser

The ME may display channelopening information

6 ME USS The terminal shall not send a PDPcontext activation request

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 11.4.1

[Command performed successfully]

PROACTIVE COMMAND: OPEN CHANNEL 11.4.1

Logically:

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device:ME

Bearer

Bearer type: Default Bearer Type

Buffer

Buffer size: 1024

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address: 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 11.4.1

Logically:

Command details

Command number: 1

Page 195: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 195 of 606

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status Channel identifier 1 and link established or PDP contextactivated

Bearer description

Bearer type: Default Bearer Type

Buffer

Buffer size: 1024

11.3.2 CLOSE CHANNELTest PurposeTo verify CLOSE CHANNEL related to Default APN Always-ON

Referenced requirement TS26_NFC_REQ_075 TS26_NFC_REQ_076 TS26_NFC_REQ_077

Initial ConditionsOne default APN is configured on the DUT and the related PDN connection to this APN hasbeen already established.

11.3.2.1 Test Sequence No 1: (CLOSE CHANNEL - Default APN Always-ON -Multiple APN supported - with different APN- SUCCESSFUL)

Initial ConditionsNone

Step Direction Sequence Expected Result

1 ME ME is connected to the USS and thefirst PDN to the APN for “Always onconnection” (web.network.com) hasbeen already established.

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 11.1.1

See OPEN CHANNEL SEQ 11.1.1

3 MEUICC

FETCH

Page 196: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 196 of 606

Step Direction Sequence Expected Result

4 UICCME

PROACTIVE COMMAND:OPEN CHANNEL 11.1.1

5 MEUSER

The ME may display channelopening information

6 ME USS PDP context activation request

7 USS ME PDP context activation accept

8 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 11.1.1

[Command performed successfully]

9 UICCME

PROACTIVE COMMAND: PENDINGCLOSE CHANNEL 11.1.1

10 MEUICC

FETCH

11 UICCME

PROACTIVE COMMAND: CLOSECHANNEL 11.1.1

12 ME USS PDP context deactivation request

13 USS ME PDP context deactivation accept

14 MEUICC

TERMINAL RESPONSE CLOSECHANNEL 11.1.1

[Command performed successfully]

PROACTIVE COMMAND: CLOSE CHANNEL 11.1.1

Logically:

Command details

Command number: 1

Command type: CLOSE CHANNEL

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

TERMINAL RESPONSE: CLOSE CHANNEL 1.1

Logically:

Command details

Command number: 1

Command type: CLOSE CHANNEL

Command qualifier: RFU

Device identities

Source device: ME

Page 197: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 197 of 606

Destination device: UICC

Result

General Result: Command performed successfully

11.3.2.2 Test Sequence No 2: (CLOSE CHANNEL - Default APN Always–ON - OnlySingle APN supported - with different APN- SUCCESSFUL)

Initial ConditionsNone

Step Direction Sequence Expected Result

1 ME ME is connected to the USS and thefirst PDN to the APN for “Always onconnection” (web.network.com) hasbeen already established.

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 11.2.1

Please See OPEN CHANNEL SEQ11.2.1

3 MEUICC

FETCH

4 UICCME

PROACTIVE COMMAND:OPEN CHANNEL 11.2.1

5 MEUSER

The ME may display channelopening information

6 ME USS The terminal shall not send a PDPcontext activation request

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 11.2.1

[Command performed successfully]

8 UICCME

PROACTIVE COMMAND PENDING:CLOSE CHANNEL 11.1.1

9 MEUICC

FETCH

10 UICCME

PROACTIVE COMMAND: CLOSECHANNEL 11.1.1

11 MEUICC

TERMINAL RESPONSE CLOSECHANNEL 11.1.1

[Command performed successfully]

11.3.2.3 Test Sequence No 3: (CLOSE CHANNEL - Default APN Always-ON - APNempty- SUCCESSFUL)

Initial ConditionsNone

Step Direction Sequence Expected Result

Page 198: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 198 of 606

Step Direction Sequence Expected Result

1 ME ME is connected to the USS and thefirst PDN to the APN for “Always onconnection” (web.network.com) hasbeen already established.

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 11.3.1

See OPEN CHANNEL SEQ 11.3.1

3 MEUICC

FETCH

4 UICCME

PROACTIVE COMMAND:OPEN CHANNEL 11.3.1

5 MEUSER

The ME may display channelopening information

6 ME USS The terminal shall not send a PDPcontext activation request

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 11.3.1

[Command performed successfully]

8 UICCME

PROACTIVE COMMAND PENDING:CLOSE CHANNEL 11.1.1

9 MEUICC

FETCH

10 UICCME

PROACTIVE COMMAND: CLOSECHANNEL 11.1.1

11 MEUICC

TERMINAL RESPONSE CLOSECHANNEL 11.1.1

[Command performed successfully]

11.3.2.4 Test Sequence No 4: (CLOSE CHANNEL - Default APN Always-ON - APNempty- SUCCESSFUL- Default Bearer Type Used)

Initial ConditionsNone

Page 199: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 199 of 606

Step Direction Sequence Expected Result

1 ME ME is connected to the USS and thefirst PDN to the APN for “Always onconnection” (web.network.com) hasbeen already established.

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 UICCME PROACTIVE COMMAND PENDING:OPEN CHANNEL 11.4.1

See OPEN CHANNEL SEQ 11.4.1

3 MEUICC

FETCH

4 UICCME

PROACTIVE COMMAND:OPEN CHANNEL 11.4.1

5 MEUSER

The ME may display channelopening information

6 MEUSS The terminal shall not send a PDPcontext activation request

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 11.4.1

[Command performed successfully]

8 UICCME

PROACTIVE COMMAND PENDING:CLOSE CHANNEL 11.1.1

9 MEUICC

FETCH

10 UICCME

PROACTIVE COMMAND: CLOSECHANNEL 11.1.1

11 MEUICC

TERMINAL RESPONSE CLOSECHANNEL 11.1.1

[Command performed successfully]

11.3.3 RECEIVE DATATest PurposeTo verify RECEIVE DATA related to Default APN Always-ON

Referenced requirement TS26_NFC_REQ_075 TS26_NFC_REQ_076 TS26_NFC_REQ_077

Initial ConditionsOne default APN is configured on the DUT and the related PDN connection to this APN hasbeen already established.

11.3.3.1 Test Sequence No 1: (RECEIVE DATA - Default APN Always-ON - MultipleAPN supported - with different APN)

Initial Conditions

Page 200: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 200 of 606

None

Step Direction Sequence Expected Result

1 ME ME is connected to the USS and thefirst PDN to the APN for “Always onconnection” (web.network.com) hasbeen already established.

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST 11.1.1 PENDING

3 MEUICC FETCH

4 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST 11.1.1

5 MEUICC

TERMINAL RESPONSE: SET UPEVENT LIST 11.1.1

6 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 11.1.1

See OPEN CHANNEL SEQ 11.1.1

7 MEUICC FETCH

8 UICCME

PROACTIVE COMMAND: OPENCHANNEL 11.1.1

9 ME User The ME may display channel openinginformation

10 ME USS PDP context activation request

11 USS ME PDP context activation accept

12 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 11.1.1

[Command performed successfully]

13 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.1

14 MEUICC FETCH

15 UICCME

PROACTIVE COMMAND: SENDDATA (immediate) 11.1.1

16 ME USS Transfer of 8 Bytes of data to the USSthrough channel 1

[To retrieve ME's port number]

17 MEUICC

TERMINAL RESPONSE: SENDDATA (immediate) 11.1.1

[Command performed successfully]

18 USS ME Transfer of 1024 Bytes of data to theM’ through channel 1 using the ME'sport number, which was retrieved instep 16

19 MEUICC

ENVELOPE: EVENT DOWNLOAD -Data available 11.1.1

(1024 Bytes of data in the ME buffer)

20 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.1

Page 201: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 201 of 606

Step Direction Sequence Expected Result

21 MEUICC FETCH

22 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.1

205 Bytes

23 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.1

24 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.2

25 MEUICC FETCH

26 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.2

205 Bytes

27 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.2

28 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.3

29 MEUICC FETCH

30 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.3

205 Bytes

31 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.3

32 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.4

33 MEUICC FETCH

34 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.4

205 Bytes

35 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.4

36 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.5

37 MEUICC FETCH

38 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.5

204 Bytes

39 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.5

PROACTIVE COMMAND: SET UP EVENT LIST 11.1.1

Logically:

Command details

Command number: 1

Command type: SET UP EVENT LIST

Page 202: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 202 of 606

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: ME

Event list Data available

TERMINAL RESPONSE: SET UP EVENT LIST 11.1.1

Logically:

Command details

Command number: 1

Command type: SET UP EVENT LIST

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

PROACTIVE COMMAND: SEND DATA 11.1.1

Logically:

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 00 01 .. 07 (8 Bytes of data)

TERMINAL RESPONSE: SEND DATA 11.1.1

Logically:

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: ME

Page 203: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 203 of 606

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in the Tx buffer

ENVELOPE: EVENT DOWNLOAD - Data available 11.1.1

Logically:

Event list

Event: Data available

Device identities

Source device: ME

Destination device: UICC

Channel status

Channel status: Channel 1 open, link established

Channel Data Length

Channel data length: FF (more than 255 bytes are available)

PROACTIVE COMMAND: RECEIVE DATA 11.1.1

Logically:

Command details

Command number: 1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: 205

PROACTIVE COMMAND: RECEIVE DATA 11.1.2

Logically:

Command details

Command number: 2

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Page 204: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 204 of 606

Channel Data Length: 205

PROACTIVE COMMAND: RECEIVE DATA 11.1.3

Logically:

Command details

Command number: 3

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: 205

PROACTIVE COMMAND: RECEIVE DATA 11.1.4

Logically:

Command details

Command number: 4

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: 205

PROACTIVE COMMAND: RECEIVE DATA 11.1.5

Logically:

Command details

Command number: 5

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: 204

TERMINAL RESPONSE: RECEIVE DATA 11.1.1

Logically:

Page 205: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 205 of 606

Command details

Command number: 1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data: 00 01 02 .. CC (205 Bytes of data)

Channel data length: FF

TERMINAL RESPONSE: RECEIVE DATA 11.1.2

Logically:

Command details

Command number: 2

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data: CD CE CF .. FF 00 01 .. 99(205 Bytes of data)

Channel data length: FF

TERMINAL RESPONSE: RECEIVE DATA 11.1.3

Logically:

Command details

Command number: 3

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data: 9A 9B .. FF 00 01 – 66 (205 Bytes of data)

Channel data length: FF

Page 206: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 206 of 606

TERMINAL RESPONSE: RECEIVE DATA 11.1.4

Logically:

Command details

Command number: 4

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data: 67 68 .. FF 00 01 .. 33 (205 Bytes of data)

Channel data length: CC

TERMINAL RESPONSE: RECEIVE DATA 11.1.5

Logically:

Command details

Command number: 5

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data: 34 35 .. FF (204 Bytes of data)

Channel data length: 00

11.3.3.2 Test Sequence No 2: (RECEIVE DATA - Default APN Always–ON - OnlySingle APN supported - with different APN)

Initial ConditionsNone

Step Direction Sequence Expected Result

1 ME ME is connected to the USS and thefirst PDN to the APN for “Always onconnection” (web.network.com) hasbeen already established.

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

Page 207: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 207 of 606

Step Direction Sequence Expected Result

2 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST 11.1.1 PENDING

3 MEUICC FETCH

4 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST 11.1.1

5 MEUICC

TERMINAL RESPONSE: SET UPEVENT LIST 11.1.1

6 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 11.2.1

See OPEN CHANNEL SEQ 11.2.1

7 MEUICC FETCH

8 UICCME

PROACTIVE COMMAND: OPENCHANNEL 11.2.1

9 ME User The ME may display channel openinginformation

10 ME USS The terminal shall not send a PDPcontext activation request

11 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 11.2.1

[Command performed successfully]

12 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.1

13 MEUICC FETCH

14 UICCME

PROACTIVE COMMAND: SENDDATA (immediate) 11.1.1

15 ME USS Transfer 8 Bytes of data to the USSthrough channel 1

[To retrieve ME's port number]

16 MEUICC

TERMINAL RESPONSE: SENDDATA (immediate) 11.1.1

[Command performed successfully]

17 USS ME Transfer 1024 Bytes of data to the MEthrough channel 1 using the ME's portnumber, which was retrieved in step15

18 MEUICC

ENVELOPE: EVENT DOWNLOAD -Data available 11.1.1

(1024 Bytes of data in the ME buffer)

19 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.1

20 MEUICC FETCH

21 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.1

205 Bytes

22 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.1

Page 208: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 208 of 606

Step Direction Sequence Expected Result

23 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.2

24 MEUICC FETCH

25 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.2

205 Bytes

26 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.2

27 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.3

28 MEUICC FETCH

29 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.3

205 Bytes

30 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.3

31 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.4

32 MEUICC FETCH

33 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.4

205 Bytes

34 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.4

35 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.5

36 MEUICC FETCH

37 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.5

204 Bytes

38 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.5

11.3.3.3 Test Sequence No 3: (RECEIVE DATA - Default APN Always-ON - APNempty)

Initial ConditionsNone

Step Direction Sequence Expected Result

1 ME ME is connected to the USS and thefirst PDN to the APN for “Always onconnection” (web.network.com) hasbeen already established.

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

Page 209: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 209 of 606

Step Direction Sequence Expected Result

2 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST 11.1.1 PENDING

3 MEUICC FETCH

4 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST 11.1.1

5 MEUICC

TERMINAL RESPONSE: SET UPEVENT LIST 11.1.1

6 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 11.3.1

See OPEN CHANNEL SEQ 11.3.1

7 MEUICC FETCH

8 UICCME

PROACTIVE COMMAND: OPENCHANNEL 11.3.1

9 ME User The ME may display channel openinginformation

10 ME USS The terminal shall not send a PDPcontext activation request

11 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 11.3.1

[Command performed successfully]

12 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.1

13 MEUICC FETCH

14 UICCME

PROACTIVE COMMAND: SENDDATA (immediate) 11.1.1

15 ME USS Transfer 8 Bytes of data to the USSthrough channel 1

[To retrieve ME's port number]

16 MEUICC

TERMINAL RESPONSE: SENDDATA (immediate) 11.1.1

[Command performed successfully]

17 USS ME Transfer 1024 Bytes of data to the MEthrough channel 1 using the ME's portnumber, which was retrieved in step15

18 MEUICC

ENVELOPE: EVENT DOWNLOAD -Data available 11.1.1

(1024 Bytes of data in the ME buffer)

19 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.1

20 MEUICC FETCH

21 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.1

205 Bytes

22 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.1

Page 210: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 210 of 606

Step Direction Sequence Expected Result

23 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.2

24 MEUICC FETCH

25 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.2

205 Bytes

26 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.2

27 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.3

28 MEUICC FETCH

29 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.3

205 Bytes

30 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.3

31 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.4

32 MEUICC FETCH

33 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.4

205 Bytes

34 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.4

35 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.5

36 MEUICC FETCH

37 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.5

204 Bytes

38 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.5

11.3.3.4 Test Sequence No 4: (RECEIVE DATA - Default APN Always-ON - APNempty-Default Bearer Type used)

Initial ConditionsNone

Step Direction Sequence Expected Result

1 ME ME is connected to the USS and thefirst PDN to the APN for “Always onconnection” (web.network.com) hasbeen already established.

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

Page 211: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 211 of 606

Step Direction Sequence Expected Result

2 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST 11.1.1 PENDING

3 MEUICC FETCH

4 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST 11.1.1

5 MEUICC

TERMINAL RESPONSE: SET UPEVENT LIST 11.1.1

6 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 11.4.1

See OPEN CHANNEL SEQ 11.4.1

7 MEUICC FETCH

8 UICCME

PROACTIVE COMMAND: OPENCHANNEL 11.4.1

9 ME User The ME may display channel openinginformation

10 ME USS The terminal shall not send a PDPcontext activation request

11 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 11.4.1

[Command performed successfully]

12 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.1

13 MEUICC FETCH

14 UICCME

PROACTIVE COMMAND: SENDDATA (immediate) 11.1.1

15 ME USS Transfer 8 Bytes of data to the USSthrough channel 1

[To retrieve ME's port number]

16 MEUICC

TERMINAL RESPONSE: SENDDATA (immediate) 11.1.1

[Command performed successfully]

17 USS ME Transfer 1024 Bytes of data to the MEthrough channel 1 using the ME's portnumber, which was retrieved in step15

18 MEUICC

ENVELOPE: EVENT DOWNLOAD -Data available 11.1.1

(1024 Bytes of data in the ME buffer)

19 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.1

20 MEUICC FETCH

21 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.1

205 Bytes

22 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.1

Page 212: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 212 of 606

Step Direction Sequence Expected Result

23 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.2

24 MEUICC FETCH

25 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.2

205 Bytes

26 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.2

27 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.3

28 MEUICC FETCH

29 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.3

205 Bytes

30 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.3

31 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.4

32 MEUICC FETCH

33 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.4

205 Bytes

34 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.4

35 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 11.1.5

36 MEUICC FETCH

37 UICCME

PROACTIVE COMMAND: RECEIVEDATA 11.1.5

204 Bytes

38 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 11.1.5

11.3.4 SEND DATATest PurposeTo verify SEND DATA related to Default APN Always-ON

Referenced requirement TS26_NFC_REQ_075 TS26_NFC_REQ_076 TS26_NFC_REQ_077

Initial Conditions

Page 213: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 213 of 606

One default APN is configured on the DUT and the related PDN connection to this APN hasbeen already established.

11.3.4.1 Test Sequence No 1: (SEND DATA - Default APN Always-ON - Multiple APNsupported - with different APN - BUFFER FULLY USED)

Initial ConditionsNone

Step Direction Sequence Expected Result

1 ME ME is connected to the USS and thefirst PDN to the APN for “Always onconnection” (web.network.com) hasbeen already established.

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 11.1.1

See OPEN CHANNEL SEQ 11.1.1

3 MEUICC FETCH

4 UICCME

PROACTIVE COMMAND: OPENCHANNEL 11.1.1

5 ME User The ME may display channel openinginformation

6 ME USS PDP context activation request

7 USS ME PDP context activation accept

8 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 11.1.1

[Command performed successfully]

9 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.1

10 MEUICC FETCH

11 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 11.1.1

Send 1024 Bytes of data by packet of 200Bytes

12 MEUICC

TERMINAL RESPONSE: SENDDATA (store mode) 11.1.1

[Command performed successfully]

13 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.2

14 MEUICC FETCH

15 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 11.1.2

[205 Bytes]

16 MEUICC

TERMINAL RESPONSE: SENDDATA (store mode) 11.1.2

[Command performed successfully]

17 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.3

18 MEUICC FETCH

Page 214: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 214 of 606

Step Direction Sequence Expected Result

19 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 11.1.3

[205 Bytes]

20 MEUICC

TERMINAL RESPONSE: SENDDATA (store mode) 11.1.3

[Command performed successfully]

21 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.4

22 MEUICC FETCH

23 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 11.1.4

[205 Bytes]

24 MEUICC

TERMINAL RESPONSE: SENDDATA (store mode) 11.1.4

[Command performed successfully]

25 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.5

26 MEUICC FETCH

27 UICCME

PROACTIVE COMMAND: SENDDATA (immediate) 11.1.5

[204 Bytes]

28 ME USS Transfer 1000 Bytes of data to theUSS through channel 1

29 MEUICC

TERMINAL RESPONSE: SENDDATA (immediate) 11.1.5

[Command performed successfully]

PROACTIVE COMMAND: SEND DATA 11.1.1

Logically:

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 00 01 02 .. CC (205 Bytes of data)

TERMINAL RESPONSE: SEND DATA 11.1.1

Logically:

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Store mode

Page 215: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 215 of 606

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in the Tx buffer

PROACTIVE COMMAND: SEND DATA 11.1.2

Logically:

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: CD CE CF .. FF 00 01 .. 99(205 Bytes of data

TERMINAL RESPONSE: SEND DATA 11.1.2

Logically:

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in the Tx buffer

PROACTIVE COMMAND: SEND DATA 11.1.3

Logically:

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Page 216: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 216 of 606

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 9A 9B .. FF 00 01 .. 66 (205 Bytes of data)

TERMINAL RESPONSE: SEND DATA 11.1.3

Logically:

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in the Tx buffer

PROACTIVE COMMAND: SEND DATA 11.1.4

Logically:

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 67 68 .. FF 00 01 .. 33 (205 Bytes of data)

TERMINAL RESPONSE: SEND DATA 11.1.4

Logically:

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: ME

Destination device: UICC

Page 217: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 217 of 606

Result

General Result: Command performed successfully

Channel data length: 204 bytes of space available in the Tx buffer

PROACTIVE COMMAND: SEND DATA 11.1.5

Logically:

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 34 35 .. FF (204 Bytes of data)

TERMINAL RESPONSE: SEND DATA 11.1.5

Logically:

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in the Tx buffer

11.3.4.2 Test Sequence No 2: (SEND DATA - Default APN Always–ON - Only SingleAPN supported - with different APN - BUFFER FULLY USED)

Initial ConditionsNone

Step Direction Sequence Expected Result

1 ME ME is connected to the USS and thefirst PDN to the APN for “Always onconnection” (web.network.com) hasbeen already established.

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 11.2.1

SEE OPEN CHANNEL SEQ 11.2.1

Page 218: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 218 of 606

Step Direction Sequence Expected Result

3 MEUICC FETCH

4 UICCME

PROACTIVE COMMAND: OPENCHANNEL 11.2.1

5 ME User The ME may display channel openinginformation

6 ME USS The terminal shall not send a PDPcontext activation request

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 11.2.1

[Command performed successfully]

8 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.1

9 MEUICC FETCH

10 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 11.1.1

Send 1024 Bytes of data by packets of205 Bytes

11 MEUICC

TERMINAL RESPONSE: SENDDATA (store mode) 11.1.1

[Command performed successfully]

12 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.2

13 MEUICC FETCH

14 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 11.1.2

[200 Bytes]

15 MEUICC

TERMINAL RESPONSE: SENDDATA (store mode) 11.1.2

[Command performed successfully]

16 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.3

17 MEUICC FETCH

18 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 11.1.3

[200 Bytes]

19 MEUICC

TERMINAL RESPONSE: SENDDATA (store mode) 11.1.3

[Command performed successfully]

20 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.4

21 MEUICC FETCH

22 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 11.1.4

[200 Bytes]

23 MEUICC

TERMINAL RESPONSE: SENDDATA (store mode) 11.1.4

[Command performed successfully]

24 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.5

Page 219: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 219 of 606

Step Direction Sequence Expected Result

25 MEUICC FETCH

26 UICCME

PROACTIVE COMMAND: SENDDATA (immediate) 11.1.5

[200 Bytes]

27 ME USS Transfer 1000 Bytes of data to theUSS through channel 1

28 MEUICC

TERMINAL RESPONSE: SENDDATA (immediate) 11.1.5

[Command performed successfully]

11.3.4.3 Test Sequence No 3: (SEND DATA - Default APN Always-ON - APN empty -BUFFER FULLY USED)

Initial ConditionsNone

Step Direction Sequence Expected Result1 ME ME is connected to the USS and the

first PDN to the APN for “Always onconnection” (web.network.com) hasbeen already established.

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 11.3.1

See OPEN CHANNEL SEQ 11.3.1

3 MEUICC FETCH

4 UICCME

PROACTIVE COMMAND: OPENCHANNEL 11.3.1

5 ME User The ME may display channel openinginformation

6 ME USS The terminal shall not send a PDPcontext activation request

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 11.3.1

[Command performed successfully]

8 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.1

9 MEUICC FETCH

10 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 11.1.1

Send 1024 Bytes of data by packets of205 Bytes

11 MEUICC

TERMINAL RESPONSE: SENDDATA (store mode) 11.1.1

[Command performed successfully]

12 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.2

13 MEUICC FETCH

14 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 11.1.2

[205 Bytes]

Page 220: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 220 of 606

Step Direction Sequence Expected Result15 ME

UICCTERMINAL RESPONSE: SENDDATA (store mode) 11.1.2

[Command performed successfully]

16 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.3

17 MEUICC FETCH

18 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 11.1.3

[205 Bytes]

19 MEUICC

TERMINAL RESPONSE: SENDDATA (store mode) 11.1.3

[Command performed successfully]

20 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.4

21 MEUICC FETCH

22 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 11.1.4

[205 Bytes]

23 MEUICC

TERMINAL RESPONSE: SENDDATA (store mode) 11.1.4

[Command performed successfully]

24 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.5

25 MEUICC FETCH

26 UICCME

PROACTIVE COMMAND: SENDDATA (immediate) 11.1.5

[204 Bytes]

27 ME USS Transfer 1000 Bytes of data to theUSS through channel 1

28 MEUICC

TERMINAL RESPONSE: SENDDATA (immediate) 11.1.5

[Command performed successfully]

11.3.4.4 Test Sequence No 4: (SEND DATA - Default APN Always-ON - APN empty -BUFFER FULLY USED - Default Bearer Type used)

Initial Conditions

None

Step Direction Sequence Expected Result

1 ME ME is connected to the USS and thefirst PDN to the APN for “Always onconnection” (web.network.com) hasbeen already established.

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 11.4.1

See OPEN CHANNEL SEQ 11.4.1

3 MEUICC FETCH

4 UICC PROACTIVE COMMAND: OPEN

Page 221: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 221 of 606

Step Direction Sequence Expected ResultME CHANNEL 11.4.1

5 ME User The ME may display channel openinginformation

6 ME USS The terminal shall not send a PDPcontext activation request

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 11.4.1

[Command performed successfully]

8 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.1

9 MEUICC FETCH

10 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 11.1.1

Send 1024 Bytes of data by packets of205 Bytes

11 MEUICC

TERMINAL RESPONSE: SENDDATA (store mode) 11.1.1

[Command performed successfully]

12 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.2

13 MEUICC FETCH

14 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 11.1.2

[205 Bytes]

15 MEUICC

TERMINAL RESPONSE: SENDDATA (store mode) 11.1.2

[Command performed successfully]

16 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.3

17 MEUICC FETCH

18 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 11.1.3

[205 Bytes]

19 MEUICC

TERMINAL RESPONSE: SENDDATA (store mode) 11.1.3

[Command performed successfully]

20 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.4

21 MEUICC FETCH

22 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 11.1.4

[205 Bytes]

23 MEUICC

TERMINAL RESPONSE: SENDDATA (store mode) 11.1.4

[Command performed successfully]

24 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 11.1.5

25 MEUICC FETCH

26 UICC PROACTIVE COMMAND: SEND [204 Bytes]

Page 222: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 222 of 606

Step Direction Sequence Expected ResultME DATA (immediate) 11.1.5

27 ME USS Transfer 1024 Bytes of data to theUSS through channel 1

28 MEUICC

TERMINAL RESPONSE: SENDDATA (immediate) 11.1.5

[Command performed successfully]

Page 223: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 223 of 606

12 Remote Management of NFC Services

12.1 General overviewThis chapter addresses the remote management of NFC services. The objective is toensure that the device allows remote application management according to GSMArequirements.

The test cases are grouped in a sub section testing the basic remote management functionsof the device and a sub section covering use cases with approach to handle end-2-endfunctionalities.

The list of conformance requirements tested within this section is listed in the table insection Error! Reference source not found..

12.2 Conformance requirementsTS26_NFC_REQ_078 The mobile device SHALL support BIP in UICC client mode for UDP.

TS26_NFC_REQ_079 The mobile device SHALL support BIP in UICC client mode for TCP.

TS26_NFC_REQ_080 The mobile device SHALL support two concurrent channels, BIP in UICCclient mode.

TS26_NFC_REQ_081 The mobile device SHALL support SMS push (per ETSI TS 102.226 and3GPP TS 31.116) to establish an open BIP channel as per ETSI TS102.223 Open Channel Command

TS26_NFC_REQ_088 The device SHALL support the letter class “e” with the following commandsand events:

Proactive command: OPEN CHANNEL (UICC in client mode andwith the support of UDP/TCP bearer)

Proactive command: CLOSE CHANNEL Proactive command: RECEIVE DATA Proactive command: SEND DATA Proactive command: G ET CHANNEL STATUS Event download: Data available Event download: Channel status

TS26_NFC_REQ_120 The device SHALL support the BIP session regardless of incoming oroutgoing calls, incoming or outgoing MMS, SMS.Note: This is not applicable if the device is on a 2G network.

12.3 Basic Remote Management

12.3.1 General overviewThis section addresses the testing of the Bearer Independent Protocol (BIP) used in remotemanagement of NFC services.

The list of conformance requirements tested within this section is listed in the table insection Error! Reference source not found..

Page 224: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 224 of 606

12.3.2 Conformance requirementsTS26_NFC_REQ_078 The mobile device SHALL support BIP in UICC client mode for UDP.

TS26_NFC_REQ_079 The mobile device SHALL support BIP in UICC client mode for TCP.

TS26_NFC_REQ_080 The mobile device SHALL support two concurrent channels, BIP in UICCclient mode.

TS26_NFC_REQ_081 The mobile device SHALL support SMS push (per ETSI TS 102.226) toestablish an open BIP channel as per ETSI TS 102.223 Open ChannelCommand

TS26_NFC_REQ_088 The device SHALL support the letter class “e” with the following commandsand events:

Proactive command: OPEN CHANNEL (UICC in client mode andwith the support of UDP/TCP bearer)

Proactive command: CLOSE CHANNEL Proactive command: RECEIVE DATA Proactive command: SEND DATA Proactive command: G ET CHANNEL STATUS Event download: Data available Event download: Channel status

12.3.3 Test Cases

12.3.3.1 Remote management in BIP

Test PurposeTo ensure the DUT allows remote management over the Bearer Independent Protocol

Referenced requirement TS26_NFC_REQ_078 TS26_NFC_REQ_079 TS26_NFC_REQ_080 TS26_NFC_REQ_088

Related Specs/Docs: ETSI TS 102 223 [22]

Test ProcedureThe DUT shall pass all test cases referenced in Table B.6.1 and Table B.6.2.

12.3.3.2 OPEN CHANNEL

Test PurposeTo verify OPEN CHANNEL related to Default (network) Bearer, for UICC in client mode forUDP.

Referenced requirement TS26_NFC_REQ_078

Page 225: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 225 of 606

Initial Conditions All TCs are defined by making use of Bearer Type ‘03’= default bearer for requested

transport layer. The DUT is registered in idle mode and is configured to not establish a PDN

connection triggered by the OS itself

Test Sequence No 1: (OPEN CHANNEL, No APN, immediate link

stblsh nt, fult fo qustd t nspot ly, o loclea i me Dea Bearer rre ee ra raerN a

ddss, nolpha re a

dntf )aieiier

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 UserME

Set and activate APN "TestGp.rs" in the terminalconfiguration if required

[see initial conditions]

2 UICCME

PROACTIVE COMMAND PENDING: OPENCHANNEL 1.1

3 MEUICC

FETCH

4 UICCME

PROACTIVE COMMAND: OPEN CHANNEL 1.1

5 MEUser

The ME may display channel openinginformation

6 MEUSS

PDP context activation request

7 USSME

PDP context activation accept

8 MEUICC

TERMINAL RESPONSE: OPEN CHANNEL 1.1 [Command performedsuccessfully]

PROACTIVE COMMAND: OPEN CHANNEL 1.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device: ME

Bearer description

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: 1400

12.3.3.2.1

Page 226: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 226 of 606

Text String: UserLog (User login)

Text String: UserPwd (User password)

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 1.1

Command details

Command number: 1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status Channel identifier 1 and link established or PDP contextactivated

Bearer description

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: 1400

Test Sequence No 2: (OPEN CHANNEL, with APN, immediate link

stblsh nt, fult fo qustd t nspot ly, nolphea i me Dea Bearer rre ee ra raer a a

dntf )ieiier

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 2.1

2 MEUICC

FETCH

3 UICCME

PROACTIVE COMMAND: OPENCHANNEL 2.1

4 MEUser

The ME may display channel openinginformation

5 ME USS PDP context activation request

12.3.3.2.2

Page 227: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 227 of 606

Step Direction Sequence Expected Result

6 USS ME PDP context activation accept

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 2.1

[Command performed successfully]

PROACTIVE COMMAND: OPEN CHANNEL 2.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device: ME

Bearer description

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: 1400

Network access name (APN): TestGp.rs

Text String: UserLog (User login)

Text String: UserPwd (User password)

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 2.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status: Channel identifier 1 and link established or PDPcontext activated

Bearer Description:

Bearer Type: Default Bearer for requested transport layer

Page 228: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 228 of 606

Buffer

Buffer size 1400

Test Sequence No 3: (OPEN CHANNEL, with alpha identifier,

dt lnkstblsh nt, fult fo qustd t nspotimmeiaei ea i me Dea Bearer rre ee ra r

ly)aer

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 3.1

2 MEUICC

FETCH

3 UICCME

PROACTIVE COMMAND: OPENCHANNEL 3.1

4 MEUser

Confirmation phase with alpha ID “Open ID”

5 UserME

Confirm

6 ME USS PDP context activation request

7 USS ME PDP context activation accept

8 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 1.1

[Command performed successfully]

PROACTIVE COMMAND: OPEN CHANNEL 3.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device: ME

Alpha Identifier Open ID

Bearer description

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: 1400

Network access name: TestGp.rs

12.3.3.2.3

Page 229: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 229 of 606

Text String: UserLog (User login)

Text String: UserPwd (User password)

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address 01.01.01.01

Test Sequence No 4: (OPEN CHANNEL, with null alpha identifier,

dt lnkstblsh nt,immeiaei ea i me

fult fo qustd t nspotDea Bearer rre ee ra r

ly)aer

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 4.1

2 MEUICC

FETCH

3 UICCME

PROACTIVE COMMAND: OPENCHANNEL 4.1

4 MEUser

Confirmation phase [The ME should not give any information]

5 UserME

Confirm [Only if the ME asks for user confirmation]

6 ME USS PDP context activation request

7 USS ME PDP context activation accept

8 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 1.1

[Command performed successfully]

PROACTIVE COMMAND: OPEN CHANNEL 4.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source de vice: UICC

Destination device: ME

Alpha Identifier Null

Bearer description

Bearer type: Default Bearer for requested transport layer

12.3.3.2.4

Page 230: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 230 of 606

Buffer

Buffer size: 1400

Network access name: TestGp.rs

Text String: UserLog (User login)

Text String: UserPwd (User password)

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address 01.01.01.01

Test Sequence No 5: (OPEN CHANNEL, command performed with

odfctons (buff sz), dt lnkstblsh nt, fultm iiai erieimmeiaei ea i me Dea

fo qustdBearer rre ee

t nspot ly)ra raer

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 5.1

2 MEUICC

FETCH

3 UICCME

PROACTIVE COMMAND: OPENCHANNEL 5.1

4 MEUser

The ME may display channel openinginformation

5 ME USS PDP context activation request

6 USS ME PDP context activation accept

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 5.1

[Command performed with modification]

PROACTIVE COMMAND: OPEN CHANNEL 5.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device: ME

Bearer description

Bearer type: Default Bearer for requested transport layer

12.3.3.2.5

Page 231: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 231 of 606

Buffer

Buffer size: 65535

Network access name: TestGp.rs

Text String: UserLog (User login)

Text String: UserPwd (User password)

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 5.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed with modifications (07)

Channel status Channel identifier 1 and link established or PDP context activated

Bearer description

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: The buffer size TLV shall be attached and contain the valuestated in Table 6a/1 "Preferred buffer size supported by the terminal forOpen Channel command".

Test Sequence No 6A: (OPEN CHANNEL, user rejection, immediate

lnkstblsh nt, fult fo qustd t nspot ly,i ea i me Dea Bearer rre ee ra raer

opn co nd thlphdntf ,)e mma wi a aieiier

nt lIiia

ondtonsC ii

None

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 6.1

2 MEUICC

FETCH

12.3.3.2.6

Page 232: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 232 of 606

Step Direction Sequence Expected Result

3 UICCME

PROACTIVE COMMAND: OPENCHANNEL 6.1

4 MEUser

Confirmation phase with alpha ID [The ME shall display “Open ID”]

5 UserME

Reject

6 ME USS No PDP context activation request issent to the USS

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 6.1

[User did not accept the proactivecommand]

PROACTIVE COMMAND: OPEN CHANNEL 6.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device: ME

Alpha Identifier "Open ID"

Bearer description

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: 1400

Network access name: TestGp.rs

Text String: UserLog (User login)

Text String: UserPwd (User password)

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 6.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Page 233: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 233 of 606

Source device: ME

Destination device: UICC

Result

General Result: User did not accept the proactive command

Channel status The presence and content of this TLV shall not be verified

Bearer description

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: Because the value depends in this case on the terminal'simplementation, it shall be ignored.

Test Sequence No 6B: (OPEN CHANNEL, User rejection, immediate

lnkstblsh nt, fult fo qustd t nspot ly,i ea i me Dea Bearer rre ee ra raer

opn co nd thlphe mma wi a ai

dntf )eiier

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 6.1

2 MEUICC

FETCH

3 UICCME

PROACTIVE COMMAND: OPENCHANNEL 6.1

4 ME USS PDP context activation request

5 USS ME PDP context activation accept

6 MEUser

Confirmation phase with alpha ID [The ME shall display “Open ID”]

7 UserME

Reject

8 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 6.1

[User did not accept the proactivecommand]

PROACTIVE COMMAND: OPEN CHANNEL 6.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

12.3.3.2.7

Page 234: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 234 of 606

Device identities

Source device: UICC

Destination device: ME

Alpha Identifier "Open ID"

Bearer description

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: 1400

Network access name: TestGp.rs

Text String: UserLog (User login)

Text String: UserPwd (User password)

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 6.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: User did not accept the proactive command

Channel status The presence and content of this TLV shall not be verified

Bearer description

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: Because the value depends in this case on the terminal'simplementation, it shall be ignored.

12.3.3.3 CLOSE CHANNEL

Test PurposeTo verify CLOSE CHANNEL related to Default (network) Bearer, for UICC in client mode forUDP

Page 235: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 235 of 606

Referenced requirement TS26_NFC_REQ_078

Initial Conditions All TCs are defined by making use of Bearer Type ‘03’= default bearer for requested

transport layer. The DUT is registered in idle mode and is configured to not establish a PDN

connection triggered by the OS itself

Test Sequence No 1: (CLOSE CHANNEL, successful)

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 1.1

See initial conditions

2 MEUICC

FETCH

3 UICCME

PROACTIVE COMMAND:OPEN CHANNEL 1.1

4 ME User The ME may display channel openinginformation

5 ME USS PDP context activation request

6 USS ME PDP context activation accept

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 1.1

[Command performed successfully]

8 UICCME

PROACTIVE COMMAND PENDING:CLOSE CHANNEL 1.1

9 MEUICC

FETCH

10 UICCME

PROACTIVE COMMAND: CLOSECHANNEL 1.1

11 ME USS PDP context deactivation request

12 USS ME PDP context deactivation accept

13 MEUICC

TERMINAL RESPONSE CLOSECHANNEL 1.1

[Command performed successfully]

PROACTIVE COMMAND: OPEN CHANNEL 1.1

Command details

Command number:1

12.3.3.3.1

Page 236: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 236 of 606

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device: ME

Bearer

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: 1000

Network access name: TestGp.rs

Text String: UserLog (User login)

Text String: UserPwd (User password)

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 1.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status Channel identifier 1 and link established or PDP context activated

Bearer description

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: 1000

PROACTIVE COMMAND: CLOSE CHANNEL 1.1

Command details

Command number:1

Command type: CLOSE CHANNEL

Command qualifier: RFU

Page 237: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 237 of 606

Device identities

Source device: UICC

Destination device: Channel 1

TERMINAL RESPONSE: CLOSE CHANNEL 1.1

Command details

Command number:1

Command type: CLOSE CHANNEL

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Test Sequence No 2: (CLOSE CHANNEL, with an invalid channel

dntf )ieiier

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 1.1

See initial conditions

2 MEUICC

FETCH

3 UICCME

PROACTIVE COMMAND: OPENCHANNEL 1.1

4 MEUser

The ME may display channel openinginformation

5 ME USS PDP context activation request

6 USS ME PDP context activation accept

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 1.1

[Command performed successfully]

8 UICCME

PROACTIVE COMMAND PENDING:CLOSE CHANNEL 2.1

9 MEUICC

FETCH

10 UICCME

PROACTIVE COMMAND: CLOSECHANNEL 2.1

11 MEUICC

TERMINAL RESPONSE CLOSECHANNEL 2.1

[Invalid channel number]

12.3.3.3.2

Page 238: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 238 of 606

PROACTIVE COMMAND: CLOSE CHANNEL 2.1

Command details

Command number:1

Command type: CLOSE CHANNEL

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 2

TERMINAL RESPONSE: CLOSE CHANNEL 2.1

Command details

Command number:1

Command type: CLOSE CHANNEL

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Bearer Independent Protocol error

Additional Result: Channel identifier not valid

Test Sequence No 3: (CLOSE CHANNEL, on an already closed

chnnl)a e

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 1.1

See initial conditions

2 MEUICC

FETCH

3 UICCME

PROACTIVE COMMAND: OPENCHANNEL 1.1

4 ME User The ME may display channel openinginformation

5 ME USS PDP context activation request

6 USS ME PDP context activation accept

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 1.1

[Command performed successfully]

12.3.3.3.3

Page 239: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 239 of 606

Step Direction Sequence Expected Result

8 UICCME

PROACTIVE COMMAND PENDING:CLOSE CHANNEL 1.1

9 MEUICC

FETCH

10 UICCME

PROACTIVE COMMAND: CLOSECHANNEL 1.1

11 ME USS PDP context deactivation request

12 USS ME PDP context deactivation accept

13 MEUICC

TERMINAL RESPONSE CLOSECHANNEL 1.1

[Command performed successfully]

14 UICCME

PROACTIVE COMMAND PENDING:CLOSE CHANNEL 1.1

15 MEUICC

FETCH

16 UICCME

PROACTIVE COMMAND: CLOSECHANNEL 1.1

17 MEUICC

TERMINAL RESPONSE CLOSECHANNEL 3.1AorTERMINAL RESPONSE CLOSECHANNEL 3.1B

[Channel closed]

[Channel identifier invalid]

TERMINAL RESPONSE: CLOSE CHANNEL 3.1A

Command details

Command number:1

Command type: CLOSE CHANNEL

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Bearer Independent Protocol error

Additional Result: Channel closed

TERMINAL RESPONSE: CLOSE CHANNEL 3.1B

Command details

Command number:1

Command type: CLOSE CHANNEL

Command qualifier: RFU

Device identities

Page 240: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 240 of 606

Source device: ME

Destination device: UICC

Result

General Result: Bearer Independent Protocol error

Additional Result: Channel identifier invalid

12.3.3.4 RECEIVE DATA

Test PurposeTo verify RECEIVE DATA related to Default (network) Bearer, for UICC in client mode forUDP

Referenced requirement TS26_NFC_REQ_078

Initial Conditions All TCs are defined by making use of Bearer Type ‘03’= default bearer for requested

transport layer. The DUT is registered in idle mode and is configured to not establish a PDN

connection triggered by the OS itself

Test Sequence No 1: (RECEIVE DATA)

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST 1.1 PENDING

2 MEUICC FETCH

3 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST 1.1

4 MEUICC

TERMINAL RESPONSE: SET UPEVENT LIST 1.1

5 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 1.1

See initial conditions

6 MEUICC FETCH

7 UICCME

PROACTIVE COMMAND: OPENCHANNEL 1.1

8 ME User The ME may display channel openinginformation

9 ME USS PDP context activation request

12.3.3.4.1

Page 241: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 241 of 606

Step Direction Sequence Expected Result

10 USS ME PDP context activation accept

11 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 1.1

[Command performed successfully]

12 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 1.1

13 MEUICC FETCH

14 UICCME

PROACTIVE COMMAND: SENDDATA (immediate) 1.1

15 ME USS Transfer 8 Bytes of data to the USSthrough channel 1

[To retrieve ME's port number]

16 MEUICC

TERMINAL RESPONSE: SEND DATA(immediate) 1.1

[Command performed successfully]

17 USS ME Transfer 1000 Bytes of data to the MEthrough channel 1 using the ME's portnumber, which was retrieved in step15

18 MEUICC

ENVELOPE: EVENT DOWNLOAD -Data available 1.1

(1000 Bytes of data in the ME buffer)

19 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 1.1

20 MEUICC FETCH

21 UICCME

PROACTIVE COMMAND: RECEIVEDATA 1.1

200 Bytes

22 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 1.1

23 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 1.2

24 MEUICC FETCH

25 UICCME

PROACTIVE COMMAND: RECEIVEDATA 1.2

200 Bytes

26 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 1.2

27 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 1.3

28 MEUICC FETCH

29 UICCME

PROACTIVE COMMAND: RECEIVEDATA 1.3

200 Bytes

30 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 1.3

Page 242: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 242 of 606

Step Direction Sequence Expected Result

31 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 1.4

32 MEUICC FETCH

33 UICCME

PROACTIVE COMMAND: RECEIVEDATA 1.4

200 Bytes

34 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 1.4

35 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 1.5

36 MEUICC FETCH

37 UICCME

PROACTIVE COMMAND: RECEIVEDATA 1.5

200 Bytes

38 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 1.5

PROACTIVE COMMAND: SET UP EVENT LIST 1.1

Command details

Command number:1

Command type: SET UP EVENT LIST

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: ME

Event list Data available

TERMINAL RESPONSE: SET UP EVENT LIST 1.1

Command details

Command number:1

Command type: SET UP EVENT LIST

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

PROACTIVE COMMAND: OPEN CHANNEL 1.1

Command details

Command number:1

Page 243: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 243 of 606

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device: ME

Bearer

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: 1000

Network access name: TestGp.rs

Text String: UserLog (User login)

Text String: UserPwd (User password)

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 1.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status Channel identifier 1 and link established or PDP context activated

Bearer description

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: 1000

PROACTIVE COMMAND: SEND DATA 1.1

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Send Immediately

Page 244: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 244 of 606

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 00 01 .. 07 (8 Bytes of data)

TERMINAL RESPONSE: SEND DATA 1.1

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in theTx buffer

ENVELOPE: EVENT DOWNLOAD - Data available 1.1

Event list

Event: Data available

Device identities

Source device: ME

Destination device: UICC

Channel status

Channel status: Channel 1 open, link established

Channel Data Length

Channel data length: FF (more than 255 bytes are available)

PROACTIVE COMMAND: RECEIVE DATA 1.1

Command details

Command number:1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: 200

Page 245: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 245 of 606

PROACTIVE COMMAND: RECEIVE DATA 1.2

Command details

Command number:2

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: 200

PROACTIVE COMMAND: RECEIVE DATA 1.3

Command details

Command number:3

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: 200

PROACTIVE COMMAND: RECEIVE DATA 1.4

Command details

Command number:4

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: 200

PROACTIVE COMMAND: RECEIVE DATA 1.5

Command details

Command number:5

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Page 246: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 246 of 606

Destination device: Channel 1

Channel Data Length

Channel Data Length: 200

TERMINAL RESPONSE: RECEIVE DATA 1.1

Command details

Command number:1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data:00 01 02 .. C7 (200 Bytes of data)

Channel data length: FF

TERMINAL RESPONSE: RECEIVE DATA 1.2

Command details

Command number:2

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data:C8 C9 CA .. FF 00 01 .. 8F (200 Bytes of data)

Channel data length: FF

TERMINAL RESPONSE: RECEIVE DATA 1.3

Command details

Command number:3

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Page 247: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 247 of 606

Channel Data:90 91 .. FF 00 01 – 57 (200 Bytes of data)

Channel data length: FF

TERMINAL RESPONSE: RECEIVE DATA 1.4

Command details

Command number:4

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data:58 59 .. FF 00 01 .. 1F (200 Bytes of data)

Channel data length: C8

TERMINAL RESPONSE: RECEIVE DATA 1.5

Command details

Command number:5

Command type: RECEIVE DATA

Command qualifier: RFU Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data:20 21 .. E7 (200 Bytes of data)

Channel data length: 00

12.3.3.5 SEND DATA

Test PurposeTo verify SEND DATA related to Default (network) Bearer, for UICC in client mode for UDP

Referenced requirement TS26_NFC_REQ_078

Initial Conditions All TCs are defined by making use of Bearer Type ‘03’ = default bearer for requested

transport layer. The DUT is registered in idle mode and is configured to not establish a PDN

connection triggered by the OS itself

Page 248: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 248 of 606

Test Sequence No 1: (SEND DATA, immediate mode)

nt l ondtonsIiiaC ii

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 1.1

See initial conditions

2 MEUICC FETCH

3 UICCME

PROACTIVE COMMAND: OPENCHANNEL 1.1

4 MEUser

The ME may display channel openinginformation

5 ME USS PDP context activation request

6 USS ME PDP context activation accept

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 1.1

[Command performed successfully]

8 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 1.1

9 MEUICC FETCH

10 UICCME

PROACTIVE COMMAND: SENDDATA (immediate) 1.1

11 ME USS Transfer 8 Bytes of data to the USSthrough channel 1

12 MEUICC

TERMINAL RESPONSE: SEND DATA(immediate) 1.1

[Command performed successfully]

PROACTIVE COMMAND: OPEN CHANNEL 1.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device: ME

Bearer

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: 1000

Network access name: TestGp.rs

Text String: UserLog (User login)

12.3.3.5.1

Page 249: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 249 of 606

Text String: UserPwd (User password)

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 1.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status Channel identifier 1 and link established or PDP context activated

Bearer description

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: 1000

PROACTIVE COMMAND: SEND DATA 1.1

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 00 01 .. 07 (8 Bytes of data)

TERMINAL RESPONSE: SEND DATA 1.1

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: ME

Page 250: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 250 of 606

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in theTx buffer

Test Sequence No 2: (SEND DATA, Store mode)

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 1.1

See initial conditions

2 MEUICC FETCH

3 UICCME

PROACTIVE COMMAND: OPENCHANNEL 1.1

4 MEUser

The ME may display channel openinginformation

5 ME USS PDP context activation request

6 USS ME PDP context activation accept

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 1.1

[Command performed successfully]

8 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 2.1

9 MEUICC FETCH

10 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 2.1

Send 500 Bytes of data (200 + 200 +100)

11 MEUICC

TERMINAL RESPONSE: SEND DATA(store mode) 2.1

[Command performed successfully]

12 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 2.2

13 MEUICC FETCH

14 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 2.2

[200 Bytes]

15 MEUICC

TERMINAL RESPONSE: SEND DATA(store mode) 2.2

[Command performed successfully]

16 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 2.3

12.3.3.5.2

Page 251: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 251 of 606

Step Direction Sequence Expected Result

17 MEUICC FETCH

18 UICCME

PROACTIVE COMMAND: SENDDATA (Immediate mode) 2.3

[100 Bytes]

19 ME USS Transfer 500 Bytes of data to the USSthrough channel 1

20 MEUICC

TERMINAL RESPONSE: SEND DATA(Immediate mode) 2.3

[Command performed successfully]

PROACTIVE COMMAND: SEND DATA 2.1

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 00 01 .. C7 (200 Bytes of data)

TERMINAL RESPONSE: SEND DATA 2.1

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in theTx buffer

PROACTIVE COMMAND: SEND DATA 2.2

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: UICC

Page 252: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 252 of 606

Destination device: Channel 1

Channel Data

Channel Data: C8 C9 .. FF 00 01 .. 8F (200 Bytes of data)

TERMINAL RESPONSE: SEND DATA 2.2

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in theTx buffer

PROACTIVE COMMAND: SEND DATA 2.3

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Immediate mode

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 90 91 .. F3 (100 Bytes of data)

TERMINAL RESPONSE: SEND DATA 2.3

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Immediate mode

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in theTx buffer

Page 253: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 253 of 606

Test Sequence No 3: (SEND DATA, Tx buffer fully used, Store mode)

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 1.1

See initial conditions

2 MEUICC FETCH

3 UICCME

PROACTIVE COMMAND: OPENCHANNEL 1.1

4 MEUser

The ME may display channel openinginformation

5 ME USS PDP context activation request

6 USS ME PDP context activation accept

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 1.1

[Command performed successfully]

8 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 3.1

9 MEUICC FETCH

10 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 3.1

Send 1000 Bytes of data by packets of200 Bytes

11 MEUICC

TERMINAL RESPONSE: SEND DATA(store mode) 3.1

[Command performed successfully]

12 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 3.2

13 MEUICC FETCH

14 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 3.2

[200 Bytes]

15 MEUICC

TERMINAL RESPONSE: SEND DATA(store mode) 3.2

[Command performed successfully]

16 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 3.3

17 MEUICC FETCH

18 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 3.3

[200 Bytes]

19 MEUICC

TERMINAL RESPONSE: SEND DATA(store mode) 3.3

[Command performed successfully]

20 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 3.4

21 MEUICC FETCH

12.3.3.5.3

Page 254: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 254 of 606

Step Direction Sequence Expected Result

22 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 3.4

[200 Bytes]

23 MEUICC

TERMINAL RESPONSE: SEND DATA(store mode) 3.4

[Command performed successfully]

24 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 3.5

25 MEUICC FETCH

26 UICCME

PROACTIVE COMMAND: SENDDATA (immediate) 3.5

[200 Bytes]

27 ME USS Transfer 1000 Bytes of data to theUSS through channel 1

28 MEUICC

TERMINAL RESPONSE: SEND DATA(immediate) 3.5

[Command performed successfully]

PROACTIVE COMMAND: SEND DATA 3.1

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 00 01 02 .. C7 (200 Bytes of data)

TERMINAL RESPONSE: SEND DATA 3.1

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in theTx buffer

PROACTIVE COMMAND: SEND DATA 3.2

Page 255: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 255 of 606

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: C8 C9 CA .. FF 00 01 .. 8F (200 Bytes of data)

TERMINAL RESPONSE: SEND DATA 3.2

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in theTx buffer

PROACTIVE COMMAND: SEND DATA 3.3

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 90 91 .. FF 00 01 .. 57 (200 Bytes of data)

TERMINAL RESPONSE: SEND DATA 3.3

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Page 256: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 256 of 606

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in theTx buffer

PROACTIVE COMMAND: SEND DATA 3.4

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 58 59 .. FF 00 01 .. 1F (200 Bytes of data)

TERMINAL RESPONSE: SEND DATA 3.4

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: 200 bytes of space available in the Tx buffer

PROACTIVE COMMAND: SEND DATA 3.5

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 20 21 .. E7 (200 Bytes of data)

Page 257: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 257 of 606

TERMINAL RESPONSE: SEND DATA 3.5

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in theTx buffer

Test Sequence No 4: (SEND DATA, 2 consecutive SEND DATA Store

od)m e

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 1.1

See initial conditions

2 MEUICC FETCH

3 UICCME

PROACTIVE COMMAND: OPENCHANNEL 1.1

4 MEUser

The ME may display channel openinginformation

5 ME USS PDP context activation request

6 USS ME PDP context activation accept

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 1..1

[Command performed successfully]

8 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 3.1

9 MEUICC FETCH

10 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 3.1

Send 1000 Bytes of data by packets of200 Bytes

11 MEUICC

TERMINAL RESPONSE: SEND DATA(store mode) 3.1

[Command performed successfully]

12 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 3.2

12.3.3.5.4

Page 258: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 258 of 606

Step Direction Sequence Expected Result

13 MEUICC FETCH

14 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 3.2

[200 Bytes]

15 MEUICC

TERMINAL RESPONSE: SEND DATA(store mode) 3.2

[Command performed successfully]

16 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 3.3

17 MEUICC FETCH

18 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 3.3

[200 Bytes]

19 MEUICC

TERMINAL RESPONSE: SEND DATA(store mode) 3.3

[Command performed successfully]

20 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 3.4

21 MEUICC FETCH

22 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 3.4

[200 Bytes]

23 MEUICC

TERMINAL RESPONSE: SEND DATA(store mode) 3.4

[Command performed successfully]

24 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 3.5

25 MEUICC FETCH

26 UICCME

PROACTIVE COMMAND: SENDDATA (immediate) 3.5

[200 Bytes]

27 ME USS Transfer 1000 Bytes of data to theUSS through channel 1

28 MEUICC

TERMINAL RESPONSE: SEND DATA(immediate) 3.5

[Command performed successfully]

29 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 3.1

30 MEUICC FETCH

31 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 3.1

Send 1000 Bytes of data by packets of200 Bytes

32 MEUICC

TERMINAL RESPONSE: SEND DATA(store mode) 3.1

[Command performed successfully]

33 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 3.2

34 MEUICC FETCH

Page 259: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 259 of 606

Step Direction Sequence Expected Result

35 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 3.2

[200 Bytes]

36 MEUICC

TERMINAL RESPONSE: SEND DATA(store mode) 3.2

[Command performed successfully]

37 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 3.3

38 MEUICC FETCH

39 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 3.3

[200 Bytes]

40 MEUICC

TERMINAL RESPONSE: SEND DATA(store mode) 3.3

[Command performed successfully]

41 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 3.4

42 MEUICC FETCH

43 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 3.4

[200 Bytes]

44 MEUICC

TERMINAL RESPONSE: SEND DATA(store mode) 3.4

[Command performed successfully]

45 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 3.5

46 MEUICC FETCH

47 UICCME

PROACTIVE COMMAND: SENDDATA (immediate) 3.5

[200 Bytes]

48 ME USS Transfer 1000 Bytes of data to theUSS through channel 1

49 MEUICC

TERMINAL RESPONSE: SEND DATA(immediate) 3.5

[Command performed successfully]

Test Sequence No 5: (SEND DATA, immediate mode with a bad

chnnldntf )a eieiier

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 1.1

See initial conditions

2 MEUICC FETCH

3 UICCME

PROACTIVE COMMAND: OPENCHANNEL 1.1

12.3.3.5.5

Page 260: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 260 of 606

Step Direction Sequence Expected Result

4 MEUser

The ME may display channel openinginformation

5 ME USS PDP context activation request

6 USS ME PDP context activation accept

7 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 1.1

[Command performed successfully]

8 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 5.1

9 MEUICC FETCH

10 UICCME

PROACTIVE COMMAND: SENDDATA (immediate) 5.1

11 MEUICC

TERMINAL RESPONSE: SEND DATA(immediate) 5.1

[Invalid channel number]

PROACTIVE COMMAND: SEND DATA 5.1

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: UICC

Destination device: Channel 2

Channel Data

Channel Data: 00 01 .. 07 (8 Bytes of data)

TERMINAL RESPONSE: SEND DATA 5.1

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Bearer Independent Protocol error (3A)

Additional Result: Channel identifier not valid (03)

Page 261: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 261 of 606

12.3.3.6 GET CHANNEL STATUS

Test PurposeTo verify GET CHANNEL STATUS related to Default (network) Bearer, for UICC in clientmode for UDP

Referenced requirement TS26_NFC_REQ_078

Initial ConditionsAll TCs are defined by making use of Bearer Type ‘03’= default bearer for requestedtransport layer.

Test Sequence No 1: (GET STATUS, without any BIP channel

opnd)ee

nt l ondtonsIiiaC iiNo channel has been opened.

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:GET CHANNEL STATUS 1.1

2 MEUICC FETCH

3 UICCME

PROACTIVE COMMAND: GETSTATUS 1.1

4 MEUICC

TERMINAL RESPONSE GETSTATUS 1.1AOrTERMINAL RESPONSE: GETSTATUS 1.1BOrTERMINAL RESPONSE: GETSTATUS 1.1C

[Command performed successfully]

PROACTIVE COMMAND: GET STATUS 1.1

Command details

Command number:1

Command type: GET STATUS

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: ME

TERMINAL RESPONSE: GET STATUS 1.1A

Command details

Command number:1

12.3.3.6.1

Page 262: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 262 of 606

Command type: GET STATUS

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

TERMINAL RESPONSE: GET STATUS 1.1B

Command details

Command number:1

Command type: GET STATUS

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status

Channel status: No Channel available, link not established or PDPcontext not activated

TERMINAL RESPONSE: GET STATUS 1.1C

Command details

Command number:1

Command type: GET STATUS

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status

Channel 1 status: Channel identifier 1, Link not established or PDPcontext not activated

Channel 2 status: Channel identifier 2, Link not established or PDPcontext not activated

.

Channel n status: Channel identifier n, Link not established or PDP context notactivated

Page 263: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 263 of 606

The number of channel status data objects shall be same as the number of channels(n)supported by the ME

Test Sequence No 2: (GET STATUS, with a BIP channel currently

opnd)ee

nt lIiia

ondtonsC ii

None

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 1.1

See initial conditions

2 MEUICC FETCH

3 UICCME

PROACTIVE COMMAND: OPENCHANNEL 1.1

4 ME USS PDP context activation request

5 USS ME PDP context activation accept

6 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 1.1

[Command performed successfully]

7 UICCME

PROACTIVE COMMAND PENDING:GET CHANNEL STATUS 2.1

8 MEUICC FETCH

9 UICCME

PROACTIVE COMMAND: GETSTATUS 2.1

10 MEUICC

TERMINAL RESPONSE GETSTATUS 2.1AOrTERMINAL RESPONSE: GETSTATUS 2.1B

[Command performed successfully]

PROACTIVE COMMAND: OPEN CHANNEL 1.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device: ME

Bearer

Bearer type: Default Bearer for requested transport layer

Buffer

12.3.3.6.2

Page 264: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 264 of 606

Buffer size: 1000

Network access name: TestGp.rs

Text String: UserLog (User login)

Text String: UserPwd (User password)

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 1.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status Channel identifier 1 and link established or PDP context activated

Bearer description

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: 1000

PROACTIVE COMMAND: GET STATUS 2.1

Command details

Command number:1

Command type: GET STATUS

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: ME

TERMINAL RESPONSE: GET STATUS 2.1A

Command details

Command number:1

Command type: GET STATUS

Command qualifier: RFU

Device identities

Page 265: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 265 of 606

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status

Channel status: Channel 1 open, link established or PDP contextactivated

TERMINAL RESPONSE: GET STATUS 2.1B

Command details

Command number:1

Command type: GET STATUS

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status

Channel 1 status: Channel identifier 1 open, Link established or PDPcontext activated

Channel 2 status: Channel identifier 2, Link not established or PDPcontext not activated

Channel n status: Channel identifier n, Link not established or PDPcontext not activated

The number of channel status data objects shall be same as the number of channels(n)supported by the ME

Test Sequence No 3: (GET STATUS, after a link dropped)

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:SET UP EVENT LIST 1.1

2 MEUICC FETCH

3 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST 1.1

4 MEUICC

TERMINAL RESPONSE: SET UPEVENT LIST 1.1

[Command performed successfully]

12.3.3.6.3

Page 266: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 266 of 606

Step Direction Sequence Expected Result

5 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 1.1

See initial conditions

6 MEUICC FETCH

7 UICCME

PROACTIVE COMMAND: OPENCHANNEL 1.1

8 ME USS PDP context activation request

9 USS ME PDP context activation accept

10 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 1.1

[Command performed successfully]

11 USS ME DROP LINK

12 MEUICC

ENVELOPE EVENT DOWNLOAD:CHANNEL STATUS 1.1

[Link dropped]

13 UICCME

PROACTIVE COMMAND PENDING:GET STATUS 1.1

14 MEUICC FETCH

15 UICCME

PROACTIVE COMMAND: GETSTATUS 1.1

16 MEUICC

TERMINAL RESPONSE: GETSTATUS 3.1AOrTERMINAL RESPONSE: GETSTATUS 3.1BOrTERMINAL RESPONSE: GETSTATUS 3.1COrTERMINAL RESPONSE: GETSTATUS 3.1DOrTERMINAL RESPONSE: GETSTATUS 3.1E

[Command performed successfully]

TERMINAL RESPONSE: GET STATUS 3.1A

Same as TERMINAL RESPONSE: GET STATUS 1.1A

TERMINAL RESPONSE: GET STATUS 3.1B

Same as TERMINAL RESPONSE: GET STATUS 1.1B

TERMINAL RESPONSE: GET STATUS 3.1C

Same as TERMINAL RESPONSE: GET STATUS 1.1C

Page 267: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 267 of 606

TERMINAL RESPONSE: GET STATUS 3.1D

Command details

Command number:1

Command type: GET STATUS

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status

Channel status: Channel 1, link dropped

TERMINAL RESPONSE: GET STATUS 3.1E

Command details

Command number:1

Command type: GET STATUS

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status

Channel 1 status: Channel identifier 1, link dropped

Channel 2 status: Channel identifier 2, Link not established or PDPcontext not activated

.

Channel n status: Channel identifier n, Link not established or PDPcontext not activated

The number of channel status data objects shall be same as the number of channels(n)supported by the ME

PROACTIVE COMMAND: SET UP EVENT LIST 1.1

Command details

Command number:1

Command type: SET UP EVENT LIST

Command qualifier: '00'

Device identities

Source device: UICC

Page 268: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 268 of 606

Destination device: ME

Event list

Event 1: Channel Status

TERMINAL RESPONSE: SET UP EVENT LIST 1.1

Command details

Command number:1

Command type: SET UP EVENT LIST

Command qualifier: '00'

Device identities

Source device: ME

Destination device: UICC

Result General Result: Command performed successfully

ENVELOPE EVENT DOWNLOAD: CHANNEL STATUS 1.1

Event list

Event list: Channel Status

Device identities

Source device: ME

Destination device: UICC

Channel status

Channel status: Channel 1, link dropped

12.3.3.7 Data available event

Test PurposeTo verify Data available event related to Default (network) Bearer, for UICC in client modefor UDP

Referenced requirement TS26_NFC_REQ_078

Initial ConditionsAll TCs are defined by making use of Bearer Type ‘03’ = default bearer for requestedtransport layer.

Test Sequence No 1: (EVENT DOWNLOAD - Data available)

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:SET UP EVENT LIST 1.1

12.3.3.7.1

Page 269: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 269 of 606

Step Direction Sequence Expected Result

2 MEUICC FETCH

3 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST 1.1

4 MEUICC

TERMINAL RESPONSE: SET UPEVENT LIST 1.1

5 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 1.1

See initial conditions

6 MEUICC FETCH

7 UICCME

PROACTIVE COMMAND: OPENCHANNEL 1.1

[Command performed successfully]

8 MEUser

The ME may display channel openinginformation

9 ME USS PDP context activation request

10 USS ME PDP context activation accept

11 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 1.1

12 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 1.1

13 MEUICC FETCH

14 UICCME

PROACTIVE COMMAND: SENDDATA (immediate) 1.1

15 ME USS Transfer 8 Bytes of data to the USSthrough channel 1

[To retrieve ME's port number]

16 MEUICC

TERMINAL RESPONSE: SEND DATA(immediate) 1.1

[Command performed successfully]

17 USS ME Send data through the BIP channelusing the ME's port number, whichwas retrieved in step 11

18 MEUICC

ENVELOPE 1.1 (Event-DataAvailable)

PROACTIVE COMMAND: SET UP EVENT LIST 1.1

Logically:

Command details

Command number: 1

Command type: SET UP EVENT LIST

Command qualifier: RFU

Device identities

Page 270: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 270 of 606

Source device: UICC

Destination device: ME

Event list Data available

TERMINAL RESPONSE: SET UP EVENT LIST 1.1

Logically:

Command details

Command number: 1

Command type: SET UP EVENT LIST

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

PROACTIVE COMMAND: OPEN CHANNEL 1.1

Command details

Command number: 1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device: ME

Bearer

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: 1000

Network access name: TestGp.rs

Text String: UserLog (User login)

Text String: UserPwd (User password)

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 1.1

Command details

Page 271: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 271 of 606

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status Channel identifier 1 and link established or PDP context activated

Bearer description

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: 1000

PROACTIVE COMMAND: SEND DATA 1.1

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 00 01 .. 07 (8 Bytes of data)

TERMINAL RESPONSE: SEND DATA 1.1

Command details

Command number:1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in theTx buffer

ENVELOPE: EVENT DOWNLOAD - Data available 1.1

Event list

Page 272: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 272 of 606

Event: Data available

Device identities

Source device: ME

Destination device: UICC

Channel status

Channel status: Channel 1 open, link established

Channel Data Length

Channel data length: 8 Bytes available in Rx buffer

12.3.3.8 Channel Status event

Test PurposeTo verify Channel Status event related to Default (network) Bearer, for UICC in client modefor UDP

Referenced requirement TS26_NFC_REQ_078

Initial ConditionsAll TCs are defined by making use of Bearer Type ‘03’= default bearer for requestedtransport layer.

Test Sequence No 1: (EVENT DOWNLOAD - Channel Status on a link

doppd)r e

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 UICCME

PROACTIVE COMMAND PENDING:SET UP EVENT LIST 1.1

2 MEUICC FETCH

3 UICCME

PROACTIVE COMMA ND: SET UPEVENT LIST 1.1

[EVENT: channel status]

4 MEUICC

TERMINAL RESPONSE: SET UPEVENT LIST 1.1

[command performed successfully]

5 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 1.1

See initial conditions

6 MEUICC FETCH

7 UICCME

PROACTIVE COMMAND: OPENCHANNEL 1.1

8 MEUser

The ME may display channel openinginformation

12.3.3.8.1

Page 273: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 273 of 606

Step Direction Sequence Expected Result

9 ME USS PDP context activation request

10 USS ME PDP context activation accept

11 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 1.1

[Command performed successfully]

12 USS ME Drop Link

13 MEUICC

ENVELOPE 1.1 (Event-ChannelStatus)

PROACTIVE COMMAND: SET UP EVENT LIST 1.1

Command details

Command number:1

Command type: SET UP EVENT LIST

Command qualifier: '00'

Device identities

Source device: UICC

Destination device: ME

Event list

Event 1: Channel Status

TERMINAL RESPONSE: SET UP EVENT LIST 1.1

Command details

Command number:1

Command type: SET UP EVENT LIST

Command qualifier: '00'

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

PROACTIVE COMMAND: OPEN CHANNEL 1.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Page 274: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 274 of 606

Destination device: ME

Bearer

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: 1000

Network access name: TestGp.rs

Text String: UserLog (User login)

Text String: UserPwd (User password)

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 1.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status Channel identifier 1 and link established or PDP context activated

Bearer description

Bearer type: Default Bearer for requested transport layer

Buffer

Buffer size: 1000

ENVELOPE: EVENT DOWNLOAD - Channel Status 1.1

Event list

Event: Channel Status

Device identities

Source device: ME

Destination device: UICC

Channel status

Channel status: Channel 1, link dropped

Page 275: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 275 of 606

12.3.3.9 SMS-PP Data Download

Test PurposeTo verify SMS-PP Data Download related to GPRS, for UICC in client mode for UDP

Referenced requirement TS26_NFC_REQ_078 TS26_NFC_REQ_081

Initial ConditionsAll TCs are defined by making use of Bearer Type ‘02’= GPRS bearer for requestedtransport layer.

Test Sequence No 1: (SMS-PP - followed by Open channel -

nd/ cv dt)S e R eeieaa

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 Test Procedure SMS-PP Data Download as specified in 12.3.3.9.4.8

2 Test Procedure Open Channel as specified in 12.3.3.9.4.1

3 Test Procedure Send Data as specified in 12.3.3.9.4.2

4 Test Procedure Receive Data 1 as specified in 12.3.3.9.4.3

5 Test Procedure Send Data as specified in 12.3.3.9.4.2

6 Test Procedure Send Data as specified in 12.3.3.9.4.2

7 Test Procedure Receive Data 2 as specified in 12.3.3.9.4.4

8 Test Procedure Send Data as specified in 12.3.3.9.4.2

9 Test Procedure Send Data as specified in 12.3.3.9.4.2

10 Test Procedure Receive Data 2 as specified in 12.3.3.9.4.4

11 Test Procedure Send Data as specified in 12.3.3.9.4.2

12 Test Procedure Send Data as specified in 12.3.3.9.4.2

13 Test Procedure Receive Data 2 as specified in 12.3.3.9.4.4

14 Test Procedure Send Data as specified in 12.3.3.9.4.2

15 Test Procedure Send Data as specified in 12.3.3.9.4.2

16 Test Procedure Receive Data 2 as specified in 12.3.3.9.4.4

17 Test Procedure Send Data as specified in 12.3.3.9.4.2

18 Test Procedure Send Data as specified in 12.3.3.9.4.2

19 Test Procedure Receive Data 2 as specified in 12.3.3.9.4.4

12.3.3.9.1

Page 276: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 276 of 606

Step Direction Sequence Expected Result

20 Test Procedure Send Data as specified in 12.3.3.9.4.2

21 Test Procedure Send Data as specified in 12.3.3.9.4.2

22 Test Procedure Receive Data 2 as specified in 12.3.3.9.4.4

23 Test Procedure Send Data as specified in 12.3.3.9.4.2

24 Test Procedure Send Data as specified in 12.3.3.9.4.2

25 Test Procedure Receive Data 1 as specified in 12.3.3.9.4.3

26 Test Procedure Receive Data 1 as specified in 12.3.3.9.4.3

Test Sequence No 2: (SMS-PP - Send SM -followed by Open channel

- nd/ cv dt)S e R eeieaa

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 Test Procedure SMS-PP Data Download as specified in 12.3.3.9.4.8

2 Test Procedure Send Short Message as specified in 12.3.3.9.4.7

3 Test Procedure Open Channel as specified in 12.3.3.9.4.1

4 Test Procedure Send Data as specified in 12.3.3.9.4.2

5 Test Procedure Receive Data 1 as specified in 12.3.3.9.4.3

6 Test Procedure Send Data as specified in 12.3.3.9.4.2

7 Test Procedure Send Data as specified in 12.3.3.9.4.2

8 Test Procedure Receive Data 2 as specified in 12.3.3.9.4.4

9 Test Procedure Send Data as specified in 12.3.3.9.4.2

10 Test Procedure Send Data as specified in 12.3.3.9.4.2

11 Test Procedure Receive Data 2 as specified in 12.3.3.9.4.4

12 Test Procedure Send Data as specified in 12.3.3.9.4.2

13 Test Procedure Send Data as specified in 12.3.3.9.4.2

14 Test Procedure Receive Data 2 as specified in 12.3.3.9.4.4

15 Test Procedure Send Data as specified in 12.3.3.9.4.2

16 Test Procedure Send Data as specified in 12.3.3.9.4.2

17 Test Procedure Receive Data 2 as specified in 12.3.3.9.4.4

18 Test Procedure Send Data as specified in 12.3.3.9.4.2

12.3.3.9.2

Page 277: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 277 of 606

Step Direction Sequence Expected Result

19 Test Procedure Send Data as specified in 12.3.3.9.4.2

20 Test Procedure Receive Data 2 as specified in 12.3.3.9.4.4

21 Test Procedure Send Data as specified in 12.3.3.9.4.2

22 Test Procedure Send Data as specified in 12.3.3.9.4.2

23 Test Procedure Receive Data 2 as specified in 12.3.3.9.4.4

24 Test Procedure Send Data as specified in 12.3.3.9.4.2

25 Test Procedure Send Data as specified in 12.3.3.9.4.2

26 Test Procedure Receive Data 1 as specified in 12.3.3.9.4.3

27 Test Procedure Receive Data 1 as specified in 12.3.3.9.4.3

Test Sequence No 3: (SMS-PP - Send SM -followed by Open channel

- nd/ cv dt th t ng nt)S e R eeieaawi imermaaeme

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 Test Procedure SMS-PP DataDownload

as specified in 12.3.3.9.4.8

2 Test Procedure Send Short Message as specified in 12.3.3.9.4.7

3 Test Procedure Open Channel as specified in 12.3.3.9.4.1

4 Test Procedure Send Data as specified in 12.3.3.9.4.2

5 Test Procedure Timer Management(Start Timer)

as specified in 12.3.3.9.4.5

6 Test Procedure Receive Data 1 as specified in 12.3.3.9.4.3

7 Test Procedure Timer Management(Deactivate Timer)

as specified in 12.3.3.9.4.6

8 Test Procedure Send Data as specified in 12.3.3.9.4.2

9 Test Procedure Send Data as specified in 12.3.3.9.4.2

10 Test Procedure Timer Management(Start Timer)

as specified in 12.3.3.9.4.5

11 Test Procedure Receive Data 2 as specified in 12.3.3.9.4.4

12 Test Procedure Timer Management(Deactivate Timer)

as specified in 12.3.3.9.4.6

13 Test Procedure Send Data as specified in 12.3.3.9.4.2

14 Test Procedure Send Data as specified in 12.3.3.9.4.2

12.3.3.9.3

Page 278: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 278 of 606

Step Direction Sequence Expected Result

15 Test Procedure Timer Management(Start Timer)

as specified in 12.3.3.9.4.5

16 Test Procedure Receive Data 2 as specified in 12.3.3.9.4.4

17 Test Procedure Timer Management(Deactivate Timer)

as specified in 12.3.3.9.4.6

18 Test Procedure Send Data as specified in 12.3.3.9.4.2

19 Test Procedure Send Data as specified in 12.3.3.9.4.2

20 Test Procedure Timer Management(Start Timer)

as specified in 12.3.3.9.4.5

21 Test Procedure Receive Data 2 as specified in 12.3.3.9.4.4

22 Test Procedure Timer Management(Deactivate Timer)

as specified in 12.3.3.9.4.6

23 Test Procedure Send Data as specified in 12.3.3.9.4.2

24 Test Procedure Send Data as specified in 12.3.3.9.4.2

25 Test Procedure Timer Management(Start Timer)

as specified in 12.3.3.9.4.5

26 Test Procedure Receive Data 2 as specified in 12.3.3.9.4.4

27 Test Procedure Timer Management(Deactivate Timer)

as specified in 12.3.3.9.4.6

28 Test Procedure Send Data as specified in 12.3.3.9.4.2

29 Test Procedure Send Data as specified in 12.3.3.9.4.2

30 Test Procedure Timer Management(Start Timer)

as specified in 12.3.3.9.4.5

31 Test Procedure Receive Data 2 as specified in 12.3.3.9.4.4

32 Test Procedure Timer Management(Deactivate Timer)

as specified in 12.3.3.9.4.6

33 Test Procedure Send Data as specified in 12.3.3.9.4.2

34 Test Procedure Send Data as specified in 12.3.3.9.4.2

35 Test Procedure Timer Management(Start Timer)

as specified in 12.3.3.9.4.5

36 Test Procedure Receive Data 2 as specified in 12.3.3.9.4.4

37 Test Procedure Timer Management(Deactivate Timer)

as specified in 12.3.3.9.4.6

38 Test Procedure Send Data as specified in 12.3.3.9.4.2

39 Test Procedure Send Data as specified in 12.3.3.9.4.2

Page 279: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 279 of 606

Step Direction Sequence Expected Result

40 Test Procedure Timer Management(Start Timer)

as specified in 12.3.3.9.4.5

41 Test Procedure Receive Data 1 as specified in 12.3.3.9.4.3

42 Test Procedure Receive Data 1 as specified in 12.3.3.9.4.3

43 Test Procedure Timer Management(Deactivate Timer)

as specified in 12.3.3.9.4.6

Reference Test Procedures

12.3.3.9.4.1 st ocduTe P r e re

pnhnnl ( , dt lnkO eCa eO P ENCHANNELimmeiaei

stblsh nt, , no locl ddss)ea i me GP R S aa re

Step Direction Sequence Expected Result1 UICC

MEPROACTIVE COMMAND PENDING:SET UP EVENT LIST

2 MEUICC FETCH

3 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST

4 MEUICC

TERMINAL RESPONSE: SET UPEVENT LIST

5 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL

6 MEUICC

FETCH

7 UICCME

PROACTIVE COMMAND: OPENCHANNEL

8 ME User The ME may display channel openinginformation

9 ME USS PDP context activation request

10 USS ME PDP context activation accept

11 MEUICC

TERMINAL RESPONSE: OPENCHANNEL

[Command performed successfully]

PROACTIVE COMMAND: SET UP EVENT LIST

Logically:

Command details

Command number: 1

Command type: SET UP EVENT LIST

Command qualifier: RFU

Device identities

12.3.3.9.4

Page 280: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 280 of 606

Source device: UICC

Destination device: ME

Event list Data available

TERMINAL RESPONSE: SET UP EVENT LIST

Logically:

Command details

Command number: 1

Command type: SET UP EVENT LIST

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

PROACTIVE COMMAND: OPEN CHANNELCommand details

Command number: 1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device: ME

Bearer

Bearer type: GPRS

Bearer parameter:

Precedence Class: 02

Delay Class: 04

Reliability Class: 02

Peak throughput class: 05

Mean throughput class: 31

Packet data protocol: 02 (IP)

Buffer

Buffer size: 1024

Network Access Name: web99.test-nfc1.com

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Page 281: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 281 of 606

Data destination address: 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNELCommand details

Command number: 1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status Channel identifier 1 and link established or PDP contextactivated

Bearer description

Bearer type: GPRS

Bearer parameter:

Precedence Class: 02

Delay Class: 04

Reliability Class: 02

Peak throughput class: 05

Mean throughput class: 31

Packet data protocol: 02 (IP)

Buffer

Buffer size: 1024

12.3.3.9.4.2 Test Procedure Send Data (SEND DATA, immediate mode)

Step Direction Sequence Expected Result1 UICC

MEPROACTIVE COMMAND PENDING:SEND DATA

2 MEUICC FETCH

3 UICCME

PROACTIVE COMMAND: SEND DATA(immediate)

4 ME USS Transfer 40 Bytes of data to the USSthrough channel 1

5 MEUICC

TERMINAL RESPONSE: SEND DATA(immediate)

[Command performed successfully]

PROACTIVE COMMAND: SEND DATACommand details

Command number: 1

Page 282: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 282 of 606

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F 10 11 12 13 14 15 16 17 18 191A 1B 1C 1D 1E 1F 20 21 22 23 24 25 26 27 (40 Bytes of data)

TERMINAL RESPONSE: SEND DATALogically:

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in the Tx buffer

12.3.3.9.4.3 Test Procedure Receive Data 1 (RECEIVE DATA)

Step Direction Sequence Expected Result1 USS ME Transfer 20 Bytes of data to the ME

through channel 1

2 MEUICC

ENVELOPE: EVENT DOWNLOAD -Data available 1

(20 Bytes of data in the ME buffer)1

3 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 1

4 MEUICC FETCH

5 UICCME

PROACTIVE COMMAND: RECEIVEDATA 1

20 Bytes

6 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 1

ENVELOPE: EVENT DOWNLOAD - Data available 1Event list

Event: Data available

Device identities

Source device: ME

Page 283: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 283 of 606

Destination device: UICC

Channel status

Channel status: Channel 1 open, link established

Channel Data Length

Channel data length: 20

PROACTIVE COMMAND: RECEIVE DATA 1Command details

Command number: 1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: 20

TERMINAL RESPONSE: RECEIVE DATA 1Command details

Command number: 1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data: 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F 10 11 12 13(20 Bytes of data)

Channel data length: 00

12.3.3.9.4.4 Test Procedure Receive Data 2 (RECEIVE DATA)

Step Direction MESSAGE / Action Comments

1 USS ME Transfer 1022 Bytes of data to the MEthrough channel 1

2 MEUICC

ENVELOPE: EVENT DOWNLOAD - Dataavailable 2

(FF Bytes of data in the ME buffer)2

3 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 2.1

4 MEUICC FETCH

5 UICCME

PROACTIVE COMMAND: RECEIVE DATA2.1

FF Bytes

Page 284: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 284 of 606

Step Direction MESSAGE / Action Comments

6 MEUICC

TERMINAL RESPONSE: RECEIVE DATA2.1

7 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 2.2

8 MEUICC FETCH

9 UICCME

PROACTIVE COMMAND: RECEIVE DATA2.2

FF Bytes

10 MEUICC

TERMINAL RESPONSE: RECEIVE DATA2.2

11 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 2.3

12 MEUICC FETCH

13 UICCME

PROACTIVE COMMAND: RECEIVE DATA2.3

FF Bytes

14 MEUICC

TERMINAL RESPONSE: RECEIVE DATA2.3

15 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 2.4

16 MEUICC FETCH

17 UICCME

PROACTIVE COMMAND: RECEIVE DATA2.4

FF Bytes

18 MEUICC

TERMINAL RESPONSE: RECEIVE DATA2.4

19 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 2.5

20 MEUICC FETCH

21 UICCME

PROACTIVE COMMAND: RECEIVE DATA2.5

74 Bytes

22 MEUICC

TERMINAL RESPONSE: RECEIVE DATA2.5

ENVELOPE: EVENT DOWNLOAD - Data available 2Event list

Event: Data available

Device identities

Source device: ME

Destination device: UICC

Channel status

Page 285: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 285 of 606

Channel status: Channel 1 open, link established

Channel Data Length

Channel data length: FF (more than 255 bytes are available)

PROACTIVE COMMAND: RECEIVE DATA 2.1Command details

Command number: 1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: FF

PROACTIVE COMMAND: RECEIVE DATA 2.2Command details

Command number: 1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: FF

PROACTIVE COMMAND: RECEIVE DATA 2.3Command details

Command number: 1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: FF

PROACTIVE COMMAND: RECEIVE DATA 2.4Command details

Command number: 1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Page 286: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 286 of 606

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: FF

PROACTIVE COMMAND: RECEIVE DATA 2.5Command details

Command number: 1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: 74

TERMINAL RESPONSE: RECEIVE DATA 2.1Command details

Command number: 1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data: 00 01 02…….EC (237 Bytes)

Channel data length: FF Bytes

TERMINAL RESPONSE: RECEIVE DATA 2.2Command details

Command number: 1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data: ED EE EF……D9 (237 Bytes)

Page 287: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 287 of 606

Channel data length: FF

TERMINAL RESPONSE: RECEIVE DATA 2.3

Command details

Command number:1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data: DA DB…..C6( 237 Bytes)

Channel data Length: FF

TERMINAL RESPONSE: RECEIVE DATA 2.4

Command details

Command number:1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data: C7 C9…..B3(237 Bytes)

Channel data Length: 74

TERMINAL RESPONSE: RECEIVE DATA 2.5

Command details

Command number:1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data: B4…..FD (74 Bytes)

Channel data length: 00

Page 288: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 288 of 606

12.3.3.9.4.5 Test Procedure Timer Management (Start Timer)

Step Direction Sequence Expected Result1 UICC

MEPROACTIVE COMMANDPENDING: TIMER MANAGEMENT

2 MEUICC FETCH

3 UICCME

PROACTIVE COMMAND:TIMER MANAGEMENT

Start timer 1

4 MEUICC

TERMINAL RESPONSE: TIMERMANAGEMENT

Command performed successfully.

PROACTIVE COMMAND: TIMER MANAGEMENT (Start timer)Command details

Command number: 1

Command type: TIMER MANAGEMENT

Command qualifier: start the Timer

Device identities

Source device: UICC

Destination device: ME

Timer identifier

Identifier of timer: 1

Timer value

Value of timer: 00:02:00

TERMINAL RESPONSE: TIMER MANAGEMENTCommand details

Command number: 1

Command type: TIMER MANAGEMENT

Command qualifier: start the Timer

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Timer identifier

Identifier of timer: 1

12.3.3.9.4.6 Test Procedure Timer Management (Deactivate Timer)

Page 289: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 289 of 606

Step Direction Sequence Expected Result1 UICC

MEPROACTIVE COMMANDPENDING: TIMER MANAGEMENT

2 MEUICC FETCH

3 UICCME

PROACTIVE COMMAND:TIMER MANAGEMENT

Deactivate timer 1

4 MEUICC

TERMINAL RESPONSE: TIMERMANAGEMENT

Command performed successfully.

PROACTIVE COMMAND: TIMER MANAGEMENT (Deactivate Timer)Command details

Command number: 1

Command type: TIMER MANAGEMENT

Command qualifier: deactivate the Timer

Device identities

Source device: UICC

Destination device: ME

Timer identifier

Identifier of timer: 1

TERMINAL RESPONSE: TIMER MANAGEMENTCommand details

Command number: 1

Command type: TIMER MANAGEMENT

Command qualifier: deactivate the Timer

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Timer identifier

Identifier of timer: 1

Timer value

Value of timer: not checked

12.3.3.9.4.7 Test Procedure Send Short Message

Step Direction Sequence Expected Result1 UICC

MEPROACTIVE COMMAND PENDING:SEND SHORT MESSAGE

2 MEUICC FETCH

Page 290: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 290 of 606

Step Direction Sequence Expected Result3 UICC

MEPROACTIVE COMMAND: SENDSHORT MESSAGE

[packing not required,8 bit data]

4 ME USS Send RP-DATA containing SMS-PP(SEND SHORT MESSAGE) Message

CS or PS domain is used to send andreceive short messages

5 USSME RP-ACK

6 MEUICC

TERMINAL RESPONSE: SENDSHORT MESSAGE

[Command performed successfully]

PROACTIVE COMMAND: SEND SHORT MESSAGECommand details

Command number: 1

Command type: SEND SHORT MESSAGE

Command qualifier: packing not required

Device identities

Source device: UICC

Destination device: Network

Address

TON: International number

NPI: "ISDN / telephone numbering plan"

Dialling number string "491720354333"

SMS TPDU

TP-MTI: SMS-SUBMIT (in the direction MS to SC)

TP-RD: Instruct the SC to accept an SMS-SUBMIT for a SM

TP-VPF: TP-VP field not present

TP-RP: TP-Reply-Path is not set in this SMS-SUBMIT

TP-UDHI: The beginning of the TP-UD field contains a header in addition to theshort message

TP-SRR: A status report is not requested

TP-MR: "00"

TP-DA

TON: Unknown

NPI: "ISDN / telephone numbering plan"

Address value: "10001"

TP-PID: no interworking, but SME to SME protocol

TP-DCS: 8-bit data, Class 2 SIM-specific Message

TP-UDL: 19

Information-Element-Ident: RFU

Data: "A@@...."

TP-UD: 02 71 00 00 0E 0A C0 00 00 00 00 00 04 31 00 00 01 6A88

Page 291: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 291 of 606

SMS-PP (SEND SHORT MESSAGE) MessageTP-MTI: SMS-SUBMIT (in the direction MS to SC)

TP-RD: Instruct the SC to accept an SMS-SUBMIT for a SM

TP-VPF: TP-VP field not present

TP-RP: TP-Reply-Path is not set in this SMS-SUBMIT

TP-UDHI: The beginning of the TP-UD field contains a header in addition to theshort message

TP-SRR: A status report is not requested

TP-MR: "01"

TP-DA

TON: Unknown

NPI: "ISDN / telephone numbering plan"

Address value: "10001"

TP-PID: no interworking, but SME to SME protocol

TP-DCS: 8-bit data, Class 2 SIM-specific Message

TP-UDL: 19

Information-Element-Ident: RFU

Data: "A@@...."

TP-UD: 02 71 00 00 0E 0A C0 00 00 00 00 00 04 31 00 00 01 6A88

TERMINAL RESPONSE: SEND SHORT MESSAGE

Command details

Command number:1

Command type: SEND SHORT MESSAGE

Command qualifier: packing not required

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

12.3.3.9.4.8 Test Procedure SMS-PP Data Download

Step Direction Sequence Expected Result1 User ME Power the ME on ME will perform Profile Download and

USIM initialisation

2 ME USS ME performs CS/PS or PSregistration.

3 USS ME SMS-PP Data Download Message See Note 1.

Page 292: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 292 of 606

SMS-PP (Data Download) MessageSMS TPDU

TP-MTI: SMS-DELIVER

TP-MMS: No more messages waiting for the MS in this SC

TP-RP: TP-Reply-Path is not set in this SMS-DELIVER

TP-UDHI: The beginning of the TP-UD field contains a header in addition tothe short message

TP-SRI: A status report will be returned to the SME

TP-OA

TON Unknown

NPI "ISDN / telephone numbering plan"

Address value "10001"

TP-PID (U): U SIM Data download

TP-DCS

Coding Group General Data Coding

Compression Text is uncompressed

Message Class: Class 2 USIM Specific Message

Alphabet 8 bit data

TP-SCTS: 01/01/98 00:00:00 +0

TP-UDL : 109

TP-UD 02 70 00 00 68 15 16 21 19 19 C0 00 00 4F F5 A4 61 BE 1E E9 C06A 62 44 15 23 47 DA 22 24 B8 87 27 CC F7 0B 32 38 B2 6D D2 E0 7F 18 33 5A06 4E 5F C5 C1 44 F7 0E 17 68 51 41 09 D9 28 43 79 B3 65 16 F4 E0 6F E3 100A 04 C2 18 0B 64 D7 F8 7C 88 6D BB F1 D9 EC 39 0C 02 67 24 BB DC 7B 5006 9A 22 15 6F FC 3F 04 1B EE E1 C7 04 33

ENVELOPE: SMS-PP DOWNLOADSMS-PP Download

Device identities

Source device: Network

4 ME User The ME shall not display themessage or alert the user of a shortmessage waiting.

5 MEUICC

ENVELOPE: SMS-PP DOWNLOAD

6 UICCME

SMS-PP Data Download UICCAcknowledgement

[SW1 / SW2 of '90 00']

7 ME USS SMS-PP Data Download UICCAcknowledgement in the TP-User-Data element of the RP-ACKmessage. The values of protocolidentifier and data coding scheme inRP-ACK shall be as in the originalmessage.

Note 1: CS or PS domain is used to send and receive short messages

Page 293: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 293 of 606

Destination device: UICC

Address

TON: International number

NPI: "ISDN / telephone numbering plan"

Dialling number string: "491720354333"

SMS TPDU

TP-MTI: SMS-DELIVER

TP-MMS: No more messages waiting for the MS in this SC

TP-RP: TP-Reply-Path is not set in this SMS-DELIVER

TP-UDHI: The beginning of the TP-UD field contains a header in additionto the short message

TP-SRI: A status report will be returned to the SME

TP-OA

TON: Unknown

NPI: "ISDN / telephone numbering plan"

Address value: "10001"

TP-PID: USIM Data download

TP-DCS

Coding Group General Data Coding

Compression Text is uncompressed

Message Class: Class 2 (U)SIM Specific Message

Alphabet : 8 bit data

TP-SCTS: 01/01/98 00:00:00 +0

TP-UDL 109

TP-UD: 02 70 00 00 68 15 16 21 19 19 C0 00 00 4F F5 A4 61 BE 1E E9 C06A 62 44 15 23 47 DA 22 24 B8 87 27 CC F7 0B 32 38 B2 6D D2 E0 7F 18 33 5A06 4E 5F C5 C1 44 F7 0E 17 68 51 41 09 D9 28 43 79 B3 65 16 F4 E0 6F E3 100A 04 C2 18 0B 64 D7 F8 7C 88 6D BB F1 D9 EC 39 0C 02 67 24 BB DC 7B 5006 9A 22 15 6F FC 3F 04 1B EE E1 C7 04 33

SMS-PP Data Download UICC Acknowledgement

12.3.3.9.4.9 Test Procedure More Time

Step Direction Sequence Expected Result1 UICC

MEPROACTIVE COMMANDPENDING: MORE TIME

2 MEUICC FETCH

3 UICCME

PROACTIVE COMMAND:MORE TIME

4 MEUICC TERMINAL RESPONSE: MORE TIME Command performed successfully.

PROACTIVE COMMAND: MORE TIMECommand details

Page 294: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 294 of 606

Command number: 1

Command type: MoreTime

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: ME

TERMINAL RESPONSE: MORE TIMECommand details

Command number: 1

Command type: MoreTime

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Test Sequence No 4: (SMS-PP - Open channel - Send/Receive data -

nd tho )S e S Mwi MreTime

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 Test Procedure SMS-PP DataDownload

as specified in 12.3.3.9.4.8

2 Test Procedure Open Channel as specified in 12.3.3.9.4.1

3 Test Procedure Send Data as specified in 12.3.3.9.4.2

4 Test Procedure Timer Management(Start Timer)

as specified in 12.3.3.9.4.5

5 Test Procedure More Time as specified in 12.3.3.9.4.9

6 Test Procedure More Time as specified in 12.3.3.9.4.9

7 Test Procedure Receive Data 1 as specified in 12.3.3.9.4.3

8 Test Procedure Timer Management(Deactivate Timer)

as specified in 12.3.3.9.4.6

9 Test Procedure Send Data as specified in 12.3.3.9.4.2

10 Test Procedure Timer Management(Start Timer)

as specified in 12.3.3.9.4.5

11 Test Procedure Send SMS as specified in 12.3.3.9.4.7

12.3.3.9.5

Page 295: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 295 of 606

Step Direction Sequence Expected Result

12 Test Procedure Receive Data 1 as specified in 12.3.3.9.4.3

13 Test Procedure Timer Management(Deactivate Timer)

as specified in 12.3.3.9.4.6

Test Sequence No 5: (SMS-PP - Open channel - Send/Receive data -

nd thS e S Mwi

out oMreTime

)nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 Test Procedure SMS-PP DataDownload

as specified in 12.3.3.9.4.8

2 Test Procedure Open Channel as specified in 12.3.3.9.4.1

3 Test Procedure Send Data as specified in 12.3.3.9.4.2

4 Test Procedure Timer Management(Start Timer)

as specified in 12.3.3.9.4.5

5 Test Procedure Receive Data 1 as specified in 12.3.3.9.4.3

6 Test Procedure Timer Management(Deactivate Timer)

as specified in 12.3.3.9.4.6

7 Test Procedure Send Data as specified in 12.3.3.9.4.2

8 Test Procedure Timer Management(Start Timer)

as specified in 12.3.3.9.4.5

9 Test Procedure Send SMS as specified in 12.3.3.9.4.7

10 Test Procedure Receive Data 1 as specified in 12.3.3.9.4.3

11 Test Procedure Timer Management(Deactivate Timer)

as specified in 12.3.3.9.4.6

12.3.3.10 Concurrent BIP channels

Test PurposeTo verify that the DUT supports two concurrent channels, BIP in client mode.

Referenced requirement TS26_NFC_REQ_080

Initial ConditionsNone

12.3.3.9.6

Page 296: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 296 of 606

Test Sequence No 1

nt l ondtonsIiiaC iiNone

Step Direction Sequence Expected Result

1 The 3GPP TS 31.124 "27.22.2Contents of the TERMINAL PROFILEcommand" test SHALL be performedin order to check that the DUT declareto support two concurrent channels,BIP in client mode.

2 The 3GPP TS 31.124 "27.22.4.27Open Channel (related to GPRS)" testSHALL be performed in order to opena first channel BIP in client mode.

The Channel is correctly opened

3 Before the first channel is closed, andin order to open a second channel the3GPP TS 31.124 "27.22.4.27 OpenChannel (related to GPRS)" testSHALL be performed again in order toopen a second channel BIP in clientmode.

The Channel is correctly opened

12.3.3.11 Contents of the TERMINAL PROFILE

Direction: terminal to UICC.

Test PurposeTo verify the content of TERMINAL PROFILE for BIP in UDP client mode.

Referenced requirement TS26_NFC_REQ_080

Initial ConditionsThe ME is connected to the UICC Simulator. All elementary files are coded as the defaultUICC Application Toolkit personalization.

Test Sequence No 1: (TERMINAL PROFILE – command for BIP inUDP, client mode)

Initial ConditionsNone

Step Direction Sequence Expected Result

12.3.3.10.1

12.3.3.11.1

Page 297: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 297 of 606

Step Direction Sequence Expected Result

1 UserME

Power on the ME.

2 MEUICC

Send the TERMINAL PROFILEcommand

After the ME sends the TERMINALPROFILE command to the UICCSimulator, the UICC Simulator shallrecord the content of the TERMINALPROFILE as mentioned below in Profilesection

3 UICCME

UICC sends SW1 / SW2 of '90 00'. The contents of the TERMINAL PROFILEis recorded and compared to thecorresponding Byte 1, Byte 12, Byte 13and Byte 17 as explained below.

The test is terminated upon the ME sending the TERMINAL PROFILE command to the

UICC Simulator

Command parameters/data:

Description Clause M/O/C Length

Profile - M length

Profile:• Contents:

- The list of CAT facilities that are supported by the terminal.• Coding:

- 1 bit is used to code each facility:bit = 1: facility supported by terminal;bit = 0: facility not supported by terminal.(bit = x: not checked by the UICC Simulator)

The terminal shall indicate Profile download as SUPPORTED in the content of TERMINALPROFILE at First byte to be used for BIP in UDP, client mode as shown below:

First byte (Download):

b8 b7 b6 b5 b4 b3 b2 b1 Meaning

- - - - - - - 1 Profile download

- - - - - - X - Reserved by 3GPP (SMS-PP data download)

- - - - - X - - Reserved by 3GPP (Cell Broadcast data download)

- - - - X - - - Menu selection

- - - X - - - - Reserved by 3GPP (SMS-PP data download)

Page 298: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 298 of 606

- - X - - - - - Timer expiration

- X - - - - - - Reserved by 3GPP and 3GPP2 (USSD string data objectsupport in Call Control by USIM)

X - - - - - - - Call Control by NAA

The terminal shall indicate OPEN CHANNEL, CLOSE CHANNEL, RECEIVE DATA andSEND DATA as SUPPORTED in the content of TERMINAL PROFILE at 12th byte to beused for BIP in UDP, client mode as shown below:

Twelfth byte (Bearer Independent protocol proactive commands, class "e"):

b8 b7 b6 b5 b4 b3 b2 b1 Meaning

- - - - - - - 1 Proactive UICC: OPEN CHANNEL

- - - - - - 1 - Proactive UICC: CLOSE CHANNEL

- - - - - 1 - - Proactive UICC: RECEIVE DATA

- - - - 1 - - - Proactive UICC: SEND DATA Proactive

- - - X - - - - UICC: GET CHANNEL STATUS Proactive

- - X - - - - - UICC: SERVICESEARCH

- X - - - - - - Proactive UICC: GET SERVICE INFORMATION

X - - - - - - - Proactive UICC: DECLARE Service

The terminal shall indicate GPRS as SUPPORTED and Number of channels supported byterminal (Minimum = 1) in the content of TERMINAL PROFILE at 13th byte to be used forBIP in UDP, client mode as shown below:

Thirteenth byte (Bearer Independent protocol supported bearers, class "e"):

b8 b7 b6 b5 b4 b3 b2 b1 Meaning

- - - - - - - X CSD

- - - - - - 1 - GPRS

- - - - - X - - Bluetooth

- - - - X - - - IrDA

- - - X - - - - RS232

- - x1 - - - - - Number of channels supported by terminal

- x2 - - - - - - Number of channels supported by terminal

x3 - - - - - - - Number of channels supported by terminal

Number of channels coded by x1, x2 and x3 must be >0

Page 299: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 299 of 606

The terminal shall indicate UDP, UICC in client mode as SUPPORTED in the content ofTERMINAL PROFILE at 17th byte to be used for BIP in UDP, client mode as shown below:

Seventeenth byte (Bearer independent protocol supported transport interface/bearers, class"e"):

b8 b7 b6 b5 b4 b3 b2 b1 Meaning

- - - - - - - X TCP, UICC in client mode, remote connection

- - - - - - 1 - UDP, UICC in client mode, remote connection

- - - - - X - - TCP, UICC in server mode

- - - - X - - - TCP, UICC in client mode, local connection (i.e. class "k" issupported)

- - - X - - - - UDP, UICC in client mode, local connection (i.e. class "k" issupported)

- - X - - - - - Direct communication channel (i.e. class "k" is supported)

- X - - - - - - Reserved by 3GPP (E-UTRAN)

X - - - - - - - Reserved by 3GPP (HSDPA)

12.3.3.12 OPEN CHANNEL - Terminal connected to Wi-Fi

Test PurposeTo verify OPEN CHANNEL for terminal connected to Wi-Fi, UICC in client mode for UDP

Referenced requirement TS26_NFC_REQ 078

Initial ConditionsFor Wi-Fi the test platform has to assure exclusive SSID which does not allow accessexcept the DUT, same for login and password.

The DUT has to be connected to Wi-Fi

12.3.3.12.1 Test Sequence No 1: (OPEN CHANNEL, Terminal connected to Wi-Fi-APN empty-Default Bearer Type used)

Initial ConditionsUse Bearer Type ‘03’= default bearer for requested transport layer.

Step Direction Sequence Expected Result

Page 300: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 300 of 606

Step Direction Sequence Expected Result

1 ME Connect ME to the USS and establishthe first PDN to the APN for “Alwayson connection” (web.network.com).

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 ME Connect ME to the local Wi-Fi hot spot Wi-Fi needs to be turned ON after firstPDN registration

3 ME Disconnect ME from the first APN for“Always on connection”(web.network.com)

4 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 12.3.3.12.1

5 MEUICC

FETCH

6 UICCME

PROACTIVE COMMAND: OPENCHANNEL 12.3.3.12.1

7 MEUser

The ME may display channel openinginformation

8 ME USS PDP context activation request on thecellular network

9 USS ME PDP context activation accept on thecellular network

10 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 12.3.3.12.1

[Command performed successfully]

PROACTIVE COMMAND: OPEN CHANNEL 12.3.3.12.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device:ME

Bearer

Bearer type: Default Bearer Type

Buffer

Buffer size: 1024

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Page 301: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 301 of 606

Data destination address: 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 12.3.3.12.1

Command details

Command number: 1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status Channel identifier 1 and link established or PDP contextactivated

Bearer description

Bearer type: Default Bearer Type

Buffer

Buffer size: 1024

12.3.3.12.2 Test Sequence No 2: (OPEN CHANNEL, Terminal connected to Wi-Fi-APN empty-GPRS Bearer Type used)

Initial ConditionsUse GPRS Bearer Type for requested transport layer.

Step Direction Sequence Expected Result1 ME Connect ME to the USS and establish

the first PDN to the APN for “Alwayson connection” (web.network.com).

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 ME Connect ME to the local Wi-Fi hotspot

Wi-Fi needs to be turned ON after firstPDN registration

3 ME Disconnect ME from the first APN for“Always on connection”(web.network.com)

4 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 12.3.3.12.2

5 MEUICC FETCH

6 UICC PROACTIVE COMMAND: OPEN

Page 302: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 302 of 606

Step Direction Sequence Expected ResultME CHANNEL 12.3.3.12.2

7 ME User The ME may display channel openinginformation

8 ME USS PDP context activation request

9 USS ME PDP context activation accept

10 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 12.3.3.12.2

[Command performed successfully]

PROACTIVE COMMAND: OPEN CHANNEL 12.3.3.12.2

Logically:

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device:ME

Bearer

Bearer type: GPRS/ UTRAN packet service/E-UTRAN

Bearer parameter:

Precedence Class: 02

Delay Class: 04

Reliability Class: 02

Peak throughput class: 05

Mean throughput class: 31

Packet data protocol: 02 (IP

Buffer size: 1024

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address: 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 12.3.3.12.2

Logically:

Command details

Command number: 1

Page 303: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 303 of 606

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status Channel identifier 1 and link established or PDP contextactivated

Bearer

Bearer type: GPRS/ UTRAN packet service/E-UTRAN

Bearer parameter:

Precedence Class: 02

Delay Class: 04

Reliability Class: 02

Peak throughput class: 05

Mean throughput class: 31

Packet data protocol: 02 (IP)

Buffer

Buffer size: 1024

12.3.3.13 CLOSE CHANNEL – Terminal connected to Wi-Fi

Test PurposeTo verify CLOSE CHANNEL for terminal connected to Wi-Fi, UICC in client mode for UDP

Referenced requirement TS26_NFC_REQ_078

Initial ConditionsOne default APN is configured on the DUT and the related PDN connection to this APN hasbeen already established.

For Wi-Fi the test platform has to assure exclusive SSID which does not allow accessexcept the DUT, same for login and password.

12.3.3.13.1 Test Sequence No 1: (CLOSE CHANNEL, Terminal connected to Wi-Fi-APN empty-Default Bearer Type used)

Initial Conditions

Page 304: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 304 of 606

Use Bearer Type ‘03’ = default bearer for requested transport layer.

PROACTIVE COMMAND: OPEN CHANNEL 12.3.3.13.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Step Direction Sequence Expected Result

1 ME Connect ME to the USS andestablish the first PDN to the APNfor “Always on connection”(web.network.com).

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 ME Connect ME to the local Wi-Fi hotspot

Wi-Fi needs to be turned ON after firstPDN registration

3 ME Disconnect ME from the first APN for“Always on connection”(web.network.com)

4 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL12.3.3.13.1

5 MEUICC FETCH

6 UICCME

PROACTIVE COMMAND:OPEN CHANNEL 12.3.3.13.1

7 ME User The ME may display channelopening information

8 ME USS PDP context activation request

9 USS ME PDP context activation accept

10 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 12.3.3.13.1

[Command performed successfully]

11 UICCME

PROACTIVE COMMAND PENDING:CLOSE CHANNEL12.3.3.13.1

12 MEUICC FETCH

13 UICCME

PROACTIVE COMMAND: CLOSECHANNEL 12.3.3.13.1

14 ME USS PDP context deactivation request

15 USS ME PDP context deactivation accept

16 MEUICC

TERMINAL RESPONSE CLOSECHANNEL 12.3.3.13.1

[Command performed successfully]

Page 305: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 305 of 606

Device identities

Source device: UICC

Destination device:ME

Bearer

Bearer type: Default Bearer Type

Buffer

Buffer size: 1024

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address: 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 12.3.3.13.1

Command details

Command number: 1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status Channel identifier 1 and link established or PDP contextactivated

Bearer description

Bearer type: Default Bearer Type

Buffer

Buffer size: 1024

PROACTIVE COMMAND: CLOSE CHANNEL 12.3.3.13.1

Command details

Command number: 1

Command type: CLOSE CHANNEL

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Page 306: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 306 of 606

TERMINAL RESPONSE: CLOSE CHANNEL 12.3.3.13.1

Command details

Command number: 1

Command type: CLOSE CHANNEL

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

12.3.3.13.2 Test Sequence No 2: (CLOSE CHANNEL, Terminal connected to Wi-Fi-APN empty-GPRS Bearer Type used)

Initial Conditions

Use GPRS Bearer Type for requested transport layer.

Step Direction Sequence Expected Result

1 ME Connect ME to the USS and establishthe first PDN to the APN for “Alwayson connection” (web.network.com).

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 ME Connect ME to the local Wi-Fi hotspot

Wi-Fi needs to be turned ON after firstPDN registration

3 ME Disconnect ME from the first APN for“Always on connection”(web.network.com)

4 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 12.3.3.13.2

5 MEUICC FETCH

6 UICCME

PROACTIVE COMMAND:OPEN CHANNEL 12.3.3.13.2

7 ME User The ME may display channel openinginformation

8 ME USS PDP context activation request

9 USS ME PDP context activation accept

10 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 12.3.3.13.2

[Command performed successfully]

Page 307: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 307 of 606

Step Direction Sequence Expected Result

11 UICCME

PROACTIVE COMMAND PENDING:CLOSE CHANNEL12.3.3.13.2

12 MEUICC FETCH

13 UICCME

PROACTIVE COMMAND: CLOSECHANNEL 12.3.3.13.2

14 ME USS PDP context deactivation request

15 USS ME PDP context deactivation accept

16 MEUICC

TERMINAL RESPONSE CLOSECHANNEL 12.3.3.13.2

[Command performed successfully]

PROACTIVE COMMAND: OPEN CHANNEL 12.3.3.13.2

Logically:

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device:ME

Bearer

Bearer type: GPRS/ UTRAN packet service/E-UTRAN

Bearer parameter:

Precedence Class: 02

Delay Class: 04

Reliability Class: 02

Peak throughput class: 05

Mean throughput class: 31

Packet data protocol: 02 (IP)

Buffer

Buffer size: 1024

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address: 01.01.01.01

Page 308: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 308 of 606

TERMINAL RESPONSE: OPEN CHANNEL 12.3.3.13.2

Logically:

Command details

Command number: 1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status Channel identifier 1 and link established or PDP contextactivated

Bearer description

Bearer type: GPRS/ UTRAN packet service/E-UTRAN

Bearer parameter:

Precedence Class: 02

Delay Class: 04

Reliability Class: 02

Peak throughput class: 05

Mean throughput class: 31

Packet data protocol: 02 (IP)

Buffer

Buffer size: 1024

PROACTIVE COMMAND: CLOSE CHANNEL 12.3.3.13.2

Logically:

Command details

Command number: 1

Command type: CLOSE CHANNEL

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

TERMINAL RESPONSE: CLOSE CHANNEL 12.3.3.13.2

Page 309: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 309 of 606

Logically:

Command details

Command number: 1

Command type: CLOSE CHANNEL

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

12.3.3.14 RECEIVE DATA – Terminal connected to Wi-Fi

Test PurposeTo verify RECEIVE DATA related to Default (network) Bearer, for terminal connected to Wi-Fi, UICC in client mode for UDP

Referenced requirement TS26_NFC_REQ_078

Initial ConditionsOne default APN is configured on the DUT and the related PDN connection to this APN hasbeen already established.

For the Wi-Fi the test platform has to assure exclusive SSID which does not allow accessexcept the DUT, same for login and password.

12.3.3.14.1 Test Sequence No 1: (RECEIVE DATA, Terminal connected to Wi-Fi-APN empty-Default Bearer Type used)

Initial ConditionsNone

Step Direction Sequence Expected Result

1 ME Connect ME to the USS and establishthe first PDN to the APN for “Alwayson connection” (web.network.com).

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 ME Connect ME to the local Wi-Fi hot spot Wi-Fi needs to be turned ON after firstPDN registration

3 ME Disconnect ME from the first APN for“Always on connection”(web.network.com)

4 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST 12.3.3.14.1 PENDING

Page 310: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 310 of 606

Step Direction Sequence Expected Result

5 MEUICC FETCH

6 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST12.3.3.14.1

7 MEUICC

TERMINAL RESPONSE: SET UPEVENT LIST 12.3.3.14.1

8 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 12.3.3.14.1

9 MEUICC FETCH

10 UICCME

PROACTIVE COMMAND: OPENCHANNEL 12.3.3.14.1

11 MEUser

The ME may display channel openinginformation

12 ME USS PDP context activation request

13 USS ME PDP context activation accept

14 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 12.3.3.14.1

[Command performed successfully]

15 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 12.3.3.14.1

16 MEUICC FETCH

17 UICCME

PROACTIVE COMMAND: SENDDATA (immediate) 12.3.3.14.1

18 ME USS Transfer 8 Bytes of data to the USSthrough channel 1

[To retrieve ME's port number]

19 MEUICC

TERMINAL RESPONSE: SEND DATA(immediate) 12.3.3.14.1

[Command performed successfully]

20 USS ME Transfer 1024 Bytes of data to the MEthrough channel 1 using the ME's portnumber, which was retrieved in step18

21 MEUICC

ENVELOPE: EVENT DOWNLOAD -Data available 12.3.3.14.1

(1024 Bytes of data in the ME buffer)

22 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 12.3.3.14.1

23 MEUICC FETCH

24 UICCME

PROACTIVE COMMAND: RECEIVEDATA 12.3.3.14.1

205 Bytes

25 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 12.3.3.14.1

Page 311: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 311 of 606

Step Direction Sequence Expected Result

26 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 12.3.3.14.2

27 MEUICC FETCH

28 UICCME

PROACTIVE COMMAND: RECEIVEDATA 12.3.3.14.2

205 Bytes

29 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 12.3.3.14.2

30 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 12.3.3.14.3

31 MEUICC FETCH

32 UICCME

PROACTIVE COMMAND: RECEIVEDATA 12.3.3.14.3

205 Bytes

33 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 12.3.3.12.3.3

34 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 12.3.3.14.4

35 MEUICC FETCH 205 Bytes

36 UICCME

PROACTIVE COMMAND: RECEIVEDATA 12.3.3.14.4

37 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 12.3.3.14.4

38 UICCME

PROACTIVE COMMAND PENDING:RECEIVE DATA 12.3.3.14.5

39 MEUICC FETCH 204 Bytes

40 UICCME

PROACTIVE COMMAND: RECEIVEDATA 12.3.3.14.5

41 MEUICC

TERMINAL RESPONSE: RECEIVEDATA 12.3.3.14.5

PROACTIVE COMMAND: OPEN CHANNEL 12.3.3.14.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device:ME

Bearer

Page 312: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 312 of 606

Bearer type: Default Bearer Type

Buffer

Buffer size: 1024

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address: 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 12.3.3.14.1

Command details

Command number: 1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status Channel identifier 1 and link established or PDP contextactivated

Bearer description

Bearer type: Default Bearer Type

Buffer

Buffer size: 1024

PROACTIVE COMMAND: SET UP EVENT LIST 12.3.3.14.1

Command details

Command number: 1

Command type: SET UP EVENT LIST

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: ME

Event list Data available

TERMINAL RESPONSE: SET UP EVENT LIST 12.3.3.14.1

Command details

Page 313: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 313 of 606

Command number: 1

Command type: SET UP EVENT LIST

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

PROACTIVE COMMAND: SEND DATA 12.3.3.14.1

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 00 01 .. 07 (8 Bytes of data)

TERMINAL RESPONSE: SEND DATA 12.3.3.14.1

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in the Tx buffer

ENVELOPE: EVENT DOWNLOAD - Data available 12.3.3.14.1

Event list

Event: Data available

Device identities

Source device: ME

Page 314: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 314 of 606

Destination device: UICC

Channel status

Channel status: Channel 1 open, link established

Channel Data Length

Channel data length: FF (more than 255 bytes are available)

PROACTIVE COMMAND: RECEIVE DATA 12.3.3.14.1

Command details

Command number: 1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: 205

PROACTIVE COMMAND: RECEIVE DATA 12.3.3.14.2

Command details

Command number: 2

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: 205

PROACTIVE COMMAND: RECEIVE DATA 12.3.3.14.3

Command details

Command number: 3

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Page 315: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 315 of 606

Channel Data Length: 205

PROACTIVE COMMAND: RECEIVE DATA 12.3.3.14.4

Command details

Command number: 4

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: 205

PROACTIVE COMMAND: RECEIVE DATA 12.3.3.14.5

Command details

Command number: 5

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: 204

TERMINAL RESPONSE: RECEIVE DATA 12.3.3.14.1

Command details

Command number: 1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data: 00 01 02 .. CC (205 Bytes of data)

Channel data length: FF

Page 316: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 316 of 606

TERMINAL RESPONSE: RECEIVE DATA 12.3.3.14.2

Command details

Command number: 2

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data: CD CE CF .. FF 00 01 .. 99(205 Bytes of data)

Channel data length: FF

TERMINAL RESPONSE: RECEIVE DATA 12.3.3.14.3

Command details

Command number: 3

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data: 9A 9B .. FF 00 01 – 66 (205 Bytes of data)

Channel data length: FF

TERMINAL RESPONSE: RECEIVE DATA 12.3.3.14.4

Command details

Command number: 4

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data: 67 68 .. FF 00 01 .. 33 (205 Bytes of data)

Page 317: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 317 of 606

Channel data length: CC

TERMINAL RESPONSE: RECEIVE DATA 12.3.3.14.5

Command details

Command number: 5

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data: 34 35 .. FF (204 Bytes of data)

Channel data length: 00

12.3.3.15 SEND DATA - Terminal connected to Wi-Fi

Test PurposeTo verify SEND DATA related to Default (network) Bearer, for terminal connected to Wi-Fi,UICC in client mode for UDP

Referenced requirement TS26_NFC_REQ_078

Initial ConditionsOne default APN is configured on the DUT and the related PDN connection to this APN hasbeen already established.

For the Wi-Fi the test platform has to assure exclusive SSID which does not allow accessexcept the DUT, same for login and password.

12.3.3.15.1 Test Sequence No 1: (SEND DATA, Terminal connected to Wi-Fi-APNempty-Default Bearer Type used)

Initial ConditionsNone

Step Direction Sequence Expected Result

1 ME Connect ME to the USS and establishthe first PDN to the APN for “Alwayson connection” (web.network.com).

Indication to the test operator required toconfigure the ME for the establishment ofthe first PDN connection to the desiredAPN after registration.

2 ME Connect ME to the local Wi-Fi hot spot Wi-Fi needs to be turned ON after firstPDN registration

Page 318: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 318 of 606

Step Direction Sequence Expected Result

3 ME Disconnect ME from the first APN for“Always on connection”(web.network.com)

4 UICCME

PROACTIVE COMMAND PENDING:OPEN CHANNEL 12.3.3.15.1

5 MEUICC FETCH

6 UICCME

PROACTIVE COMMAND: OPENCHANNEL 12.3.3.15.1

7 MEUICC

The ME may display channel openinginformation

8 ME USS PDP context activation request

9 USS ME PDP context activation accept

10 MEUICC

TERMINAL RESPONSE: OPENCHANNEL 12.3.3.15.1

[Command performed successfully]

11 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 12.3.3.15.1

12 MEUICC FETCH

13 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 12.3.3.15.1

Send 1024 Bytes of data by packets of205 Bytes

14 MEUICC

TERMINAL RESPONSE: SEND DATA(store mode) 12.3.3.15.1

[Command performed successfully]

15 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 12.3.3.15.2

16 MEUICC FETCH

17 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 12.3.3.15.2

[205 Bytes]

18 MEUICC

TERMINAL RESPONSE: SEND DATA(store mode) 12.3.3.15.2

[Command performed successfully]

19 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 12.3.3.15.3

20 MEUICC FETCH

21 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 12.3.3.15.3

[205 Bytes]

22 MEUICC

TERMINAL RESPONSE: SEND DATA(store mode) 12.3.3.15.3

[Command performed successfully]

23 UICCME

PROACTIVE COMMAND PENDING:SEND DATA 12.3.3.15.4

24 MEUICC FETCH

Page 319: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 319 of 606

Step Direction Sequence Expected Result

25 UICCME

PROACTIVE COMMAND: SENDDATA (store mode) 12.3.3.15.4

[205 Bytes]

26 MEUICC

TERMINAL RESPONSE: SEND DATA(store mode) 12.3.3.15.4

[Command performed successfully]

27 UICCME

PROACTIVE COMMAND PENDING:SEND DATA12.3.3.15.5

28 MEUICC FETCH

29 UICCME

PROACTIVE COMMAND: SENDDATA (immediate) 12.3.3.15.5

[204 Bytes]

30 ME USS Transfer 1024 Bytes of data to theUSS through channel 1

31 MEUICC

TERMINAL RESPONSE: SEND DATA(immediate) 12.3.3.15.5

[Command performed successfully]

PROACTIVE COMMAND: OPEN CHANNEL 12.3.3.15.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device:ME

Bearer

Bearer type: Default Bearer Type

Buffer

Buffer size: 1024

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address: 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 12.3.3.15.1

Command details

Command number: 1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Page 320: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 320 of 606

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status Channel identifier 1 and link established or PDP contextactivated

Bearer description

Bearer type: Default Bearer Type

Buffer

Buffer size: 1024

PROACTIVE COMMAND: SEND DATA 12.3.3.15.1

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 00 01 02 .. CC (205 Bytes of data)

TERMINAL RESPONSE: SEND DATA 12.3.3.15.1

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in the Tx buffer

PROACTIVE COMMAND: SEND DATA 12.3.3.15.2

Command details

Command number: 1

Command type: SEND DATA

Page 321: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 321 of 606

Command qualifier: Store mode

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: CD CE CF .. FF 00 01 .. 99(205 Bytes of data)

TERMINAL RESPONSE: SEND DATA 12.3.3.15.2

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in the Tx buffer

PROACTIVE COMMAND: SEND DATA 12.3.3.15.3

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 9A 9B .. FF 00 01 .. 66 (205 Bytes of data)

TERMINAL RESPONSE: SEND DATA 12.3.3.15.3

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: ME

Page 322: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 322 of 606

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in the Tx buffer

PROACTIVE COMMAND: SEND DATA 12.3.3.15.4

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 67 68 .. FF 00 01 .. 33 (205 Bytes of data)

TERMINAL RESPONSE: SEND DATA 12.3.3.15.4

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Store mode

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: 204 bytes of space available in the Tx buffer

PROACTIVE COMMAND: SEND DATA 12.3.3.15.5

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Page 323: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 323 of 606

Channel Data: 34 35 .. FF (204 Bytes of data)

TERMINAL RESPONSE: SEND DATA 12.3.3.15.5

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in the Tx buffer.

12.4 Remote Management use cases

12.4.1 General overviewThis section addresses testing of selected use cases for NFC services in environment withpossible real data transfer in place.

The list of conformance requirements tested within this section is listed in the table insection Error! Reference source not found..

12.4.2 Conformance requirementsTS26_NFC_REQ_078 The mobile device SHALL support BIP in UICC client mode for UDP.

TS26_NFC_REQ_079 The mobile device SHALL support BIP in UICC client mode for TCP.

TS26_NFC_REQ_081 The mobile device SHALL support the SMS push (per ETSI TS 102 226and 3GPP TS 31.116) to establish an open BIP channel as per ETSI TS102 223 Open Channel Command

TS26_NFC_REQ_120 The device SHALL support the BIP session regardless of incoming oroutgoing calls, incoming or outgoing MMS, SMS.Note: This is not applicable if the device is on a 2G network.

12.4.3 Test Cases

12.4.3.1 Contactless transaction during BIP session

Test PurposeTo ensure that the device is able to perform contactless transaction during a CAT-TP/BIPsession

Referenced requirement TS26_NFC_REQ_078

Page 324: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 324 of 606

Test Sequence No 1: Receiving or send a SMS during BIP data

t nsfra er

nt l ondtonsIiiaC ii

ReferenceApplication.cap managing the reference transaction with AID_REFselectable into the reference UICC.

APDU Application to send APDUs according to the reference transaction.

Step Direction

Sequence Expected Result

1 DUT UICC

Send Fetch OPEN CHANNELcommand

2 UICCDUT

OPEN CHANNEL 1.1

3 DUT UICC

TERMINAL RESPONSE: OPENCHANNEL

TR Open Channel successful + SW= 91xx

4 Fetch Send Data (CATTP SYNcommand for Link establishment )

TR Successful + 90 00

5 Send Event Data Available to theUICC (Reception of CATTP SYN-ACK)

91 XX

6 DUT UICC

Fetch Receive Data TR Successful + 91 XX

7 Fetch Send Data (ACK-PDU) Ask server for downloading data

8 DUT UICC

Send Event Data Available to theUICC (Reception of data from theserver)

91 FF

9 DUT UICC

Fetch Receive Data (with 0xFF data) TR Successful + 91 FF

10 DUT UICC

Fetch Receive Data (with 0xFF data) TR Successful + 91 FF

11 Execute the reference transactionin loop mode (5 loops)

The DUT must manage thereference transaction at least 5transaction done consecutivelywithout any loss.

12 DUT UICC

Fetch Receive Data (with 0xFF data) TR Successful + 91 yy (last Bytes)

13 Fetch Receive Data (with 0x’yy’ data) TR Successful + 91 zz

14 Fetch Send Data store data in Txbuffer (with 0x’zz’ data)

TR Successful + 90 00

15 Send Event Data Available to theUICC

12.4.3.1.1

Page 325: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 325 of 606

Step Direction

Sequence Expected Result

16 Fetch Receive Data (with 0xFF data) TR Successful + 91 FF

17 DUT UICC

Fetch Receive Data (with 0xFF data) TR Successful + 91 yy (last Bytes)

18 Fetch Receive Data (with 0x’yy’ data) TR Successful + 91 zz

19 Fetch Send Data immediate TR Successful + 90 00

20 Send Event Data Available to theUICC

21 Fetch Receive Data (with 0xFF data) TR Successful + 91 FF

22 Fetch Receive Data (with 0xFF data) TR Successful + 91 yy (last Bytes)

23 Fetch Receive Data (with 0x’yy’ data) TR Successful + 91 zz

24 Fetch Send Data immediate TR Successful + 91 xx

25 Fetch Close Channel TR Successful + 90 00

PROACTIVE COMMAND: OPEN CHANNEL 1.1

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device: ME

Bearer description

Bearer type: 03 Default Bearer for requested transport layer

Buffer

Buffer size: 1400

Text String: UserLog (User login)

Text String: UserPwd (User password)

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 1.1

Command details

Command number:1

Page 326: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 326 of 606

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel status Channel identifier 1 and link established or PDPcontext activated

Bearer description

Bearer type: 03 Default Bearer for requested transport layer

Buffer

Buffer size: 1400

12.4.3.2 OTA Data Loading

Test PurposeEnsure that the Baseband can support the OTA data Loading

Referenced requirement TS26_NFC_REQ_078 TS26_NFC_REQ_079 TS26_NFC_REQ_081 TS26_NFC_REQ_120

Initial Conditions A test data with a size of 60k Bytes to induce OTA Load duration in CAT-TP Set up a network simulator for the appropriate radio access technology as defined in

chapter 2.5.8. Also, the DUT with a test phone number which can be called and permits to maintain

the call for several minutes is necessary. Simulated UICC is connected to the DUT Prior to this test the DUT shall have been powered ON and ISO7816 initialization has

been completed. Test shall be made based on the capability of the DUT (Example: For LTE device,

test shall use LTE; otherwise, use 3G).

Test Sequence No 1: Receiving and accepting a voice call duringBIP CAT

- dt t nsfTP aara er

nt l ondtonsIiiaC iiSet up a network simulator for supported network technology as defined in chapter 2.5.8.

One default APN is configured on the DUT and the related PDN connection to this APN hasbeen already established.

12.4.3.2.1

Page 327: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 327 of 606

immediate Link establishment,

Bearer Type 03 (Default Bearer for requested transport layer),

No Alpha Identifier

Step Direction Sequence Expected Result

1 ServerDUT

Perform Push SMS procedure asdefined in section 12.4.3.7.1

2 ServerDUT

Transfer 60k Bytes of data to theDUT through channel 1 using theDUT's port number, which wasretrieved within step 1The data shall be constructed suchthat each portion of the data canbe unambiguously identified whenreceived by the UICC.

3 DUT UICC

ENVELOPE: EVENT DOWNLOAD– Data Available (Reception ofdata from the server, 60K Bytes ofdata in the DUT buffer)

91 XX

4 UICCDUT

PROACTIVE COMMAND:Receive Data 12.1 (with channeldata length of 0xFF)

5 DUT UICC TERMINAL RESPONSE:RECEIVE DATA 12.1

TR Successful Channel datacontains the start of the expecteddata from the server.91 XX

6 During CATTP data transfer,Receive and accept an incomingvoice call. Operate the Call for thewhole test sequence.

Voice call established

7 Repeat steps 8 to 9 until thecomplete 60k Bytes of data havebeen received by the UICC.Additional ENVELOPE: EVENTDOWNLOAD –Data Availablecommands may be sent by theDUT in between successivePROACTIVE COMMAND:Receive Data commands.

8 UICCDUT

PROACTIVE COMMAND: ReceiveData 12.1 (with channel datalength of YY according to theamount of data available)

Page 328: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 328 of 606

Step Direction Sequence Expected Result

9 DUT UICC TERMINAL RESPONSE:RECEIVE DATA 12.1

TR Successful Channel datacontains the remainder of theexpected data from the server.91 XX

10 UICC DUT PROACTIVE COMMAND: CLOSECHANNEL 12.1

11 DUT UICC TERMINAL RESPONSE: CLOSECHANNEL 12.1

[Command performed successfully]TR Successful + 90 00

PROACTIVE COMMAND: SEND DATA 12.1

Logically:

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data

Channel Data: 00 01 .. 07 (8 Bytes of data) (or other data as specified in thereferencing test procedure)

TERMINAL RESPONSE: SEND DATA 12.1

Logically:

Command details

Command number: 1

Command type: SEND DATA

Command qualifier: Send Immediately

Device identities

Source device: DUT

Destination device: UICC

Result

General Result: Command performed successfully

Channel data length: More than 255 bytes of space available in the Tx buffer

ENVELOPE: EVENT DOWNLOAD - Data available 12.1

Logically:

Page 329: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 329 of 606

Event list

Event: Data available

Device identities

Source device: DUT

Destination device: UICC

Channel status

Channel status: Channel 1 open, link established

Channel Data Length

Channel data length: FF (more than 255 bytes are available)

PROACTIVE COMMAND: RECEIVE DATA 12.1

Logically:

Command details

Command number: 1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel 1

Channel Data Length

Channel Data Length: 200 (or other value as specified in the referencing testprocedure)

TERMINAL RESPONSE: RECEIVE DATA 12.1

Logically:

Command details

Command number: 1

Command type: RECEIVE DATA

Command qualifier: RFU

Device identities

Source device: ME

Destination device: UICC

Result

General Result: Command performed successfully

Channel Data: 00 01 02 .. C7 (Segmented Bytes of data) (or other data as specifiedin the referencing test procedure)

Channel data length: FF (for the last TERMINAL RESPONSE: RECEIVE DATA thechannel data length should be 00)

Page 330: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 330 of 606

PROACTIVE COMMAND: CLOSE CHANNEL 12.1

Logically:

Command details

Command number: 1

Command type: CLOSE CHANNEL

Command qualifier: RFU

Device identities

Source device: UICC

Destination device: Channel

TERMINAL RESPONSE: CLOSE CHANNEL 12.1

Logically:

Command details

Command number: 1

Command type: CLOSE CHANNEL

Command qualifier: RFU

Device identities

Source device: DUT

Destination device: UICC

Result

General Result: Command performed successfully

VOID

Covered by section 12.4.3.2.1

Test Sequence No 3: Voice Call made from the device during BIPCAT-TP session

Initial ConditionsSet up a network simulator for supported network technology as defined in chapter 2.5.8.

One default APN is configured on the DUT and the related PDN connection to this APN hasbeen already established.

Immediate link establishment,

Bearer Type 03 (Default Bearer for requested transport layer)

No alpha identifier

Step Direction Sequence Expected Result

12.4.3.2.2

12.4.3.2.3

Page 331: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 331 of 606

Step Direction Sequence Expected Result

1 ServerDUTDUT Server

Perform Push SMS procedure asdefined in section 12.4.3.7.1

2 ServerDUT

Transfer of 60k Bytes of data to theDUT through channel 1 using theDUT's port number, which wasretrieved within step 1The data shall be constructed suchthat each portion of the data canbe unambiguously identified whenreceived by the UICC.

3 DUT UICC ENVELOPE: EVENT DOWNLOAD– Data Available (Reception ofdata from the server, 60K Bytes ofdata in the DUT buffer)

91 XX

4 UICCDUT

PROACTIVE COMMAND:Receive Data 12.1 (with channeldata length of 0xFF)

5 DUT UICC TERMINAL RESPONSE:RECEIVE DATA 12.1

TR Successful Channel datacontains the start of the expecteddata from the server.91 XX

6 During CATTP data transfer, start avoice call to a test phone numberand Receive the call. Operate theCall for the whole test sequence

Voice call established

7 Repeat steps 8 to 9 until thecomplete 60k Bytes of data havebeen received by the UICC.Additional ENVELOPE: EVENTDOWNLOAD –Data Availablecommands may be sent by theDUT in between successivePROACTIVE COMMAND:Receive Data commands.

8 UICCDUT

PROACTIVE COMMAND: ReceiveData 12.1 (with channel datalength of YY according to theamount of data available)

9 DUT UICC TERMINAL RESPONSE:RECEIVE DATA 12.1

TR Successful Channel datacontains the remainder of theexpected data from the server.91 XX

10 UICC DUT PROACTIVE COMMAND: CLOSE

Page 332: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 332 of 606

Step Direction Sequence Expected ResultCHANNEL 12.1

11 DUT UICC TERMINAL RESPONSE: CLOSECHANNEL 12.1

[Command performedsuccessfully]TR Successful + 90 00

Logically

Same as PROACTIVE COMMAND: SEND DATA 12.1 in clause 12.4.3.2.1.

Same as TERMINAL RESPONSE: SEND DATA 12.1 in clause 12.4.3.2.1.

Same as, ENVELOPE: EVENT DOWNLOAD - Data available 12.1 in clause 12.4.3.2.1.

Same as PROACTIVE COMMAND: RECEIVE CHANNEL 12.1 in clause 12.4.3.2.1.

Same as TERMINAL RESPONSE: RECEIVE CHANNEL 12.1 in clause 12.4.3.2.1.

Same as PROACTIVE COMMAND: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1.

Same as TERMINAL RESPONSE: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1.

VOID

Covered by section 12.4.3.2.3

Test Sequence No 5: BIP CAT-TP data transfer during a Voice Call isestablished

Initial Conditions

Set up a network simulator for supported network technology as defined in chapter 2.5.8.

One default APN is configured on the DUT and the related PDN connection to this APN hasbeen already established.

Immediate link establishment,

Bearer Type 03 (Default Bearer for requested transport layer),

No alpha identifier

Step Direction

Sequence Expected Result

1 Start the test by Receiving andaccepting an incoming voice callover 2G/3G. Operate the call forthe whole test sequence.

Voice call established

12.4.3.2.4

12.4.3.2.5

Page 333: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 333 of 606

Step Direction

Sequence Expected Result

2 ServerDUTDUT Server

Perform Push SMS procedure asdefined in section 12.4.3.7.1

3 ServerDUT

Transfer 60k Bytes of data to theDUT through channel 1 using theDUT's port number, which wasretrieved within step 2.The data shall be constructed suchthat each portion of the data canbe unambiguously identified whenreceived by the UICC.

4 DUT UICC

ENVELOPE: EVENT DOWNLOAD– Data Available (Reception ofdata from the server, 60K Bytes ofdata in the DUT buffer)

91 XX

5 Repeat steps 6 to 7 until thecomplete 60k Bytes of data havebeen received by the UICC.Additional ENVELOPE: EVENTDOWNLOAD –Data Availablecommands may be sent by theDUT in between successivePROACTIVE COMMAND:Receive Data commands.

6 UICCDUT

PROACTIVE COMMAND:Receive Data 12.1 (with channeldata length of YY according to theamount of data available)

7 DUT UICC

TERMINAL RESPONSE:RECEIVE DATA 12.1

TR Successful Channel datacontains the expected data fromthe server.91 XX

8 UICCDUT

PROACTIVE COMMAND: CLOSECHANNEL 12.1

9 DUT UICC

TERMINAL RESPONSE: CLOSECHANNEL 12.1

[Command performed successfully]TR Successful + 90 00

Logically

Same as PROACTIVE COMMAND: SEND DATA 12.1 in clause 12.4.3.2.1.

Same as TERMINAL RESPONSE: SEND DATA 12.1 in clause 12.4.3.2.1.

Page 334: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 334 of 606

Same as, ENVELOPE: EVENT DOWNLOAD - Data available 12.1 in clause 12.4.3.2.1.

Same as PROACTIVE COMMAND: RECEIVE CHANNEL 12.1 in clause 12.4.3.2.1.

Same as TERMINAL RESPONSE: RECEIVE CHANNEL 12.1 in clause 12.4.3.2.1.

Same as PROACTIVE COMMAND: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1.

Same as TERMINAL RESPONSE: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1.

VOID

Covered by section 12.4.3.2.5

12.4.3.3 OTA Data Loading with and without proof of Receipt (PoR)

Test PurposeEnsure that the mobile device supports the OTA data Loading with and without proof ofReceipt (PoR) request by the OTA server.

Referenced requirement TS26_NFC_REQ_078 TS26_NFC_REQ_081

Initial Conditions A test data with a size of 60k Bytes to induce OTA data transfer Set up a network simulator for the appropriate radio access technology as defined in

chapter 2.5.8. Also, a test phone number which may be called and which permits to maintain the

call during several minutes is necessary. Simulated UICC is connected to the DUT Prior to this test the DUT shall have been powered ON and ISO7816 initialization has

been completed.

Test Sequence No 1: OTA data loading without PoR requested byOTA server

Initial ConditionsSet up a network simulator for supported network technology as defined in chapter 2.5.8.

One default APN is configured on the DUT and the related PDN connection to this APN hasbeen already established.

Test UICC should be configured to No PoR.

Immediate Link establishment,

Bearer Type 03 (Default Bearer for requested transport layer)

No alpha identifier

12.4.3.2.6

12.4.3.3.1

Page 335: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 335 of 606

Step Direction

Sequence Expected Result

1 ServerDUTDUTServer

Perform Push SMS procedure asdefined in section 12.4.3.7.1

2 ServerDUT

Transfer 60k Bytes of data to theDUT through channel 1 using theDUT's port number, which wasretrieved within step 1The data shall be constructed suchthat each portion of the data canbe unambiguously identified whenreceived by the UICC.

3 DUT UICC

ENVELOPE: EVENT DOWNLOAD– Data Available (Reception ofdata from the server, 60K Bytes ofdata in the DUT buffer)

91 XX

4 Repeat steps 5 to 6 until thecomplete 60k Bytes of data havebeen received by the UICC.Additional ENVELOPE: EVENTDOWNLOAD –Data Availablecommands shall be sent by theDUT in between successivePROACTIVE COMMAND:Receive Data commands.

5 UICCDUT

PROACTIVE COMMAND:Receive Data 12.1 (with channeldata length of YY according to theamount of data available)

6 DUT UICC

TERMINAL RESPONSE:RECEIVE DATA 12.1

TR Successful Channel datacontains the expected data fromthe server.91 XX

7 UICCDUT

PROACTIVE COMMAND: CLOSECHANNEL 12.1

8 DUT UICC

TERMINAL RESPONSE: CLOSECHANNEL 12.1

[Command performed successfully]TR Successful + 90 00

Logically:

Same as PROACTIVE COMMAND: SEND DATA 12.1 in clause 12.4.3.2.1

Same as TERMINAL RESPONSE: SEND DATA 12.1 in clause 12.4.3.2.1

Same as ENVELOPE: EVENT DOWNLOAD – Data available 12.1 in clause 12.4.3.2.1

Page 336: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 336 of 606

Same as PROACTIVE COMMAND: RECEIVE CHANNEL 12.1 in clause 12.4.3.2.1

Same as TERMINAL RESPONSE: RECEIVE CHANNEL 12.1 in clause 12.4.3.2.1

Same as PROACTIVE COMMAND: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1

Same as TERMINAL RESPONSE: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1

Test Sequence No 2: OTA data loading with PoR requested by OTA

sverer

nt l ondtonsIiiaC iiSet up a network simulator for supported network technology as defined in section 2.5.8.

One default APN is configured on the DUT and the related PDN connection to this APN hasbeen already established.

immediate link establishment,

Bearer Type 03 (Default Bearer for requested transport layer)

No alpha identifier

Step Direction

Sequence Expected Result

1 ServerDUTDUTServer

Perform Push SMS procedure asdefined in section 12.4.3.7.2

2 ServerDUT

Transfer 60k Bytes of data to theDUT through channel 1 using theDUT's port number, which wasretrieved within step 1The data shall be constructed suchthat each portion of the data canbe unambiguously identified whenreceived by the UICC.

3 DUT UICC

ENVELOPE: EVENT DOWNLOAD– Data Available (Reception ofdata from the server, 60K Bytes ofdata in the DUT buffer)

91 XX

4 Repeat steps 5 to 6 until thecomplete 60k Bytes of data havebeen received by the UICC.Additional ENVELOPE: EVENTDOWNLOAD – Data Availablecommands should be sent by theDUT in between successivePROACTIVE COMMAND:Receive Data commands.

12.4.3.3.2

Page 337: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 337 of 606

Step Direction

Sequence Expected Result

5 UICCDUT

PROACTIVE COMMAND:Receive Data 12.1 (with channeldata length of YY according to theamount of data available)

6 DUT UICC

TERMINAL RESPONSE:RECEIVE DATA 12.1

TR Successful Channel datacontains the expected data fromthe server.91 XX

7 UICCDUT

PROACTIVE COMMAND: CLOSECHANNEL 12.1

8 DUT UICC

TERMINAL RESPONSE: CLOSECHANNEL 12.1

[Command performed successfully]TR Successful + 90 00

Logically:

Same as PROACTIVE COMMAND: SEND DATA 12.1 in clause 12.4.3.2.1

Same as TERMINAL RESPONSE: SEND DATA 12.1 in clause 12.4.3.2.1

Same as ENVELOPE: EVENT DOWNLOAD – Data available 12.1 in clause 12.4.3.2.1

Same as PROACTIVE COMMAND: RECEIVE CHANNEL 12.1 in clause 12.4.3.2.1

Same as TERMINAL RESPONSE: RECEIVE CHANNEL 12.1 in clause 12.4.3.2.1

Same as PROACTIVE COMMAND: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1

Same as TERMINAL RESPONSE: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1

VOID

VO ID

st qu nc o 5: d t lo dng th o qu st d byTeS eeeN O TAaa ai wi P R reee O TA

s v only on oerer errr

nt l ondtonsIiiaC iiSet up a network simulator for supported network technology as defined in chapter 2.5.8.

One default APN is configured on the DUT and the related PDN connection to this APN hasbeen already established.

Immediate link establishment,

Bearer Type 03 (Default Bearer for requested transport layer)

No alpha identifier.

Step Direction Sequence Expected Result

12.4.3.3.3

12.4.3.3.412.4.3.3.5

Page 338: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 338 of 606

Step Direction Sequence Expected Result

1 ServerDUTDUT Server

Perform Push SMS procedure withSPI ’12 22’ as defined in section12.4.3.7.1 with SPI set to ’12 22’(PoR only on error)

2 ServerDUT

Transfer 60k Bytes of data to theDUT through channel 1 using theDUT's port number, which wasretrieved within step 1.The data shall be constructed suchthat each portion of the data canbe unambiguously identified whenreceived by the UICC.

3 DUT UICC

ENVELOPE: EVENT DOWNLOAD– Data Available (Reception ofdata from the server, 60K Bytes ofdata in the DUT buffer)

91 XX

4 Repeat steps 5 to 6 until thecomplete 60k Bytes of data havebeen received by the UICC.Additional ENVELOPE: EVENTDOWNLOAD – Data Availablecommands should be sent by theDUT in between successivePROACTIVE COMMAND:Receive Data commands.

5 UICCDUT

PROACTIVE COMMAND:Receive Data 12.1 (with channeldata length of YY according to theamount of data available)

6 DUT UICC

TERMINAL RESPONSE:RECEIVE DATA 12.1

TR Successful Channel data containsthe expected data from the server.91 XX

7 UICCDUT

PROACTIVE COMMAND: CLOSECHANNEL 12.1

8 DUT UICC

TERMINAL RESPONSE: CLOSECHANNEL 12.1

[Command performed successfully]TR Successful + 90 00

Logically

Same as PROACTIVE COMMAND: SEND DATA 12.1 in clause 12.4.3.2.1

Same as TERMINAL RESPONSE: SEND DATA 12.1 in clause 12.4.3.2.1

Same as ENVELOPE: EVENT DOWNLOAD – Data available 12.1 in clause 12.4.3.2.1

Same as PROACTIVE COMMAND: RECEIVE CHANNEL 12.1 in clause 12.4.3.2.1

Same as TERMINAL RESPONSE: RECEIVE CHANNEL 12.1 in clause 12.4.3.2.1

Page 339: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 339 of 606

Same as PROACTIVE COMMAND: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1

Same as TERMINAL RESPONSE: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1

12.4.3.4 Secure Element Access during BIP session

Test PurposeTo ensure that the device is able to perform Secure Element Access during a BIP session

Referenced requirement TS26_NFC_REQ_078

Test Sequence No 1

nt l ondtonsIiiaC iiSet up a network simulator supported network technology as defined in chapter 2.5.8.

One default APN is configured on the DUT and the related PDN connection to this APN hasbeen already established.

APDU_TestApplication.cap implements the sequence used by the MobileApplication. MobileApplication to call Secure Element Access APIs for open channel and Send

APDU. This Application has full access to all AIDs.

The UICC simulator is connected to the DUT

The following configuration is loaded into the UICC: PKCS#15 ADF with a DODF present and valid an ACMF is present and valid an ACRF is present and valid and contains a rule for all other AIDs and a path for one ACCF containing an empty hash condition.

Step Direction Sequence Expected Result

1 ServerDUTDUT Server

Perform Push SMS procedure asdefined in section 12.4.3.7.1 or12.4.3.7.2

2 ServerDUT

Transfer 60k Bytes of data to theDUT through channel 1 using theDUT's port number, which wasretrieved within step 1.The data shall be constructed suchthat each portion of the data can beunambiguously identified whenreceived by the UICC.

3 DUT UICC

ENVELOPE: EVENT DOWNLOAD– Data Available (Reception of datafrom the server, 60K Bytes of datain the DUT buffer)

91 XX

12.4.3.4.1

Page 340: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 340 of 606

Step Direction Sequence Expected Result

4 UICCDUT

PROACTIVE COMMAND: ReceiveData 12.1 (with channel data lengthof 0xFF)

5 DUT UICC

TERMINAL RESPONSE: RECEIVEDATA 12.1

TR Successful Channel data containsthe start of the expected data from theserver.91 XX

6 Execute the MobileApplication inloop mode (20 loops) sendingAPDUs simultaneously, APDUCase 1, Case 2, Case 3, Case 4 .

APDU Case 1 and 3: 90 00

APDU Case 2 and 4: Data field of 0xFFbytes+ 9000

7 Repeat steps 8 to 9 until thecomplete 60k Bytes of data havebeen received by the UICC.Additional ENVELOPE: EVENTDOWNLOAD – Data Availablecommands may be sent by theDUT in between successivePROACTIVE COMMAND: ReceiveData commands.

8 UICCDUT

PROACTIVE COMMAND: ReceiveData 12.1 (with channel data lengthof YY according to the amount ofdata available)

9 DUT UICC

TERMINAL RESPONSE: RECEIVEDATA 12.1

TR Successful Channel data containsthe remainder of the expected data fromthe server.91 XX

10 UICCDUT

PROACTIVE COMMAND: CLOSECHANNEL 12.1

11 DUT UICC

TERMINAL RESPONSE: CLOSECHANNEL 12.1

[Command performed successfully]TR Successful + 90 00

Logically

Same as PROACTIVE COMMAND: SEND DATA 12.1 in clause 12.4.3.2.1.

Same as TERMINAL REPONSE: SEND DATA 12.1 in clause 12.4.3.2.1.

Same as ENVELOPE: EVENT DOWNLOAD - Data available 12.1 in clause 12.4.3.2.1.

Same as PROACTIVE COMMAND: RECEIVE CHANNEL 12.1 in clause 12.4.3.2.1.

Same as TERMINAL RESPONSE: RECEIVE CHANNEL 12.1 in clause 12.4.3.2.1.

Same as PROACTIVE COMMAND: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1.

Page 341: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 341 of 606

Same as TERMINAL RESPONSE: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1.

12.4.3.5 SMS and Internet Connection during OTA data loading.

Test PurposeEnsure that the mobile device supports the OTA data Loading during receiving/sendingSMS

Referenced requirement TS26_NFC_REQ_078 TS26_NFC_REQ_081 TS26_NFC_REQ_120

Initial Conditions A test data with a size of 60k Bytes to induce OTA data transfer Set up a network simulator for the appropriate radio access technology as defined in

chapter 2.5.8. Also, a test phone number which may be called and which permits to maintain the

call during several minutes is necessary. Simulated UICC is connected to the DUT Prior to this test the DUT shall have been powered ON and ISO7816 initialization has

been completed. Test shall be made based on the capability of the DUT (Example: For LTE device,

test shall use LTE; otherwise, use 3G).

Test Sequence No 1: Receiving and send a SMS during BIP data

t nsfra er

nt l ondtonsIiiaC iiSet up a network simulator for supported network technology as defined in chapter 2.5.8.

One default APN is configured on the DUT and the related PDN connection to this APN hasbeen already established.

Step Direction Sequence Expected Result

1 ServerDUTDUT Server

Perform Push SMS procedure asdefined in section 12.4.3.7.1 or12.4.3.7.2

2 ServerDUT

Transfer 60k Bytes of data to theDUT through channel 1 using theDUT's port number, which wasretrieved within step 1.The data shall be constructed suchthat each portion of the data canbe unambiguously identified whenreceived by the UICC.

3 DUT ENVELOPE: EVENT DOWNLOAD 91 XX

12.4.3.5.1

Page 342: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 342 of 606

Step Direction Sequence Expected ResultUICC – Data Available (Reception of

data from the server, 60K Bytes ofdata in the DUT buffer)

4 UICCDUT

PROACTIVE COMMAND:Receive Data 12.1 (with channeldata length of 0xFF)

5 DUT UICC

TERMINAL RESPONSE:RECEIVE DATA 12.1

TR Successful Channel data containsthe start of the expected data from theserver.91 XX

6 Send SMS from DUT to test phonenumber.Receive SMS from test phonenumber on DUT.

SMS Sent and Received

7 Repeat steps 8 to 9 until thecomplete 60k Bytes of data havebeen received by the UICC.Additional ENVELOPE: EVENTDOWNLOAD – Data Availablecommands should be sent by theDUT in between successivePROACTIVE COMMAND:Receive Data commands.

8 UICCDUT

PROACTIVE COMMAND: ReceiveData 12.1 (with channel datalength of YY according to theamount of data available)

9 DUT UICC

TERMINAL RESPONSE:RECEIVE DATA 12.1

TR Successful Channel data containsthe remainder of the expected datafrom the server.91 XX

10 UICCDUT

PROACTIVE COMMAND: CLOSECHANNEL 12.1

11 DUT UICC

TERMINAL RESPONSE: CLOSECHANNEL 12.1

[Command performed successfully]TR Successful + 90 00

Logically

Same as PROACTIVE COMMAND: SEND DATA 12.1 in clause 12.4.3.2.1.

Same as TERMINAL REPONSE: SEND DATA 12.1 in clause 12.4.3.2.1.

Same as ENVELOPE: EVENT DOWNLOAD - Data available 12.1 in clause 12.4.3.2.1.

Same as PROACTIVE COMMAND: RECEIVE CHANNEL 12.1 in clause 12.4.3.2.1.

Page 343: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 343 of 606

Same as TERMINAL RESPONSE: RECEIVE CHANNEL 12.1 in clause 12.4.3.2.1.

Same as PROACTIVE COMMAND: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1.

Same as TERMINAL RESPONSE: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1.

12.4.3.6 VOID

12.4.3.7 Link Establishment using Push SMS

Test PurposeTo ensure that the device establishes a connection to a given remote management serveron request by an appropriate Push SMS

Referenced requirement TS26_NFC_REQ_081

Test Procedure: OPEN CHANNEL on receiving Push SMS without

oP R

nt l ondtonsIiiaC iiSet up a network simulator for LTE, terminal is authenticating against LTE.

If PUSH SMS is sent through IMS over LTE: Set up an IMS server, DUT is registering withIMS in order to receive and send SMS.

If PUSH SMS is sent through 2G/3G network: Set up a network simulator for 2G/3G,terminal is authenticating against 2G/3G in order to receive and send SMS.

One default APN is configured on the DUT and the related PDN connection to this APN hasbeen already established.

Test UICC should send no PoR.

12.4.3.7.1

Page 344: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 344 of 606

Test Environment

Test Procedure(With APN, immediate link establishment, Bearer type 03 (Default Bearer for requestedtransport layer), no alpha identifier)

Step Direction Sequence Expected Result

SMS with PUSH commands

ENVELOPE(SMS-PP DOWNLOAD)

OPEN CHANNELOpen PDN connection

SEND DATA(SYN PDU)SYN

SYN/ACKENVELOPE(EVENT DOWNLOAD –

Data available)

SEND DATA(ACK PDU)ACK

Network ME(DUT)

UICC

TERMINAL RESPONSECommand performed successfully

TERMINAL RESPONSECommand performed successfully

TERMINAL RESPONSECommand performed successfully

RECEIVE DATA &TERMINAL RESPONSE(SYN/ACK PDU)Command performed successfully

Page 345: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 345 of 606

Step Direction Sequence Expected Result

1 Network DUT

Send “PUSH SMS” (content seebelow) with two commands: “Request for BIP channel

opening” as defined in TS 102226 and TS 102 223.The SPI parameter is set to "1200" in the sms open channel push

“Request for CAT_TP linkestablishment” as defined in TS102 226 [23] and TS 102 127 [24]

ENVELOPE(SMS-PP DOWNLOAD),forwarding the PUSH SMS to the UICC

2 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST 11.1.1 PENDING

3 ME

UICC

FETCH

4 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST 11.1.1

5 MEUICC

TERMINAL RESPONSE: SET UPEVENT LIST 11.1.1

6 UICCDUT

PROACTIVE COMMAND: OPENCHANNEL 12.1

Open PDN connection may takeplace

TERMINAL RESPONSE(Command performed successfully,’91 xx’) 12.1

7 UICCDUT

PROACTIVE COMMAND: SENDDATA 12.1 (SYN PDU)

Transfer data to the networkthrough channel 1 to retrieve DUT'sport number.

TERMINAL RESPONSE (Commandperformed successfully, ’91 xx’)12.1

8 Network DUT

Transmit SYN/ACK Packet ENVELOPE(EVENT DOWNLOAD -Data available 12.1)

9 UICCDUT

PROACTIVE COMMAND: RECEIVEDATA 12.1 (SYN/ACK PDU)

TERMINAL RESPONSE(Command performed successfully, ’91xx’) 12.1

10 UICCDUT

PROACTIVE COMMAND: SENDDATA 12.1 (ACK PDU)

Transfer ACK Packet into network TERMINAL RESPONSE

(Command performed successfully,’91 xx’) 12.1

Logically

PROACTIVE COMMAND: OPEN CHANNEL 12.1

Page 346: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 346 of 606

Logically:

Command details

Command number:1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: UICC

Destination device:DUT

Bearer description

Bearer type: 03 Default Bearer for requested transport layer

Buffer

Buffer size: 1400

UICC/ME interface transport level

Transport format: UDP

Port number: 44444

Data destination address: 01.01.01.01

TERMINAL RESPONSE: OPEN CHANNEL 12.1

Logically:

Command details

Command number: 1

Command type: OPEN CHANNEL

Command qualifier: immediate link establishment

Device identities

Source device: DUT

Destination device: UICC

Result

General Result: Command performed successfully

Channel status Channel identifier 1 and link established or PDP contextactivated

Bearer description

Bearer type: 03 Default Bearer for requested transport layer

Buffer

Buffer size: 1400

Same as PROACTIVE COMMAND: SET UP EVENT LIST 11.1.1 in clause 11.3.3.1.

Same as TERMINAL RESPONSE: SET UP EVENT LIST 11.1.1 in clause 11.3.3.1.

Page 347: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 347 of 606

Same as PROACTIVE COMMAND: SEND DATA 12.1 in clause 12.4.3.2.1.

Same as TERMINAL RESPONSE: SEND DATA 12.1 in clause 12.4.3.2.1.

Same as, ENVELOPE: EVENT DOWNLOAD - Data available 12.1 in clause 12.4.3.2.1.

Same as PROACTIVE COMMAND: RECEIVE DATA 12.1 in clause 12.4.3.2.1.

Same as TERMINAL RESPONSE: RECEIVE DATA 12.1 in clause 12.4.3.2.1.

Same as PROACTIVE COMMAND: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1.

Same as TERMINAL RESPONSE: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1.

Test Procedure: OPEN CHANNEL on receiving Push SMS, with PoR

nt l ondtonsIiiaC iiSet up a network simulator for LTE, terminal is authenticating against LTE.

If PUSH SMS is sent through IMS over LTE: Set up an IMS server, DUT is registering withIMS in order to receive and send SMS.

If PUSH SMS is sent through 2G/3G network: Set up a network simulator for 2G/3G,terminal is authenticating against 2G/3G in order to receive and send SMS.

One default APN is configured on the DUT and the related PDN connection to this APN hasbeen already established.

Test UICC should send PoR.

12.4.3.7.2

Page 348: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 348 of 606

Test Environment

Test Procedure(With APN, immediate link establishment, Bearer type 03 (Default Bearer for requestedtransport layer), no alpha identifier)

SMS with PUSH commands

ENVELOPE(SMS-PP DOWNLOAD)

OPEN CHANNELOpen PDN connection

SEND DATA(SYN PDU)SYN

SYN/ACKENVELOPE(EVENT DOWNLOAD –

Data available)

SEND DATA(ACK PDU)ACK

Network ME(DUT)

UICC

TERMINAL RESPONSECommand performed successfully

TERMINAL RESPONSECommand performed successfully

TERMINAL RESPONSECommand performed successfully

SEND SHORT MESSAGE (PoR)

TERMINAL RESPONSECommand performed successfully

SHORT MESSAGE(PoR)

RECEIVE DATA &TERMINAL RESPONSE(SYN/ACK PDU)Command performed successfully

Page 349: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 349 of 606

Step Direction Sequence Expected Result

1 Network DUT

Send “PUSH SMS” (content seebelow) with two commands: “Request for BIP channel

opening” as defined in TS 102226 and TS 102 223.The SPI parameter is set to "1221" in the sms open channel push

“Request for CAT_TP linkestablishment” as defined in TS102 226 [23] and TS 102 127 [24]

ENVELOPE(SMS-PP DOWNLOAD),forwarding the PUSH SMS to the UICC

2 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST 11.1.1 PENDING

3 MEUICC

FETCH

4 UICCME

PROACTIVE COMMAND: SET UPEVENT LIST 11.1.1

5 MEUICC

TERMINAL RESPONSE: SET UPEVENT LIST 11.1.1

6 UICCDUT

PROACTIVE COMMAND: OPENCHANNEL 12.1

Open PDN connection may takeplace

TERMINAL RESPONSE(Command performed successfully,’91 xx’) 12.1

7 UICCDUT

PROACTIVE COMMAND: SENDDATA 12.1 (SYN PDU)

Transfer data to the networkthrough channel 1 to retrieve DUT'sport number.

TERMINAL RESPONSE (Commandperformed successfully, ’91 xx’)12.1

8 Network DUT

Transmit SYN/ACK Packet ENVELOPE(EVENT DOWNLOAD –Data Available 12.1)

9 UICCDUT

PROACTIVE COMMAND: RECEIVEDATA 12.1 (SYN/ACK PDU)

TERMINAL RESPONSE(Command performed successfully, ’91xx’)

10 UICCDUT

PROACTIVE COMMAND: SENDDATA 12.1 (ACK PDU)

Transfer ACK Packet into network TERMINAL RESPONSE

(Command performed successfully,’91 xx’) 12.1

11 UICCDUT

PROACTIVE COMMAND: SENDSHORT MESSAGE (PoR)

Transfer PoR into network TERMINAL RESPONSE

(Command performed successfully,’91 xx’) 12.1

Page 350: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 350 of 606

Logically

Same as PROACTIVE COMMAND: SET UP EVENT LIST 11.1.1 in clause 11.3.3.1.

Same as TERMINAL RESPONSE: SET UP EVENT LIST 11.1.1 in clause 11.3.3.1.

Same as PROACTIVE COMMAND: OPEN CHANNEL 12.1 in clause 12.4.3.7.1.

Same as TERMINAL RESPONSE: OPEN CHANNEL 12.1 in clause 12.4.3.7.1.

Same as PROACTIVE COMMAND: SEND DATA 12.1 in clause 12.4.3.2.1.

Same as TERMINAL RESPONSE: SEND DATA 12.1 in clause 12.4.3.2.1.

Same as, ENVELOPE: EVENT DOWNLOAD - Data available 12.1 in clause 12.4.3.2.1.

Same as PROACTIVE COMMAND: RECEIVE DATA 12.1 in clause 12.4.3.2.1.

Same as TERMINAL RESPONSE: RECEIVE DATA 12.1 in clause 12.4.3.2.1.

Same as PROACTIVE COMMAND: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1.

Same as TERMINAL RESPONSE: CLOSE CHANNEL 12.1 in clause 12.4.3.2.1.

Page 351: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 351 of 606

13 General Device Support

13.1 General OverviewThis chapter addresses requirements for general device features which cannot be groupedunder previous specific section. This includes general UI requirements, modemrequirements and general device related requirements.

The list of conformance requirements tested within this section is listed in the table insection Error! Reference source not found..

13.2 Conformance requirementsTS26_NFC_REQ_006 The NFC controller SHALL support SWP (Single Wire Protocol) interface with

the UICC as per ETSI TS 102 613.

TS26_NFC_REQ_046 Access to the UICC (logical channel) SHALL be allowed even when themobile device is in a Radio OFF state, i.e. flight mode, airplane mode etc.

TS26_NFC_REQ_047 OS implementations SHALL provide an API for communication with all NFCSE inside the device (UICC, eUICC, eSE).

TS26_NFC_REQ_109 In non Basic Devices the OS SHALL allow the user to turn NFC on and offwhen the device is in Radio Off Mode.

TS26_NFC_REQ_113 Modem SHALL support APDU transmission case 1, 2, 3 & 4 as defined inISO/IEC 7816-4.

TS26_NFC_REQ_141 The modem SHALL provide a way for the application processor to retrieve theanswer from the UICC after the selection of an AID.

TS26_NFC_REQ_142 The modem SHALL support 19 logical channels in addition to the basicchannel.

TS26_NFC_REQ_161 Modem SHALL support Extended Length APDU as defined in ISO/IEC 7816-4with at least 2048 bytes command and response data field size.Note: This requirement will become effective from the 1st January 2018.

TS26_NFC_REQ_166 The device SHALL send the Terminal Capability command to the UICCindicating that the UICC-CLF interface (SWP) is supported as per ETSI TS102 221.

TS26_NFC_REQ_183 The API SHALL be able to send the Select by AID command with zero lengthAID (as defined in GlobalPlatform card specification) to the SE.Note: In order to select the Issuer Security Domain.

TS26_NFC_REQ_185 The Issuer Security Domain on the eSE SHALL be personalized with CIN(Card Image Number) and IIN (Issuer Identification Number) as defined inGlobalPlatform Secure Element Configuration Version 1.0.

13.3 Test Cases

13.3.1 Secure Element Access API in Radio OFF StateTest PurposeAccess to the UICC (logical channel) SHALL be allowed even when the DUT device is in aRadio OFF state, i.e. flight mode, airplane mode etc.

Page 352: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 352 of 606

Referenced requirement TS26_NFC_REQ_046

Initial ConditionsAn instance of the UICC application APDU_TestApplication.cap with AID01 is selectable.

MobileApplication is installed on the DUT and implements a function “Select AID01”. Theapplication is signed and respectively named:

GSMA_Mobile_App_SP1_signed signed with a test certificate #1

13.3.1.1 Test Sequence No 1: Standard

Initial ConditionsThe DUT is in Radio OFF state (e.g. Flight Mode, Airplane Mode, etc.)

Step Direction Sequence Expected Result

1 UserDUT

LaunchGSMA_Mobile_App_SP1_signed

None

2 DUTUICC

Call the “Select AID01” function The expected ISO command(s) (C-APDU) sent by the DUT to the UICC:CMD 1:APDU_MANAGE_CHANNEL_OPEN ('0X70 00 00 01')CMD 2: APDU_SELECT_BY_DF_NAME– the CLA contains the Channel Numberreturned by the UICC as a response toAPDU_MANAGE_CHANNEL_OPEN;Data = ‘AID01’; Le=00, or empty

3 UICCDUT

UICC successfully opens a new logicalchannel to AID01

Expected result of the API called: call to“Select AID01” function returnssuccessfully

4 DUT UICC

Send APDU Case 4 P1 = 0x01 The expected C-APDU:C-APDU (’XX 04 01 00 FF’ <Data field of255 bytes> FF)

5 UICCDUT

APDU_TestApplication.cap returns:P1 = 0x01R-APDU – <data field of 255 bytes>SW1-SW2

Expected result of the API called:R-APDU - data field of 255 bytes, SW1,SW2

13.3.1.2 VOID

13.3.1.3 VOID

13.3.1.4 Test Sequence No 4: After reboot

Initial Conditions

Page 353: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 353 of 606

The DUT is in Radio OFF state (e.g. Flight mode, Airplane Mode, etc.)

Step Direction Sequence Expected Result

1 UserDUT

Power off the DUT None

2 UserDUT

Power on the DUT None

3 UserDUT

LaunchGSMA_Mobile_App_SP1_signed

None

4 DUTUICC

Call the “Select AID01” function The expected ISO command(s) (C-APDU) sent by the DUT to the UICC:CMD 1:APDU_MANAGE_CHANNEL_OPEN ('0X70 00 00 01')CMD 2: APDU_SELECT_BY_DF_NAME– the CLA contains the Channel Numberreturned by the UICC as a response toAPDU_MANAGE_CHANNEL_OPEN;Data = ‘AID01’; Le=00, or empty

5 UICCDUT

UICC successfully opens a new logicalchannel to AID01

Expected result of the API called: call to“Select AID01” function returnssuccessfully

6 DUT UICC

Send APDU Case 4 P1 = 0x01 The expected C-APDU:C-APDU (’XX 04 01 00 FF’ <Data field of255 bytes> FF)

7 UICCDUT

APDU_TestApplication.cap returns:P1 = 0x01R-APDU – <data field of 255 bytes>SW1-SW2

Expected result of the API called:R-APDU - data field of 255 bytes, SW1,SW2

13.3.2 Enabled / Disabled statesTest PurposeVerify that the device provides the current status on NFC i.e. Enabled / Disabled

Referenced requirement TS26_NFC_REQ_109

Initial Conditions ReferenceApplication.cap managing the reference transaction with AID_REF

selectable into the reference UICC. APDU Application to send APDUs according to the reference transaction. Set the DUT to “Radio Off”

Page 354: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 354 of 606

13.3.2.1 Test Sequence No 1: Enable, disable

Step Direction Sequence Expected Result

1 UserDUT

Enable NFC on the DUT, if notenabled

None

2 UserDUT

Check in the Wireless Settings optionif it sets the current state of NFC to"Enabled"

“NFC enabled” indication is present

3 Perform the reference transactionusing a contactless reader

Reference transaction is performedsuccessfully

4 Try to read a NFC tag NFC Tag is read successfully

5 User DUT

Disable NFC on the DUT None

6 User DUT

Check in the Wireless Settings optionif the DUT changes the current stateof NFC to "Disabled"

“NFC enabled” indication is absent

7 Perform the reference transactionusing a contactless reader

Reference transaction is not performed

8 Try to read a NFC tag NFC Tag is not read

9 User DUT

Enable NFC on the DUT None

10 Perform the reference transactionusing a contactless reader

Reference transaction is performedsuccessfully

11 Try to read a NFC tag NFC Tag is read successfully

13.3.2.2 Test Sequence No 2: Persistence after reboot

Initial Conditions

Step Direction Sequence Expected Result

1 User DUT

Enable NFC on the DUT, if notenabled

None

2 UserDUT

Check in the Wireless Settings optionif it sets the current state of NFC to"Enabled"

“NFC enabled” indication is present

3 UserDUT

Power off the DUT None

4 UserDUT

Power on the DUT. Check in theWireless Settings option if it sets thecurrent state of NFC to "Enabled"

“NFC enabled” indication is still present

Page 355: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 355 of 606

Step Direction Sequence Expected Result

5 UserDUT

LaunchGSMA_Mobile_App_SP1_signed

None

6 DUT UICC

Call "Select AID1" function Call is successful

13.3.3 Modem and UICC over APDU exchangeTest Purpose

To ensure the Modem support APDU exchange to access UICC for cases 1, 2, 3 & 4 asdefined in ISO/IEC 7816-4.

Referenced requirement

TS26_NFC_REQ_113

Initial Conditions

None

13.3.3.1 Test Sequence No 1Following Test Cases in Table B.1.2 6.3.1.6.5.6 (transmit(byte[] command)) from OpenMobile API test specification SHALL be passed:

Test cases ID2 to ID16 Test cases ID18 to ID21 Test cases ID23

If the test cases referenced in Table B.1.2 6.3.1.6.5.6 are already referenced in certificationprograms, then this test sequence should not be referenced in the certification programs.

13.3.4 Modem retrieves the response data to the SELECT commandTest Purpose

To ensure the Modem provides a way for the application processor to retrieve the answerfrom the UICC after the selection of an AID.

Referenced requirement

TS26_NFC_REQ_141

Initial Conditions

None

Page 356: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 356 of 606

13.3.4.1 Test Sequence No 1: Modem retrieves the response data to the SELECTcommand

Following Test Cases in Table B.1.2 6.3.1.6.5.4 (getSelectResponse) from Open MobileAPI test specification SHALL be passed:

Test cases ID1, ID2, ID4, ID5, ID6, ID7, ID8

If the test cases referenced in Table B.1.2 6.3.1.6.5.6 are already referenced in certificationprograms, then this test sequence should not be referenced in the certification programs.

13.3.5 Modem supports 19 logical channelsTest Purpose

To ensure the Modem support 19 logical channels in addition to the basic channel.

Referenced requirement

TS26_NFC_REQ_142

Initial Conditions

None

13.3.5.1 Test Sequence No 1: Modem supports 19 logical channelsFollowing Test Cases in Table B.1.2 6.3.1.6.4.8 (openLogicalChannel – Extended logicalchannels) from Open Mobile API test specification SHALL be passed:

Test cases ID1, ID2, ID3

If the test cases referenced in Table B.1.2 6.3.1.6.5.6 are already referenced in certificationprograms, then this test sequence should not be referenced in the certification programs.

13.3.6 Long APDU handlingTest Purpose

To ensure the modem of the DUT handle correctly long APDU

There are 2 ways to handle them, either long APDU are segmented in several smallersegments, or the Modem & SIM Card both support Extended Length APDU and the APDUcan be exchanged within one segment.

Referenced requirement

TS26_NFC_REQ_113 TS26_NFC_REQ_141 TS26_NFC_REQ_161

13.3.6.1 Test Sequence No 1: Get Response APDU segmented from UICC (Case2Command)

Referenced requirement

Page 357: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 357 of 606

TS26_NFC_REQ_113 TS26_NFC_REQ_141

Initial Conditions

The Applet returns a response of 2500 bytes length to the command sent, where the UICCuses SW = '61XX' multiple times in order to send the response.

App1: An application capable of sending a short APDU Case2 command to the Applet.

Step Direction Sequence Expected Result

1 User DUT

Install App1 on the DUT Installation is successful

2 AppUICC

Select the Applet Applet is successfully selected

3 AppUICC

App1 send a case2 short APDUcommand to the Applet

APDU command is sent

4 UICCApp

Applet answer with a 2500 bytesresponse

2500 bytes are received by App1 andSW: 90 00 at the end

13.3.6.2 Test Sequence No 2: Get Response APDU segmented from UICC (Case4Command)

Referenced requirement

TS26_NFC_REQ_113 TS26_NFC_REQ_141

Initial Conditions

The Applet return a response of 2500 bytes length to the command sent, where the UICCuses SW = '61XX' multiple times in order to send the response.

App1: An application capable of sending a short APDU Case4 command to the Applet.

Step Direction Sequence Expected Result

1 User DUT

Install App1 on the DUT Installation is successful

2 AppUICC

Select the Applet Applet is successfully selected

3 AppUICC

App1 send a case4 short APDUcommand to the Applet

APDU command is sent

4 AppUICC

Applet answer with a 2500 bytesresponse

2500 bytes are received by App1 andSW: 90 00 at the end

Page 358: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 358 of 606

13.3.6.3 Test Sequence No 3: Long APDU answer from UICC (case 2E command)

Referenced requirement

TS26_NFC_REQ_113 TS26_NFC_REQ_141 TS26_NFC_REQ_161

Initial Conditions

The UICC used for the testing SHALL support extended length APDU

App1: An application capable of sending an APDU case 2E command to the Applet.

The APDU is defined like this: CLA INS P1 P2 Le

Where Le is “00 08 00” (2048 bytes)

Step Direction Sequence Expected Result

1 User DUT

Install App1 on the DUT Installation is successful

2 AppUICC

Select the Applet Applet is successfully selected

3 AppUICC

App1 send case 2E APDU commandto the applet with Le “00 08 00”

APDU command is sent

4 UICCApp

Applet answer a 2048 bytes response 2048 bytes are received by app1 followedby SW: 90 00 at the end

13.3.6.4 Test Sequence No 4: Long APDU command + answer from UICC (case 4Ecommand)

Referenced requirement

TS26_NFC_REQ_113 TS26_NFC_REQ_141 TS26_NFC_REQ_161

Initial Conditions

The UICC used for the testing SHALL support extended length APDU

The applet hosted on the UICC returns a response of 2048 bytes length to the commandsent

App1: An application capable of sending a long APDU case 4E command to the Applet.

Page 359: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 359 of 606

The APDU is defined like this: CLA INS P1 P2 Lc Nc data bytes Le

Where:

Lc is 00 08 00 (2048 bytes) Nc is 2048 bytes length Le is “08 00” (2048 bytes)

Step Direction Sequence Expected Result

1 User DUT

Install App1 on the DUT Installation is successful

2 AppUICC

Select the Applet Applet is successfully selected

3 AppUICC

App1 send case 4E APDU commandto the applet with Lc “00 08 00” and Le“08 00”

APDU command is sent

4 UICCApp

Applet answer a 2048 bytes response 2048 bytes are received by app1 followedby SW: 90 00 at the end

13.3.7 Terminal Capability TAG 82Test Purpose

To ensure that during the initialisation of the UICC, the DUT indicates that it supports anSWP link as specified by ETSI TS 102 221 [8]

Referenced requirement

TS26_NFC_REQ_006 TS26_NFC_REQ_166

13.3.7.1 Test Sequence No 1: Terminal Capability TAG 82Initial Conditions

Device is powered off

Step Direction Sequence Expected Result

1 UserDUT

Power on the deviceIf needed enter the PIN code of the UICC

The device is powered on.

Page 360: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 360 of 606

Step Direction Sequence Expected Result

2 UserDUT

Inspect the initialization parameters exchangedbetween the DUT and the UICC.

Verify the content of the “TERMINAL CAPABILITY"82" TAG“ sent by the DUT to the UICC.

TERMINALCAPABILITY "82"TAG “is set to “UICC-CLF”:Supported

Value of b1 is “1”.

See ETSI TS 102 221Clause 11.1.19.2.3

13.3.8 Reselect previously non-existing appletTest Purpose

Ensure that after an applet is loaded to the UICC, the selection of the applet is possiblewithout rebooting the device

Referenced requirement

TS26_NFC_REQ_047

13.3.8.1 Test Sequence No 1: Select non existing applet, deploy applet, selectexisting applet

Prepare an applet1 identified by AID1 to be installed on the UICC

Initial Conditions

Applet1 identified by AID06 does not exist on the UICC MobileApplication implements the “Select AID06” function. MobileApplication is installed on the DUT

Step Direction Sequence Expected Result

1 UserDUT Launch Mobile Application none

2 UserDUT Call the “Select AID06” function SELECT by AID commandwith “AID06” is received bythe UICC over ISO7816interface.

3 UICC-DUT UICC answer “6A82” to the SELECT by AIDcommand received in Step2

Selecting AID06 fails

4 Deploy applet1 to the UICC Applet1 is deployedsuccessfully

5 UserDUT Call the “Select AID06” function SELECT by AID commandwith “AID06” is received bythe UICC over ISO7816interface.

Page 361: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 361 of 606

Step Direction Sequence Expected Result

6 UICC-DUT UICC answer “9000” to the SELECT by AIDcommand received in Step5

Selecting AID06 succeeds

13.3.9 Retrieve CIN and IIN from eSE ISD by mobile applicationTest Purpose

To ensure that during the CIN and IIN on the ISD of the eSE are personalized and can beretrieved by a mobile application.

Referenced requirement

TS26_NFC_REQ_183 TS26_NFC_REQ_185

Note: these REQs are included in TS26 v12

13.3.9.1 Test Sequence No 1: CIN, IIN retrieval from eSEInitial Conditions

App2 is installed on the DUT and implements a function “Select by AID_ZERO_LENGTH”.

Note: The “Select by AID_ZERO_LENGTH” function selects the ISD on the eSE.

The Mobile Application is capable of sending GET DATA command to the eSE.

Step Direction Sequence Expected Result

1 AppeSE

Select the ISD on the eSE ISD is successfully selected

2 AppeSE

App2 send a GET DATA commandwith P1=00, P2=45 to the ISD toretrieve the CIN

APDU command is sent

3 eSEApp

ISD answers with CIN in the response CIN is received by App2.The value of the returned CIN equals tothe value of Item 3 in Table 2.7.

4 AppeSE

App2 send a GET DATA commandwith P1=00, P2=42 to the ISD toretrieve the IIN

APDU command is sent

5 eSEApp

ISD answers with IIN in the response IIN is received by App2.The value of the returned IIN equals tothe value of Item 2 in Table 2.7.

14 VOID

Page 362: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 362 of 606

15 Android specific test cases

15.1 General overviewThis chapter addresses test cases which are related to Android specific requirements.

The list of conformance requirements tested within this section is listed in the table insection Error! Reference source not found..

15.2 Conformance requirementsTS26_NFC_REQ_063 When an NFC application is uninstalled, the device SHALL remove all

information related to this application from the routing table.

TS26_NFC_REQ_063.1 When an NFC application is disabled, the device SHALL remove allinformation related to this application from the NFC routing table.

Note: this also applies for preinstalled applications that cannot beuninstalled but that can only be disabled.

TS26_NFC_REQ_064

When an NFC application is updated or re-enabled, the device SHALLupdate the routing table according to the new registration information(removing/adding elements).Note: Static elements from the previous version will be removed andstatic elements from the new version will be added.

TS26_NFC_REQ_065.1 When the device is powered off and a NFC reader is trying to select byAID a NFC service relying on the HCE technology, the NFC ControllerSHALL return an ISO error code (‘6A82’) indicating this service is notavailable.

Routing Table NFC Controller action when device ispowered off

Contains AID based onHCE

Default AID route set to“Off-Host”

Return an ISO error code (‘6A82’)for AID stored in the routing tableand related to HCE.

Forward others request to the “Off-Host”

Contains “Off-Host” AIDs Default AID route set to

HCE

Forward the request for all the AIDstored in the routing table to OFF-Host

Return an ISO error code (‘6A82’)for all the other AID select requests

TS26_NFC_REQ_068 The device SHALL provide a mechanism to handle AID Conflict.

TS26_NFC_REQ_068.01 AID Conflict resolution SHOULD follow the same mechanisms whetherNFC services registration is dynamic or static.

TS26_NFC_REQ_068.02 When managing AID conflict resolution, the device SHALL follow theend-user preferences.Note: In case of a Basic Device, end-user preference may have beenset via a paired device or from a connected PC. The way this isachieved is out of scope of this document.

Page 363: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 363 of 606

TS26_NFC_REQ_069 For UICC, Secure Element Name SHALL be SIM[smartcard slot] (e.g.SIM/SIM1, SIM2… SIMn).

TS26_NFC_REQ_093 There MAY be an API (as described below) to check if the NFCController is enabled and to ask the system to enable the NFCfunctionality. User input SHALL be required to enable NFC. This UIdialogue SHALL be generated by the OS and not by the callingapplication.Note: Refer to the Javadoc linked to this document for more details.

“com.gsma.services.utils.NfcController”

Classes Methods

Nested classes(NfcController.Callbacks)

All methods except“onCardEmulationMode“

NfcController isEnabled, enableNfcController

Note: this requirement fulfils the generic requirementsTS26_NFC_REQ_022 and TS26_NFC_REQ_023.

TS26_NFC_REQ_094 When a mobile application is registering an AID-based or non AID-based service (statically or dynamically) it SHALL be able to state thetarget CEE using an OS mechanism (manifest, API, …).

TS26_NFC_REQ_094.1 The following extension SHALL be supported in the manifest

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group><se-id name="XXX" />

</se-ext-group><AID-based>boolean</AID-based></extensions>

Where:- se-id name SHALL be set as described in

TS26_NFC_REQ_069 and TS26_NFC_REQ_070; theuniqueness of the naming SHALL be ensured by the OS asdescribed in TS26_NFC_REQ_144.

- AID-based SHALL be set to true in case a SE application iscompliant with ISO 7816-4 and false in all other cases

Note: When a mobile application is declaring a se-id name that is notexisting on the device the registration shall be ignored.

TS26_NFC_REQ_094.2 If the extension is not declared in the manifest of the application, thenthe following default values SHALL apply (for backward compatibility):

- <se-id name=”SIM1”/>

<AID-based>true</AID-based>

TS26_NFC_REQ_095 The device SHALL support routing to active CEEs.

Page 364: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 364 of 606

TS26_NFC_REQ_096 Before Android P Transaction event data SHALL be set in the followingextended field:

com.gsma.services.nfc.extra.AID

ByteArray

Contains the card “Application

Identifier” [optional]

com.gsma.services.nfc.extra.DATA

ByteArray

Payload conveyed by the HCI event

“EVT_TRANSACTION”

TS26_NFC_REQ_098 Before Android P the Device SHALL support “Unicast” and “Multicast”modes for receiving the “EVT_TRANSACTION”.

TS26_NFC_REQ_099 Before Android P for switching from “Unicast” to “Multicast”, the deviceMAY support an API as described below.

“com.gsma.services.utils.Handset”

Classes Methods

Handset enableMultiEvt_transactionReception

This is considered a sensitive API

TS26_NFC_REQ_123 The GSMA APIs SHALL be included in the following jar file:“com.gsma.services.nfc.jar”Note: Library SHALL be built as a shared library in order to be usedwith the following tag:

<uses-library android:name="com.gsma.services.nfc”android:required="false"/>

TS26_NFC_REQ_124 Before Android P the device SHALL implement SIMalliance OpenMobile API (using the name space “org.simalliance.openmobileapi”),but only thetransport layer. The service layer SHALL not be implemented.Note 1: This requirement fulfils the generic requirementsTS26_NFC_REQ_047, TS26_NFC_REQ_047.1,TS26_NFC_REQ_047.2 and TS26_NFC_REQ_047.3.Note 2: see TS26_NFC_REQ_047.3 for the values of EventTypes

TS26_NFC_REQ_125 SIMAlliance Open Mobile API and Global Platform Access ControlSHALL be initialized and ready to use when the BOOT_COMPLETEDintent is sent.

TS26_NFC_REQ_127 The device MAY implement classes and methods as described below.Note: Refer to the Javadoc linked to this document for more details.

“com.gsma.services.nfc.NfcController”

Classes Methods

nested classes(NfcController.Callbacks)

All methods except“onCardEmulationMode”

Page 365: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 365 of 606

NfcControllerAll methods except“disableCardEmulationMode,enableCardEmulationMode,

“com.gsma.services.nfc.AIDGroup”

Classes Methods

AIDGroup All methods

“com.gsma.services.nfc.OffHostService”

Classes Methods

OffHostService All methods

Note: this requirement fulfils the generic requirementsTS26_NFC_REQ_055 and TS26_NFC_REQ_058.

TS26_NFC_REQ_127.1 APIs SHALL also manage “Off-Host” services registered staticallythrough the Manifest

TS26_NFC_REQ_127.2 All the services/group created through these APIs SHALL staypersistent (still available after a power off/on of the device).

TS26_NFC_REQ_128 The device MAY handle a “Long Press” on all “Tap&Pay” menu entries.

TS26_NFC_REQ_128.1 When a “Long Press” is done on a “Tap&Pay” menu entry, the deviceSHALL only send an intent to the application that has created this entry.Note: the primary anticipated usage of the intent is to allow theapplication to display further information to the user about its services.Other usages are also possible.

TS26_NFC_REQ_129 Before Android P a Transaction Event (EVT_Transaction) SHALL betriggered based on the following information:

Action com.gsma.services.nfc.action.

TRANSACTION_EVENT

Mime type -

URI nfc://secure:0/<SEName>/<AID>

- SEName reflects the originating SEIt must be compliant with SIMAlliance Open MobileAPIs

- AID reflects the originating UICC applet identifier

TS26_NFC_REQ_130 Before Android P the Android Framework SHALL define the followingpermissions for handling Open Mobile APIs and Transaction events:- Permission-group "com.gsma.services.nfc.permission" SHALL bedefined in Android framework to host all NFC-related permissions asfollowing: permission-group android:name =com.gsma.services.nfc.permission android:label =@string/permgrouplab_NFC = "NFC - Near Field Communication"android:icon = @drawable/perm_group_network android:description =

Page 366: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 366 of 606

@string/permgroupdesc_NFC = "Access various NFC features"android:priority = 270

- Permission "org.simalliance.openmobileapi.SMARTCARD" SHALL bedefined in Android framework as following: android:name =org.simalliance.openmobileapi.SMARTCARD android:permissionGroup= com.gsma.services.nfc.permission android:label =@string/permlab_SmartcardService = "Access to SIM Card"android:description = @string/permdesc_SmartcardService = "Allowsapplication to communicate with the SIM card"

- Permission"com.gsma.services.nfc.permission.TRANSACTION_EVENT" shall bedefined in Android framework as following: android:name =com.gsma.services.nfc.permission.TRANSACTION_EVENTandroid:permissionGroup = com.gsma.services.nfc.permissionandroid:label = @string/permlab_nfcReceiveEvent = "NFC Transactionawareness" android:description = @string/permdesc_nfcReceiveEvent= "Allows application to receive information about NFC transactionperformed"

TS26_NFC_REQ_130.1 Before Android P protection level of all the permissions described inTS26_NFC_REQ_130 SHALL be set to the same level as“android.permission.NFC”.

Note:Before Marshmallow version: android.permission.NFC is set to“dangerous”.From Marshmallow version: android.permission.NFC is set to “normal”.

TS26_NFC_REQ_131 Before Android P, the device SHALL ensure that the application has thefollowing permission before forwarding a Transaction event to theapplication:

NFC Controller android.permission.NFC

Transaction Event com.gsma.services.nfc.permission.TRANSACTION_EVENTTS26_NFC_REQ_132 The device MAY implement classes and methods as described below:

“com.gsma.services.utils.Handset”

Classes Methods

Handset getProperty, getVersion

Note: this requirement fulfils the generic requirementTS26_NFC_REQ_092.

TS26_NFC_REQ_134 The device SHALL provide an additional menu entry in “Settings” inorder to enable/disable group of AIDs (as defined by Android) belongingto the category “Other”.A group of AIDs SHALL only be enabled/disabled as a single unit.

Page 367: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 367 of 606

TS26_NFC_REQ_134.1 When there is an overflow in the NFC router table, the menu entrySHOULD display:

A banner representing the groups of AIDs belonging to thecategory “Other” (and optionally the group description) with itscurrent status (enabled/disabled) and a way fordisabling/enabling it

A visual indication representing the NFC Controller capacityand showing

1. The space used by the selected group2. If enablement of the selected group can fit with the remaining spaceof the NFC Controller routing table

TS26_NFC_REQ_134.2 The menu SHOULD be hidden to the end user until the first time anNFC Service cannot be added in the NFC Controller routing table andthereafter the menu is visible.

TS26_NFC_REQ_134.3 When the menu entry is opened, the status of NFC services groupdisplayed by the menu entry SHALL reflect the actual status of thecurrent NFC Controller routing table.

TS26_NFC_REQ_135 When an application is trying to register new AIDs belonging to thecategory “Other” and there is no automatic solution to solve any routingtable overflow (as defined in REQ_143), the device SHALL

Inform the end user that some NFC Services proposed bythe application cannot be used. A message SHALL providethe description of the group(s) of AIDs(android:description) which cannot be activated.

Propose the end user should disable some previouslyinstalled NFC services using the feature described inTS26_NFC_REQ_134 in order to free some NFCController routing table space to be able to register all AIDsneeded by the current application

When one AID from a group of AIDs cannot be added in the NFCController routing table, the entire group of AIDs SHALL not beenabled.

TS26_NFC_REQ_136 When a customer is selecting a service from the “Tap&Pay” menu thereis no automatic solution to solve any routing table overflow (as definedin REQ_143), the device SHALL

Inform the end user that activation of the selected NFCservices cannot be performed

Propose the end user should disable some previouslyinstalled NFC services using the feature described inTS26_NFC_REQ_134 in order to free some NFCController routing table space

If the end user doesn’t disable enough NFC services to allow activationof the selected “Tap&Pay” menu, previous “Tap&Pay” entry SHALL stayactive and the end users selection is cancelled.

TS26_NFC_REQ_143 If the default route is set to a certain card emulation environmentAND the routing table of the NFC controller becomes full AND therouting table would not be full with the default route set to one of theother card emulation environments then the default route SHALL beswitched automatically to one of those card emulation environments.In such situation, there SHALL be no user interaction at all.

Page 368: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 368 of 606

Note: this mechanism SHALL be totally transparent for end users asthis is a solution resolving the chipset routing table size shortage.

TS26_NFC_REQ_144 The Secure Element Name used for a particular Secure Element in theNFC transaction event SHALL be the same as the Secure ElementName for that Secure Element in the Secure Element Access API.

TS26_NFC_REQ_145 When OS uses certificates for signing applications, any deviceimplementing GSMA API SHALL implement a mechanism based oncertificates stored in the Active UICC Profile for protecting sensitiveAPIs as illustrated in the figure below.

TS26_NFC_REQ_145.3 Any sensitive API SHALL check if the application has been signed withone of the certificates stored in the Protection mechanism cache beforeexecuting the operation, and:

Only authorised applications shall be granted access to thisfunction.

For any other non-authorised applications an exception needsto be raised.

TS26_NFC_REQ_146 The device MAY implement the method as described below:Note: Refer to the Javadoc linked to this document for more details.

“com.gsma.services.utils.Handset”

Classes MethodsHandset getAvailableSecureElements

Note: this requirement fulfils the generic requirementsTS26_NFC_REQ_059 and TS26_NFC_REQ_060.

TS26_NFC_REQ_147 In the “Tap&Pay” menu, the user selection has precedence and thebehaviour of the device is consistent across different handset states.The following scenarios SHALL be applied.

Note 1: If Android is changing the behaviour then this requirement willchange accordingly.Note 2: GSMA strongly recommend that service providers register theOff-Host AIDs in the Android OS as defined by Android.

ScenarioScreen ON

(ScreenLock/Unlock)

Screen OFF Switched Off

Default AIDroute is set toHCE.No App in thePaymentcategory hasbeen installed.

For any AIDwhich is notregistered inthe "Other"category,contactlessselection failswith error code'6A82'.

For any AIDwhich is notregistered inthe "Other"category,contactlessselection failswith error code'6A82'.

For any AIDwhich is notregistered in the"Other"category,contactlessselection failswith error code'6A82'.

Page 369: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 369 of 606

Default AIDroute is set toOff-HostNo App in thePaymentcategory hasbeen Installed.

For any AIDwhich is notregistered inthe "Other"category,APDUs go toOff-Host.

For any AIDwhich is notregistered inthe "Other"category,APDUs go toOff-Host.

For any AIDwhich is notregistered in the"Other"category,APDUs go toOff-Host.

Default AIDroute is set toOff-HostThe userselected an Off-Host-basedservice inTap&Pay menu.

APDUsintended for theselected Off-Host service goto Off-Host.

APDUsintended forthe selectedOff-Hostservice go toOff-Host.

APDUsintended for theselected Off-Host service goto Off-Host.

Default AIDroute is set toOff-HostThe userselected a HCE-based service inTap&Pay menu.

APDUsintended for theselected HCEservice go toHCE.

For APDUsintended forthe selectedHCE service,contactlessselection failswith error code'6A82 ORAPDUs go toHCE'.

For APDUsintended for theselected HCEservice,contactlessselection failswith error code'6A82'.

Default AIDroute is set toHCEThe userselected a HCE-based service inTap&Pay menu.

APDUsintended for theselected HCEservice go toHCE.

For APDUsintended forthe selectedHCE service,contactlessselection failswith error code'6A82 ORAPDUs go toHCE'.

For APDUsintended for theselected HCEservice,contactlessselection failswith error code'6A82'.

Default AIDroute is set toHCEThe userselected an Off-Host-basedservice inTap&Pay menu.

APDUsintended for theselected Off-Host service goto Off-Host.

APDUsintended forthe selectedOff-Hostservice go toOff-Host.

APDUsintended for theselected Off-Host service goto Off-Host.

TS26_NFC_REQ_148 The device SHALL not change the default AID route in response tochanges in device state (such as screen off, power off).

TS26_NFC_REQ_148.1 The same behaviour SHALL be implemented when the mobile device isset in Flight Mode with NFC ON.

TS26_NFC_REQ_150 Before Android P in “Unicast” mode, “EVT_TRANSACTION” eventSHALL be received by only one activity.

Page 370: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 370 of 606

TS26_NFC_REQ_150.1 Before Android P when several activities registered for the“EVT_TRANSACTION”, the framework SHALL follow the priorityscheme described below:

1. “Android:priority” level defined in the Intent Filter SHALL becompared

2. First installed application package (APK) has a higher priority

Note: Only priority <0 are possible for non privileged application, as perAndroid AOSP code(https://android.googlesource.com/platform/frameworks/base/+/5585dd971e265cbb3a515bb759710646c5bc6f63)

TS26_NFC_REQ_151 Before Android P the framework SHALL use “BroadcastReceiver”mechanism to inform the registered activities of the event.

TS26_NFC_REQ_152.1 If an application is registered to any “EVT_TRANSACTION”, by omittingthe AID in the Intent, it SHALL receive the events of any applets tothose accessible using the “Access Control”.

TS26_NFC_REQ_163 The device SHALL not log any APDU or AID exchanged in acommunication with an applet located in an SE (UICC, eSE, …).

TS26_NFC_REQ_170 In case the device detects a conflict between non-AID basedcontactless services (see TS26_NFC_REQ_172), the device SHALLdisplay a menu entry in “Settings” in order to list impacted contactlessservices and the user SHALL be directed to the menu.

TS26_NFC_REQ_170.1 The menu entry SHALL present the conflicting services to the end userwith an option to select which service(s) to be active. Only one set ofservice(s) (which are not conflicting with each other) SHALL be activeat any one time.

TS26_NFC_REQ_172 The device SHALL consider that non-AID based services are conflictingas soon as they are associated to different Off-Host entities.

TS26_NFC_REQ_173 A device MAY be shipped with an eSE for NFC services.

TS26_NFC_REQ_173.1 The NFC controller SHALL support an interface with the eSE.Note: The interface can be SWP or any other interface.

TS26_NFC_REQ_175 In case the NFC Controller receives a RF parameters configurationrequest from a CEE enabling a Mifare Classic service with either UID 4or 7 bytes, the corresponding RF parameters profile “Profile 2 ” asdefined in chapter 3.1.2.2 of GSMA SGP.12 SHALL apply

TS26_NFC_REQ_176 In case the NFC Controller receives a RF parameters configurationrequest from a CEE enabling a Mifare DESFire service, the RFparameters profile “Profile 3” as defined in chapter 3.1.2.2 of GSMASGP.12 SHALL apply

TS26_NFC_REQ_186 This requirement is applicable from Android P onwards.The device SHALL implement GlobalPlatform OMAPI using the“android.se.omapi” namespace

Note: this requirement fulfils the generic requirementsTS26_NFC_REQ_047, TS26_NFC_REQ_047.1,

Page 371: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 371 of 606

TS26_NFC_REQ_047.2 TS26_NFC_REQ_047.3 andTS26_NFC_REQ_183.

TS26_NFC_REQ_187

This requirement is applicable from Android P onwards.Transaction Event is provided natively by Android.

A Transaction Event (EVT_TRANSACTION) SHALL be triggered basedon the following information:

Action android.nfc.action.TRANSACTION_DETECTED

Mime type -

URI nfc://secure:0/<SEName>/<AID>- SEName reflects the originating SEIt must be compliant with SIMalliance Open Mobile API- AID reflects the originating UICC applet identifier

TS26_NFC_REQ_188 Transaction event data SHALL be set in the following extended field:

android.nfc.extra.AIDByteArray

Contains the card “Application Identifier” ]

android.nfc.extra.DATAByteArray

Payload conveyed by the HCI event

“EVT_TRANSACTION” [optional]

android.nfc.extra.SECURE_ELEMENT_NAMEString

Indicates the Secure Element on which thetransaction occurred.

eSE1...eSEn for Embedded Secure Elements,SIM1...SIMn for UICC, etc. ]

TS26_NFC_REQ_191 This requirement is applicable from Android P onwards.The device SHALL ensure that the application has the followingpermission before forwarding a Transaction event to the application:

NFC Controller android.permission.NFC

Transaction Event android.permission.NFC_TRANSACTION_EVENT

Note: some requirements from the Generic Device Requirements section are fulfilled forAndroid by specific requirements in the Android Operating System section. The tablebelow lists generic requirements which are not tested explicitly in this section, becausethey are covered by the testing of the related Android requirement. (In some cases, therelated Android requirement might not be tested in the current version of this document.)

Generic requirement Related Android requirement

TS26_NFC_REQ_022 TS26_NFC_REQ_093

TS26_NFC_REQ_023 TS26_NFC_REQ_093

TS26_NFC_REQ_055 TS26_NFC_REQ_127

Page 372: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 372 of 606

TS26_NFC_REQ_058 TS26_NFC_REQ_127

TS26_NFC_REQ_061 TS26_NFC_REQ_133

TS26_NFC_REQ_092 TS26_NFC_REQ_132

TS26_NFC_REQ_092.02 TS26_NFC_REQ_132

TS26_NFC_REQ_092.04 TS26_NFC_REQ_132

TS26_NFC_REQ_092.05 TS26_NFC_REQ_132

TS26_NFC_REQ_092.06 TS26_NFC_REQ_132

TS26_NFC_REQ_092.07 TS26_NFC_REQ_132

TS26_NFC_REQ_092.08 TS26_NFC_REQ_132

TS26_NFC_REQ_092.09 TS26_NFC_REQ_132

TS26_NFC_REQ_092.10 TS26_NFC_REQ_132

TS26_NFC_REQ_092.11 TS26_NFC_REQ_132

15.3 NFC Features

15.3.1 General overviewThis section provides test cases for checking Android specific core NFC features like:Availability of the GSMA APIs in the deviceAPIs used to handle the NFC Controller

The list of conformance requirements tested within this section is listed in the table insection Error! Reference source not found..

15.3.2 Conformance requirements

TS26_NFC_REQ_093

There MAY be an API (as described below) to check if the NFC Controller isenabled and to ask the system to enable the NFC functionality. User inputSHALL be required to enable NFC. This UI dialogue SHALL be generated bythe OS and not by the calling application.Note: Refer to the Javadoc linked to this document for more details.

“com.gsma.services.utils.NfcController”

Classes Methods

Nested classes(NfcController.Callbacks)

All methods except“onCardEmulationMode“

NfcController isEnabled, enableNfcController

Note: this requirement fulfils the generic requirements TS26_NFC_REQ_022and TS26_NFC_REQ_023.

TS26_NFC_REQ_123The GSMA APIs SHALL be included in the following jar file:“com.gsma.services.nfc.jar”Note: Library SHALL be built as a shared library in order to be used with the

Page 373: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 373 of 606

following tag:<uses-library android:name="com.gsma.services.nfc”

android:required="false"/>

15.3.3 Test Cases

15.3.3.1 Shared libraryTest Purpose

Ensure DUT contains all GSMA APIs as described in the GSMA NFC HandsetRequirements and its Javadoc.

Referenced requirement

TS26_NFC_REQ_123

Test Sequence No 1When checking the presence/absence of modifiers for classes, constructors, methods andfields, the presence/absence of the following modifiers shall be checked:

public protected private static abstract

In the current version of this document, the presence/absence of the following modifier shallnot be checked:

final

NOTE: future versions of this document may change the requirement regarding final toindicate that the modifier should be checked. In particular, this might occur if TS.26 [1] isupdated to indicate explicitly that classes should be final.

The presence/absence of the following modifiers shall not be checked:

strictfp volatile transient synchronized native

In the context of this test case, the term "accessible" means public or protected

Initial ConditionsNone

Step Direction Sequence Expected Result

15.3.3.1.1

Page 374: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 374 of 606

Step Direction Sequence Expected Result

1 AppDUT Using reflection (“Class.forName”), check ifall the requested GSMAclasses/interfaces are available in theDUT.

List of GSMA classes/interfaces:com.gsma.services.utils.Handsetcom.gsma.services.nfc.NfcControllercom.gsma.services.nfc.NfcController$Callbackscom.gsma.services.nfc.OffHostServicecom.gsma.services.nfc.AidGroupcom.gsma.services.utils.InsufficientResourcesExceptioncom.gsma.services.nfc.SEControllercom.gsma.services.nfc.SEController$Callbacks

A valid Class object shall bereturned for every call

2 AppDUT Using reflection, check ifcom.gsma.services.utils.Handset is a classthat, implements the following methods andthat their definition is fully compliant toGSMA requirements.

List of methods: enableMultiEvt_transactionReception getAvailableSecureElements (only to bechecked if DUT supportsO_ANDROID_API_V8_OR_LATER) getProperty getVersion

Super-class and modifiers of theclass are compliant.There is one accessible constructorwith no parameter.Modifiers of the constructor arecompliant.All methods are implemented.For each of them,Modifiers are compliantReturn type is compliantNumber of parameters andassociated types are compliantSet of declared checkedexceptions matches set of checkedexceptions defined in TS.26 (seenote).

3 AppDUT Using reflection, check ifcom.gsma.services.nfc.NfcController is aclass, implements the following methods andtheir definition is fully compliant to GSMArequirements.

List of methods: defineOffHostService deleteOffHostService disableCardEmulationMode enableCardEmulationMode enableNfcController getDefaultController getDefaultOffHostService getOffHostServices isCardEmulationEnabled isEnabled

Super-class and modifiers of theclass are compliant.Any constructor is not accessibleAll methods are implementedFor each of them,Modifiers are compliantReturn type is compliantNumber of parameters andassociated types are compliantSet of declared checkedexceptions matches set of checkedexceptions defined in TS.26 (seenote).

Page 375: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 375 of 606

Step Direction Sequence Expected Result

4 AppDUT Using reflection, check ifcom.gsma.services.nfc.NfcController$Callbacks is an interface, implements the followingmethods and their definition is fully compliantto GSMA requirements.

List of methods: onCardEmulationMode onEnableNfcController onGetDefaultController

Super-interface and modifiers ofthe interface are compliant.All methods are implementedFor each of them,Modifiers are compliantReturn type is compliantNumber of parameters andassociated types are compliantSet of declared checkedexceptions matches set of checkedexceptions defined in TS.26 (seenote).

5 AppDUT Using reflection, check ifcom.gsma.services.nfc.OffHostService is aclass, implements the following methods andtheir definition is fully compliant to GSMArequirements.

List of methods: commit defineAidGroup deleteAidGroup getAidGroups getBanner getDescription getLocation setBanner(int) (only to be checked if DUTsupportsO_ANDROID_API_V8_OR_LATER) setBanner(Drawable)

Super-class and modifiers of theclass are compliant.Any constructor is not accessibleAll methods are implementedFor each of them,Modifiers are compliantReturn type is compliantNumber of parameters andassociated types are compliantSet of declared checkedexceptions matches set of checkedexceptions defined in TS.26 (seenote).

6 AppDUT Using reflection, check ifcom.gsma.services.nfc.AidGroup is a class,implements the following methods and theirdefinition is fully compliant to GSMArequirements.

List of methods: addNewAid getCategory getDescription removeAid

Super-class and modifiers of theclass are compliant.Any constructor is not accessibleAll methods are implementedFor each of them,Modifiers are compliantReturn type is compliantNumber of parameters andassociated types are compliantSet of declared checkedexceptions matches set of checkedexceptions defined in TS.26 (seenote).

Page 376: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 376 of 606

Step Direction Sequence Expected Result

7 AppDUT Using reflection, check ifcom.gsma.services.nfc.SEController is aclass, implements the following methods andtheir definition is fully compliant to GSMArequirements.

List of methods: getActiveSecureElement getDefaultController setActiveSecureElement

Super-class and modifiers of theclass are compliant.Any constructor is not accessibleAll methods are implementedFor each of them,Modifiers are compliantReturn type is compliantNumber of parameters andassociated types are compliantSet of declared checkedexceptions matches set of checkedexceptions defined in TS.26 (seenote).

8 AppDUT Using reflection, check ifcom.gsma.services.nfc.SEController$Callbacks is an interface, implements the followingmethods and their definition is fully compliantto GSMA requirements.

List of methods: onGetDefaultController

Super-interface and modifiers ofthe interface are compliant.

All methods are implementedFor each of them,Modifiers are compliantReturn type is compliantNumber of parameters andassociated types are compliantSet of declared checkedexceptions matches set of checkedexceptions defined in TS.26 (seenote).

9 AppDUT Using reflection, check ifcom.gsma.services.utils.Handset defines thefollowing constants and their type/value isfully compliant to GSMA requirements.

List of constants: BATTERY_LOW_MODE BATTERY_POWER_OFF_MODE BATTERY_OPERATIONAL_MODE (onlyto be checked if DUT supportsO_ANDROID_API_V8_OR_LATER) FELICA HCI_SWP MIFARE_CLASSIC MIFARE_DESFIRE MULTIPLE_ACTIVE_CEE NFC_FORUM_TYPE3 OMAPI

All constants are definedFor each of them,Modifiers are compliantType is compliantAssociated value is equal to thevalue defined by GSMA

Page 377: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 377 of 606

Step Direction Sequence Expected Result

10 AppDUT Using reflection, check ifcom.gsma.services.nfc.NfcController$Callbacks defines the following constants and theirtype/value is fully compliant to GSMArequirements.

List of constants:CARD_EMULATION_DISABLEDCARD_EMULATION_ENABLEDCARD_EMULATION_ERROR

All constants are definedFor each of them,Modifiers are compliantType is compliantAssociated value is equal to thevalue defined by GSMA

11 AppDUT Using reflection, check ifcom.gsma.services.utils.InsufficientResourcesException is a class.

List of constructors:

InsufficientResourcesExceptionInsufficientResourcesException(String)

Super-class and modifiers of theclass are compliant.All constructors are implemented.For each of them,Modifiers are compliantNumber of parameters andassociated types are compliant

Note: The test for matching sets of exceptions shall be unordered. Unchecked exceptions shall not betested.

15.3.3.2 Getting an instance of the “NFC Controller” class

Test PurposeEnsure DUT can provide asynchronously an instance of the “NFCController” class asdefined in the javadoc linked to the GSMA NFC Requirements.

Referenced requirement TS26_NFC_REQ_093 TS26_NFC_REQ_123

Test Sequence No 1: getDefaultController, valid usage

nt l ondtonsIiiaC iiApplication SHALL define the following variables

[var01] refers to the “Context” of the Android application [var02] contains an instance of the “NfcController$Callbacks” class and is not null

Step Direction Sequence Expected Result

1 Call “getDefaultController” staticmethod with the following parameters: context: [var01] cb: [var02]

“onGetDefaultController” method,member of the instance referred by[var02] is called “onGetDefaultController” parameter isnot null

2 Call “isEnabled” method from theparameter returned by the“onGetDefaultController” method

No exception thrown by the system

15.3.3.2.1

Page 378: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 378 of 606

Test Sequence No 2: getDefaultController, null callback

nt l ondtonsIiiaC iiApplication SHALL define the following variable

[var01] refers to the “Context” of the Android application

Step Direction Sequence Expected Result

1 Call “getDefaultController” staticmethod with the following parameters: context: [var01] cb: null

3 options: No exception thrown by the system An “IllegalArgumentException” is thrownby the system An “NullPointerException” is thrown bythe system

15.3.3.3 Getting the status the NFC Controller

Test PurposeEnsure DUT can provide the status of the NFC Controller from APIs as described in theGSMA NFC Handset Requirements and its Javadoc.

Referenced requirement TS26_NFC_REQ_093

Test Sequence No 1: isEnabled, NFC enabled

Initial Conditions NFC is activated on the DUT An instance of the “NfcController” class has been retrieved successfully and is not

null

Step Direction Sequence Expected Result

1 From the “NfcController” instance, callthe “isEnabled” method

Method SHALL return true

Test Sequence No 2: isEnabled, NFC disabled

Initial Conditions NFC is deactivated on the DUT An instance of the “NfcController” class has been retrieved successfully and is not

null

Step Direction Sequence Expected Result

1 From the “NfcController” instance, callthe “isEnabled” method

Method SHALL return false

15.3.3.4 Enabling the NFC Controller

Test Purpose

15.3.3.2.2

15.3.3.3.1

15.3.3.3.2

Page 379: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 379 of 606

Ensure DUT can enable the NFC Controller from APIs as described in the GSMA NFCHandset Requirements and its Javadoc.

Referenced requirement TS26_NFC_REQ_093

Test Sequence No 1: enableNfcController, confirmation dialog

cncllda ee

nt l ondtonsIiiaC ii

NFC is deactivated on the DUT An instance of the “NfcController” class has been retrieved successfully and is not

null

Step Direction Sequence Expected Result

1 From the “NfcController” instance, callthe “enableNfcController” method

A dialog box asking confirmation to theuser is displayed. This dialog box SHALLprovide an option to cancel or confirm theaction

2 Cancel the Action Dialog box SHALL be withdrawn An icon representing enablement ofNFC SHALL not be displayed in thestatus bar

3 From the “NfcController” instance, callthe “isEnabled” method

Method SHALL return false

4 Check that NFC is indicated asdisabled in the settings

NFC Status SHALL be “disabled”

Test Sequence No 2: enableNfcController, confirmation dialogconfirmed

Initial Conditions NFC is deactivated on the DUT An instance of the “NfcController” class has been retrieved successfully and is not

null

Step Direction Sequence Expected Result

1 From the “NfcController” instance, callthe “enableNfcController” method

A dialog box asking confirmation to theuser is displayed. This dialog box SHALLprovide an option to cancel or confirm theaction

2 Select to confirm the Action Dialog box SHALL be withdrawnIf the DUT has an icon representing theNFC enablement, the DUT SHALLdisplay this icon on the status bar.

3 From the “NfcController” instance, callthe “isEnabled” method

Method SHALL return true

15.3.3.4.1

15.3.3.4.2

Page 380: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 380 of 606

Step Direction Sequence Expected Result

4 In the “Setting” menu, check NFCstatus.

NFC status SHALL be “enabled”

Test Sequence No 3: enableNfcController, NFC already enabled

nt l ondtonsIiiaC iiNFC is activated on the DUT

An instance of the “NfcController” class has been retrieved successfully and is notnull

Step Direction Sequence Expected Result

1 From the “NfcController” instance, callthe “enableNfcController” method

No dialog box appears.

OR

a) a dialog box appears askingconfirmation to the user. This dialog boxSHALL provide an option to cancel orconfirm the action.

b) “Confirm” is pressedc) the dialog box shall disappear

2 From the “NfcController” instance callthe “isEnabled” method

Method SHALL return true

3 In the “Setting” menu check NFCstatus

NFC status SHALL be “enabled”

4 From the “NfcController” instance callthe “enableNfcController” method

No dialog box appears.ORa) a dialog box appears askingconfirmation to the user. This dialog boxSHALL provide an option to cancel orconfirm the action.b) “Cancel” is pressedc) the dialog box shall disappear

5 From the “NfcController” instance, callthe “isEnabled” method

Method SHALL return true

6 In the “Setting” menu, check NFCstatus

NFC status SHALL be “enabled”

15.4 Accessing the Secure Elements

15.4.1 General overview

This section provides test cases related to the Secure Element access.

15.4.2 Conformance requirementsTS26_NFC_REQ_69 For UICC, Secure Element Name SHALL be SIM[smartcard slot] (e.g.

SIM/SIM1, SIM2… SIMn).

15.3.3.4.3

Page 381: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 381 of 606

TS26_NFC_REQ_124 Before Android P the device SHALL support SIMalliance Open Mobile API(using the namespace “org.simalliance.openmobileapi”), but only thetransport layer.Note: this requirement fulfils the generic requirementsTS26_NFC_REQ_047, TS26_NFC_REQ_047.1, TS26_NFC_REQ_047.2and TS26_NFC_REQ_047.3.

TS26_NFC_REQ_125 SIMalliance Open Mobile API and Global Platform Access Control SHALLbe initialized and ready to use when the BOOT_COMPLETED intent issent.

TS26_NFC_REQ_144 The Secure Element Name used for a particular Secure Element in theNFC transaction event SHALL be the same as the Secure Element Namefor that Secure Element in the Secure Element Access API.

TS26_NFC_REQ_146 The device MAY implement the method as described below:Note: Refer to the Javadoc linked to this document for more details.

“com.gsma.services.utils.Handset”

Classes MethodsHandset getAvailableSecureElements

Note: this requirement fulfils the generic requirementsTS26_NFC_REQ_059 and TS26_NFC_REQ_060.

TS26_NFC_REQ_186 This requirement is applicable from Android P onwards.The device SHALL implement GlobalPlatform OMAPI using the“android.se.omapi” namespace

Note: this requirement fulfils the generic requirementsTS26_NFC_REQ_047, TS26_NFC_REQ_047.1, TS26_NFC_REQ_047.2TS26_NFC_REQ_047.3 and TS26_NFC_REQ_183.

15.4.3 Test Cases

15.4.3.1 Open Mobile Service Layer API

Test PurposeTo ensure that OMAPI service layer API are not available and accessible from the androidapplication.

Referenced requirement TS26_NFC_REQ_124 TS26_NFC_REQ_186

Initial Conditions The DUT is powered on

Test Sequence No 1

nt l ondtonsIiiaC ii

None

15.4.3.1.1

Page 382: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 382 of 606

Step Direction Sequence Expected Result1 App

DUTUsing reflection (“Class.forName”),check if any of the requested OMAPIservice layer classes are available in theDUT or not.

List of OMAPI Service Layer classes:

org.simalliance.openmobileapi.Provider

Exception“ClassNotFoundException” is thrown

2 AppDUT

Using reflection (“Class.forName”),check if any of the requested OMAPIservice layer (Discovery API) classes areavailable in the DUT or not.

List of OMAPI Service Layer classes:

org.simalliance.openmobileapi.SEDiscovery

org.simalliance.openmobileapi.SERecognizer

org.simalliance.openmobileapi.SERecognizerByAID

org.simalliance.openmobileapi.SERecognizerByATR

org.simalliance.openmobileapi.SERecognizerByHistoricalBytes

Exception“ClassNotFoundException” for eachclass is thrown

3 AppDUT

Using reflection (“Class.forName”),check if any of the requested OMAPIservice layer (File Management API)classes are available in the DUT or not.

List of OMAPI Service Layer classes:

org.simalliance.openmobileapi.FileViewProvider

org.simalliance.openmobileapi.FileViewProvider.FCP

org.simalliance.openmobileapi.FileViewProvider.Record

Exception“ClassNotFoundException” for eachclass is thrown

4 AppDUT

Using reflection (“Class.forName”),check if any of the requested OMAPIservice layer (Authentication ServiceAPI) classes are available in the DUT ornot.

List of OMAPI Service Layer classes:

org.simalliance.openmobileapi.AuthenticationProvider

org.simalliance.openmobileapi.AuthenticationProvider.PinID

Exception“ClassNotFoundException” for eachclass is thrown

Page 383: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 383 of 606

Step Direction Sequence Expected Result5 App

DUTUsing reflection (“Class.forName”),check if any of the requested OMAPIservice layer (PKCS# 15 Service API)classes are available in the DUT or not.

List of OMAPI Service Layer classes:

org.simalliance.openmobileapi.PKCS15Provider

org.simalliance.openmobileapi.PKCS15Provider.Path

Exception“ClassNotFoundException” for eachclass is thrown

6 AppDUT

Using reflection (“Class.forName”),check if any of the requested OMAPIservice layer (Secure Storage API)classes are available in the DUT or not.

List of OMAPI Service Layer classes:

org.simalliance.openmobileapi.SecureStorageProvider

Exception“ClassNotFoundException” for eachclass is thrown

15.4.3.2 Access to SIMAlliance OMAPI after the device is bootedTest Purpose

To ensure that an application has access to the SE through the OMAPI right after theBOOT_COMPLETED event is received

Referenced requirement

TS26_NFC_REQ_125

Test Sequence No 1: OM API access after boot, ARA

nt l ondtonsIiiaC ii

An instance of the UICC application APDU_TestApplication.cap with AID 01 isselectable and is installed on to the UICC

GSMA_Mobile_App_BOOT#1 application signed with a private key correspondingto test certificate #1 and implementing a function “Select AID 01” using theopenLogicalChannel() method for the UICC application AID 01

GSMA_Mobile_App_BOOT#1 defines a broadcastReceiver as follows Registers in its Manifest the following permissions:

<uses-permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" />

Define a “BroadcastReceiver” as follows

<receiver android:name=".BootUpReceiver"><intent-filter><action android:name="android.intent.action.BOOT_COMPLETED"></action>

</intent-filter></receiver>

15.4.3.2.1

Page 384: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 384 of 606

When the activity GSMA_Mobile_App_BOOT#1 receive the intent“BOOT_COMPLETED” the activity will send “select AID 01” and “select AID 02” tothe UICC immediately

GSMA_Mobile_App_BOOT#1 is installed on the DUT Access Control is authorizing [GSMA_Mobile_App_BOOT#1] to access the applet

“APDU_TestApplication.cap” on the UICC using AID 01 and preventing access tothe applet using AID 02 ..

The Access Control is using ARA mechanism.

The DUT is powered off.

Step Direction Sequence Expected Result1 User

DUT Power on the DUT Activity listening “BOOT_COMPLETED”is launched.

2 AppUICC

Call "Select AID 01" function SELECT command is successful and callto "Select AID 01" function returnssuccessfully

3 AppUICC

Call "Select AID 02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted

Test Sequence No 2: OM API access after boot, ARF

nt l ondtonsIiiaC ii

An instance of the UICC application APDU_TestApplication.cap with AID 01 isselectable and is installed on to the UICC

GSMA_Mobile_App_BOOT#1 application signed with a private keycorresponding to test certificate #1 and implementing a function “Select AID01” using the openLogicalChannel() method for the UICC application AID 01

GSMA_Mobile_App_BOOT#1 defines a broadcastReceiver as follows Registers in its Manifest the following permissions:

<uses-permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" />

Define a “BroadcastReceiver” as follows

<receiver android:name=".BootUpReceiver"><intent-filter><action android:name="android.intent.action.BOOT_COMPLETED"></action>

</intent-filter></receiver>

When the activity GSMA_Mobile_App_BOOT#1 receive the intent“BOOT_COMPLETED” the activity will send “select AID 01” and “select AID 02”to the UICC immediately.

GSMA_Mobile_App_BOOT#1 is installed on the DUT

15.4.3.2.2

Page 385: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 385 of 606

Access Control is authorizing [GSMA_Mobile_App_BOOT#1] to access the applet“APDU_TestApplication.cap” on the UICC using AID 01 and preventing access tothe applet using AID 02.

The Access Control is using ARF mechanism.

The DUT is powered off

Step Direction Sequence Expected Result1 User

DUT Power on the DUT Activity listening “BOOT_COMPLETED”is launched.

2 APPUICC

Call "Select AID 01" function SELECT command is successful and callto "Select AID 01" function returnssuccessfully

3 APPUICC

Call "Select AID 02" function Call is unsuccessful, returning an errorindicating that the access control rightsare not granted.

15.4.3.3 Getting the list of available Secure ElementsTo ensure that the framework is implementing the method for getting the list of availableSecure Elements as defined by TS26_NFC_REQ_146.

Referenced requirement

TS26_NFC_REQ_146

Test Sequence No 1: Handset::getavailableSecureElements

nt l ondtonsIiiaC ii

An instance of the “Handset” class has been retrieved successfully by the applicationand is not null

Step Direction Sequence Expected Result1 APP

DUT

From the “Handset” instance, call the“getAvailableSecureElements“ methodwith a value which is different from thefollowing constants:- “BATTERY_OPERATIONAL

_MODE”- “BATTERY_ POWER_OFF

_MODE”- “BATTERY_ LOW_MODE”

An “IllegalArgumentException” exceptionis thrown by the system.

2 APPDUT

From the “Handset” instance, call the“getAvailableSecureElements“ method with the value“BATTERY_OPERATIONAL_MODE”constant as parameter

No exception thrown by the system Return a list in which one entry

identifies the UICC

15.4.3.3.1

Page 386: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 386 of 606

Step Direction Sequence Expected Result3 APP

DUT

From the “Handset” instance, call the“getAvailableSecureElements“ methodwith the value“BATTERY_POWER_OFF_MODE”constant as parameter

Result is stored in [List01]

No exception thrown by the system [List01] is not null

4 APPDUT

From the “Handset” instance, call the“getAvailableSecureElements“ methodwith the value“BATTERY_LOW_MODE” constant asparameter

Result is stored in [List02]

No exception thrown by the system [List02] is not null At least one of [List01] and [List02]

contains an entry identifying the UICC

15.4.3.4 Identical SE Names across device componentsTo ensure that the framework is using the same Secure Element names across devicecomponents.

Referenced requirement

TS26_NFC_REQ_69 TS26_NFC_REQ_144

Test Sequence No 1: Usage of identical SE Names across device

coponntsm e

nt l ondtonsIiiaC ii

Application [app01] Provides the following features

Retrieves the list of Secure Elements available when the DUT is in “Operationmode”

Dynamically creates an “Off-Host” service/group for registering AID(s) in therouting table of the NFC Controller

Retrieves the list of readers using SIMAlliance OMAPI Displays a notification when a transaction event is received The notification displays the Secure Element name at the origin of the event

Applet with [AID01] as AID is installed on the UICC Access Control is allowing communication between any applets in the UICC and

[app01]

Step Direction Sequence Expected Result

15.4.3.4.1

Page 387: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 387 of 606

Step Direction Sequence Expected Result1 APP

DUT

Retrieve the list of Secure Element(s)when the device is in “OperationalMode” using thegetAvailableSecureElements() method

Entry identifying the UICC is stored in[SEName]

• No exception thrown by the system• A list containing at least the UICC is

returned• Entry identifying the UICC contains a

string equal to “SIM” or “SIM1”

2 APPDUT

Create an “Off-Host” service using thefollowing details:• “myOffHostService” as description• [SEName] as Secure Element

name

Instance of the new service is storedin [myService]

No exception thrown by the system

3 APPDUT

Create a group as part of [myService]using the following details:• “myGroup01” as description• android.nfc.cardemulation.CardE

mulation.CATEGORY_PAYMENTconstant as category

• A banner where it is displayed“myOffHostService”

Instance of the new service is storedin [myGroup]

No exception thrown by the system

4 APPDUT

Register [AID01] in [myGroup] group No exception thrown by the system

5 APPDUT

Commit the creation of the service, thegroup and the registration of [AID01]

No exception thrown by the system

6 APPDUT

Using SIMAlliance APIs, get the list ofavailable readers

The name of one of the returned reader isequal to the string stored in [SEName]

7 UserDUT

From the “Setting” menu open the“Tap&Pay” entry

List of entries contains a banner where“myOffHostService” is displayed

8 UserDUT

Select entry with “myOffHostService”banner

9 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

10 UserPCD

Power on the field

11 PCDDUT

DUT UICC

Send “SELECT APDU” command with[AID01] as parameter

SW = 90 00 is returned

12 UICCDUT

DUT APP

Send a transaction event from anapplet in the UICC

• A notification linked to the transactionevent is displayed by [app01]

• The Secure Element is displayed bythe notification is equal to the onestored in [SEName]

Page 388: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 388 of 606

Test Sequence No 2: Usage of identical SE Names across device

coponnts ( thout usng )m e wi i GS MAAP I

nt l ondtonsIiiaC ii

Application [app01] Provides the following features defines an “Off-Host” service [myOffHostService] in its Manifest.

with group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name="AID01"/>

</aid-group>

service [myOffHostService] declaration must contain an intent filter in themeta-data element as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostService>

</offhost-apdu-service>

Retrieves the list of readers using SIMAlliance OMAPI Displays a notification when a transaction event is received The notification displays the Secure Element name at the origin of the event

Applet with [AID01] as AID is installed on the UICC Access Control is allowing communication between any applets in the UICC and

[app01]

Step Direction Sequence Expected Result1 APP

DUT

Using SIMAlliance APIs, get the list ofavailable readers

The name of one of the returned reader isequal to “SIM” or “SIM1” andthis string is stored in [SEName]

2 UserDUT

From the “Setting” menu open the“Tap&Pay” entry

List of entries contains a banner where“myOffHostService” is displayed

3 UserDUT

Select entry with “myOffHostService”banner

15.4.3.4.2

Page 389: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 389 of 606

Step Direction Sequence Expected Result4 User

DUT

While the field is off, place the DUT inthe area where the field will bepowered on

5 UserPCD

Power on the field

6 PCDDUT

DUT UICC

Send “SELECT APDU” command with[AID01] as parameter

SW = 90 00 is returned

7 UICCDUT

DUT APP

Send a transaction event from anapplet in the UICC

• A notification linked to the transactionevent is displayed by [app01]

• The Secure Element is displayed bythe notification is equal to the onestored in [SEName]

15.5 NFC Transaction Events

15.5.1 General overviewThis section provides test cases for checking reception of NFC Transaction events.

The list of conformance requirements tested within this section is listed in the table insection Error! Reference source not found..

15.5.2 Conformance requirementsTS26_NFC_REQ_096 Before Android P Transaction event data SHALL be set in the following

extended field:

com.gsma.services.nfc.extra.AID

ByteArray

Contains the card “Application

Identifier” [optional]

com.gsma.services.nfc.extra.DATA

ByteArray

Payload conveyed by the HCI event

“EVT_TRANSACTION”

TS26_NFC_REQ_098 Before Android P the Device SHALL support “Unicast” and “Multicast”modes for receiving the “EVT_TRANSACTION”.

TS26_NFC_REQ_099 Before Android P for switching from “Unicast” to “Multicast”, the deviceMAY support an API as described below.

“com.gsma.services.utils.Handset”

Classes MethodsHandset enableMultiEvt_transactionReception

This is considered a sensitive API

TS26_NFC_REQ_129 Before Android P a Transaction Event (EVT_Transaction) SHALL betriggered based on the following information:

Page 390: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 390 of 606

Action com.gsma.services.nfc.action.

TRANSACTION_EVENT

Mime type -

URI nfc://secure:0/<SEName>/<AID>

- SEName reflects the originating SEIt must be compliant with SIMAlliance Open MobileAPIs

- AID reflects the originating UICC applet identifier

TS26_NFC_REQ_130 Before Android P the Android Framework SHALL define the followingpermissions for handling Open Mobile APIs and Transaction events:- Permission-group "com.gsma.services.nfc.permission" SHALL bedefined in Android framework to host all NFC-related permissions asfollowing: permission-group android:name =com.gsma.services.permission android:label =@string/permgrouplab_NFC = "NFC - Near Field Communication"android:icon = @drawable/perm_group_network android:description =@string/permgroupdesc_NFC = "Access various NFC features"android:priority = 270

- Permission "org.simalliance.openmobileapi.SMARTCARD" SHALL bedefined in Android framework as following: android:name =org.simalliance.openmobileapi.SMARTCARD android:permissionGroup= com.gsma.services.nfc.permission android:label =@string/permlab_SmartcardService = "Access to SIM Card"android:description = @string/permdesc_SmartcardService = "Allowsapplication to communicate with the SIM card"

- Permission"com.gsma.services.nfc.permission.TRANSACTION_EVENT" shall bedefined in Android framework as following: android:name =com.gsma.services.nfc.permission.TRANSACTION_EVENTandroid:permissionGroup = com.gsma.services.nfc.permissionandroid:label = @string/permlab_nfcReceiveEvent = "NFC Transactionawareness" android:description = @string/permdesc_nfcReceiveEvent ="Allows application to receive information about NFC transactionperformed"

TS26_NFC_REQ_145 When OS uses certificates for signing applications, any deviceimplementing GSMA API SHALL implement a mechanism based oncertificates stored in the Active UICC Profile for protecting sensitive APIsas illustrated in the figure below.

TS26_NFC_REQ_145.3 Any sensitive API SHALL check if the application has been signed withone of the certificates stored in the Protection mechanism cache beforeexecuting the operation, and:

Only authorised applications shall be granted access to thisfunction.

For any other non-authorised applications an exception needs to beraised.

Page 391: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 391 of 606

TS26_NFC_REQ_150 Before Android P in “Unicast” mode, “EVT_TRANSACTION” eventSHALL be received by only one activity.

TS26_NFC_REQ_150.1 Before Android P when several activities registered for the“EVT_TRANSACTION”, the framework SHALL follow the priorityscheme described below:

1. “Android:priority” level defined in the Intent Filter SHALL becompared

2. First installed application package (APK) has a higher priority

Note: Only priority <0 are possible for non privileged application, as perAndroid AOSP code(https://android.googlesource.com/platform/frameworks/base/+/5585dd971e265cbb3a515bb759710646c5bc6f63)

TS26_NFC_REQ_151 Before Android P the framework SHALL use “BroadcastReceiver”mechanism to inform the registered activities of the event.

TS26_NFC_REQ_152.1 If an application is registered to any “EVT_TRANSACTION”, by omittingthe AID in the Intent, it SHALL receive the events of any applets to thoseaccessible using the “Access Control”.

TS26_NFC_REQ_187

This requirement is applicable from Android P onwards.Transaction Event is provided natively by Android.

A Transaction Event (EVT_TRANSACTION) SHALL be triggered basedon the following information:

Action android.nfc.action.TRANSACTION_DETECTED

Mime type -URI nfc://secure:0/<SEName>/<AID>

- SEName reflects the originating SEIt must be compliant with SIMalliance Open Mobile API- AID r-eflects the originating UICC applet identifier

TS26_NFC_REQ_188 Transaction event data SHALL be set in the following extended field:

android.nfc.extra.AID

ByteArrayContains the card “Application Identifier” ]

android.nfc.extra.DATA

ByteArray

Payload conveyed by the HCI event

“EVT_TRANSACTION” [optional]

android.nfc.extra.SECURE_ELEMENT_NAM

E

String

Indicates the Secure Element on which the transactionoccurred.

eSE1...eSEn for Embedded Secure Elements,SIM1...SIMn for UICC, etc. ]

Page 392: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 392 of 606

15.5.3 Test Cases

15.5.3.1 Switching to “Multicast” mode

Test PurposeEnsure DUT implements correctly defined API for switching to “Multicast” mode andbroadcast accordingly “EVT_Transaction” to several applications.

Referenced requirement TS26_NFC_REQ_098 TS26_NFC_REQ_099 TS26_NFC_REQ_145 TS26_NFC_REQ_145.3

Test Sequence No 1: enableMultiEvt_transactionReception, not

uthosda rie

nt l ondtonsIiiaC ii

PKCS#15 structure on the UICC:

A certificate [cert01] is stored in a file [EF01] A EF_CDF file [EF02] as defined by PKCS#15 specification is referencing [EF01] EF_ODF file contains a reference to [EF02] for the “A5” type

Application [app01] is signed with a certificate which is not [cert01]

An instance of the “Handset” class has been retrieved successfully by theapplication and is not null

Step Direction Sequence Expected Result

1 AppDUT From the “Handset” instance, call“enableMultiEvt_transactionReception” method

“SecurityException” is thrown by thesystem

Test Sequence No 2: enableMultiEvt_transactionReception, enable,reboot

Initial Conditions PKCS#15 structure on the UICC:

A certificate [cert01] is stored in a file [EF01] A EF_CDF file [EF02] as defined by PKCS#15 specification is referencing [EF01] EF_ODF file contains a reference to [EF02] for the “A5” type

Access Control is allowing communication between any applets in the UICC and[app01], [app02] and [app03]

Application [app01]- Defines an “activity” which listens an “intent-filter” as follows

<intent-filter><action android:name="com.gsma.services.nfc.action.TRANSACTION_EVENT" />

15.5.3.1.1

15.5.3.1.2

Page 393: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 393 of 606

<category android:name="android.intent.category.DEFAULT" /><data

android:host="secure"android:pathPrefix="/SIM"android:port="0"android:scheme="nfc"/>

</intent-filter>

Applications [app02] and [app03]- Signed with certificate [cert01]- Define a “BroadcastReceiver” which an “intent-filter” as follows

<intent-filter><action android:name="com.gsma.services.nfc.action.TRANSACTION_EVENT" /><category android:name="android.intent.category.DEFAULT" /><data

android:host="secure"android:pathPrefix="/SIM"android:port="0"

android:scheme="nfc"/>

</intent-filter>

- An instance of the “Handset” class has been retrieved successfully and is not null

Step Direction Sequence Expected Result

1 AppDUT From the “Handset” instance, call“enableMultiEvt_transactionReception” method from [app02]

No exception thrown by the system

2 UICCDUT

Send a transaction event from anapplet in the UICC

[app02] and [app03] are receiving theevent [app01] is not receiving the event

3 AppDUT Restart DUT

4 UICCDUT

Send transaction event from an appletin the UICC

[app01] is receiving the event [app02] and [app03] are not receivingthe event

15.5.3.2 Receiving EVT_Transaction from “BroadcastReceiver”

Test PurposeEnsure DUT implements correctly the filtering feature of “BroadcastReceiver” in order toreceive appropriate EVT_Transaction events

Referenced requirement TS26_NFC_REQ_098 TS26_NFC_REQ_099 TS26_NFC_REQ_151

Page 394: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 394 of 606

Test Sequence No 1: enableMultiEvt_transactionReception, path

ptt naer

nt l ondtonsIiiaC ii

PKCS#15 structure on the UICC:

A certificate [cert01] is stored in a file [EF01] A EF_CDF file [EF02] as defined by PKCS#15 specification is referencing [EF01] EF_ODF file contains a reference to [EF02] for the “A5” type

Access Control is allowing communication from any applets in the UICC and [app01] Application [app01]

- Signed with certificate [cert01]- An instance of the “Handset” class has been retrieved successfully and is not null- In all the following sequences, “intent-filter” must be defined with

- action: "com.gsma.services.nfc.action.TRANSACTION_EVENT"- category: "android.intent.category.DEFAULT"

Step Direction Sequence Expected Result

1 AppDUT From the “Handset” instance, call“enableMultiEvt_transactionReception” method

No exception thrown by the system

2 AppDUT Application defines an “intent-filter”with following extra parameters anddynamically registers a“BroadcastReceiver” with it- scheme="nfc"- host="secure"- port="0"- pathPattern="/.*"

3 AppDUT Send a transaction event from anapplet in the UICC

Application is receiving the event

4 AppDUT Application defines an “intent-filter”with following extra parameters anddynamically registers a“BroadcastReceiver” with it

- scheme="nfc"- host="secure"- port="0"- pathPattern="/SIM.*/.*"

5 AppDUT Send a transaction event from anapplet in the UICC

Application is receiving the event

15.5.3.2.1

Page 395: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 395 of 606

Step Direction Sequence Expected Result

6 AppDUT Application defines an “intent-filter”with following extra parameters anddynamically registers a“BroadcastReceiver” with it

- scheme="nfc"- host="secure"- port="0"- pathPattern="/X/.*"

7 AppDUT Send a transaction event from anapplet in the UICC

Application is not receiving the event

8 AppDUT Application defines an “intent-filter”with following extra parameters anddynamically registers a“BroadcastReceiver” with it

- scheme="nfc"- host="secure"- port="0"- pathPattern="/SIM.*/X.*"

9 UICCDUT

Send transaction event from an appletin the UICC

Application is not receiving the event

Test Sequence No 2: enableMultiEvt_transactionReception, path

pfxrei

nt l ondtonsIiiaC ii

PKCS#15 structure on the UICC

A certificate [cert01] is stored in a file [EF01] A EF_CDF file [EF02] as defined by PKCS#15 specification is referencing [EF01] EF_ODF file contains a reference to [EF02] for the “A5” type

Access Control is allowing communication between any applets in the UICC and[app01]

SEName for the UICC is mentioned in the following sequences as [SEName] Application [app01]

- Signed with certificate [cert01]- An instance of the “Handset” class has been retrieved successfully and is not null- In all the following sequences, “intent-filter” must be defined with

- action: "com.gsma.services.nfc.action.TRANSACTION_EVENT"- category: "android.intent.category.DEFAULT"

Step Direction Sequence Expected Result

1 AppDUT From the “Handset” instance call“enableMultiEvt_transactionReception” method

No exception thrown by the system

15.5.3.2.2

Page 396: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 396 of 606

Step Direction Sequence Expected Result

2 AppDUT Application defines an “intent-filter”with following extra parameters anddynamically registers a“BroadcastReceiver” with it- scheme="nfc"- host="secure"- port="0"- pathPrefix="/"

3 UICCDUT

Send transaction event from an appletin the UICC

Application is receiving the event

4 AppDUT Application defines an “intent-filter”with following extra parameters anddynamically registers a“BroadcastReceiver” with it

- scheme="nfc"- host="secure"- port="0"- pathPrefix="/SIM"

5 UICCDUT

Send a transaction event from anapplet in the UICC

Application is receiving the event

6 AppDUT Application defines an “intent-filter”with following extra parameters anddynamically registers a“BroadcastReceiver” with it

- scheme="nfc"- host="secure"- port="0"- pathPrefix="/X"

7 UICCDUT

Send transaction event from an appletin the UICC

Application is not receiving the event

8 AppDUT Application defines an “intent-filter”with following extra parameters anddynamically registers a“BroadcastReceiver” with it

- scheme="nfc"- host="secure"- port="0"- pathPrefix="/[SEName]/X"

Note: SEName as to be replaced bythe UICC SE Name.

9 UICCDUT

Send transaction event from an appletin the UICC

Application is not receiving the event

Page 397: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 397 of 606

Test Sequence No 3: enableMultiEvt_transactionReception, invalid

ntnt p t si e arameer

nt l ondtonsIiiaC ii

PKCS#15 structure on the UICC

A certificate [cert01] is stored in a file [EF01] A EF_CDF file [EF02] as defined by PKCS#15 specification is referencing [EF01] EF_ODF file contains a reference to [EF02] for the “A5” type

Access Control is allowing communication between any applets in the UICC and[app01]

Application [app01]- Signed with certificate [cert01]- An instance of the “Handset” class has been retrieved successfully and is not null- In all the following sequences, “intent-filter” must be defined with

- action: "com.gsma.services.nfc.action.TRANSACTION_EVENT"- category: "android.intent.category.DEFAULT"

Step Direction Sequence Expected Result

1 AppDUT

From the “Handset” instance, call“enableMultiEvt_transactionReception” method

No exception thrown by the system

2 AppDUT

Application defines an “intent-filter”with following extra parameters anddynamically registers a“BroadcastReceiver” with it- scheme="tcp"- host="secure"- port="0"- pathPrefix="/SIM"

3 UICCDUT

Send transaction event from an appletin the UICC

Application is not receiving the event

4 AppDUT

Application defines an “intent-filter”with following extra parameters anddynamically registers a“BroadcastReceiver” with it- scheme="nfc"- host="unsecure"- port="0"- pathPrefix="/SIM"

5 UICCDUT

Send transaction event from an appletin the UICC

Application is not receiving the event

15.5.3.2.3

Page 398: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 398 of 606

Step Direction Sequence Expected Result

6 AppDUT Application defines an “intent-filter”with following extra parameters anddynamically registers a“BroadcastReceiver” with it- scheme="nfc"- host="secure"- port="1"- pathPrefix="/SIM"

7 UICCDUT

Send transaction event from an appletin the UICC

Application is not receiving the event

15.5.3.3 Checking EVT_Transaction data sent through “BroadcastReceiver”

Test PurposeEnsure DUT transmits correctly all the requested data through the “BroadcastReceiver”

Referenced requirement TS26_NFC_REQ_098 TS26_NFC_REQ_099

Test Sequence No 1

nt l ondtonsIiiaC ii

PKCS#15 structure on the UICC

A certificate [cert01] is stored in a file [EF01] A EF_CDF file [EF02] as defined by PKCS#15 specification is referencing [EF01] EF_ODF file contains a reference to [EF02] for the “A5” type

Access Control is allowing communication between any applets in the UICC and[app01]

Application [app01]- Signed with certificate [cert01]- Define a “BroadcastReceiver” which listens an “intent-filter” as follows

<intent-filter>

<action android:name="com.gsma.services.nfc.action.TRANSACTION_EVENT" />

<category android:name="android.intent.category.DEFAULT" />

<data

android:host="secure"

android:pathPrefix="/SIM"

android:port="0"

android:scheme="nfc"/>

</intent-filter>

- An instance of the “Handset” class has been retrieved successfully and is not null

15.5.3.3.1

Page 399: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 399 of 606

Step Direction Sequence Expected Result

1 AppDUT

From the “Handset” instance, call“enableMultiEvt_transactionReception” method

No exception thrown by the system

2 UICCDUT

Send transaction event from an appletin the UICC

Application is receiving the event

3 AppDUT

From received event, following data isextracted:

- SEName is stored in [var01]- AID is stored in [var02]- If

“com.gsma.services.nfc.extra.AID”field is available it is stored in [var03]

No exception thrown by the systemIf [var03] is available, check, if [var02]equals [var03]

4 AppDUT

Using OMAPI APIs, open a Sessionusing [var01] as SEName

Following SEName stored in [var01], aninstance of the “Session” class is returned

5 AppDUT

Using OMAPI APIs and the instanceof the “Session” class previouslyreturned, open a logical channel to theapplet which AID is stored in [var02]

A non null object representing aninstance of the “Channel” class isreturned

15.5.3.4 Test EVT Transaction event shall be handled only by the appropriateapplications

Test PurposeTest EVT Transaction event shall have a specific format

Referenced requirement TS26_NFC_REQ_129 TS26_NFC_REQ_152.1

Initial Conditions GSMA Mobile App UIA #2 and #5 is just a variant of GSMA Mobile App UIA #1 as

described in section in 8.3.4

Test Sequence No 1: Unicast

nt l ondtonsIiiaC ii

DUT is running in “unicast” mode (default mode after device power cycle) Applets with [AID01] and [AID02] as AID are installed on the UICC Access Control is

- Allowing Communication between applet [AID01] and [app01], [app03]- Blocking any communication with applet [AID02]

Following applications are installed in the following order: [app02], [app03], [app01] Application [app01]

- Signed with certificate [cert01]- Define an “Activity” which listens an “intent-filter” as follows

15.5.3.4.1

Page 400: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 400 of 606

<intent-filter><actionandroid:name="com.gsma.services.nfc.action.TRANSACTION_EVENT"/><category android:name="android.intent.category.DEFAULT"/><data

android:host="secure"android:pathPattern="/SIM.*/[AID01]"android:scheme="nfc"/>

</intent-filter>

This “Activity” displays a dialog box with =”/SIM.*/[AID01]” as message

Applications [app02] and [app03]- Application [app02] is signed with certificate [cert02]- Application [app03] is signed with certificate [cert03]- Define an “Activity” which listens an “intent-filter” as follows

<intent-filter><actionandroid:name="com.gsma.services.nfc.action.TRANSACTION_EVENT"/><category android:name="android.intent.category.DEFAULT"/><data

android:host="secure"android:pathPattern="/SIM.*/[AID02]"android:scheme="nfc"/>

</intent-filter>

This “Activity” display a dialog box with text =”/SIM.*/[AID02] from app02” asmessage for application [app02]

This “Activity” display a dialog box with text =”/SIM.*/[AID02] from app03” asmessage for application [app03]

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

2 PCD Power on RF field

3 PCDDUT

Perform RF protocol initialisation

4 PCDDUT

Using the APDU application, send aSELECT command with AID01.

APDU Application receives Status Word90 00

5 PCD Power off RF field

6 DUT UICC

Send EVT_FIELD_OFF

Page 401: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 401 of 606

Step Direction Sequence Expected Result

7 UICCDUT

UICC sends EVT_TRANSACTIONwith AID01

Only a dialog box containing“/SIM.*[AID01]” is displayed

8 UserDUT

Close Dialog box

9 UserDUT

Repeat steps 2-6 with AID02 insteadof AID01

10 UICCDUT

UICC sends EVT_TRANSACTIONwith AID02

No dialog box is displayed

Test Sequence No 2: Unicast

nt l ondtonsIiiaC ii

DUT is running in “unicast” mode (default after device power cycle) Applets with [AID01] and [AID02] as AID are installed on the UICC Access Control is

- Allowing communication between applet [AID01] and [app01], [app03]- Blocking any communication between applet [AID01] and [app02]- Allowing communication between applet [AID02] and any applications

Following applications are installed in the following order: [app02], [app03], [app01] Application [app01]

Signed with certificate [cert01] Define an “Activity” which listens an “intent-filter” as follows

<intent-filter><actionandroid:name="com.gsma.services.nfc.action.TRANSACTION_EVENT"/><category android:name="android.intent.category.DEFAULT"/><data

android:host="secure"android:pathPattern="/SIM.*/.*"android:scheme="nfc"/>

</intent-filter>

This “Activity” displays a dialog box with text =”/SIM.*/.*” as message

Applications [app02] and [app03]- Application [app02] is signed with certificate [cert02]- Application [app03] is signed with certificate [cert03]- Define an “Activity” which listens an “intent-filter” as follows

<intent-filter><action android:name="com.gsma.services.nfc.action.TRANSACTION_EVENT"/><category android:name="android.intent.category.DEFAULT"/><data

android:host="secure"android:pathPattern="/SIM.*/[AID01]"android:scheme="nfc"/>

</intent-filter>

15.5.3.4.2

Page 402: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 402 of 606

This “Activity” displays a dialog box with text =”/SIM.*/[AID01] from app02” asmessage for application [app02]

This “Activity” displays a dialog box with text =”/SIM.*/[AID01] from app03” asmessage for application [app03]

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

2 PCD Power on RF field

3 PCDDUT

Perform RF protocol initialisation

4 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

5 PCD Power off RF field

6 DUT UICC

Send EVT_Field_OFF

7 UICCDUT

UICC sends EVT_TRANSACTIONwith AID01

Only a dialog box containing“/SIM.*/[AID01] from app03” is displayed

8 UserDUT

Close Dialog box

9 UserDUT

Repeat steps 2-6 with AID02 insteadof AID01

10 UICCDUT

UICC sends EVT_TRANSACTIONwith AID02

Only a dialog box containing “/SIM.*/.*” isdisplayed

15.5.3.5 Application Permission for using Open Mobile API

Test PurposeTo ensure that android application has required permissions to use OMAPIs and theTransaction events.

Referenced requirement TS26_NFC_REQ_130

Initial Conditions APDU_TestApplication.cap is installed on the UICC and is Selectable at AID 01. The DUT is powered on

Test Sequence No 1

nt l ondtonsIiiaC ii

MobileApplication using Open Mobile APIs is installed on the DUT. The following permission is NOT declared in the MobileApplication manifest:

15.5.3.5.1

Page 403: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 403 of 606

<permissionandroid:name="org.simalliance.openmobileapi.SMARTCARD"/>

Step Direction Sequence Expected Result

1 App DUT Attempt to create a SEService object “SecurityException” is thrown by thesystem

15.5.3.6 EVT Transaction is received only by the appropriate application basedon priority scheme

Test PurposeCheck that in Unicast mode the EVT Transaction is received only by the appropriateapplication based on priority scheme.

Referenced requirement TS26_NFC_REQ_150 TS26_NFC_REQ_150.1

Test Sequence No 1: Check installation order

nt l ondtonsIiiaC ii

DUT is running in “unicast” mode (default mode after device power cycle) Applet with [AID01] is installed on the UICC Access Control is- Allowing Communication between applet [AID01] and [app01], [app02] Following applications are installed in the following order: [app01], [app02] Application [app01]- Signed with certificate [cert01]- The “android:priority” is set to “-100”- Define an “Activity” which listens to an “intent-filter” as follows

<intent-filter><actionandroid:name="com.gsma.services.nfc.action.TRANSACTION_EVENT"/><category android:name="android.intent.category.DEFAULT"/><data

android:host="secure"android:pathPattern="/SIM.*/[AID01]"android:scheme="nfc"/>

</intent-filter>

Applications [app02]- Application [app02] is signed with certificate [cert02]- The “android:priority” is set to “-100”- Define an “Activity” which listens an “intent-filter” as follows

<intent-filter><actionandroid:name="com.gsma.services.nfc.action.TRANSACTION_EVENT"/><category android:name="android.intent.category.DEFAULT"/>

15.5.3.6.1

Page 404: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 404 of 606

<dataandroid:host="secure"android:pathPattern="/SIM.*/[AID01]"android:scheme="nfc"/>

</intent-filter>

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

2 PCD Power on RF field

3 PCDDUT

Perform RF protocol initialisation

4 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

5 PCD Power off RF field

6 DUTUICC

Send EVT_FIELD_OFF

7 UICCDUT

UICC sends EVT_TRANSACTIONwith AID01

Transaction Event Activity [app01] isstarted.

Test Sequence No 2: Check that “android : priority” has priority over

thnstllton odei aai rer

nt l ondtonsIiiaC ii

DUT is running in “unicast” mode (default mode after device power cycle) Applet with [AID01] is installed on the UICC Access Control is- Allowing Communication between applet [AID01] and [app01], [app02] Following applications are installed in the following order: [app02], [app01] Application [app01]- Signed with certificate [cert01]- The “android:priority” is set to “-10”- Define an “Activity” which listens to an “intent-filter” as follows

<intent-filter><actionandroid:name="com.gsma.services.nfc.action.TRANSACTION_EVENT"/><category android:name="android.intent.category.DEFAULT"/><data

android:host="secure"android:pathPattern="/SIM.*/[AID01]"android:scheme="nfc"/>

</intent-filter>

Applications [app02]- Application [app02] is signed with certificate [cert02]- The “android:priority” is set to “-100”

15.5.3.6.2

Page 405: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 405 of 606

- Define an “Activity” which listens an “intent-filter” as follows

<intent-filter><actionandroid:name="com.gsma.services.nfc.action.TRANSACTION_EVENT"/><category android:name="android.intent.category.DEFAULT"/><data

android:host="secure"android:pathPattern="/SIM.*/[AID01]"android:scheme="nfc"/>

</intent-filter>

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on.

2 PCD Power on RF field

3 PCDDUT

Perform RF protocol initialisation

4 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

5 PCD Power off RF field

6 DUTUICC

Send EVT_FIELD_OFF

7 UICCDUT

UICC sends EVT_TRANSACTIONwith AID01

Transaction Event Activity [app01] isstarted.

15.6 VOID

15.7 Multiple Card Emulation Environment

15.7.1 General overviewThis section provides test cases for checking features linked to Multiple Card EmulationEnvironment.

The list of conformance requirements tested within this section is listed in the table insection Error! Reference source not found..

15.7.2 Conformance requirementsTS26_NFC_REQ_063 When an NFC application is uninstalled, the device SHALL remove all

information related to this application from the routing table.

TS26_NFC_REQ_063.1 When an NFC application is disabled, the device SHALL remove allinformation related to this application from the NFC routing table.

Note: this also applies for preinstalled applications that cannot beuninstalled but that can only be disabled.

Page 406: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 406 of 606

TS26_NFC_REQ_064

When an NFC application is updated or re-enabled, the device SHALLupdate the routing table according to the new registration information(removing/adding elements).Note: Static elements from the previous version will be removed and staticelements from the new version will be added.

TS26_NFC_REQ_065.1 When the device is powered off and a NFC reader is trying to select by AIDa NFC service relying on the HCE technology, the NFC Controller SHALLreturn an ISO error code (‘6A82’) indicating this service is not available.

Routing Table NFC Controller action when device ispowered off

Contains AID based onHCE

Default AID route set to“Off-Host”

Return an ISO error code (‘6A82’)for AID stored in the routing tableand related to HCE.

Forward others request to the “Off-Host”

Contains “Off-Host” AIDs Default AID route set to

HCE

Forward the request for all the AIDstored in the routing table to OFF-Host

Return an ISO error code (‘6A82’)for all the other AID select requests

TS26_NFC_REQ_068 The device SHALL provide a mechanism to handle AID Conflict.

TS26_NFC_REQ_068.01 AID Conflict resolution SHOULD follow the same mechanisms whetherNFC services registration is dynamic or static.

TS26_NFC_REQ_068.02 When managing AID conflict resolution, the device SHALL follow the end-user preferences.Note: In case of a Basic Device, end-user preference may have been setvia a paired device or from a connected PC. The way this is achieved is outof scope of this document.

TS26_NFC_REQ_094 When a mobile application is registering an AID-based or non AID-basedservice (statically or dynamically) it SHALL be able to state the target CEEusing an OS mechanism (manifest, API, …).

TS26_NFC_REQ_094.1 The following extension SHALL be supported in the manifest

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group><se-id name="XXX" />

</se-ext-group><AID-based>boolean</AID-based></extensions>

Where:- se-id name SHALL be set as described in TS26_NFC_REQ_069

and TS26_NFC_REQ_070 ; the uniqueness of the naming SHALLbe ensured by the OS as described in TS26_NFC_REQ_144.

- AID-based SHALL be set to true in case a SE application is

Page 407: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 407 of 606

compliant with ISO 7816-4 and false in all other casesNote: When a mobile application is declaring a se-id name that is notexisting on the device the registration shall be ignored.

TS26_NFC_REQ_094.2 If the extension is not declared in the manifest of the application, then thefollowing default values SHALL apply (for backward compatibility):

- <se-id name=”SIM1”/>

<AID-based>true</AID-based>

TS26_NFC_REQ_095 The device SHALL support routing to active CEEs.

TS26_NFC_REQ_127 The device MAY implement classes and methods as described below.Note: Refer to the Javadoc linked to this document for more details.

“com.gsma.services.nfc.NfcController”

Classes Methods

nested classes(NfcController.Callbacks)

All methods except“onCardEmulationMode”

NfcController

All methods except“disableCardEmulationMode,enableCardEmulationMode,isCardEmulationEnabled”

“com.gsma.services.nfc.AIDGroup”

Classes Methods

AIDGroup All methods

“com.gsma.services.nfc.OffHostService”

Classes Methods

OffHostService All methods

TS26_NFC_REQ_127.1 APIs SHALL also manage “Off-Host” services registered statically throughthe Manifest

TS26_NFC_REQ_127.2 All the services/group created through these APIs SHALL stay persistent(still available after a power off/on of the device).

TS26_NFC_REQ_128 The device MAY handle a “Long Press” on all “Tap&Pay” menu entries.

TS26_NFC_REQ_128.1 When a “Long Press” is done on a “Tap&Pay” menu entry, the deviceSHALL send the following intent to the application that has created thisentry.intent: com.gsma.services.nfc.SELECT_DEFAULT_SERVICE

TS26_NFC_REQ_134 The device SHALL provide an additional menu entry in “Settings” in orderto enable/disable group of AIDs (as defined by Android) belonging to thecategory “Other”.A group of AIDs SHALL only be enabled/disabled as a single unit.

Page 408: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 408 of 606

TS26_NFC_REQ_134.1 When there is an overflow in the NFC router table, the menu entrySHOULD display:

A banner representing the groups of AIDs belonging to thecategory “Other” (and optionally the group description) with itscurrent status (enabled/disabled) and a way for disabling/enablingit

A visual indication representing the NFC Controller capacity andshowing

1. The space used by the selected group2. If enablement of the selected group can fit with the remaining space ofthe NFC Controller routing table

TS26_NFC_REQ_134.2 The menu SHOULD be hidden to the end user until the first time an NFCService cannot be added in the NFC Controller routing table and thereafterthe menu is visible.

TS26_NFC_REQ_134.3 When the menu entry is opened, the status of NFC services groupdisplayed by the menu entry SHALL reflect the actual status of the currentNFC Controller routing table.

TS26_NFC_REQ_135 When an application is trying to register new AIDs belonging to thecategory “Other” and there is no automatic solution to solve any routingtable overflow (as defined in REQ_143), the device SHALL

Inform the end user that some NFC Services proposed by theapplication cannot be used. A message SHALL provide thedescription of the group(s) of AIDs (android:description) whichcannot be activated.

Propose the end user should disable some previously installedNFC services using the feature described inTS26_NFC_REQ_134 in order to free some NFC Controllerrouting table space to be able to register all AIDs needed bythe current application

When one AID from a group of AIDs cannot be added in the NFCController routing table, the entire group of AIDs SHALL not be enabled.

TS26_NFC_REQ_136 When a customer is selecting a service from the “Tap&Pay” menu there isno automatic solution to solve any routing table overflow (as defined inREQ_143), the device SHALL

Inform the end user that activation of the selected NFCservices cannot be performed

Propose the end user should disable some previously installedNFC services using the feature described inTS26_NFC_REQ_134 in order to free some NFC Controllerrouting table space

If the end user doesn’t disable enough NFC services to allow activation ofthe selected “Tap&Pay” menu, previous “Tap&Pay” entry SHALL stayactive and the end users selection is cancelled.

Note 1: Only Dynamic registration is currently tested.

TS26_NFC_REQ_143 When the device needs to update the routing table because of new AIDregistration; AND there is not enough space in the routing table for all required AIDs

while maintaining the current default route; AND there would be enough space in the routing table for all required AIDs

if the default AID route was changed to one of the other card emulation

Page 409: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 409 of 606

environments,THEN the device SHALL change the default route automatically to one ofthose other card emulation environments and SHALL update the routingtable accordingly.In such situation, there SHALL be no user interaction at all.

Note: this mechanism SHALL be totally transparent for end users as this isa solution resolving the chipset routing table size shortage.

TS26_NFC_REQ_147 In the “Tap&Pay” menu, the user selection has precedence and thebehaviour of the device is consistent across different handset states.The following scenarios SHALL be applied.

Note 1: If Android is changing the behaviour then this requirement willchange accordingly.Note 2: GSMA strongly recommend that service providers register the Off-Host AIDs in the Android OS as defined by Android.

ScenarioScreen ON

(ScreenLock/Unlock)

Screen OFF Switched Off

Default AIDroute is set toHCE.No App in thePaymentcategory hasbeen installed.

For any AIDwhich is notregistered inthe "Other"category,contactlessselection failswith error code'6A82'.

For any AIDwhich is notregistered inthe "Other"category,contactlessselection failswith error code'6A82'.

For any AIDwhich is notregistered in the"Other"category,contactlessselection failswith error code'6A82'.

Default AIDroute is set toOff-HostNo App in thePaymentcategory hasbeen Installed.

For any AIDwhich is notregistered inthe "Other"category,APDUs go toOff-Host.

For any AIDwhich is notregistered inthe "Other"category,APDUs go toOff-Host.

For any AIDwhich is notregistered in the"Other"category,APDUs go toOff-Host.

Default AIDroute is set toOff-HostThe userselected an Off-Host-basedservice inTap&Pay menu.

APDUsintended for theselected Off-Host service goto Off-Host.

APDUsintended forthe selectedOff-Hostservice go toOff-Host.

APDUsintended for theselected Off-Host service goto Off-Host.

Page 410: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 410 of 606

Default AIDroute is set toOff-HostThe userselected a HCE-based service inTap&Pay menu.

APDUsintended for theselected HCEservice go toHCE.

For APDUsintended forthe selectedHCE service,contactlessselection failswith error code'6A82'.

For APDUsintended for theselected HCEservice,contactlessselection failswith error code'6A82'.

Default AIDroute is set toHCEThe userselected a HCE-based service inTap&Pay menu.

APDUsintended for theselected HCEservice go toHCE.

For APDUsintended forthe selectedHCE service,contactlessselection failswith error code'6A82'.

For APDUsintended for theselected HCEservice,contactlessselection failswith error code'6A82'.

Default AIDroute is set toHCEThe userselected an Off-Host-basedservice inTap&Pay menu.

APDUsintended for theselected Off-Host service goto Off-Host.

APDUsintended forthe selectedOff-Hostservice go toOff-Host.

APDUsintended for theselected Off-Host service goto Off-Host.

TS26_NFC_REQ_148 The device SHALL not change the default AID route in response tochanges in device state (such as screen off, power off).

TS26_NFC_REQ_148.1 The same behaviour SHALL be implemented when the mobile device is setin Flight Mode with NFC ON.

TS26_NFC_REQ_170 In case the device detects a conflict between non-AID based contactlessservices (see TS26_NFC_REQ_172), the device SHALL display a menuentry in “Settings” in order to list impacted contactless services and theuser SHALL be directed to the menu.

TS26_NFC_REQ_170.1 The menu entry SHALL present the conflicting services to the end userwith an option to select which service(s) to be active. Only one set ofservice(s) (which are not conflicting with each other) SHALL be active atany one time.

TS26_NFC_REQ_172 The device SHALL consider that non-AID based services are conflicting assoon as they are associated to different Off-Host entities.

TS26_NFC_REQ_173 A device MAY be shipped with an eSE for NFC services.

TS26_NFC_REQ_173.1 The NFC controller SHALL support an interface with the eSE.Note: The interface can be SWP or any other interface.

TS26_NFC_REQ_175 In case the NFC Controller receives a RF parameters configuration requestfrom a CEE enabling a Mifare Classic service with either UID 4 or 7 bytes,the corresponding RF parameters profile “Profile 2 ” as defined in chapter3.1.2.2 of GSMA SGP.12 SHALL apply

TS26_NFC_REQ_176 In case the NFC Controller receives a RF parameters configuration requestfrom a CEE enabling a Mifare DESFire service, the RF parameters profile“Profile 3” as defined in chapter 3.1.2.2 of GSMA SGP.12 SHALL apply

Page 411: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 411 of 606

15.7.3 Test Cases

15.7.3.1 Dynamic AIDs Registration APIs –“com.gsma.services.nfc.NfcController” class

Test PurposeEnsure DUT implements correctly all APIs related to Dynamic AIDs Registration for“com.gsma.services.nfc.NfcController” class (as described in the GSMA NFC HandsetRequirements and its Javadoc).

Referenced requirement TS26_NFC_REQ_127 TS26_NFC_REQ_127.1

Test Sequence No 1: defineOffHostService, valid call

nt l ondtonsIiiaC ii

A Secure Element name for UICC exists and is stored in [SEName] An instance of the “NfcController” class has been retrieved successfully and is not

null

Step Direction Sequence Expected Result

1 AppDUT

From the “NfcController” instance, callthe “defineOffHostService” methodwith the following parameters: description: “Description” SEName: [SEName]

An “OffHostService” instance is returned

2 AppDUT

From the “OffHostService” instancereturned by the “defineOffHostService”method call, “getDescription” method

No exception thrown by the system String “Description” is returned

Test Sequence No 2: defineOffHostService, null description

Initial ConditionsA Secure Element name for UICC exists and is stored in [SEName]An instance of the “NfcController” class has been retrieved successfully and is not null

Step Direction Sequence Expected Result

15.7.3.1.1

15.7.3.1.2

Page 412: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 412 of 606

Step Direction Sequence Expected Result

1 AppDUT

From the “NfcController” instance, callthe “defineOffHostService” methodwith the following parameters: description: null SEName: [SEName]

IF DUT supportsO_ANDROID_API_V8_OR_LATER:

“IllegalArgumentException” is thrown bythe system

ELSE:

“IllegalArgumentException” is thrown bythe system

ORnull is returned

Test Sequence No 3: defineOffHostService, invalid SEName

nt l ondtonsIiiaC iiAn instance of the “NfcController” class has been retrieved successfully and is not null

Step Direction Sequence Expected Result

1 AppDUT

From the “NfcController” instance, callthe “defineOffHostService” methodwith the following parameters: description: “Description” SEName: “Invalid”

“IllegalArgumentException” is thrown bythe system

OR

a) An “OffHostService” instance isreturned

b) “getDescription” method is called fromthe returned instance

c) No exception thrown by the systemand String “Description” is returned

Test Sequence No 4: defineOffHostService, null description andinvalid SEName

Initial ConditionsAn instance of the “NfcController” class has been retrieved successfully and is not null

Step Direction Sequence Expected Result

1 AppDUT

From the “NfcController” instance, callthe “defineOffHostService” methodwith the following parameters: description: null SEName: “Invalid”

IF DUT supportsO_ANDROID_API_V8_OR_LATER:

“IllegalArgumentException” is thrown bythe system

ELSE:

“IllegalArgumentException” or“NullPointerException” is thrown by thesystem

Test Sequence No 5: Off-host service with Tap&Pay

Initial Conditions

15.7.3.1.3

15.7.3.1.4

15.7.3.1.5

Page 413: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 413 of 606

All NFC applications on the DUT are uninstalled except applications that are pre-installed.

NFC is enabled on the DUT Applet with [AID01] as AID is installed on the UICC Application [app01]

- An “Off-Host” service has been previously created using GSMA APIs with- “myOffHostService01-App01” as description- A banner where it is displayed “myOffHostService01-App01”- A group with "payment" as category and containing one AID named [AID01]

- An instance of the “NfcController” class has been retrieved successfully and is notnull

The default route is set to HCE (See section 2.6.1)

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

“myOffHostService01-App01” banner isone of the entries of the list

2 UserDUT

Select the entry with“myOffHostService01-App01” banner

3 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

4 UserPCD

Power on the field

5 PCDDUTDUT UICC

Send “SELECT APDU” commandwith AID01 as parameter

SW: 90 00 is returned

6 UserPCD

Power off the field

7 AppDUT

From the “NfcController” instance of[app01], call the “getOffHostServices”method

A list containing one instance of“OffHostService“ class is returned

8 AppDUT

From the “NfcController” instance of[app01], call the“deleteOffHostService” method withthe instance of the“OffHostService“ class returned in theprevious sequence

9 AppDUT

From the “NfcController” instance, callthe “getOffHostServices” method

List of returned “OffHostService” instanceis null

10 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

“myOffHostService01-App01” banner isno more part of the list

11 UserPCD

Power on the field

Page 414: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 414 of 606

Step Direction Sequence Expected Result

12 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

SW != 90 00 is returned

Test Sequence No 6: deleteOffHostService, null service

nt l ondtonsIiiaC iiApplication [app01]

- Application does not define an “Off-Host” service- An instance of the “NfcController” class has been retrieved successfully and is not null

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

2 AppDUT

From the “NfcController” instance of[app01], call the“deleteOffHostService” method withthe following parameter: service: null

IF DUT supportsO_ANDROID_API_V8_OR_LATER:“IllegalArgumentException” is thrown bythe systemELSE:3 Options: No exception is thrown “IllegalArgumentException” is thrown bythe system “NullPointerException” is thrown by thesystem

3 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

Services shall be the same than the oneslisted in Step 1

Test Sequence No 7: getOffHostServices, multiple applications,GSMA APIs and manifest

Initial Conditions Application [app01]

- An “Off-Host” service has been created previously using GSMA APIs with“myOffHostService01-App01” as description

- An “Off-Host” service has been defined in the Manifest with“myOffHostService02-App01” as description

- An instance of the “NfcController” class has been retrieved successfully and is notnull

Application [app02]- An “Off-Host” service has been created previously using GSMA APIs with

“myOffHostService01-App02” as description

15.7.3.1.6

15.7.3.1.7

Page 415: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 415 of 606

- An “Off-Host” service has been defined in the Manifest with“myOffHostService02-App02” as description

Applications [app01] and [app02] have been launched previously for registering itsNFC services

Step Direction Sequence Expected Result

1 AppDUT

From the “NfcController” instance of[app01], call the “getOffHostServices”method

List of returned “OffHostService”instances is not null and contains onlytwo elements

2 AppDUT

From the 2 “OffHostService” instancesreturned by the previous sequence,call the “getDescription” method

Result of these 2 calls is“myOffHostService01-App01” and“myOffHostService02-App01”Note: Any order is valid

Test Sequence No 8: getOffHostServices, no off-host services

dfndeie

nt l ondtonsIiiaC ii

Application [app01]- Application does not define an “Off-Host” service- An instance of the “NfcController” class has been retrieved successfully and is notnull

Application [app02]- An “Off-Host” service has been created previously using GSMA APIs with

“myOffHostService01-App02” as description- An “Off-Host” service has been defined in the Manifest with

“myOffHostService02-App02” as description Application [app02] has been launched previously for registering its NFC services

Step Direction Sequence Expected Result

1 AppDUT

From the “NfcController” instance of[app01], call the “getOffHostServices”method

List of returned “OffHostService”instances is null

Test Sequence No 9: getDefaultOffHostService, single application

Initial Conditions Application [app01]

- An “Off-Host” service has been created previously using GSMA APIs with- “myOffHostService01-App01” as description- A banner where it is displayed “myOffHostService01-App01”- A group with "payment" as category and containing one or several AIDs

- An “Off-Host” service has been defined in the Manifest with- “myOffHostService02-App01” as description- A banner where it is displayed “myOffHostService02-App01”

15.7.3.1.8

15.7.3.1.9

Page 416: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 416 of 606

- A group with "payment" as category and containing one or several AIDs- An instance of the “NfcController” class has been retrieved successfully and is notnull

Step Direction Sequence Expected Result

1 UserDUT

Launch [app01]

2 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

At least, 2 entries with“myOffHostService01-App01” and“myOffHostService02-App01” as bannerare displayed

3 UserDUT

Select the entry with“myOffHostService01-App01” banner

4 UserDUT

Set [app01] to foreground

5 AppDUT

From the “NfcController” instance, callthe “getDefaultOffHostService”method

An instance of the “OffHostService” classis returned

6 AppDUT

From the “OffHostService” instancereturned by the previous sequence,call the “getDescription” method

String “myOffHostService01-App01” isreturned

7 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

8 UserDUT

Select entry with“myOffHostService02-App01” banner

9 UserDUT

Set [app01] to foreground

10 AppDUT

From the “NfcController” instance, callthe “getDefaultOffHostService”method

An instance of the “OffHostService” classis returned

11 AppDUT

From the “OffHostService” instancereturned by the previous sequence,call the “getDescription” method

String “myOffHostService02-App01” isreturned

Test Sequence No 10: getDefaultOffHostService, multiple

pplctonsa iai

nt l ondtonsIiiaC ii

Application [app01]- Application does not define an “Off-Host” service- An instance of the “NfcController” class has been retrieved successfully and is notnull

Application [app02]- An “Off-Host” service has been created previously using GSMA APIs with

- “myOffHostService01-App02” as description

15.7.3.1.10

Page 417: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 417 of 606

- A banner where it is displayed “myOffHostService01-App02”- A group with "payment" as category and containing one or several AIDs

- An “Off-Host” service has been defined in the Manifest with- “myOffHostService02-App02” as description- A banner where it is displayed “myOffHostService02-App02”- A group with "payment" as category and containing one or several AIDs

Application [app02] has been launched previously for registering its NFC services

Step Direction Sequence Expected Result

1 UserDUT

Launch [app01]

2 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

At least, 2 entries with“myOffHostService01-App02” and“myOffHostService02-App02” as bannerare displayed

3 UserDUT

Select entry with“myOffHostService01-App02” banner

4 UserDUT

Set [app01] to foreground

5 AppDUT

From the “NfcController” instance, callthe “getDefaultOffHostService”method

null is returned

6 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

7 UserDUT

Select entry with“myOffHostService02-App02” banner

8 UserDUT

Set [app01] to foreground

9 AppDUT

From the “NfcController” instance, callthe “getDefaultOffHostService”method

null is returned

Test Sequence No 11: Tap&Pay after reboot

nt l ondtonsIiiaC ii

Application [app01]An “Off-Host” service has been created previously using GSMA APIs with

- “myOffHostService-App01” as description- A banner where it is displayed “myOffHostService01-App01”- A group with "payment" as category and containing one AID named [AID01]

Application [app01] has been launched previously for registering its NFC services Applet with [AID01] as AID is installed on the UICC NFC is enabled on the DUT

15.7.3.1.11

Page 418: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 418 of 606

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

At least, 1 entry with“myOffHostService01-App01” as banneris displayed

2 UserDUT

Select entry with“myOffHostService01-App01” banner

3 UserDUT

Power off the Device and then poweron the Device

4 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

“myOffHostService01-App01” banner isselected

5 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

6 UserPCD

Power on the field

7 PCDDUTDUTUICC

Send “SELECT APDU” command withAID01 as parameter

SW: 90 00 is returned

15.7.3.2 Dynamic AIDs Registration APIs –“com.gsma.services.nfc.OffHostService” class

Test PurposeEnsure DUT implements correctly all APIs related to Dynamic AIDs Registration for“com.gsma.services.nfc.OffHostService” class (as described in the GSMA NFC HandsetRequirements and its Javadoc).

Referenced requirements TS26_NFC_REQ_127 TS26_NFC_REQ_127.1 TS26_NFC_REQ_127.2

Test Sequence No 1: getLocation

nt l ondtonsIiiaC ii

Application [app01]- Using the following details, application called “defineOffHostService” method andstored the returned “OffHostService” instance in [myService]

- “myOffHostService-App01” as description- [SEName] as Secure Element name ([SEName] identifies UICC)

Step Direction Sequence Expected Result

15.7.3.2.1

Page 419: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 419 of 606

Step Direction Sequence Expected Result

1 AppDUT

From the “OffHostService” instance in[myService], call the “getLocation”method

Result is equals to [SEName]

Test Sequence No 2: defineAidGroup, CATEGORY_PAYMENT

nt l ondtonsIiiaC ii

Application [app01]- Using the following details, application called “defineOffHostService” method andstored the returned “OffHostService” instance in [myService]

- “myOffHostService-App01” as description- [SEName] as Secure Element name ([SEName] identifies UICC)

Step Direction Sequence Expected Result

1 AppDUT

From the “OffHostService” instance in[myService], call the “defineAidGroup”method with the following parameter: Description: “myGroup01” Category:android.nfc.cardemulation.CardEmulation.CATEGORY_PAYMENT constant

An “AidGroup” instance is returned

2 AppDUT

From the “AidGroup” instance returnedby the previous sequence, call the“getCategory” method

A string equals to theandroid.nfc.cardemulation.CardEmulation.CATEGORY_PAYMENT constant isreturned

3 AppDUT

From the “AidGroup” instance returnedby the previous sequence, call the“getDescription” method

String “myGroup01” is returned

Test Sequence No 3: defineAidGroup, CATEGORY_OTHER

Initial Conditions Application [app01]

- Using the following details, application called “defineOffHostService” method andstored the returned “OffHostService” instance in [myService]

- “myOffHostService-App01” as description- [SEName] as Secure Element name ([SEName] identifies UICC)

Step Direction Sequence Expected Result

1 AppDUT

From the “OffHostService” instance in[myService], call the “defineAidGroup”method with the following parameter: Description: “myGroup01” Category:android.nfc.cardemulation.CardEmulation.CATEGORY_OTHER constant

An “AidGroup” instance is returned

15.7.3.2.2

15.7.3.2.3

Page 420: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 420 of 606

Step Direction Sequence Expected Result

2 AppDUT

From the “AidGroup” instance returnedby the previous sequence, call the“getCategory” method

A string equals to theandroid.nfc.cardemulation.CardEmulation.CATEGORY_OTHER constant isreturned

3 AppDUT

From the “AidGroup” instance returnedby the previous sequence, call the“getDescription” method

String “myGroup01” is returned

Test Sequence No 4: defineAidGroup, null description

nt l ondtonsIiiaC ii

Application [app01]- Using the following details, application called “defineOffHostService” method andstored the returned “OffHostService” instance in [myService]

- “myOffHostService-App01” as description- [SEName] as Secure Element name ([SEName] identifies UICC)

Step Direction Sequence Expected Result

1 AppDUT

From the “OffHostService” instance in[myService], call the “defineAidGroup”method with the following parameter: Description: null Category:android.nfc.cardemulation.CardEmulation.CATEGORY_PAYMENT constant

IF DUT supportsO_ANDROID_API_V8_OR_LATER:“IllegalArgumentException” is thrown bythe system.ELSE:“IllegalArgumentException” or“NullPointerException” is thrown by thesystem

Test Sequence No 5: defineAidGroup, invalid category

Initial Conditions Application [app01]

- Using the following details, application called “defineOffHostService” method andstored the returned “OffHostService” instance in [myService]

- “myOffHostService-App01” as description- [SEName] as Secure Element name ([SEName] identifies UICC)

Step Direction Sequence Expected Result

1 AppDUT

From the “OffHostService” instance in[myService], call the “defineAidGroup”method with the following parameter: Description: “myGroup01” Category: “XX”

“IllegalArgumentException” is thrown bythe system

15.7.3.2.4

15.7.3.2.5

Page 421: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 421 of 606

Test Sequence No 6: getAidGroups, deleteAidGroup

nt l ondtonsIiiaC ii

Application [app01]- Using the following details, application called “defineOffHostService” method andstored the returned “OffHostService” instance in [myService]

- “myOffHostService-App01” as description- [SEName] as Secure Element name ([SEName] identifies UICC)

Step Direction Sequence Expected Result

1 AppDUT

From the “OffHostService” instance in[myService], call the “defineAidGroup”method with the following parameter: Description: “myGroup01” Category:android.nfc.cardemulation.CardEmulation.CATEGORY_PAYMENT constant

An “AidGroup” instance is returned

2 AppDUT

From the “OffHostService” instance in[myService], call the “defineAidGroup”method with the following parameter: Description: “myGroup02” Category:android.nfc.cardemulation.CardEmulation.CATEGORY_OTHER constant

An “AidGroup” instance is returned

3 AppDUT

From the “OffHostService” instance,call the “getAidGroups” method

List of returned “AidGroup” instances isnot null and contains only two elements

4 AppDUT

The expected result from the previousstep 1st instance is stored in [grp01] 2nd instance is stored in [grp02]From [grp01] instance call the“getDescription” methodResult is stored in [description]

Result of this call is“myGroup01” or “myGroup02” string

5 AppDUT

From [grp01] instance the call“getCategory” methodResult is stored in [category]

- IF [description] equals to “myGroup1”[category] shall be equal to the value of

android.nfc.cardemulation.CardEmulation.CATEGORY_PAYMENT- IF [description] equals to “myGroup2”[category] shall be equal to the value of

android.nfc.cardemulation.CardEmulation.CATEGORY_OTHER

15.7.3.2.6

Page 422: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 422 of 606

Step Direction Sequence Expected Result

6 AppDUT

From [grp02] instance call the“getDescription” method

Result is stored in [description02]

- [description02] is different from[description]- [description02] is equal to “myGroup1”or “myGroup2”

7 AppDUT

From [grp02] instance call the“getCategory” methodResult is stored in [category02]

- IF [description02] equals to “myGroup1”[category02] shall be equal to the value ofandroid.nfc.cardemulation.CardEmulation.CATEGORY_PAYMENT- IF [description02] equals to “myGroup2”[category02] shall be equal to the value ofandroid.nfc.cardemulation.CardEmulation.CATEGORY_OTHER

8 AppDUT

From the unique “OffHostService”, callthe “deleteAidGroup” method with“AidGroup” instance stored in [grp01]

No exception thrown by the system

9 AppDUT

From the “OffHostService” instance,call the “getAidGroups” methodInstance is stored in [grp02]

List of returned “AidGroup” instances isnot null and contains only one element

10 AppDUT

From instance returned in the previoussequence, call the “getDescription”method

Returned string is different than stringstored in [description]

11 AppDUT

From instance returned in the previoussequence, call the “getCategory”method

Returned string is different than stringstored in [category]

12 AppDUT

From the unique “OffHostService”, callthe “deleteAidGroup” method with“AidGroup” instance stored in [grp02]

No exception thrown by the system

13 AppDUT

From the “OffHostService”, call the“getAidGroups” method

List of returned “AidGroup” instances isnull

Test Sequence No 7: setBanner

nt l ondtonsIiiaC ii

Application [app01]- An “Off-Host” service has been defined in the Manifest with

- “myOffHostService” as description- A banner where it is displayed “myOffHostService”- A group with "payment" as category and containing one or several AIDs

- An instance of the “NfcController” class has been retrieved successfully and is notnull- Application contains an 260x96 dp image defined as resource [res01].

This image is displaying “myNewBanner”

15.7.3.2.7

Page 423: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 423 of 606

Step Direction Sequence Expected Result

1 UserDUT

Launch [app01]

2 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

At least, 1 entry with “myOffHostService”as banner is displayed

3 UserDUT

Set [app01] to foreground

4 AppDUT

From the “NfcController” instance, callthe “getOffHostServices” method

List of returned “OffHostService”instances is not null and contains onlyone element

5 AppDUT

From the “OffHostService” instancereturned by the previous sequence,call the “setBanner” method with thefollowing parameter: Banner: “Drawable” object built fromapplication resource [res01]

6 AppDUT

From the “OffHostService” instancestored in [myService], call the“commit” method

7 UserDUT

From the “Setting” menu open the“Tap&Pay” entry

List of entries contains a banner where“myNewBanner” is displayed

Test Sequence No 8: Persistence of “OffHostService” Application [app01]

- Using the following details, application called “defineOffHostService” method- “myOffHostService” as description- [SEName] as Secure Element name ([SEName] identifies UICC)

- From the returned “OffHostService” instance, application called the “commit”method

Step Direction Sequence Expected Result

1 UserDUT

Launch [app01]“Off-Host” service as defined in theinitial condition is created

2 UserDUT

Power off DUT

3 UserDUT

Power on DUT

4 UserDUT

Launch [app01]

5 AppDUT

[app01]retrieves an instance of the“NfcController” class

instance is not null

15.7.3.2.8

Page 424: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 424 of 606

Step Direction Sequence Expected Result

6 AppDUT

From the “NfcController” instance callthe “getOffHostServices” method

List of returned “OffHostService”instances is not null and contains onlyone element

7 AppDUT

From the “OffHostService” instancecontained in the list call the“getDescription” method

String “myOffHostService” is returned

15.7.3.3 Dynamic AIDs Registration APIs – “com.gsma.services.nfc.AidGroup”class

Test PurposeEnsure DUT implements correctly all APIs related to Dynamic AIDs Registration for“com.gsma.services.nfc.AidGroup” class (as described in the GSMA NFC HandsetRequirements and its Javadoc).

Referenced requirement TS26_NFC_REQ_127 TS26_NFC_REQ_127.2

Test Sequence No 1: AIDGroup, general usage

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that are pre-installed

Application [app01]- Using the following details, application called “defineOffHostService” method andstored the returned “OffHostService” instance in [myService]

- “myOffHostService” as description- [SEName] as Secure Element name ([SEName] identifies UICC)

- Using the following details, application created a group and stored the returned“AidGroup” instance in [myGroup01]

- “myGroup01” as description- android.nfc.cardemulation.CardEmulation.CATEGORY_PAYMENT constant as

category- A banner where it is displayed “myOffHostService”

- Creation of [myGroup01] is committed Applets with [AID01] and [AID02] as AIDs are installed on the UICC NFC is enabled on the DUT The default route is set to HCE (See section 2.6.1)

Step Direction Sequence Expected Result

1 UserDUT

Launch [app01]

15.7.3.3.1

Page 425: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 425 of 606

Step Direction Sequence Expected Result

2 UserDUT

From the “Setting” menu open the“Tap&Pay” entry

List of entries does not contain a bannerwhere “myOffHostService” is displayed

3 UserDUT

Set [app01] to foreground

4 AppDUT

From the “AidGroup” instance storedin [myGroup01] call the “addNewAid”method with the following parameter:Aid: [AID01]

5 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

6 UserPCD

Power on the field

7 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

SW != 90 00 is returned

8 CD DUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

SW != 90 00 is returned

9 UserPCD

Power off the field

10 UserDUT

Set [app01] to foreground

11 AppDUT

From the “OffHostService” instancestored in [myService], call the“commit” method

12 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

List of entries contains a banner where“myOffHostService” is displayed

13 UserDUT

Select entry with “myOffHostService”banner

14 UserPCD

Power on the field

15 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

SW: 90 00 is returned

16 UserPCD

Power off the field

17 UserDUT

Set [app01] to foreground

Page 426: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 426 of 606

Step Direction Sequence Expected Result

18 AppDUT

From the “AidGroup” instance storedin [myGroup01], call the “addNewAid”method with the following parameter:Aid: [AID02]

19 AppDUT

From the “OffHostService” instancestored in [myService], call the“commit” method

20 UserPCD

Power on the field

21 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

SW: 90 00 is returned

22 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

SW: 90 00 is returned

23 UserPCD

Power off the field

24 UserDUT

Set [app01] to foreground

25 AppDUT

From the “AidGroup” instance storedin [myGroup01] call the “removeAid”method with the following parameter:Aid: [AID01]

26 AppDUT

From the “OffHostService” instancestored in [myService] call the “commit”method

27 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

List of entries contains a banner where“myOffHostService” is displayed

28 UserPCD

Power on the field

29 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

SW: 90 00 is returned

Test Sequence No 2: Persistence of “AidGroup”

nt l ondtonsIiiaC ii

Application [app01]

- Using the following details, application called “defineOffHostService” method andstored the returned “OffHostService” instance in [myService]

15.7.3.3.2

Page 427: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 427 of 606

- “myOffHostService” as description- [SEName] as Secure Element name ([SEName] identifies UICC)

- Using the following details, application created a group as part of [myService]- “myGroup01” as description- android.nfc.cardemulation.CardEmulation.CATEGORY_PAYMENT constant as

category- A banner where it is displayed “myOffHostService”- [AID01] has been registered

- Creation of the service and the group is committed Applet with [AID01] as AID is installed on the UICC

Step Direction Sequence Expected Result

1 UserDUT

Launch [app01]“Off-Host” service as defined in theinitial condition is created

2 UserDUT

Power DUT off

3 UserDUT

Power DUT on

4 UserDUT

From the “Setting” open menu the“Tap&Pay” entry

List of entries contains a banner where“myOffHostService” is displayed

5 UserDUT

Select entry with “myOffHostService”banner

6 UserDUT

Launch [app01]

7 APPDUT

[app01] retrieves an instance of the“NfcController” class

Instance is not null

8 APPDUT

From the “NfcController” instance callthe “getDefaultOffHostService()”method

An “OffHostService” instance is returned

9 APPDUT

From the “OffHostService” instancecall the “getDescription” method

String “myOffHostService” is returned

10 APPDUT

From the “OffHostService” instancecall the “getAidGroups” methodInstance is stored in [grp01]

List of returned “AidGroup” instances isnot null and contains only one element

11 APPDUT

From [grp01] instance call the“getDescription” method

String “myGroup01” is returned

12 APPDUT

From [grp01] instance call the“getCategory” method

Value of the constantandroid.nfc.cardemulation.CardEmulationCATEGORY.PAYMENT is returned

13 APPDUT

While the field is off, place the DUT inthe area where the field will bepowered on

Page 428: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 428 of 606

Step Direction Sequence Expected Result

14 UserPCD

Power on the field

15 PCDDUTDUT UICC

Send “SELECT APDU” command with[AID01] as parameter

SW = 90 00 is returned

15.7.3.4 “Long Press” on “Tap&Pay” menu entries

Test PurposeEnsure DUT implements correctly all the additional GSMA features around the “Tap&Pay”menu

Referenced requirement TS26_NFC_REQ_128 TS26_NFC_REQ_128.1

Test Sequence No 1: Off-host service defined in manifest

nt l ondtonsIiiaC ii

Application defined an “Off-Host” payment service [serv01] in its Manifest… <aid-group android:description="@string/aiddescription"

android:category="payment">…

Application has registered following “Intent Filter” for one of its activity [activity01]<!-- LongPress on "Tap&Pay" entries -->

<intent-filter>

<actionandroid:name="com.gsma.services.nfc.SELECT_DEFAULT_SERVICE"/>

<categoryandroid:name="android.intent.category.DEFAULT"/></intent-filter>

when the activity is receiving the event it should display “Hello” on the screen

Step Direction Sequence Expected Result

1 AppDUT

Open the “Tap&Pay” menu Service [serv01] is one entry of the“Tap&Pay” menu

2 AppDUT

Execute a “Long Press” on the[serv01] entry

Activity [activity01] is launched inforeground

Test Sequence No 2: Off-host service defined using GSMA APIs

Initial Conditions

15.7.3.4.1

15.7.3.4.2

Page 429: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 429 of 606

Application [app01] defined an “Off-Host” payment service [serv01] using GSMAAPIs (i.e. category of the AID group is set to

android.nfc.cardemulation.CardEmulation.CATEGORY_PAYMENT)Service has to be registered when application is launched the first time

Application has registered following “Intent Filter” for one of its activity [activity01]<!-- LongPress on "Tap&Pay" entries -->

<intent-filter>

<actionandroid:name="com.gsma.services.nfc.SELECT_DEFAULT_SERVICE"/>

<categoryandroid:name="android.intent.category.DEFAULT"/></intent-filter>

when the activity is receiving the event it should display “Hello” on the screen

Step Direction Sequence Expected Result

1 AppDUT

Launch the application [app01] forregistering the “Off-Host” paymentservice

2 AppDUT

Open the “Tap&Pay” menu Service [serv01] is one entry of the“Tap&Pay” menu

3 AppDUT

Execute a “Long Press” on the[serv01] entry

Activity [activity01] is launched inforeground

15.7.3.5 Routing in Multiple CEE model

Test PurposeTo ensure routing between different CEE environments is performed correctly in a multipleCEE model.

Referenced requirement

TS26_NFC_REQ_065.1 TS26_NFC_REQ_095 TS26_NFC_REQ_147

Initial Conditions

The DUT is powered on HCI initialization has been performed successfully. NFC is enabled on the DUT

VOID

st qunc o 2: ffTe S e e eN O

-host py nt svc v same erieiaGS MAAP I

nt l ondtonsIiiaC ii

15.7.3.5.1

15. .3.5.27

Page 430: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 430 of 606

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1) Application [app01]

An “Off-Host” service has been created previously using GSMA APIs with- “myOffHostService-App01” as description- A banner where it is displayed “myOffHostService-App01”- A group with "payment" as category and containing one AID named [AID01]

Application [app01] has been launched previously for registering its NFC services Applets with [AID01] & [AID02] as AID are installed on the UICC

- When they are selected from a POS, SW:90 00 is returned + extra data “4f 46 4648 4f 53 54”

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu open the“Tap&Pay” entry

At least, 1 entry with “myOffHostService-App01” as banner is displayed

2 UserDUT

Select entry with“myOffHostService01-App01” banner

3 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

4 UserPCD

Power on the field

5 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

SW: 90 00 is returned with extra data “4f46 46 48 4f 53 54”

6 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

Contactless selection fails with SW: 6A82

Test Sequence No 3: Default route HCE, host payment service

(slctdn p&y), offeeei Ta P a

-host py nt svc v same erieiaGS MAAP I

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1) Application [app01]

This application defines “HCE” service as follows- “myHCEService-App01” as description- A banner where it is displayed “myHCEService-App1”- A group with "payment" as category and containing one AID named [AID01]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02]An “Off-Host” service has been created previously using GSMA APIs with

15.7.3.5.3

Page 431: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 431 of 606

- “myOffHostService-App02” as description- A banner where it is displayed “myOffHostService-App02”- A group with "payment" as category and containing one AID named [AID02]

Application [app02] has been launched previously for registering its NFC services An applet with [AID02] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

At least, 2 entries with “myHCEService-App01” and “myOffHostService-App02”as banner are displayed

2 UserDUT

Select entry with “myHCEService-App01” banner

3 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

4 UserPCD

Power on the field

5 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

SW: 90 00 is returned with extra data “4843 45”

6 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

Contactless selection fails with SW: 6A82

Test Sequence No 4: Default route HCE, host payment service, off-

host py nt svc v s (slctdn p&y), “oth”ame erieiaGS MAAP Ieeei Ta P a er

svc v serieiaGS MAAP I

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1) Application [app01]

This application defines “HCE” service as follows- “myHCEService-App01” as description- A banner where it is displayed “myHCEService-App1”- A group with "payment" as category and containing one AID named [AID01]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02]An “Off-Host” service has been created previously using GSMA APIs with

- “myOffHostService-App02” as description- A banner where it is displayed “myOffHostService-App02”

15.7.3.5.4

Page 432: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 432 of 606

- A group with "payment" as category and containing one AID named [AID02]- A group with "other" as category and containing one AID named [AID03]

Application [app02] has been launched previously for registering its NFC services An applet with [AID01] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID02] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID03] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

At least, 2 entries with “myHCEService-App01” and “myOffHostService-App02”as banner are displayed

2 UserDUT

Select entry with “myHCEService-App01” banner

3 UserDUT

Power off Device

4 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

5 UserPCD

Power on the field

6 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

Contactless selection fails with SW: 6A82

7 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

Contactless selection fails with SW: 6A82

8 PCDDUTDUT UICC

Send “SELECT APDU” command withAID03 as parameter

SW: 90 00 is returned with extra data “4f46 46 48 4f 53 54”

Test Sequence No 5: device off, “other” routing

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1)

15.7.3.5.5

Page 433: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 433 of 606

Application [app01]This application defines “HCE” service as follows

- “myHCEService-App01” as description- A banner where it is displayed “myHCEService-App1”- A group with "other" as category and containing one AID named [AID01]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02]An “Off-Host” service has been created previously using GSMA APIs with

- “myOffHostService-App02” as description- A banner where it is displayed “myOffHostService-App02”- A group with "other" as category and containing one AID named [AID02]

Application [app02] has been launched previously for registering its NFC services An applet with [AID01] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID02] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f

53 54”

Step Direction Sequence Expected Result

1 UserDUT

Power off Device

2 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

3 UserPCD

Power on the field

4 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

Contactless selection fails with SW: 6A82

5 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

SW: 90 00 is returned with extra data “4f46 46 48 4f 53 54”

Test Sequence No 6: HCE entry selected in Tap&Pay, device off,

py ntoutngame r i

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1) Application [app01]

This application defines “HCE” service as follows- “myHCEService-App01” as description- A banner where it is displayed “myHCEService-App1”

15.7.3.5.6

Page 434: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 434 of 606

- A group with "payment" as category and containing one AID named [AID01]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02]An “Off-Host” service has been created previously using GSMA APIs with

- “myOffHostService-App02” as description- A banner where it is displayed “myOffHostService-App02”- A group with "payment" as category and containing one AID named [AID02]

[app01] is installed before [app02] Application [app02] has been launched previously for registering its NFC services An applet with [AID01] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID02] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f

53 54”

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

At least, 2 entries with “myHCEService-App01” and “myOffHostService-App02”as banner are displayed

2 UserDUT

Select entry with “myHCEService-App01” banner

3 UserDUT

Power off Device

4 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

5 UserPCD

Power on the field

6 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

Contactless selection fails with SW: 6A82

7 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

Contactless selection fails with SW: 6A82

Test Sequence No 7: off-host entry selected in Tap&Pay, device off,

py ntoutngame r i

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1)

15.7.3.5.7

Page 435: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 435 of 606

Application [app01]This application defines “HCE” service as follows

- “myHCEService-App01” as description- A banner where it is displayed “myHCEService-App1”- A group with "payment" as category and containing one AID named [AID01]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02]An “Off-Host” service has been created previously using GSMA APIs with

- “myOffHostService-App02” as description- A banner where it is displayed “myOffHostService-App02”- A group with "payment" as category and containing one AID named [AID02]

Application [app02] has been launched previously for registering its NFC services An applet with [AID01] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID02] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f

53 54”

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

At least, 2 entries with “myHCEService-App01” and “myOffHostService-App02”as banner are displayed

2 UserDUT

Select entry with “myOffHostService-App02” banner

3 UserDUT

Power off Device

4 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

5 UserPCD

Power on the field

6 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

Contactless selection fails with SW: 6A82

7 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

SW: 90 00 is returned with extra data “4f46 46 48 4f 53 54”

Test Sequence No 8: screen off, “other” routing.

nt l ondtonsIiiaC ii

15.7.3.5.8

Page 436: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 436 of 606

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1) Application [app01]

This application defines “HCE” service as follows- “myHCEService-App01” as description- A banner where it is displayed “myHCEService-App1”- A group with "other" as category and containing one AID named [AID01]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02]An “Off-Host” service has been created previously using GSMA APIs with

- “myOffHostService-App02” as description- A banner where it is displayed “myOffHostService-App02”- A group with "other" as category and containing one AID named [AID02]

Application [app02] has been launched previously for registering its NFC services An applet with [AID01] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID02] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f

53 54” No default Tap&Pay service is selected

Step Direction Sequence Expected Result

1 UserDUT

Ensure that the Device screen is off

2 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

3 UserPCD

Power on the field

4 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

Contactless selection fails with SW: 6A82ORApp01 (Host) responds: SW:90 00 isreturned + extra data “48 43 45”

5 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

SW: 90 00 is returned with extra data “4f46 46 48 4f 53 54”

Test Sequence No 9: HCE entry selected in Tap&Pay, screen off,

py ntoutngame r i

nt l ondtonsIiiaC ii

15.7.3.5.9

Page 437: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 437 of 606

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1) Application [app01]

This application defines “HCE” service as follows- “myHCEService-App01” as description- A banner where it is displayed “myHCEService-App1”- A group with "payment" as category and containing one AID named [AID01]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02]An “Off-Host” service has been created previously using GSMA APIs with

- “myOffHostService-App02” as description- A banner where it is displayed “myOffHostService-App02”- A group with "payment" as category and containing one AID named [AID02]

[app01] is installed before [app02] Application [app02] has been launched previously for registering its NFC services An applet with [AID01] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID02] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

At least, 2 entries with “myHCEService-App01” and “myOffHostService-App02”as banner are displayed

2 UserDUT

Select entry with “myHCEService-App01” banner

3 UserDUT

Ensure that the Device screen is off

4 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

5 UserPCD

Power on the field

6 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

Contactless selection fails with SW: 6A82ORApp01 (Host) responds: SW:90 00 isreturned + extra data “48 43 45”

7 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

Contactless selection fails with SW: 6A82

Page 438: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 438 of 606

Test Sequence No 10: off-host entry selected in Tap&Pay, screen off,

py ntoutngame r i

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1) Application [app01]

This application defines “HCE” service as follows- “myHCEService-App01” as description- A banner where it is displayed “myHCEService-App1”- A group with "payment" as category and containing one AID named [AID01]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02]An “Off-Host” service has been created previously using GSMA APIs with

- “myOffHostService-App02” as description- A banner where it is displayed “myOffHostService-App02”- A group with "payment" as category and containing one AID named [AID02]

Application [app02] has been launched previously for registering its NFC services An applet with [AID01] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID02] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 484f 53 54”

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

At least, 2 entries with “myHCEService-App01” and “myOffHostService-App02”as banner are displayed

2 UserDUT

Select entry with “myOffHostService-App02” banner

3 UserDUT

Ensure that the Device screen is off

4 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

5 UserPCD

Power on the field

6 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

Contactless selection fails with SW: 6A82

15.7.3.5.10

Page 439: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 439 of 606

Step Direction Sequence Expected Result

7 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

SW: 90 00 is returned with extra data “4f46 46 48 4f 53 54”

15.7.3.6 AID Conflict Resolution Mechanism

Test PurposeEnsure DUT provide AID Conflict Resolution mechanism.

Referenced requirement TS26_NFC_REQ_068 TS26_NFC_REQ_068.01 TS26_NFC_REQ_068.02

Initial ConditionsNone

Test Sequence No 1

nt l ondtonsIiiaC iiNo default service for category “Other” is present in the DUT

Applet with [AID01] as AID is installed on the UICC.

When the Applet is selected it shall send a response APDU 9000 + ‘4f 46 46 48 4f 53 54

NFC is enabled on the DUT

Application [app01] An “Off-Host” service has been created using GSMA APIs with

A group with "other" as category and containing one AID named [AID01]

Application [app02]

defined as “Host” service in its Manifest.

With group "other" as category and containing [AID01] as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=" AID01"/>

</aid-group>

15.7.3.6.1

Page 440: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 440 of 606

NFC application [app02] service declaration must contain an intent filter in the meta-data element as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.HOST_APDU_SERVICE"/>

</intent-filter>

When the application is selected it shall send a response APDU 9000 + ‘48 43 45’’

Install the [app01] and [app02] on to the DUT for registering their respective NFCservices.

Application [app01] is launched and registered its AID

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

2 UserPCD

Power on the field

3 PCDDUTDUT UICC

“SELECT APDU” command is sentwith AID01 as parameter

DUT should present a message askingthe user which service is to be invoked.See Note

4 UserDUT

Select “app01”

5 UserPCD

Power Off the field

6 UserPCD

Power ON the field

7 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

SW: 90 00 + extra data ‘4f 46 46 48 4f 5354’ is returned by the off-host application

Note: TS26_NFC_REQ_068.02 is implemented in Android by asking the user to select the preferredservice.

Test Sequence No 2 (without using GSMA API)

nt l ondtonsIiiaC iiNo default service for category “Other” is present in the DUT

Applet with [AID01] as AID is installed on the UICC.

When the Applet is selected it shall send a response APDU 9000 + ‘4f 46 46 48 4f 53 54

15.7.3.6.2

Page 441: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 441 of 606

NFC is enabled on the DUT

Application [app01] define an “Off-Host” service in its Manifest.

With group "other" as category and containing [AID01] as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=" AID01"/>

</aid-group>

[app01] service declaration must contain an intent filter in the meta-data element asdefine below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

Application [app02]

defined as “Host” service in its Manifest.

With group "other" as category and containing [AID01] as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=" AID01"/>

</aid-group>

[app02] service declaration must contain an intent filter in the meta-data element asdefine below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.HOST_APDU_SERVICE"/>

</intent-filter>

When the application is selected it shall send a response APDU 9000 + ‘48 43 45’’

Install the [app01] and [app02] on to the DUT for registering their respective NFCservices.

Page 442: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 442 of 606

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

2 UserPCD

Power on the field

3 PCDDUTDUT UICC

“SELECT APDU” command is sentwith AID01 as parameter

DUT should present a message askingthe user which service is to be invoked.See Note

4 UserDUT

Select “app01”

5 UserPCD

Power Off the field

6 UserPCD

Power ON the field

7 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

SW: 90 00 + extra data ‘4f 46 46 48 4f 5354’ is returned by the off-host application

Note: TS26_NFC_REQ_068.02 is implemented in Android by asking the user to select the preferredservice.

15.7.3.7 Routing table update after NFC Application is uninstalled or disabled inMultiple CEE model

Test PurposeEnsure DUT removes all of the application entries related to a disabled or uninstalledapplication.

Referenced requirement TS26_NFC_REQ_063 TS26_NFC_REQ_063.1 TS26_NFC_REQ_064

Test Sequence No 1: Application uninstalled

nt l ondtonsIiiaC ii Determine N the maximum capacity of the routing table using the procedure 2.6.2 All NFC applications on the DUT are uninstalled except applications that are

preinstalled In the NFC Controller the default AID route is set to HCE (see section 2.6.1) Application [app01] defined an “OffHost” other service [serv01] in its Manifest.

o With group “other” as category and containing AID01 as defined below

<aid-group android:description="@string/aiddescription"

15.7.3.7.1

Page 443: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 443 of 606

android:category="other">

<aid-filter android:name= [AID 01]/>

</aid-group>

o your service [serv01] declaration must contain an intent filter

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/></intent-filter>

Applet with [AID01] as AID is installed on the UICC. [AID01] is of size 16 bytes. When the applet is selected, it shall send the response APDU 9000 + ‘4f 46 46 48 4f

53 54’ NFC is enabled on the DUT Application [Fillrouteapp01] is installed on the DUT

- Using the following details, application called “defineOffHostService” method andstored the returned “OffHostService” instance in [myService]

- “OffHost-Fillrouteapp01” as description- [SEName] as Secure Element name ([SEName] identifies UICC)

- Using the following details, application created a group and stored the returned“AidGroup” instance in [myGroup01]

- “myGroup01” as description- android.nfc.cardemulation.CardEmulation.CATEGORY_OTHER constant as

category- Creation of [myGroup01] is committed

Every [TestAID xx] are of size 16 bytes and for the same target. [TestAID xx] SHALLbe any random AIDs of 16 bytes and is not equal to [AID 01].

Steps 2 to 3 are used to fill the routing table (N-1) so that only AID01 of the [app01] canbe installed.

Step Direction Sequence Expected Result

1 AppDUT

From the “AidGroup” instance storedin [myGroup01], call the “addNewAid”method with N-1 different AIDs[TestAID xx]

2 AppDUT

From the “OffHostService” instancestored in [myService] call the “commit”method

No exception is expected

3 UserDUT

Install the Application [app01] on tothe DUT

No exception is expected

Page 444: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 444 of 606

Step Direction Sequence Expected Result

4 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

5 UserPCD

Power ON the field

6 PCDDUTDUT UICC

Send “SELECT APDU” command withAID1 as parameter

SW: 90 00 + extra data ‘4f 46 46 48 4f 5354’ is returned by the host application

7 UserDUT

From the “Setting -> apps” menu,remove the Application [app01]

8 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

9 UserPCD

Power ON the field

10 PCDDUTDUT UICC

Send “SELECT APDU” command withAID1 as parameter

SW: not equal 90 00

Test Sequence No 2: Application disabled and re-enabled

nt l ondtonsIiiaC ii All NFC applications on the DUT are uninstalled except applications that are

preinstalled In the NFC Controller the default AID route is set to HCE (see section 2.6.1) Application [app01] defined an “OffHost” other service [serv01] in its Manifest.

o With group “other” as category and containing AID01 as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name= [AID 01]/>

</aid-group>

o your service [serv01] declaration must contain an intent filter

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/></intent-filter>

Applet with [AID01] as AID is installed on the UICC. [AID01] is of size 16 bytes. When the applet is selected, it shall send the response APDU 9000 + ‘4f 46 46 48 4f

53 54’ NFC is enabled on the DUT

15.7.3.7.2

Page 445: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 445 of 606

Step Direction Sequence Expected Result

1 UserDUT

Install the Application [app01] on tothe DUT

No exception is expected

2 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

3 UserPCD

Power ON the field

4 PCDDUTDUT UICC

Send “SELECT APDU” command withAID1 as parameter

SW: 90 00 + extra data ‘4f 46 46 48 4f 5354’ is returned by the host application

5 UserDUT

Disable the Application [app01] usingIf the DUT supportsO_BEFORE_ANDROID_NOUGAT:“adb shell pm hide <package_name>”Else:“adb shell pm disable-user<package_name>”

Check that the adb command reportssuccess

6 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

7 UserPCD

Power ON the field

8 PCDDUTDUT UICC

Send “SELECT APDU” command withAID1 as parameter

SW: not equal 90 00

9 UserDUT

Enable the Application [app01] usingIf the DUT supportsO_BEFORE_ANDROID_NOUGAT:

“adb shell pm unhide<package_name>”

Else:

“adb shell pm enable<package_name>”

Check that the adb command reportssuccess.

10 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

11 UserPCD

Power ON the field

12 PCDDUTDUT UICC

Send “SELECT APDU” command withAID1 as parameter

SW: 90 00 + extra data ‘4f 46 46 48 4f 5354’ is returned by the host application

Page 446: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 446 of 606

Test Sequence No 3: Application uninstalled (without using GSMA

)AP I

nt l ondtonsIiiaC ii Determine N the maximum capacity of the routing table using the procedure 2.6.2 All NFC applications on the DUT are uninstalled except applications that are

preinstalled In the NFC Controller the default AID route is set to HCE (see section 2.6.1) Application [app01] defined an “OffHost” other service [serv01] in its Manifest.

o With group “other” as category and containing AID01 as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name= [AID 01]/>

</aid-group>

o service [serv01] declaration must contain an intent filter

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/></intent-filter>

Applet with [AID01] as AID is installed on the UICC. [AID01] is of size 16 bytes. When the applet is selected, it shall send the response APDU 9000 + ‘4f 46 46 48 4f

53 54’ NFC is enabled on the DUT Application [Fillrouteapp01] implements the registerAidsForService method Application [Fillrouteapp01] defined an “OffHost” other service [fillrouteserv01] in its

Manifest.o With group “other” as category and containing TestAID01 as defined below

<aid-group android:description="@string/aidfillroute"

android:category="other">

<aid-filter android:name= [TestAID01]/>

</aid-group>

o service [fillrouteserv01] declaration must contain an intent filter

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/></intent-filter>

Every [TestAID xx] are of size 16 bytes and for the same target. [TestAID xx] SHALLbe any random AID of 16 bytes and is not equal to [AID 01].

15.7.3.7.3

Page 447: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 447 of 606

Steps 2 to 3 are used to fill the routing table (N-1) so that only AID01 of the [app01] canbe installed.

Step Direction Sequence Expected Result

1 AppDUT

Call the “registerAidsForService”method of Fillrouteapp01 with N-1different AIDs [TestAID xx] with “other”category to register them for[fillrouteserv01] service

registerAidsForService method returns aboolean for success

2 UserDUT

Install the Application [app01] on tothe DUT

No exception is expected

3 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

4 UserPCD

Power ON the field

5 PCDDUTDUT UICC

Send “SELECT APDU” command withAID1 as parameter

SW: 90 00 + extra data ‘4f 46 46 48 4f 5354’ is returned by the host application

6 UserDUT

From the “Setting -> apps” menu,remove the Application [app01]

7 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

8 UserPCD

Power ON the field

9 PCDDUTDUT UICC

Send “SELECT APDU” command withAID1 as parameter

SW: not equal 90 00

15.7.3.8 Routing update when Application is updated / upgraded in Multiple CEEmodel.

Test PurposeTo ensure that when an NFC application is updated, the device SHALL update the routingtable according to the new registration information

Referenced requirement TS26_NFC_REQ_064

Test execution:

The DUT is powered on

Page 448: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 448 of 606

HCI initialization has been performed successfully. NFC is enabled on the DUT

Test Sequence No 1: Off-host service

nt lIiia

ondtonsC ii

The default AID route is set to HCE. (See section 2.6.1) Applet with [AID 01] as AID is installed on the UICC. [AID 01] is of size 16 bytes.Application [app01]

An “Off-Host” service has been previously created using GSMA APIs with“myOffHostService01-App01” as descriptionA banner where it is displayed “myOffHostService01-App01”A group with "other" as category and containing one AID named [AID 01]

An instance of the “NfcController” class has been retrieved successfully and is not nullWhen the [app01] is selected it shall send the response APDU 9000 + ‘4f 46 46 48 4f 5354’

Step Direction Sequence Expected Result

1 UserDUT

Install Application [app01]

2 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

3 UserPCD

Power ON the field

4 PCDDUTDUT UICC

Send “SELECT APDU” command withAID1 as parameter

SW: 90 00 + extra data ‘4f 46 46 48 4f 5354’ is returned by the off-host application

5 Now update the [app01] with [AID 02]via manifest and install it onto the DUT

<aid-groupandroid:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=[AID 02]/>

</aid-group>

6 UserPCD

Remove the DUT from the RF fieldand Place it again in the RF field

7 PCDDUTDUT UICC

Send “SELECT APDU” command with[AID 01] as parameter

SW other than 90 00 will be returned

15.7.3.8.1

Page 449: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 449 of 606

Test Sequence No 2: Host service

nt l ondtonsIiiaC ii The default AID route is set to HCE. (See section 2.6.1)

Application [app02]Defined a “Host” service [serv02] in its Manifest.

With group " other " as category and containing AID01 as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name= [AID 01]/>

</aid-group>

your service [serv02] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.HOST_APDU_SERVICE"/>

</intent-filter>

When the [app02] is selected it shall send the response APDU 9000 + ‘48 43 45’’

Step Direction Sequence Expected Result

1 UserDUT

Install Application [app02]

2 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

3 UserPCD

Power ON the field

4 PCDDUTDUT UICC

Send “SELECT APDU” command with[AID 01] as parameter

SW: 90 00 + extra data ‘48 43 45’ isreturned by the host application

5 Now update the [app02] with [AID 02]via manifest and install it onto the DUT

<aid-groupandroid:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=[AID 02]/>

</aid-group>

15.7.3.8.2

Page 450: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 450 of 606

Step Direction Sequence Expected Result

6 UserPCD

Remove the DUT from the RF fieldand Place it again in the RF field

7 PCDDUTDUT UICC

Send “SELECT APDU” command with[AID 01] as parameter

SW other than 90 00 will be returned

Test Sequence No 3: Off-host service (without using GSMA API)

Initial Conditions The default AID route is set to HCE. (See section 2.6.1) Applet with [AID 01] as AID is installed on the UICC. [AID 01] is of size 16 bytes.When the Applet is selected it shall send the response APDU 9000 + ‘4f 46 46 48 4f 53

54’

Application [app01]

Defined an “OffHost” service [serv01] in its Manifest.

With group "other" as category and containing AID01 as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name= [AID 01]/>

</aid-group>

[serv01] declaration must contain an intent filter in the meta-data element as definebelow

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

Step Direction Sequence Expected Result

1 UserDUT

Install Application [app01]

2 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

3 UserPCD

Power ON the field

15.7.3.8.3

Page 451: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 451 of 606

Step Direction Sequence Expected Result

4 PCDDUTDUT UICC

Send “SELECT APDU” command withAID1 as parameter

SW: 90 00 + extra data ‘4f 46 46 48 4f 5354’ is returned by the off-host application

5 Now update the [app01] with [AID 02]via manifest and install it onto the DUT

<aid-groupandroid:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=[AID 02]/>

</aid-group>

6 UserPCD

Remove the DUT from the RF fieldand Place it again in the RF field

7 PCDDUTDUT UICC

Send “SELECT APDU” command with[AID 01] as parameter

SW other than 90 00 will be returned

15.7.3.9 NFC Controller routing table

Test PurposeEnsure DUT handles correctly situations when NFC Controller routing is full.

Referenced requirement TS26_NFC_REQ_134 TS26_NFC_REQ_134.2 TS26_NFC_REQ_134.3 TS26_NFC_REQ_135 TS26_NFC_REQ_136

Test Sequence No 1: REQ_134 menu not available by default

nt l ondtonsIiiaC ii

A Factory Reset has been performed Application [app01]

An “Off-Host” service has been defined in the Manifest with- “myOffHostService-App01” as description- A group with "other" as category and containing one AID named [AID01]

Step Direction Sequence Expected Result

1 UserDUT

Install application [app01]

15.7.3.9.1

Page 452: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 452 of 606

Step Direction Sequence Expected Result

2 UserDUT

Open the “Setting” menu An additional menu allowing the end-userto enable/disable group of AIDs belongingto the category “other” is not available orvisible to the end user

VOID

st qunc o 3: fultout ,Te S e e eN Dea r eHCE

off-host svc ddd veriea e ia

p&y nu, chck _134 nuTa P ame e R EQ me

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE (see section 2.6.1) Application [app01]

An “Off-Host” service has been defined in the Manifest with- “myOffHostService-App01” as description- A group with "payment" as category and containing one AID named [AID01].

Group description is “myOtherGroup-App01” Application [app02]

An “Off-Host” service has been created previously using GSMA APIs with- “myOffHostService-App02” as description- A banner where it is displayed “myOffHostService-App02”- A group with "payment" as category containing [AID01] and [AID02]

Group description is “myOtherGroup-App02” Application [app01] is installed before application [app02] In the “Tap&Pay” menu, “myOffHostService-App01” is selected After installing application [app01] and application [app02], the NFC Controller

routing table is not full

Application [Fillrouteapp02]: It dynamically creates a group within an Off host service with "other" as category. It dynamically fills this group with different TestAIDFillxx as defined below until the

InsufficientResourceException is thrown:

AIDbyte 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

value

0x01 for TestAIDFill010x02 for TestAIDFill02…0x64 forTestAIDFill100

…..

0xFF forTestAIDFill255

0x02

0x03

0x04

0x05

0x06

0x07

0x08

0x09

0x10

0x11

0x12

0x13

0x14

0x15

0x03

15.7.3.9.2

15. .3.9.37

Page 453: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 453 of 606

After application [app01] and application [app02] are launched, application[Fillrouteapp02] is launched to fill the NFC Controller routing table.

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu open the“Tap&Pay” entry

At least, 2 entries with“myOffHostService-App01” and“myOffHostService-App02” as banner aredisplayed. “myOffHostService-App01” banner isselected

2 UserDUT

Select Entry with “myOffHostService-App02” banner

User is informed that the NFC Serviceproposed by the application cannot beused. Displayed message shall propose to theend-user a way to disable NFC servicespreviously installed

3 UserDUT

Open the “Setting” menu An additional menu allowing the end-userto enable/disable group of AIDs belongingto the category “other” is visible

4 UserDUT

Open the additional “Setting” menu Groups “myOffHostService-App01”“myOffHostService-App02” are notdisplayed as entry

Test Sequence No 4: Default route HCE, off-host service added via

nfst, svc nbld, contctlss sssonmaie erieea e a e e i

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE (see section 2.6.1)

Application [app01]An “Off-Host” service has been defined in the Manifest with

- “myOffHostService-App01” as description- A group with "other" as category and containing one AID named [AID01].

Group description is “myOtherGroup-App01” Application [app01] is not yet installed on the DUT Application [Fillrouteapp02]: It dynamically creates a group within an Off host service with "other" as category. It dynamically fills this group with different TestAIDFillxx as defined bellow until the

InsufficientResourceException is thrown:

AIDbyte 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

15.7.3.9.4

Page 454: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 454 of 606

value

0x01 for TestAIDFill010x02 for TestAIDFill02…0x64 forTestAIDFill100

…..

0xFF forTestAIDFill255

0x02

0x03

0x04

0x05

0x06

0x07

0x08

0x09

0x10

0x11

0x12

0x13

0x14

0x15

0x03

Application[Fillrouteapp02] is launched to fill the NFC Controller routing table.

Step Direction Sequence Expected Result

1 UserDUT

Install application [app01] User is informed that the NFC Serviceproposed by the application cannot beused.

Displayed message shall propose to theend-user a way to disable NFC servicespreviously installed

2 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

3 UserPCD

Power on the field

4 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

SW: 90 00 is not returned

5 UserPCD

Power off the field

6 UserDUT

Remove the DUT from the area wherethe field is powered on

7 UserDUT

Open the “Setting” menu An additional menu allowing the end-userto enable/disable group of AIDs belongingto the category “other” is visible

8 UserDUT

Open the additional “Setting” menu At least, the following groups aredisplayed:

- “myOtherGroup-App01”- the group created by application

[Fillrouteapp02]

“myOtherGroup-App01” group is seenas disabled and cannot be enabled

9 UserDUT

Disable the group created byapplication [Fillrouteapp02]

The group created by application[Fillrouteapp02] is disabled

Page 455: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 455 of 606

Step Direction Sequence Expected Result

10 UserDUT

Enable “myOtherGroup-App01” “myOtherGroup-App01” group is seen asenabled

11 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

12 UserPCD

Power on the field

13 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

SW: 90 00 is returned

14 PCDDUTDUT UICC

Send “SELECT APDU” command withTestAIDFill01

SW: 90 00 is not returned

Test Sequence No 5: Default route HCE, off-host service added via

p&yTa P a

nu, chck _134 nu ( thout usng )me e R EQ me wi i GS MAAP I

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE (see section 2.6.1) Application [app01]

An “Off-Host” service has been defined in the Manifest with- “myOffHostService-App01” as description- A group with "payment" as category and containing one AID named [AID01].

Group description is “myOtherGroup-App01” Application [app02]

An “Off-Host” service has been defined in the Manifest with- “myOffHostService-App02” as description- A banner where it is displayed “myOffHostService-App02”- A group with "payment" as category containing [AID01] and [AID02]

Group description is “myOtherGroup-App02” Application [app01] is installed before application [app02] In the “Tap&Pay” menu, “myOffHostService-App01” is selected After installing application [app01] and application [app02], the NFC Controller

routing table is not full

Application [Fillrouteapp02] defined an “OffHost” other service [fillrouteserv02] in itsManifest.

o With group “other” as category and containing TestAIDFill01 as definedbelow

<aid-group android:description="@string/aidfillroute"

15.7.3.9.5

Page 456: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 456 of 606

android:category="other">

<aid-filter android:name= [TestAIDFill01]/>

</aid-group>

o service [fillrouteserv01] declaration must contain an intent filter

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/></intent-filter>

It dynamically fills the routing table with different TestAIDFillxx as defined below with“other” category for service [fillrouteserv02] until the registerAidsForService methodreturns false. To fill the routing table the registerAidsForService method is calledrepeatedly first with one TestAIDFillxx than with two TestAIDFillxx-s than with threeTestAIDFillxx-sand so on -always increasing the number of AID-s to be registered byone- until the method returns false.

AIDbyte 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

value

0x01 for TestAIDFill010x02 for TestAIDFill02…0x64 forTestAIDFill100

…..

0xFF forTestAIDFill255

0x02

0x03

0x04

0x05

0x06

0x07

0x08

0x09

0x10

0x11

0x12

0x13

0x14

0x15

0x03

After application [app01] and application [app02] are launched, application[Fillrouteapp02] is launched to fill the NFC Controller routing table.

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu open the“Tap&Pay” entry

At least, 2 entries with“myOffHostService-App01” and“myOffHostService-App02” as banner aredisplayed. “myOffHostService-App01” banner isselected

Page 457: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 457 of 606

Step Direction Sequence Expected Result

2 UserDUT

Select Entry with “myOffHostService-App02” banner

User is informed that the NFC Serviceproposed by the application cannot beused. Displayed message shall propose to theend-user a way to disable NFC servicespreviously installed

3 UserDUT

Open the “Setting” menu An additional menu allowing the end-userto enable/disable group of AIDs belongingto the category “other” is visible

4 UserDUT

Open the additional “Setting” menu Groups “myOffHostService-App01”“myOffHostService-App02” are notdisplayed as entry

Test Sequence No 6: Default route HCE, off-host service added viamanifest, service enabled, contactless session (without using GSMAAPI)

Initial Conditions

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE (see section 2.6.1) Application [app01]

An “Off-Host” service has been defined in the Manifest with- “myOffHostService-App01” as description- A group with "other" as category and containing one AID named [AID01].

Group description is “myOtherGroup-App01” Application [app01] is not yet installed on the DUT

Application[Fillrouteapp02] is launched to fill the NFC Controller routing table.

Step Direction Sequence Expected Result

1 UserDUT

Install application [app01] User is informed that the NFC Serviceproposed by the application cannot beused.

Displayed message shall propose to theend-user a way to disable NFC servicespreviously installed

2 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

3 UserPCD

Power on the field

15.7.3.9.6

Page 458: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 458 of 606

Step Direction Sequence Expected Result

4 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

SW: 90 00 is not returned

5 UserPCD

Power off the field

6 UserDUT

Remove the DUT from the area wherethe field is powered on

7 UserDUT

Open the “Setting” menu An additional menu allowing the end-userto enable/disable group of AIDs belongingto the category “other” is visible

8 UserDUT

Open the additional “Setting” menu At least, the following groups aredisplayed:

- “myOtherGroup-App01”- the group created by application

[Fillrouteapp02]

“myOtherGroup-App01” group is seenas disabled and cannot be enabled

9 UserDUT

Disable the group created byapplication [Fillrouteapp02]

The group created by application[Fillrouteapp02] is disabled

10 UserDUT

Enable “myOtherGroup-App01” “myOtherGroup-App01” group is seen asenabled

11 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

12 UserPCD

Power on the field

13 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

SW: 90 00 is returned

14 PCDDUTDUT UICC

Send “SELECT APDU” command withTestAIDFill01

SW: 90 00 is not returned

15.7.3.10 Tap&Pay menu – routing of APDUs for payment servicesTest Purpose

Test the DUT for correct configuration of routing table in response to changes made in theTap and Pay menu settings:

Default Processor Default Payment Application

Page 459: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 459 of 606

And test the DUT for persistence of Tap&Pay menu setting after reboot.

Referenced requirement

TS26_NFC_REQ_147 TS26_NFC_REQ_148 TS26_NFC_REQ_148.1

Initial Conditions

ReferenceApplication.cap is installed with AID_REF on the UICC APDU Application to send APDUs according to the reference transaction NFC enabled on the DUT

Test Sequence No 1: Tap&Pay routing to UICC

nt l ondtonsIiiaC ii

App01: an android application which registers an off_host_apdu_service forAID_REF and specifies the category as “payment”.

App02: an android application which registers host_apdu_service (HCE) forAID_REF and specifies the category as “payment”. This application will respond tothe APDU application similar to the ReferenceApplication.cap

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

NOTE: It is not possible to configure scenarios 1 and 2 in TS26_NFC_REQ_147.This is because at least 1 payment service must be selected as default inthe Tap&Pay settings menu. As a result, these test scenarios have beenomitted from the table below.

Step Direction Sequence Expected Result

1 UserDUT

Install App01 The application is installed successfully

2 UserDUT

Install App02 The application is installed successfully

3 UserDUT

In the NFC Controller set the defaultAID route to UICC (see section2.6.1.2).

4 UserDUT

In NFC Tap&Pay settings set App01as the default payment service

The active payment service has been setto App01, (Off Host)

5 PCDDUTDUT UICC

With the screen off perform thereference transaction using the APDUapplication

App01 (Off Host) responds

15.7.3.10.1

Page 460: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 460 of 606

Step Direction Sequence Expected Result

6 PCDDUTDUT UICC

With the screen on and the devicelocked perform the referencetransaction using the APDUapplication

App01 (Off Host) responds

7 PCDDUTDUT UICC

With the screen on and the deviceunlocked perform the referencetransaction using the APDUapplication.

App01 (Off Host) responds

8 PCDDUTDUT UICC

With the device in flight mode performthe reference transaction using theAPDU application (with NFC switchedON)

App01 (Off Host) responds

9 PCDDUTDUT UICC

With the device powered off performthe reference transaction using theAPDU application

App01 (Off Host) responds

10 UserDUT

Power on the DUT and deactivateflight mode

11 UserDUT

In NFC Tap&Pay settings set App02as the default payment service

The active payment service has been setto App02, (Host)

12 PCDDUTDUT UICC

With the screen off perform thereference transaction using the APDUapplication

App02 (Host) selection fails with errorcode ‘6A82’ORApp02 (Host) responds

13 PCDDUTDUT UICC

With the screen on and the devicelocked perform the referencetransaction using the APDUapplication

APDUs are routed to the host

14 PCDDUTDUT UICC

With the screen on and the deviceunlocked perform the referencetransaction using the APDUapplication.

APDUs are routed to the host

15 PCDDUTDUT UICC

With the screen on and the device inflight mode perform the referencetransaction using the APDUapplication. (with NFC switched ON)

APDUs are routed to the host

16 PCDDUTDUT UICC

With the device powered off performthe reference transaction using theAPDU application

App02 (Host) selection fails with errorcode ‘6A82’

Test Sequence No 2: Tap&Pay routing to HCE

nt l ondtonsIiiaC ii

15.7.3.10.2

Page 461: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 461 of 606

App01: an android application which registers an off_host_apdu_service forAID_REF and specifies the category as “payment”.

App02: an android application which registers host_apdu_service (HCE) forAID_REF and specifies the category as “payment”. This application will respond tothe APDU application similar to the ReferenceApplication.cap

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

NOTE: It is not possible to configure scenarios 1 and 2 in TS26_NFC_REQ_147.This is because at least 1 payment service must be selected as default in theTap&Pay settings menu. As a result, these test scenarios have been omittedfrom the table below.

Step Direction Sequence Expected Result

1 UserDUT

Install App01 The application is installed successfully

2 UserDUT

Install App02 The application is installed successfully

3 UserDUT

In the NFC Controller set the defaultAID route to HCE (see section2.6.1.1).

4 UserDUT

In NFC Tap&Pay settings set App01as the default payment service

The active payment service has been setto App01, (Off Host)

5 PCDDUTDUT UICC

With the screen off perform thereference transaction using the APDUapplication

App01 (Off Host) responds

6 PCDDUTDUT UICC

With the screen on and the devicelocked perform the referencetransaction using the APDUapplication

App01 (Off Host) responds

7 PCDDUTDUT UICC

With the screen on and the deviceunlocked perform the referencetransaction using the APDUapplication.

App01 (Off Host) responds

8 PCDDUTDUT UICC

With the device in flight mode performthe reference transaction using theAPDU application (with NFCswitched ON)

App01 (Off Host) responds

9 PCDDUTDUT UICC

With the device powered off performthe reference transaction using theAPDU application

App01 (Off Host) responds

Page 462: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 462 of 606

Step Direction Sequence Expected Result

10 UserDUT

Power on the DUT and deactivate theflight mode

11 UserDUT

In NFC Tap&Pay settings set App02as the default payment service

The active payment service has been setto App02, (Host)

12 PCDDUTDUT UICC

With the screen off perform thereference transaction using the APDUapplication

App02 (Host) selection fails with errorcode ‘6A82’ORApp02 (Host) responds

13 PCDDUTDUT UICC

With the screen on and the devicelocked perform the referencetransaction using the APDUapplication

APDUs are routed to the host

14 PCDDUTDUT UICC

With the screen on and the deviceunlocked perform the referencetransaction using the APDUapplication.

APDUs are routed to the host

15 PCDDUTDUT UICC

With the screen on and the device inflight mode perform the referencetransaction using the APDUapplication. (with NFC switched ON)

APDUs are routed to the host

16 PCDDUTDUT UICC

With the device powered off performthe reference transaction using theAPDU application.

App02 (Host) selection fails with errorcode ‘6A82’

Test Sequence No 3: Tap&Pay after reboot (without using GSMA API)

nt l ondtonsIiiaC ii

Application [app01] defined an “Off-Host” other service

[myOffHostService01-App01] in its Manifest.

With group "other" as category and containing [AID01]

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name="AID01"/>

</aid-group>

[app01] service declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

15.7.3.10.3

Page 463: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 463 of 606

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostService01-App01>

</offhost-apdu-service>

Application [app01] is installed for registering its NFC services Applet with [AID01] as AID is installed on the UICC NFC is enabled on the DUT

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

At least, 1 entry with“myOffHostService01-App01” as banneris displayed

2 UserDUT

Select entry with“myOffHostService01-App01” banner

3 UserDUT

Power off the Device and then poweron the Device

4 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

“myOffHostService01-App01” banner isselected

5 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

6 UserPCD

Power on the field

7 PCDDUTDUTUICC

Send “SELECT APDU” command withAID01 as parameter

SW: 90 00 is returned

15.7.3.11 Dynamic & Automatic switch of AID default RouteTest Purpose

The aims of these tests are to ensure the coexistence between HCE and UICC-based NFCservices in the case were many AIDs are used & registered.

Referenced requirements:

TS26_NFC_REQ_134 TS26_NFC_REQ_134.1 TS26_NFC_REQ_135

Page 464: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 464 of 606

TS26_NFC_REQ_143

Test Sequence No 1: One card emulation environment overflow –

uto tc ng ntA mai Maaeme

This test ensure that the automatic route switching (without user interaction) feature worksin a one ecosystem overflow scenario

Initial Conditions:

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to UICC. (See section 2.6.1.2) The UICC contains 3 cardlets with known AIDs [AID01, AID02, AID03]. AID01, AID02, AID03 are available on the UICC AID01 is not registered by any application DUT is powered ON and DUT is unlocked and the screen is ON

Dynamic_Other_HCE: An application able to register a configurable list of non-payment AID with a length of 16 bytes on HCE using the dynamic registration API ofAndroid. [registerAidsForService()]

The AIDs list used by the application SHALL be different then AIDs used by the 3others applications

Static_Other_255AIDs_OffHost: An application able to register a list of 255 non-payment AID with a length of 16 bytes on the OffHost (UICC) using the Manifest ofthe application

The AIDs list used by the application SHALL be different than AIDs used by the 3others applications

Static_Other_2AIDs_HCE: An application able to register 2 AIDs with a length of 16bytes on the Host (HCE) referred below as AID04 an AID05 from the Manifest

Those 2 AIDs are not present in the list of AID used by any other application

Static_Other_2AIDs_OffHost: An application able to register 2 AIDs with a length of16 bytes on the OffHOST (UICC) from the Manifest of the application.

The 2 AIDs chosen SHALL exist on the UICC, referred below as AID02 and AID03 Those 2 AIDs are not present in the list of AID used by any other application

Step Direction Sequence Expected Result

1 UserDUT

Unregister 254 TestAIDUICC thatwere registered using 2.6.1.2procedure (keep one TestAIDUICC)

2 UserDUT

Install ApplicationStatic_Other_2AIDs_OffHost

Installation successfulRegistration of the 2 OffHost AIDs issuccessful

15.7.3.11.1

Page 465: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 465 of 606

Step Direction Sequence Expected Result

3 UserDUT

Install ApplicationDynamic_Other_HCE

Installation successful

4 UserDUT

Use Dynamic_Other_HCE andregister 255 HCE AIDs

No error while registering the AIDs

5 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

6 UserPCD

Power on the field

7 PCDDUT

Send “SELECT APDU” command withAID01 as parameter

SW: 6A 82 is returned[default route was previously switched toHCE and AID01 not reachable becausenot in routing table]

8 PCDDUT

Send “SELECT APDU” command withAID02 as parameter

SW: 90 00 is returned[AID02 is present in the routing tablerouted to UICC]

9 PCDDUT

Send “SELECT APDU” command withAID03 as parameter

SW: 90 00 is returned[AID03 is present in the routing tablerouted to UICC]

10 UserDUT

Uninstall Dynamic_Other_HCEapplication

Uninstall is successful

11 UserDUT

Uninstall Static_Other_2AIDs_OffHostapplication

Uninstall is successful

12 UserDUT

Install Static_Other_2AIDs_HCEapplication

Install is successfulRegistration of the 2 Host AIDs issuccessful

13 UserDUT

Install Static_Other_255AIDs_OffHostapplication

Install is successfulNo error while registering the 255 AIDs

14 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

15 UserPCD

Power on the field

16 PCDDUT

Send “SELECT APDU” command withAID01 as parameter

SW: 90 00 is returned[default route was previously switched toUICC]

17 PCDDUT

Send “SELECT APDU” command withAID04 as parameter

SW: 90 00 is returned[AID04 is present in the routing tablerouted to HCE]

Page 466: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 466 of 606

Step Direction Sequence Expected Result

18 PCDDUT

Send “SELECT APDU” command withAID05 as parameter

SW: 90 00 is returned[AID05 is present in the routing tablerouted to HCE]

19 UserDUT

UninstallStatic_Other_255AIDs_OffHostapplication

Uninstall is successful

20 UserDUT

Uninstall Static_Other_2AIDs_HCEapplication

Uninstall is successful

Test Sequence No 2: Both card emulation environment overflow -

Wthout py nt ppsi ame a

The purpose of this test case is to ensure compliance with TS26_NFC_REQ_135.

Initial Conditions:

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to UICC. (See section 2.6.1.2) Know how many 16 bytes AIDs the Routing Table of the DUT may contain (RTS) See 2.6 section: “Procedure to identify the AID routing table max size”) The UICC contains 3 cardlets with known AIDs [AID01, AID02, AID03]. AID01, AID02, AID03 are only available on the UICC AID01 is not registered by any application DUT is powered on and DUT is unlocked and the screen is ON Dynamic_Other_HCE: An application able to register a configurable list of non-

payment AID with a length of 16 bytes on the HCE using the dynamic registrationAPI of Android [registerAidsForService()]

The AIDs list used by the application SHALL be different then AIDs used by anyother applications. The AIDs of the application have a length of 16 bytes

Dynamic_Other_OffHost: An application able to register a list of non-payment AIDwith a length of 16 bytes on the OffHost (UICC) using the GSMA API.

The AIDs list used by the application SHALL be different than AIDs used by anyotherapplications. The AIDs of the application have a length of 16 bytes

Static_Other_2AIDs_HCE: An application able to register 2 AIDs with a length of 16bytes on HCE referred below as AID04 an AID05 from the Manifest of the application

Those 2 AIDs must not be present in the list of AID used by any other application

Static_Other_2AIDs_OffHost: An application able to register 2 AIDs with a length of16 bytes on the OffHOST (UICC) using the Manifest of the Application.

The 2 AIDs chosen are expected to exist on the UICC, referred below as AID02 anAID03 from the Manifest of the application

15.7.3.11.2

Page 467: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 467 of 606

Those 2 AIDs must not be present in the list of AID used by any other application

Step Direction Sequence Expected Result

1 UserDUT

Unregister 254 TestAIDUICC thatwere registered using 2.6.1.2procedure (keep one TestAIDUICC)

2 UserDUT

Install “Dynamic_Other_OffHost”application

Installation successful

3 UserDUT

Start “Dynamic_Other_OffHost”application and register RTS-2 AIDs

No error while registering the RTS-2 AIDs

4 UserDUT

Install “Static_Other_2AIDs_OffHost”application

Installation successfulNo error while registering the 2 AIDs

5 UserDUT

Install “Dynamic_Other_HCE”application

6 UserDUT

User “Dynamic_Other_HCE” to write(RTS-1) AIDs

No error occurs

7 UserDUT

Install "Static_2AIDs_HCE" application Installation is successful

A message is displayed to the user (perREQ_135)

Menu entry is available in “Settings” (perREQ_134)The group of AID registered by the"Static_2AIDs_HCE" application isdisabled

8 UserDUT

Exit the menu (Home button) It’s possible to exit menu

9 UserPCD

While the field is off, place the DUT inthe area where the field will bepowered on

10 UserPCD

Power on the field

11 PCDDUT

Send “SELECT APDU” command withAID01 as parameter

SW: 90 00 is returned

12 PCDDUT

Send “SELECT APDU” command withAID02 as parameter

SW: 90 00 is returned

13 PCDDUT

Send “SELECT APDU” command withAID03 as parameter

SW: 90 00 is returned

14 PCDDUT

Send “SELECT APDU” command withAID04 as parameter

SW: 6A 82 is returned[not present in routing table]

15 PCDDUT

Send “SELECT APDU” command withAID05 as parameter

SW: 6A 82 is returned[not present in routing table]

Page 468: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 468 of 606

Step Direction Sequence Expected Result

16 UserPCD

Power off the field

17 UserDUT

Uninstall “Dynamic_Other_OffHost”applicationUninstall“Static_Other_2AIDs_OffHost”application

Uninstall successful

18 UserDUT

Open the menu as defined byTS26_REQ_134Enable the group defined by“Static_2AIDs_HCE”

19 UserPCD

While the field is off, place the DUT inthe area where the field will bepowered on

20 UserPCD

Power on the field

21 PCDDUT

Verify that default route is switched toHCE:Send “SELECT APDU” command withAID01 as parameter

SW: 6A 82 is returned

22 PCDDUT

Verify that HostAID are now reachableSend “SELECT APDU” command withAID04 as parameter

SW: 90 00 is returned

23 PCDDUT

Send “SELECT APDU” command withAID05 as parameter

SW: 90 00 is returned

24 UserPCD

Power off the field

25 UserDUT

Uninstall all the apps Uninstall is successful

Test Sequence No 3: Both card emulation environment overflow -

Wthout py nt pps ( thouti ame a wi

usngi

)GS MAAP I

The purpose of this test case is to ensure compliance with TS26_NFC_REQ_135.

Initial Conditions:

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to UICC. (See section 2.6.1.2) Know how many 16 bytes AIDs the Routing Table of the DUT may contain (RTS) See 2.6 section: “Procedure to identify the AID routing table max size”) The UICC contains 3 cardlets with known AIDs [AID01, AID02, AID03].

15.7.3.11.3

Page 469: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 469 of 606

AID01, AID02, AID03 are only available on the UICC AID01 is not registered by any application DUT is powered on and DUT is unlocked and the screen is ON Dynamic_Other_HCE: An application able to register a configurable list of non-

payment AID with a length of 16 bytes on the HCE using the dynamic registrationAPI of Android [registerAidsForService()]

The AIDs list used by the application SHALL be different then AIDs used by anyother applications. The AIDs of the application have a length of 16 bytes

Fill_Other_OffHost: defined an “OffHost” other service [fillrouteserv01] in its Manifest.

o With group “other” as category and containing TestAID01 as defined below

<aid-group android:description="@string/aidfillroute"

android:category="other">

<aid-filter android:name= [TestAID01]/>

</aid-group>

o service [fillrouteserv01] declaration must contain an intent filter

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/></intent-filter>

Every [TestAID xx] are of size 16 bytes and for the same target. [TestAID xx] SHALLbe any random AIDs of 16 bytes and is not equal to any AIDs used by any otherapplications.

Application [Fill_Other_OffHost] implements the registerAidsForService method

Static_Other_2AIDs_HCE: An application able to register 2 AIDs with a length of 16bytes on HCE referred below as AID04 an AID05 from the Manifest of the application

Those 2 AIDs must not be present in the list of AID used by any other application

Static_Other_2AIDs_OffHost: An application able to register 2 AIDs with a length of16 bytes on the OffHOST (UICC) using the Manifest of the Application.

The 2 AIDs chosen are expected to exist on the UICC, referred below as AID02 anAID03 from the Manifest of the application

Those 2 AIDs must not be present in the list of AID used by any other application

Step Direction Sequence Expected Result

1 UserDUT

Unregister 254 TestAIDUICC thatwere registered using 2.6.1.2procedure (keep one TestAIDUICC)

Page 470: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 470 of 606

Step Direction Sequence Expected Result

2 UserDUT

Install “Fill_Other_OffHost” application Installation successful

3 UserDUT

Call the “registerAidsForService”method of “Fill_Other_OffHost”application with RTS-2 different AIDs[TestAID xx] with “other” category toregister them for [fillrouteserv01]service

registerAidsForService method returns aboolean for success

4 UserDUT

Install “Static_Other_2AIDs_OffHost”application

Installation successfulNo error while registering the 2 AIDs

5 UserDUT

Install “Dynamic_Other_HCE”application

6 UserDUT

User “Dynamic_Other_HCE” to write(RTS-1) AIDs

No error occurs

7 UserDUT

Install "Static_2AIDs_HCE" application Installation is successful

A message is displayed to the user (perREQ_135)

Menu entry is available in “Settings” (perREQ_134)The group of AID registered by the"Static_2AIDs_HCE" application isdisabled

8 UserDUT

Exit the menu (Home button) It’s possible to exit menu

9 UserPCD

While the field is off, place the DUT inthe area where the field will bepowered on

10 UserPCD

Power on the field

11 PCDDUT

Send “SELECT APDU” command withAID01 as parameter

SW: 90 00 is returned

12 PCDDUT

Send “SELECT APDU” command withAID02 as parameter

SW: 90 00 is returned

13 PCDDUT

Send “SELECT APDU” command withAID03 as parameter

SW: 90 00 is returned

14 PCDDUT

Send “SELECT APDU” command withAID04 as parameter

SW: 6A 82 is returned[not present in routing table]

15 PCDDUT

Send “SELECT APDU” command withAID05 as parameter

SW: 6A 82 is returned[not present in routing table]

16 UserPCD

Power off the field

Page 471: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 471 of 606

Step Direction Sequence Expected Result

17 UserDUT

Uninstall “Fill_Other_OffHost”applicationUninstall“Static_Other_2AIDs_OffHost”application

Uninstall successful

18 UserDUT

Open the menu as defined byTS26_REQ_134Enable the group defined by“Static_2AIDs_HCE”

19 UserPCD

While the field is off, place the DUT inthe area where the field will bepowered on

20 UserPCD

Power on the field

21 PCDDUT

Verify that default route is switched toHCE:Send “SELECT APDU” command withAID01 as parameter

SW: 6A 82 is returned

22 PCDDUT

Verify that HostAID are now reachableSend “SELECT APDU” command withAID04 as parameter

SW: 90 00 is returned

23 PCDDUT

Send “SELECT APDU” command withAID05 as parameter

SW: 90 00 is returned

24 UserPCD

Power off the field

25 UserDUT

Uninstall all the apps Uninstall is successful

15.7.3.12 Routing in Multiple CEE model without using GSMA API

Test PurposeTo ensure routing between different CEE environments is performed correctly in a multipleCEE model.

Referenced requirement

TS26_NFC_REQ_065.1 TS26_NFC_REQ_095 TS26_NFC_REQ_147

Initial Conditions

The DUT is powered on HCI initialization has been performed successfully.

Page 472: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 472 of 606

NFC is enabled on the DUT

Test Sequence No 1: Off-host payment service via manifest, host

“oth” svcer erie

Initial Conditions

No AID is registered in the CLF routing table. Applet with [AID01] as AID is installed on the UICC.

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

The default AID route is set to HCE. (See section 2.6.1) Application [app01] defined an “Off-Host” payment service [serv01] in its Manifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name=" AID01"/>

</aid-group>

your service [serv01] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/ myOffHostService01>

</offhost-apdu-service>

Application [app02] defined a “Host” non-payment service [serv02] in its Manifest.

with group "other" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=" AID02"/>

</aid-group>

your service [serv02] declaration must contain an intent filter

<intent-filter>

15.7.3.12.1

Page 473: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 473 of 606

<action android:name =

"android.nfc.cardemulation.action.HOST_APDU_SERVICE"/>

</intent-filter>

Application [app02] should respond to SELECT Command for AID 2 with responseAPDU ’9000’ with extra data ’48 43 45’

Step Direction Sequence Expected Result1 App

DUTInstall the application [app01] forregistering the “Off-Host” forpayment services

Install the [app02] for registering the“Host” for other (non-payment)services

2 AppDUT

Open the “Tap&Pay” menu Service [serv01] is one entry as banner“myOffHostService01” in the “Tap&Pay”menu

3 UserDUT

Select “myOffHostService01” banner

4 UserDUT

While the field is off, place the DUTin the area where the field will bepowered on

5 UserPCD

Power on the field

6 PCDDUTDUT UICC

Send “SELECT APDU” commandwith AID01 as parameter

SW: 90 00 is returned with extra data “4f46 46 48 4f 53 54”As UICC applet will answer to the AID 1Select.

7 PCDDUT

Send “SELECT APDU” commandwith AID 2 as parameter

HCE application will answer to the AID 2Select.SW: 90 00 is returned with extra data ’4843 45’

8 PCDDUTDUT UICC

Send “SELECT APDU” commandwith AID01 as parameter

SW: 90 00 is returned with extra data “4f46 46 48 4f 53 54”As UICC applet will answer to the AID 1Select.

Test Sequence No 2: Off-host payment service via manifest

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1)

15.7.3.12.2

Page 474: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 474 of 606

Application [app01] defined an “Off-Host” payment service [myOffHostService-App01] in its Manifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name="AID01"/>

</aid-group>

your service [serv01] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostService-App01>

</offhost-apdu-service>

Application [app01] is installed for registering its NFC services Applets with [AID01] & [AID02] as AID are installed on the UICC

- When they are selected from a POS, SW:90 00 is returned + extra data “4f 46 4648 4f 53 54”

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu open the“Tap&Pay” entry

At least, 1 entry with “myOffHostService-App01” as banner is displayed

2 UserDUT

Select entry with“myOffHostService01-App01” banner

3 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

4 UserPCD

Power on the field

5 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

SW: 90 00 is returned with extra data “4f46 46 48 4f 53 54”

Page 475: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 475 of 606

Step Direction Sequence Expected Result

6 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

Contactless selection fails with SW: 6A82

Test Sequence No 3: Default route HCE, host payment service

(slctdn p&y), offeeei Ta P a

-host py nt svc v nfstame erieiamaie

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1) Application [app01]

This application defines “HCE” service as follows- “myHCEService-App01” as description- A banner where it is displayed “myHCEService-App1”- A group with "payment" as category and containing one AID named [AID01]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02] defined an “Off-Host” payment service [myOffHostService-App02] in its Manifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name="AID02"/>

</aid-group>

your service [serv01] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostService-App02>

</offhost-apdu-service>

Application [app02] is installed for registering its NFC services

15.7.3.12.3

Page 476: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 476 of 606

An applet with [AID02] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

At least, 2 entries with “myHCEService-App01” and “myOffHostService-App02”as banner are displayed

2 UserDUT

Select entry with “myHCEService-App01” banner

3 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

4 UserPCD

Power on the field

5 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

SW: 90 00 is returned with extra data “4843 45”

6 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

Contactless selection fails with SW: 6A82

Test Sequence No 4: Default route HCE, host payment service, off-

host py nt svcame erie

v nfst (slctdn p&y), “oth”iamaie eeei Ta P a er

svc v nfsterieiamaie

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1) Application [app01]

This application defines “HCE” service as follows- “myHCEService-App01” as description- A banner where it is displayed “myHCEService-App1”- A group with "payment" as category and containing one AID named [AID01]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02] defined an “Off-Host” service [myOffHostService-App02] in itsManifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name="AID02"/>

15.7.3.12.4

Page 477: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 477 of 606

</aid-group>

and with group "other" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name="AID03"/>

</aid-group>

your service [serv01] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostService-App02>

</offhost-apdu-service>

Application [app02] is installed for registering its NFC services An applet with [AID01] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID02] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID03] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

At least, 2 entries with “myHCEService-App01” and “myOffHostService-App02”as banner are displayed

2 UserDUT

Select entry with “myHCEService-App01” banner

3 UserDUT

Power off Device

Page 478: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 478 of 606

Step Direction Sequence Expected Result

4 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

5 UserPCD

Power on the field

6 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

Contactless selection fails with SW: 6A82

7 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

Contactless selection fails with SW: 6A82

8 PCDDUTDUT UICC

Send “SELECT APDU” command withAID03 as parameter

SW: 90 00 is returned with extra data “4f46 46 48 4f 53 54”

Test Sequence No 5: device off, “other” routing

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1) Application [app01]

This application defines “HCE” service as follows- “myHCEService-App01” as description- A banner where it is displayed “myHCEService-App1”- A group with "other" as category and containing one AID named [AID01]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02] defined an “Off-Host” other service [myOffHostService-App02] inits Manifest.

With group "other" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name="AID02"/>

</aid-group>

your service [serv01] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

15.7.3.12.5

Page 479: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 479 of 606

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostService-App02>

</offhost-apdu-service>

Application [app02] is installed for registering its NFC services An applet with [AID01] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID02] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f

53 54”

Step Direction Sequence Expected Result

1 UserDUT

Power off Device

2 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

3 UserPCD

Power on the field

4 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

Contactless selection fails with SW: 6A82

5 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

SW: 90 00 is returned with extra data “4f46 46 48 4f 53 54”

Test Sequence No 6: HCE entry selected in Tap&Pay, device off,

py ntoutngame r i

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1) Application [app01]

This application defines “HCE” service as follows- “myHCEService-App01” as description- A banner where it is displayed “myHCEService-App1”

15.7.3.12.6

Page 480: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 480 of 606

- A group with "payment" as category and containing one AID named [AID01]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02] defined an “Off-Host” payment service [myOffHostService-App02] in its Manifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name="AID02"/>

</aid-group>

your service [serv01] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostService-App02>

</offhost-apdu-service>

[app01] is installed before [app02] An applet with [AID01] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID02] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f

53 54”

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

At least, 2 entries with “myHCEService-App01” and “myOffHostService-App02”as banner are displayed

2 UserDUT

Select entry with “myHCEService-App01” banner

3 UserDUT

Power off Device

Page 481: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 481 of 606

Step Direction Sequence Expected Result

4 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

5 UserPCD

Power on the field

6 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

Contactless selection fails with SW: 6A82

7 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

Contactless selection fails with SW: 6A82

Test Sequence No 7: off-host entry selected in Tap&Pay, device off,

py ntoutngame r i

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1) Application [app01]

This application defines “HCE” service as follows- “myHCEService-App01” as description- A banner where it is displayed “myHCEService-App1”- A group with "payment" as category and containing one AID named [AID01]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02] defined an “Off-Host” payment service [myOffHostService-App02] in its Manifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name="AID02"/>

</aid-group>

your service [serv01] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

15.7.3.12.7

Page 482: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 482 of 606

A banner where it is displayed “myOffHostService01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostService-App02>

</offhost-apdu-service>

Application [app02] is installed for registering its NFC services An applet with [AID01] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID02] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f

53 54”

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

At least, 2 entries with “myHCEService-App01” and “myOffHostService-App02”as banner are displayed

2 UserDUT

Select entry with “myOffHostService-App02” banner

3 UserDUT

Power off Device

4 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

5 UserPCD

Power on the field

6 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

Contactless selection fails with SW: 6A82

7 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

SW: 90 00 is returned with extra data “4f46 46 48 4f 53 54”

Test Sequence No 8: screen off, “other” routing.

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1)

15.7.3.12.8

Page 483: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 483 of 606

Application [app01]This application defines “HCE” service as follows

- “myHCEService-App01” as description- A banner where it is displayed “myHCEService-App1”- A group with "other" as category and containing one AID named [AID01]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02] defined an “Off-Host” other service [myOffHostService-App02] inits Manifest.

With group "other" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name="AID02"/>

</aid-group>

your service [serv01] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostService-App02>

</offhost-apdu-service> Application [app02] is installed for registering its NFC services An applet with [AID01] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID02] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f

53 54” No default Tap&Pay service is selected

Step Direction Sequence Expected Result

1 UserDUT

Ensure that the Device screen is off

2 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

Page 484: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 484 of 606

Step Direction Sequence Expected Result

3 UserPCD

Power on the field

4 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

Contactless selection fails with SW: 6A82ORApp01 (Host) responds: SW:90 00 isreturned + extra data “48 43 45”

5 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

SW: 90 00 is returned with extra data “4f46 46 48 4f 53 54”

Test Sequence No 9: HCE entry selected in Tap&Pay, screen off,

py ntame

outngr i

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1) Application [app01]

This application defines “HCE” service as follows- “myHCEService-App01” as description- A banner where it is displayed “myHCEService-App1”- A group with "payment" as category and containing one AID named [AID01]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02] defined an “Off-Host” payment service [myOffHostService-App02] in its Manifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name="AID02"/>

</aid-group>

your service [serv01] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService01”

15.7.3.12.9

Page 485: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 485 of 606

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostService-App02>

</offhost-apdu-service>

[app01] is installed before [app02] An applet with [AID01] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID02] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

At least, 2 entries with “myHCEService-App01” and “myOffHostService-App02”as banner are displayed

2 UserDUT

Select entry with “myHCEService-App01” banner

3 UserDUT

Ensure that the Device screen is off

4 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

5 UserPCD

Power on the field

6 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

Contactless selection fails with SW: 6A82ORApp01 (Host) responds: SW:90 00 isreturned + extra data “48 43 45”

7 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

Contactless selection fails with SW: 6A82

Test Sequence No 10: off-host entry selected in Tap&Pay, screen off,

py ntoutngame r i

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1)

15.7.3.12.10

Page 486: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 486 of 606

Application [app01]This application defines “HCE” service as follows

- “myHCEService-App01” as description- A banner where it is displayed “myHCEService-App1”- A group with "payment" as category and containing one AID named [AID01]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02] defined an “Off-Host” payment service [myOffHostService-App02] in its Manifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name="AID02"/>

</aid-group>

your service [serv01] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostService-App02>

</offhost-apdu-service>

Application [app02] is installed for registering its NFC services An applet with [AID01] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID02] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 484f 53 54”

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

At least, 2 entries with “myHCEService-App01” and “myOffHostService-App02”as banner are displayed

Page 487: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 487 of 606

Step Direction Sequence Expected Result

2 UserDUT

Select entry with “myOffHostService-App02” banner

3 UserDUT

Ensure that the Device screen is off

4 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

5 UserPCD

Power on the field

6 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

Contactless selection fails with SW: 6A82

7 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

SW: 90 00 is returned with extra data “4f46 46 48 4f 53 54”

15.7.3.13 Routing in Multiple CEE model with eSE

Test PurposeTo ensure routing between different CEE environments is performed correctly in a multipleCEE model with eSE.

Referenced requirement

TS26_NFC_REQ_094 TS26_NFC_REQ_094.1 TS26_NFC_REQ_095 TS26_NFC_REQ_147 TS26_NFC_REQ_173 TS26_NFC_REQ_173.1

Initial Conditions

The DUT is powered on HCI initialization has been performed successfully. NFC is enabled on the DUT

Test Sequence No 1: Off-host (eSE) “other” service, host payment

svcerie

Initial Conditions

No AID is registered in the CLF routing table. The default AID route is set to HCE. (See section 2.6.1)

15.7.3.13.1

Page 488: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 488 of 606

Application [app01] defines an “Off-Host” other service [serv01] for eSE in itsManifest.

With group "other" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name="AID08"/>

</aid-group>

your service [serv01] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service [serv01] declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

<AID-based>true</AID-based>

</extensions>

A banner where it is displayed “myOffHostServiceeSE02”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostServiceeSE02>

</offhost-apdu-service>

Application [app02] defines “HCE” service as follows- “myHCEService01” as description- A banner where it is displayed “myHCEService01”- A group with "other" as category and containing one AID named [AID02]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Page 489: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 489 of 606

Step Direction Sequence Expected Result1 App

DUTInstall the [app01] for registering the“Off-Host” for other (non-payment)servicesInstall the application [app02] forregistering the “Host” for paymentservices

2 AppDUT

Open the “Tap&Pay” menu At least“myHCEService01” as banner isdisplayed.

3 UserDUT

Select “myHCEService01” banner

4 UserDUT

While the field is off, place the DUTin the area where the field will bepowered on

5 UserPCD

Power on the field

6 PCDDUTDUT eSE

Send “SELECT APDU” commandwith AID08 as parameter

SW: 90 00 is returned with extra data “6553 45”As eSE applet will answer to the AID08Select.

7 PCDDUT

Send “SELECT APDU” commandwith AID02 as parameter

HCE application will answer to the AID02Select.SW: 90 00 is returned with extra data ’4843 45’

8 PCDDUTDUT eSE

Send “SELECT APDU” commandwith AID08 as parameter

SW: 90 00 is returned with extra data “6553 45”As eSE applet will answer to the AID08Select.

Test Sequence No 2: Off-host (eSE) “other” service

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1) Application [app01] defines an “Off-Host” other service [serv01] for eSE in its

Manifest.

With group "other" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

15.7.3.13.2

Page 490: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 490 of 606

<aid-filter android:name="AID08"/>

</aid-group>

your service [serv01] declaration must contain an intent filter in the meta-dataelement as defined below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service [serv01] declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE1"/>

</se-ext-group>

<AID-based>true</AID-based>

</extensions>

A banner where it is displayed “myOffHostServiceeSE02”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostServiceeSE02>

</offhost-apdu-service> Application [app01] is installed for registering its NFC services

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

2 UserPCD

Power on the field

Page 491: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 491 of 606

Step Direction Sequence Expected Result

3 PCDDUTDUT eSE

Send “SELECT APDU” command withAID08 as parameter

SW: 90 00 is returned with extra data “6553 45”

4 PCDDUTDUT eSE

Send “SELECT APDU” command withAID07 as parameter

Contactless selection fails with SW: 6A82

Test Sequence No 3: Off-host (UICC) payment service, off-host (eSE)

py nt svc (slctdn p&y), host “oth” svcame erie eeei Ta P a er erie

Initial Conditions

No AID is registered in the CLF routing table. Applet with [AID01] as AID is installed on the UICC.

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

The default AID route is set to HCE. (See section 2.6.1) Application [app01] defines an “Off-Host” payment service [serv01] for UICC in its

Manifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name=" AID01"/>

</aid-group>

your service [serv01] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/ myOffHostService01>

</offhost-apdu-service>

15.7.3.13.3

Page 492: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 492 of 606

Application [app02] defines a “Host” non-payment service [serv02] in its Manifest.

with group "other" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=" AID02"/>

</aid-group>

your service [serv02] declaration must contain an intent filter

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.HOST_APDU_SERVICE"/>

</intent-filter>

Application [app02] should respond to SELECT Command for AID 2 with responseAPDU ’9000’ with extra data ’48 43 45’

Application [app03] defines an “Off-Host” payment service [serv03] for eSE in itsManifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name=" AID07"/>

</aid-group>

your service [serv03] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service [serv03] declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

Page 493: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 493 of 606

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

<AID-based>true</AID-based>

</extensions>

A banner where it is displayed “myOffHostServiceeSE01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostServiceeSE01>

</offhost-apdu-service>

Application [app01], application [app02] and application [app03] are installed toregister their NFC services.

Step Direction Sequence Expected Result1 App

DUTOpen the “Tap&Pay” menu At least, 2 entries with

“myOffHostServiceeSE01” and“myOffHostService01” as banner aredisplayed.

2 UserDUT

Select “myOffHostServiceeSE01”banner

3 UserDUT

While the field is off, place the DUTin the area where the field will bepowered on

4 UserPCD

Power on the field

5 PCDDUTDUT eSE

Send “SELECT APDU” commandwith AID07 as parameter

SW: 90 00 is returned with extra data “6553 45”As eSE applet will answer to the AID07Select.

6 PCDDUT

Send “SELECT APDU” commandwith AID 2 as parameter

HCE application will answer to the AID 2Select.SW: 90 00 is returned with extra data ’4843 45’

7 PCDDUTDUT UICC

Send “SELECT APDU” commandwith AID01 as parameter

Contactless selection fails with SW: 6A82

Page 494: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 494 of 606

Test Sequence No 4: Various services

Initial Conditions

No AID is registered in the CLF routing table. Two applets with [AID01] and [AID03] as AID are installed on the UICC.

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

The default AID route is set to HCE. (See section 2.6.1) Application [app01] defines an “Off-Host” payment service [serv01] for UICC in its

Manifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name=" AID01"/>

</aid-group>

your service [serv01] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/ myOffHostService01>

</offhost-apdu-service>

Application [app02] defines “HCE” service as follows- “myHCEService01” as description- A banner where it is displayed “myHCEService01”- A group with "payment" as category and containing one AID named [AID02]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app03] defines an “Off-Host” payment service [serv03] for eSE in itsManifest.

With group "payment" as category and containing one AID as defined below

15.7.3.13.4

Page 495: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 495 of 606

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name=" AID07"/>

</aid-group>

your service [serv03] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service [serv03] declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

<AID-based>true</AID-based>

</extensions>

A banner where it is displayed “myOffHostServiceeSE01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostServiceeSE01>

</offhost-apdu-service>

Application [app04] defines an “Off-Host” other service [serv04] for UICC in itsManifest.

With group "other" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=" AID03"/>

</aid-group>

Page 496: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 496 of 606

your service [serv04] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService02”

< offhost-apdu-service

android:apduServiceBanner="@drawable/ myOffHostService02>

</offhost-apdu-service>

Application [app05] defines an “Off-Host” other service [serv05] for eSE in itsManifest.

With group "other" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=" AID08"/>

</aid-group>

your service [serv05] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service [serv05] declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

Page 497: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 497 of 606

<AID-based>true</AID-based>

</extensions>

A banner where it is displayed “myOffHostServiceeSE02”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostServiceeSE02>

</offhost-apdu-service>

Application [app06] defines an “Off-Host” other service [serv06] for eSE in itsManifest.

With group "other" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=" AID09"/>

</aid-group>

your service [serv06] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service [serv06] declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

<AID-based>true</AID-based>

</extensions>

A banner where it is displayed “myOffHostServiceeSE03”

Page 498: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 498 of 606

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostServiceeSE03>

</offhost-apdu-service>

Application [app01], application [app02], application [app03], application [app04] ,application [app05] and application [app06] are installed to register their NFCservices.

Step Direction Sequence Expected Result1 App

DUTOpen the “Tap&Pay” menu At least, 3 entries with

“myHCEService01” and“myOffHostServiceeSE01” and“myOffHostService01” as banner aredisplayed.

2 UserDUT

Select “myHCEService01” banner

3 UserDUT

While the field is off, place the DUTin the area where the field will bepowered on

4 UserPCD

Power on the field

5 PCDDUT

Send “SELECT APDU” commandwith AID02 as parameter

HCE application will answer to the AID02Select.SW: 90 00 is returned with extra data ’4843 45’

6 PCDDUTDUT UICC

Send “SELECT APDU” commandwith AID01 as parameter

Contactless selection fails with SW: 6A82

7 PCDDUTDUT eSE

Send “SELECT APDU” commandwith AID07 as parameter

Contactless selection fails with SW: 6A82

8 PCDDUTDUT UICC

Send “SELECT APDU” commandwith AID03 as parameter

SW: 90 00 is returned with extra data “4f46 46 48 4f 53 54”As UICC applet will answer to the AID03Select.

9 PCDDUTDUT eSE

Send “SELECT APDU” commandwith AID08 as parameter

SW: 90 00 is returned with extra data “6553 45”As eSE applet will answer to the AID08Select.

Page 499: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 499 of 606

Step Direction Sequence Expected Result10 PCD

DUTDUT eSE

Send “SELECT APDU” commandwith AID09 as parameter

SW: 90 00 is returned with extra data “6553 45”As eSE applet will answer to the AID09Select.

Test Sequence No 5: screen off, payment routing, off-host (eSE)

nty slctdn p&yer eeei Ta P a

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1) Application [app01]

This application defines “HCE” service as follows- “myHCEService01” as description- A banner where it is displayed “myHCEService01”- A group with "payment" as category and containing one AID named [AID02]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02] defines an “Off-Host” payment service [serv02] for UICC in its

Manifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name=" AID01"/>

</aid-group>

your service [serv02] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/ myOffHostService01>

</offhost-apdu-service>

15.7.3.13.5

Page 500: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 500 of 606

Application [app03] defines an “Off-Host” payment service [serv03] for eSE in itsManifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name=" AID07"/>

</aid-group>

your service [serv03] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service [serv03] declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

<AID-based>true</AID-based>

</extensions>

A banner where it is displayed “myOffHostServiceeSE01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostServiceeSE01>

</offhost-apdu-service> Application [app01], application [app02], application [app03] are installed to register

their NFC services. An applet with [AID01] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

Page 501: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 501 of 606

An applet with [AID02] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

Step Direction Sequence Expected Result

1 UserDUT

From the “Setting” menu, open the“Tap&Pay” entry

At least, 3 entries:“myHCEService01” and“myOffHostService01” and“myOffHostServiceeSE01”as banner are displayed

2 UserDUT

Select entry with “myOffHostService-eSE01” banner

3 UserDUT

Ensure that the Device screen is off

4 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

5 UserPCD

Power on the field

6 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

Contactless selection fails with SW: 6A82

7 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

Contactless selection fails with SW: 6A82

8 PCDDUTDUT eSE

Send “SELECT APDU” command withAID07 as parameter

SW: 90 00 is returned with extra data “6553 45”

Test Sequence No 6: Screen off, various routing

Initial Conditions

No AID is registered in the CLF routing table. Two applets with [AID01] and [AID03] as AID are installed on the UICC.

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

The default AID route is set to HCE. (See section 2.6.1)

15.7.3.13.6

Page 502: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 502 of 606

Application [app01] defines an “Off-Host” payment service [serv01] for UICC in itsManifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name=" AID01"/>

</aid-group>

your service [serv01] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/ myOffHostService01>

</offhost-apdu-service>

Application [app02] defines “HCE” service as follows- “myHCEService01” as description- A banner where it is displayed “myHCEService01”- A group with "payment" as category and containing one AID named [AID02]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app03] defines an “Off-Host” payment service [serv03] for eSE in itsManifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name=" AID07"/>

</aid-group>

your service [serv03] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

Page 503: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 503 of 606

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service [serv03] declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

<AID-based>true</AID-based>

</extensions>

A banner where it is displayed “myOffHostServiceeSE01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostServiceeSE01>

</offhost-apdu-service>

Application [app04] defines an “Off-Host” other service [serv04] for UICC in itsManifest.

With group "other" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=" AID03"/>

</aid-group>

your service [serv04] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

Page 504: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 504 of 606

A banner where it is displayed “myOffHostService02”

< offhost-apdu-service

android:apduServiceBanner="@drawable/ myOffHostService02>

</offhost-apdu-service>

Application [app05] defines an “Off-Host” other service [serv05] for eSE in itsManifest.

With group "other" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=" AID08"/>

</aid-group>

your service [serv05] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service [serv05] declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

<AID-based>true</AID-based>

</extensions>

A banner where it is displayed “myOffHostServiceeSE02”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostServiceeSE02>

</offhost-apdu-service>

Page 505: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 505 of 606

Application [app06] defines an “Off-Host” other service [serv06] for eSE in itsManifest.

With group "other" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=" AID09"/>

</aid-group>

your service [serv06] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service [serv06] declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

<AID-based>true</AID-based>

</extensions>

A banner where it is displayed “myOffHostServiceeSE03”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostServiceeSE03>

</offhost-apdu-service>

Application [app01], application [app02], application [app03], application [app04] ,application [app05] and application [app06] are installed to register their NFCservices.

Page 506: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 506 of 606

Step Direction Sequence Expected Result1 App

DUTOpen the “Tap&Pay” menu At least, 3 entries with

“myHCEService01” and“myOffHostServiceeSE01” and“myOffHostService01” as banner aredisplayed.

2 UserDUT

Select “myOffHostServiceeSE01”banner

3 UserDUT

Ensure that the Device screen is off

4 UserDUT

While the field is off, place the DUTin the area where the field will bepowered on

5 UserPCD

Power on the field

6 PCDDUT

Send “SELECT APDU” commandwith AID02 as parameter

Contactless selection fails with SW: 6A82

7 PCDDUTDUT UICC

Send “SELECT APDU” commandwith AID01 as parameter

Contactless selection fails with SW: 6A82

8 PCDDUTDUT eSE

Send “SELECT APDU” commandwith AID07 as parameter

SW: 90 00 is returned with extra data “6553 45”

9 PCDDUTDUT UICC

Send “SELECT APDU” commandwith AID03 as parameter

SW: 90 00 is returned with extra data “4f46 46 48 4f 53 54”As UICC applet will answer to the AID03Select.

10 PCDDUTDUT eSE

Send “SELECT APDU” commandwith AID08 as parameter

SW: 90 00 is returned with extra data “6553 45”As eSE applet will answer to the AID08Select.

11 PCDDUTDUT eSE

Send “SELECT APDU” commandwith AID09 as parameter

SW: 90 00 is returned with extra data “6553 45”As eSE applet will answer to the AID09Select.

Page 507: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 507 of 606

15.7.3.14 Routing in Multiple CEE model with eSE in Battery Low Mode

Test PurposeTo ensure routing between different CEE environments is performed correctly in a multipleCEE model with eSE in Battery Low Mode.

Referenced requirement

TS26_NFC_REQ_021 TS26_NFC_REQ_094 TS26_NFC_REQ_094.1 TS26_NFC_REQ_095 TS26_NFC_REQ_147 TS26_NFC_REQ_173 TS26_NFC_REQ_173.1

Initial Conditions

The DUT is powered on HCI initialization has been performed successfully. NFC is enabled on the DUT

Test Sequence No 1: Battery Low, “other” routing

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1) Application [app01]

This application defines “HCE” service as follows- “myHCEService01” as description- A banner where it is displayed “myHCEService01”- A group with "other" as category and containing one AID named [AID02]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02] defines an “Off-Host” other service [serv02] for UICC in its

Manifest.

With group "other" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=" AID03"/>

</aid-group>

your service [serv02] declaration must contain an intent filter in the meta-dataelement as define below

15.7.3.14.1

Page 508: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 508 of 606

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService02”

< offhost-apdu-service

android:apduServiceBanner="@drawable/ myOffHostService02>

</offhost-apdu-service>

Application [app03] defines an “Off-Host” other service [serv03] for eSE in itsManifest.

With group "other" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=" AID08"/>

</aid-group>

your service [serv01] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service [serv01] declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

<AID-based>true</AID-based>

</extensions>

Page 509: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 509 of 606

A banner where it is displayed “myOffHostServiceeSE02”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostServiceeSE02>

</offhost-apdu-service> Application [app01], application [app02], application [app03] are installed to register

their NFC services. An applet with [AID02] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID03] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f

53 54”The following initial conditions need to be executed after the previous initial conditionsare executed and in the following order: No default Tap&Pay service is selected Ensure that the Device is in battery power low mode

Step Direction Sequence Expected Result

1 PCDDUT

Send “SELECT APDU” command withAID02 as parameter

Contactless selection fails with SW: 6A82

2 PCDDUTDUT UICC

Send “SELECT APDU” command withAID03 as parameter

SW: 90 00 is returned with extra data “4f46 46 48 4f 53 54”

3 PCDDUTDUT eSE

Send “SELECT APDU” command withAID08 as parameter

SW: 90 00 is returned with extra data “6553 45”

Test Sequence No 2: Battery Low, payment routing, off-host (eSE)

nty slctdn p&yer eeei Ta P a

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1) Application [app01]

This application defines “HCE” service as follows

15.7.3.14.2

Page 510: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 510 of 606

- “myHCEService01” as description- A banner where it is displayed “myHCEService01”- A group with "payment" as category and containing one AID named [AID02]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02] defines an “Off-Host” payment service [serv02] for UICC in its

Manifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name=" AID01"/>

</aid-group>

your service [serv02] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/ myOffHostService01>

</offhost-apdu-service>

Application [app03] defines an “Off-Host” payment service [serv03] for eSE in itsManifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name=" AID07"/>

</aid-group>

your service [serv03] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

Page 511: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 511 of 606

</intent-filter>

your service [serv03] declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

<AID-based>true</AID-based>

</extensions>

A banner where it is displayed “myOffHostServiceeSE01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostServiceeSE01>

</offhost-apdu-service> Application [app01], application [app02], application [app03] are installed to register

their NFC services. An applet with [AID01] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID02] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

The following initial conditions need to be executed after the previous initial conditionsare executed and in the following order:

Select “myOffHostServiceeSE01” banner from the “Tap&Pay” menu Ensure that the Device is in battery power low mode

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

2 UserPCD

Power on the field

Page 512: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 512 of 606

Step Direction Sequence Expected Result

3 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

Contactless selection fails with SW: 6A82

4 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

Contactless selection fails with SW: 6A82

5 PCDDUTDUT eSE

Send “SELECT APDU” command withAID07 as parameter

SW: 90 00 is returned with extra data “6553 45”

Test Sequence No 3: Battery Low, payment routing, host entry

slctdn p&yeeei Ta P a

nt l ondtonsIiiaC ii

All NFC applications on the DUT are uninstalled except applications that arepreinstalled

The default AID route is set to HCE. (See section 2.6.1) Application [app01]

This application defines “HCE” service as follows- “myHCEService01” as description- A banner where it is displayed “myHCEService01”- A group with "payment" as category and containing one AID named [AID02]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app02] defines an “Off-Host” payment service [serv02] for UICC in its

Manifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name=" AID01"/>

</aid-group>

your service [serv02] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

15.7.3.14.3

Page 513: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 513 of 606

A banner where it is displayed “myOffHostService01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/ myOffHostService01>

</offhost-apdu-service>

Application [app03] defines an “Off-Host” payment service [serv03] for eSE in itsManifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name=" AID07"/>

</aid-group>

your service [serv03] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service [serv03] declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

<AID-based>true</AID-based>

</extensions>

A banner where it is displayed “myOffHostServiceeSE01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostServiceeSE01>

Page 514: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 514 of 606

</offhost-apdu-service> Application [app01], application [app02], application [app03] are installed to register

their NFC services. An applet with [AID01] as AID is installed on the UICC

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

An applet with [AID02] as AID is installed on the UICC- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

The following initial conditions need to be executed after the previous initial conditionsare executed and in the following order:

Select “myHCEService01” banner from the “Tap&Pay” menu Ensure that the Device is in battery power low mode

Step Direction Sequence Expected Result

1 UserDUT

While the field is off, place the DUT inthe area where the field will bepowered on

2 UserPCD

Power on the field

3 PCDDUTDUT UICC

Send “SELECT APDU” command withAID02 as parameter

Contactless selection fails with SW: 6A82

4 PCDDUTDUT UICC

Send “SELECT APDU” command withAID01 as parameter

Contactless selection fails with SW: 6A82

5 PCDDUTDUT eSE

Send “SELECT APDU” command withAID07 as parameter

Contactless selection fails with SW: 6A82

Test Sequence No 4: Battery Low, various routing

Initial Conditions

No AID is registered in the CLF routing table. Two applets with [AID01] and [AID03] as AID are installed on the UICC.

- When it is selected from a POS, SW:90 00 is returned + extra data “4f 46 46 48 4f53 54”

15.7.3.14.4

Page 515: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 515 of 606

The default AID route is set to HCE. (See section 2.6.1) Application [app01] defines an “Off-Host” payment service [serv01] for UICC in its

Manifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name=" AID01"/>

</aid-group>

your service [serv01] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/ myOffHostService01>

</offhost-apdu-service>

Application [app02] defines “HCE” service as follows- “myHCEService01” as description- A banner where it is displayed “myHCEService01”- A group with "payment" as category and containing one AID named [AID02]- When it is selected from a POS, SW:90 00 is returned + extra data “48 43 45”

Application [app03] defines an “Off-Host” payment service [serv03] for eSE in itsManifest.

With group "payment" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="payment">

<aid-filter android:name=" AID07"/>

</aid-group>

Page 516: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 516 of 606

your service [serv03] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service [serv03] declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

<AID-based>true</AID-based>

</extensions>

A banner where it is displayed “myOffHostServiceeSE01”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostServiceeSE01>

</offhost-apdu-service>

Application [app04] defines an “Off-Host” other service [serv04] for UICC in itsManifest.

With group "other" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=" AID03"/>

</aid-group>

your service [serv04] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

Page 517: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 517 of 606

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

A banner where it is displayed “myOffHostService02”

< offhost-apdu-service

android:apduServiceBanner="@drawable/ myOffHostService02>

</offhost-apdu-service>

Application [app05] defines an “Off-Host” other service [serv05] for eSE in itsManifest.

With group "other" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=" AID08"/>

</aid-group>

your service [serv05] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service [serv05] declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

<AID-based>true</AID-based>

</extensions>

A banner where it is displayed “myOffHostServiceeSE02”

Page 518: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 518 of 606

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostServiceeSE02>

</offhost-apdu-service>

Application [app06] defines an “Off-Host” other service [serv06] for eSE in itsManifest.

With group "other" as category and containing one AID as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name=" AID09"/>

</aid-group>

your service [serv06] declaration must contain an intent filter in the meta-dataelement as define below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service [serv06] declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

<AID-based>true</AID-based>

</extensions>

A banner where it is displayed “myOffHostServiceeSE03”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostServiceeSE03>

</offhost-apdu-service>

Page 519: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 519 of 606

Application [app01], application [app02], application [app03], application [app04] ,application [app05] and application [app06] are installed to register their NFCservices.

The following initial conditions need to be executed after the provious initial conditionsare executed and in the following order: Select “myOffHostServiceeSE01” banner from the “Tap&Pay” menu Ensure that the Device is in battery power low mode

Step Direction Sequence Expected Result1 User

DUTWhile the field is off, place the DUTin the area where the field will bepowered on

2 UserPCD

Power on the field

3 PCDDUT

Send “SELECT APDU” commandwith AID02 as parameter

Contactless selection fails with SW: 6A82

4 PCDDUTDUT UICC

Send “SELECT APDU” commandwith AID01 as parameter

Contactless selection fails with SW: 6A82

5 PCDDUTDUT eSE

Send “SELECT APDU” commandwith AID07 as parameter

SW: 90 00 is returned with extra data “6553 45”

6 PCDDUTDUT UICC

Send “SELECT APDU” commandwith AID03 as parameter

SW: 90 00 is returned with extra data “4f46 46 48 4f 53 54”As UICC applet will answer to the AID03Select.

7 PCDDUTDUT eSE

Send “SELECT APDU” commandwith AID08 as parameter

SW: 90 00 is returned with extra data “6553 45”As eSE applet will answer to the AID08Select.

8 PCDDUTDUT eSE

Send “SELECT APDU” commandwith AID09 as parameter

SW: 90 00 is returned with extra data “6553 45”As eSE applet will answer to the AID09Select.

15.7.3.15 nonAID based services registration and conflict management

Test PurposeEnsure DUT handles the registration of nonAID based services.

Referenced requirement

Page 520: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 520 of 606

TS26_NFC_REQ_094 TS26_NFC_REQ_094.01 TS26_NFC_REQ_094.02 TS26_NFC_REQ_170 TS26_NFC_REQ_170.1 TS26_NFC_REQ_172 TS26_NFC_REQ_175 TS26_NFC_REQ_176

Initial Conditions The DUT is powered on HCI initialization has been performed successfully. NFC is enabled on the DUT

Test Sequence No 1: nonAID based service registration and

slcton oneei R F

tchnology lvl (U svc slcton succds)e ee ICCerieeei ee

nt l ondtonsIiiaC ii

If the phone supports a mechanism to change the default technology, protocol orDefault AID route, then do a factory reset before the test

The NFC reader is polling in type A only or provide a mechanism to make sure theNFC transaction will be performed using RF type A.

The NFC reader is establishing an ISO 14443-3 communication over type A. Install an Applet on the UICC, to handle CLT=A mode or use an intrinsic UICC

mechanism (e.g. MIFARE Classic). When activated the Applet requests theContactless paramsters according to “Mifare classic parameters” in Table 2 of GSMASGP12 [42]

Application [app01] defines a nonAID based “Off-Host” service for UICC in itsManifest.

your service declaration must contain an intent filter in the meta-data element asdefine below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

15.7.3.15.1

Page 521: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 521 of 606

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="SIM"/>

</se-ext-group>

<AID-based>false</AID-based>

</extensions>

A banner where it is displayed “myOffHostService03”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostService03>

</offhost-apdu-service>

Application [app02] defines a nonAID based “Off-Host” service for eSE in itsManifest.

your service declaration must contain an intent filter in the meta-data element asdefine below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

<AID-based>false</AID-based>

</extensions>

A banner where it is displayed “myOffHostService-eSE04”

< offhost-apdu-service

Page 522: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 522 of 606

android:apduServiceBanner="@drawable/myOffHostService-eSE04>

</offhost-apdu-service>

Step Direction Sequence Expected Result

1 AppDUT

Install [app01] to register it’s NFCservices

Installation is successful

2 AppDUT

Install [app02] to register it’s NFCservices

The user is directed to a menu entry in“Settings” that lists the followingconflicting services:myOffHostService03myOffHostService-eSE04The user is presented an option to selectone and only one of these services.

3 UserDUT

Select myOffHostService03 myOffHostService03 is selected

4 PCDDUTDUT UICC

Use a contactless reader to exchangecommand with the UICC applet whileremaining at ISO 14443-3communication level (e.g. send aMIFARE authenticate command).

the command is received by the UICCand UICC response is received by thecontactless reader

5 PCDDUT

The test tool verifies the followingcontactless protocol parameters:GP Tag ‘80’ – UID (LV)GP Tag ‘81’ - SAKGP Tag ‘82’ - ATQAGP Tag ‘83’ – ATS (LV)GP Tag ’84 - FWI/SFGIGP Tag ‘85’ – CID supportGP Tag ‘86’ - Data_Rate Max

The values of these parameters arematching the values of profile 2 asdefined in Table 3 of GSMA SGP12 [42]

Test Sequence No 2: nonAID based service registration and

slcton on tchnology lvl (U svc slcton f ls)eei R Fe ee ICCerieeei ai

Initial Conditions

If the phone supports a mechanism to change the default technology, protocol orDefault AID route, then do a factory reset before the test

The NFC reader is polling in type A only or provide a mechanism to make sure theNFC transaction will be performed using RF type A.

15.7.3.15.2

Page 523: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 523 of 606

The NFC reader is establishing an ISO 14443-3 communication over type A. Install an Applet on the UICC, to handle CLT=A mode or use an intrinsic UICC

mechanism (e.g. MIFARE Classic) Application [app01] defines a nonAID based “Off-Host” service for UICC in its

Manifest.

your service declaration must contain an intent filter in the meta-data element asdefine below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="SIM1"/>

</se-ext-group>

<AID-based>false</AID-based>

</extensions>

A banner where it is displayed “myOffHostService03”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostService03>

</offhost-apdu-service>

Application [app02] defines a nonAID based “Off-Host” service for eSE in itsManifest.

your service declaration must contain an intent filter in the meta-data element asdefine below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

Page 524: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 524 of 606

</intent-filter>

your service declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

<AID-based>false</AID-based>

</extensions>

A banner where it is displayed “myOffHostService-eSE04”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostService-eSE04>

</offhost-apdu-service>

Step Direction Sequence Expected Result

1 AppDUT

Install [app01] to register it’s NFCservices

Installation is successful

2 AppDUT

Install [app02] to register it’s NFCservices

The user is directed to a menu entry in“Settings” that lists the followingconflicting services:myOffHostService03myOffHostService-eSE04The user is presented an option to selectone and only one of these services.

3 UserDUT

Select myOffHostService-eSE04 myOffHostService-eSE04 is selected

4 PCDDUTDUT UICC

Use a contactless reader to exchangecommand with the UICC applet whileremaining at ISO 14443-3communication level (e.g. send aMIFARE authenticate command).

the command is not received by the UICCand the expected UICC response is notreceived by the contactless reader

Page 525: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 525 of 606

Test Sequence No 3: nonAID based service registration and

slcton on potocol lvl (U svc slcton succds)eei R Fr ee ICCerieeei ee

nt l ondtonsIiiaC ii

If the phone supports a mechanism to change the default technology, protocol orDefault AID route, then do a factory reset before the test

The NFC reader is polling in type A only or provide a mechanism to make sure theNFC transaction will be performed using RF type A.

Install an applet on the UICC implementing External Authenticate according to AnnexA.4.4, implicitly selectable via NFCA. Note: The reader shall not explicitly select theApplet by AID. When activated the Applet requests the Contactless paramstersaccording to “DESFire EV1” in Table 2 of GSMA SGP12 [42]

Application [app01] defines a nonAID based “Off-Host” service for UICC in itsManifest.

your service declaration must contain an intent filter in the meta-data element asdefine below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="SIM1"/>

</se-ext-group>

<AID-based>false</AID-based>

</extensions>

A banner where it is displayed “myOffHostService03”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostService03>

</offhost-apdu-service>

15.7.3.15.3

Page 526: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 526 of 606

Application [app02] defines a nonAID based “Off-Host” service for eSE in itsManifest.

your service declaration must contain an intent filter in the meta-data element asdefine below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

<AID-based>false</AID-based>

</extensions>

A banner where it is displayed “myOffHostService-eSE04”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostService-eSE04>

</offhost-apdu-service>

Step Direction Sequence Expected Result

1 AppDUT

Install [app01] to register it’s NFCservices

Installation is successful

Page 527: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 527 of 606

Step Direction Sequence Expected Result

2 AppDUT

Install [app02] to register it’s NFCservices

The user is directed to a menu entry in“Settings” that lists the followingconflicting services:myOffHostService03myOffHostService-eSE04The user is presented an option to selectone and only one of these services.

3 UserDUT

Select myOffHostService03 myOffHostService03 is selected

4 PCDDUTDUT UICCUICCDUTDUT PCD

Send EXTERNAL AUTHENTICATE(acc to Annex A.4.4) to the UICCapplet using a contactless readerNote: The reader shall access theUICC applet without explicitly selectingit by AID.

Status Word 90 00 is returned

5 PCDDUT

The test tool verifies the followingcontactless protocol parameters:GP Tag ‘80’ – UID (LV)GP Tag ‘81’ - SAKGP Tag ‘82’ - ATQAGP Tag ‘83’ – ATS (LV)GP Tag ’84 - FWI/SFGIGP Tag ‘85’ – CID supportGP Tag ‘86’ - Data_Rate Max

The values of these parameters arematching the values of profile 3 asdefined in Table 3 of GSMA SGP12 [42]

Test Sequence No 4: nonAID based service registration and

slcton on potocol lvl (U svc slcton f ls)eei R Fr ee ICCerieeei ai

nt l ondtonsIiiaC ii

If the phone supports a mechanism to change the default technology, protocol orDefault AID route, then do a factory reset before the test

The NFC reader is polling in type A only or provide a mechanism to make sure theNFC transaction will be performed using RF type A.

Install an applet on the UICC implementing External Authenticate according to AnnexA.4.4, implicitly selectable via NFCA. Note: The reader shall not explicitly select theApplet by AID

Application [app01] defines a nonAID based “Off-Host” service for UICC in itsManifest.

15.7.3.15.4

Page 528: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 528 of 606

your service declaration must contain an intent filter in the meta-data element asdefine below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="SIM"/>

</se-ext-group>

<AID-based>false</AID-based>

</extensions>

A banner where it is displayed “myOffHostService03”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostService03>

</offhost-apdu-service>

Application [app02] defines a nonAID based “Off-Host” service for eSE in itsManifest.

your service declaration must contain an intent filter in the meta-data element asdefine below

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/>

</intent-filter>

your service declaration must contain com.gsma.services.nfc.extensions

<meta-data android:name="com.gsma.services.nfc.extensions"android:resource="@xml/nfc_se"/>

Page 529: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 529 of 606

with nfc_se xml file as defined bellow

<extensions xmlns:android="http://www.gsma.com"android:description="@string/servicedesc">

<se-ext-group>

<se-id name="eSE"/>

</se-ext-group>

<AID-based>false</AID-based>

</extensions>

A banner where it is displayed “myOffHostService-eSE04”

< offhost-apdu-service

android:apduServiceBanner="@drawable/myOffHostService-eSE04>

</offhost-apdu-service>

Step Direction Sequence Expected Result

1 AppDUT

Install [app01] to register it’s NFCservices

Installation is successful

2 AppDUT

Install [app02] to register it’s NFCservices

The user is directed to a menu entry in“Settings” that lists the followingconflicting services:myOffHostService03myOffHostService-eSE04The user is presented an option to selectone and only one of these services.

3 UserDUT

Select myOffHostService-eSE04 myOffHostService-eSE04 is selected

4 PCDDUTDUT UICCUICCDUTDUT PCD

Send EXTERNAL AUTHENTICATE(acc to Annex A.4.4) to the UICCapplet using a contactless readerNote: The reader shall try to accessthe UICC applet without explicitlyselecting it by AID.

Status Word not equal 90 00 is returned

15.8 Platform Dependant Properties

15.8.1 General overviewThis section provides test cases for checking platform dependant properties.

Page 530: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 530 of 606

The list of conformance requirements tested within this section is listed in the table insection 15.8.2.

15.8.2 Conformance requirementsTS26_NFC_REQ_132 The device MAY implement classes and methods as described below:

“com.gsma.services.utils.Handset”

Classes Methods

Handset getProperty, getVersion

Note: this requirement fulfils the generic requirementTS26_NFC_REQ_092.

15.8.3 Test Cases

15.8.3.1 “getVersion” API

Test PurposeEnsure DUT implements correctly the method used to retrieve the version of the GSMAAPIs available in the device

Referenced requirement TS26_NFC_REQ_132

Test Sequence No 1

nt l ondtonsIiiaC ii

An instance of the “Handset” class has been retrieved successfully by the applicationand is not null

Step Direction Sequence Expected Result

15.8.3.1.1

Page 531: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 531 of 606

Step Direction Sequence Expected Result

1 AppDUT

From the “Handset” instance call“getVersion” method

No exception thrown by the systemIF DUT supports O_TS26_VERSION_9:-Minor version number of the returnedvalue is between 0 and 999.-Major version number of the returnedvalue is 9.

ELSE IF DUT supportsO_TS26_VERSION_10:-Minor version number of the returnedvalue is between 0 and 999.-Major version number of the returnedvalue is 10.

ELSEMinor version number of the returnedvalue is between 0 and 999Major version number of the returnedvalue is between 5 and 2147483The major version number must not begreater than the major version of TS.26[1]

15.8.3.2 “getProperty” API

Test PurposeEnsure DUT implements correctly API used to retrieve characteristics of the device

Referenced requirement

TS26_NFC_REQ_132

Test Sequence No 1: OMAPI

nt l ondtonsIiiaC ii

An instance of the “Handset” class has been retrieved successfully by the applicationand is not null

Step Direction Sequence Expected Result

1 AppDUT

From the “Handset” instance, call“getProperty” method with “OMAPI”constant as parameter

Returned value is “true”.

15.8.3.2.1

Page 532: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 532 of 606

Step Direction Sequence Expected Result

2 AppDUT

Create an instance of the “SEService”class (SIM Alliance Open Mobile API)

No exception thrown by the system

3 AppDUT

From the “SEService” instance call“getVersion” method

No exception thrown by the system

Test Sequence No 2: MULTIPLE_ACTIVE_CEE

nt l ondtonsIiiaC ii

An instance of the “Handset” class has been retrieved successfully by the applicationand is not null

Step Direction Sequence Expected Result

1 AppDUT

From the “Handset” instance call“getProperty” method with“MULTIPLE_ACTIVE_CEE” constantas parameter

IF DUT supports O_MULTI_CEE_ON,returned value is "true".IF DUT does not supportO_MULTI_CEE_ON, returned value is"false".

Test Sequence No 3: HCI_SWP, BATTERY_LOW_MODE

Initial Conditions An instance of the “Handset” class has been retrieved successfully by the application

and is not null

Step Direction Sequence Expected Result

1 AppDUT

From the “Handset” instance call“getProperty” method with “HCI_SWP”constant as parameter

Returned value is “true”

2 AppDUT

From the “Handset” instance call“getProperty” method with“BATTERY_LOW_MODE” constant asparameter

IF DUT supports O_BAT_LOW, returnedvalue is "true".IF DUT does not support O_BAT_LOW,returned value is "false".

Test Sequence No 4: BATTERY_POWER_OFF_MODE, FELICA,MIFARE_CLASSIC, MIFARE_DESFIRE

Initial Conditions An instance of the “Handset” class has been retrieved successfully by the application

and is not null

Step Direction Sequence Expected Result

15.8.3.2.2

15.8.3.2.3

15.8.3.2.4

Page 533: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 533 of 606

Step Direction Sequence Expected Result

1 AppDUT

From the “Handset” instance call“getProperty” method with“BATTERY_POWER_OFF_MODE”constant as parameter

IF DUT supports O_BAT_OFF, returnedvalue is "true".IF DUT does not support O_BAT_ OFF,returned value is "false".

2 AppDUT

From the “Handset” instance call“getProperty” method with “FELICA”constant as parameter

IF DUT supportsO_CARD_EM_FELICA_UICC, returnedvalue is "true".IF DUT does not supportO_CARD_EM_FELICA_UICC, returnedvalue is "false".

3 AppDUT

From the “Handset” instance call“getProperty” method with“MIFARE_CLASSIC” constant asparameter

IF DUT supportsO_MIFARE_CLASSIC_RW, returnedvalue is "true".IF DUT does not supportO_MIFARE_CLASSIC_RW, returnedvalue is "false".

4 AppDUT

From the “Handset” instance call,“getProperty” method with“MIFARE_DESFIRE” constant asparameter

IF DUT supportsO_MIFARE_DESFIRE_RW, returnedvalue is "true".IF DUT does not supportO_MIFARE_DESFIRE_RW, returnedvalue is "false".

Test Sequence No 5: Invalid argument

nt l ondtonsIiiaC ii

An instance of the “Handset” class has been retrieved successfully by the applicationand is not null

Step Direction Sequence Expected Result

1 AppDUT

From the “Handset” instance call“getProperty” method with a integervalue as parameter which is not partof the following list:0, 1, 32, 33, 34, 35, 80, 144, 145

IF DUT supportsO_ANDROID_API_V8_OR_LATER:“IllegalArgumentException” is thrown bythe systemELSE:An exception is thrown by the system

Test Sequence No 6: BATTERY_POWER_OFF_MODE, FELICA,MIFARE_CLASSIC, MIFARE_DESFIRE

Initial Conditions An instance of the “Handset” class has been retrieved successfully by the application

and is not null

15.8.3.2.5

15.8.3.2.6

Page 534: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 534 of 606

Step Direction Sequence Expected Result

1 AppDUT

From the “Handset” instance call“getProperty” method with“BATTERY_POWER_OFF_MODE”constant as parameter

IF DUT supports O_BAT_OFF, returnedvalue is "true".IF DUT does not support O_BAT_ OFF,returned value is "false".

2 AppDUT

From the “Handset” instance call“getProperty” method with “FELICA”constant as parameter

Returned value is “true”.

3 AppDUT

From the “Handset” instance call“getProperty” method with“MIFARE_CLASSIC” constant asparameter

IF DUT supportsO_MIFARE_CLASSIC_RW, returnedvalue is "true".IF DUT does not supportO_MIFARE_CLASSIC_RW, returnedvalue is "false".

4 AppDUT

From the “Handset” instance call,“getProperty” method with“MIFARE_DESFIRE” constant asparameter

IF DUT supportsO_MIFARE_DESFIRE_RW, returnedvalue is "true".IF DUT does not supportO_MIFARE_DESFIRE_RW, returnedvalue is "false".

15.9 Security

15.9.1 General overview

This section provides test cases for checking security requirements.

15.9.2 Conformance requirementsTS26_NFC_REQ_130.1

Before Android P protection level of all the permissions described inTS26_NFC_REQ_130 SHALL be set to the same level as“android.permission.NFC”.

Note:Before Marshmallow version: android.permission.NFC is set to “dangerous”.From Marshmallow version: android.permission.NFC is set to “normal”.

TS26_NFC_REQ_131

Before Android P, the device SHALL ensure that the application has thefollowing permission before forwarding a Transaction event to the application:

NFC Controller android.permission.NFC

Transaction Event com.gsma.services.nfc.permission.TRANSACTION_EVENTTS26_NFC_REQ_163

The device SHALL not log any APDU or AID exchanged in a communicationwith an applet located in an SE (UICC, eSE, …).

TS26_NFC_REQ_190

This requirement is applicable from Android P onwards.The permission SHALL be set as following:

- OMAPI do not require any specific permissions- TRANSACTION_EVENT SHALL be

Page 535: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 535 of 606

o android.permission.NFC_TRANSACTION_EVENT

TS26_NFC_REQ_191

This requirement is applicable from Android P onwards.The device SHALL ensure that the application has the following permissionbefore forwarding a Transaction event to the application:

NFC Controller android.permission.NFC

Transaction Event android.permission.NFC_TRANSACTION_EVENT

15.9.3 Test Cases

15.9.3.1 Permissions

Ensure DUT implements correctly the requested permissions for using NFC services.

Referenced requirement TS26_NFC_REQ_130.1 TS26_NFC_REQ_131 TS26_NFC_REQ_190 TS26_NFC_REQ_191

Test Sequence No 1: Protection level for NFC Permission

nt l ondtonsIiiaC ii

Application [app01]Registers in its Manifest the following permissions:- android.permission.NFC- For devices before Android P : org.simalliance.openmobileapi.SMARTCARD

Note: For devices based on Android P or following Android releases:org.simalliance.openmobileapi.SMARTCARD will not be used by the device .

- For devices before Android P :com.gsma.services.nfc.permission.TRANSACTION_EVENT- For devices based on Android P or following Android releases :android.permission.NFC_TRANSACTION_EVENT.It is allowed to use the same application for both devices before Android P anddevices based on Android P or following Android releasesProvides the following features

- Retrieves the list of readers via OMAPI- Displays a notification when a transaction event is received

Application [app01] is built with the following parameters:- “compileSdkVersion” >= 23- “targetSdkVersion” >=23- “minSdkVersion”<23

Application [app01] is not yet installed on the DUT Access Control is allowing communication between any applet in the UICC and

[app01]

Step Direction Sequence Expected Result

15.9.3.1.1

Page 536: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 536 of 606

Step Direction Sequence Expected Result

1 UserDUT

Install [app01] without using “adbinstall” command

For devices based on an Androidrelease before “Marshmallow”, theframework is requesting to accept, atleast, the following permissions:

- org.simalliance.openmobileapi.SMARTCARD

- com.gsma.service.nfc.permission.TRANSACTION_EVENT

For devices based on “Marshmallow” orfollowing Android releases, the frameworkis not requesting to accept the followingpermissions

- org.simalliance.openmobileapi.SMARTCARD

- com.gsma.service.nfc.permission.TRANSACTION_EVENT- android.permission.NFC_TRANS

ACTION_EVENT

2 AppDUT

Retrieve and display a list of availablereaders

Android is not requesting to accept anyadditional permissions

3 PCD Power on RF field

4 PCDDUT

Perform RF protocol initialisation

5 PCDDUT

Using the APDU application, send aSELECT command with AID01

APDU Application receives Status Word90 00

6 PCD Power off RF field

7 DUTUICC

Send EVT_FIELD_OFF

8 UICCDUT

UICC sends EVT_TRANSACTIONwith AID01

The DUT does not request to acceptany additional permissions

The application displays a notificationlinked to the transaction event

Test Sequence No 2: Permissions for using NFC services

nt l ondtonsIiiaC ii

Application [app01]Registers in its Manifest the following permissions:- android.permission.NFC- For devices before Android P:com.gsma.services.nfc.permission.TRANSACTION_EVENT- For devices based on Android P or following Android releases:android.permission.NFC_TRANSACTION_EVENT.

15.9.3.1.2

Page 537: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 537 of 606

It is allowed to use the same application for both devices before Android P anddevices based on Android P or following Android releases.Registers an activity for receiving a transaction event based on [AID01]

Application [app02]Registers in its Manifest the following permissions:- android.permission.NFCRegisters an activity for receiving a transaction event based on [AID02]

Application [app03]Registers in its Manifest the following permissions:

- For devices before Android P:com.gsma.services.nfc.permission.TRANSACTION_EVENT- For devices based on Android P or following Android releases:

android.permission.NFC_TRANSACTION_EVENT.It is allowed to use the same application for both devices before Android P anddevices based on Android P or following Android releases.Registers an activity for receiving a transaction event based on [AID03]

Application [app04]Does not registers in its Manifest the following permissions:

- android.permission.NFC- com.gsma.services.nfc.permission.TRANSACTION_EVENT- android.permission.NFC_TRANSACTION_EVENT.

It is allowed to use the same application for both devices before Android P anddevices based on Android P or following Android releases.Registers an activity for receiving a transaction event based on [AID04]

Access Control is allowing communication between any applets in the UICC and anyapplications

Step Direction Sequence Expected Result

1 AppDUT

Generate a transaction event (seeprocedure 2.6.3) based on [AID01]

Transaction Event Activity from [app01]is launched

2 AppDUT

Generate a transaction event (seeprocedure 2.6.3) based on [AID02]

Transaction event Activity from [app02]is not launched

3 AppDUT

Generate a transaction event (seeprocedure 2.6.3) based on [AID03]

Transaction event Activity from [app03]is not launched

4 AppDUT

Generate a transaction event (seeprocedure 2.6.3) based on [AID04]

Transaction event Activity from [app04]Is not launched

15.9.3.2 APDU Logs

Ensure DUT avoid to log any sensitive information such as APDU exchange

Referenced requirement

Page 538: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 538 of 606

TS26_NFC_REQ_163

Test Sequence No 1: APDU Logs for contactless transaction

nt l ondtonsIiiaC ii

Application [app01] define an “OffHost” other service [serv01] in its Manifest.

o With group “other” as category and containing AID01 as defined below

<aid-group android:description="@string/aiddescription"

android:category="other">

<aid-filter android:name= [AID 01]/>

</aid-group>

o your service [serv01] declaration must contain an intent filter

<intent-filter>

<action android:name =

"android.nfc.cardemulation.action.OFF_HOST_APDU_SERVICE"/></intent-filter>

Registers in its Manifest the following permissions:- android.permission.NFC- For devices before Android P : org.simalliance.openmobileapi.SMARTCARD

Note: For devices based on Android P or following Android releases:org.simalliance.openmobileapi.SMARTCARD will not be used by the device.

- Before Android P : com.gsma.services.nfc.permission.TRANSACTION_EVENT- For devices based on Android P or following Android releases:android.permission.NFC_TRANSACTION_EVENT.It is allowed to use the same application for both devices before Android P anddevices based on Android P or following Android releases

app01 is built to receive transaction event from AID01 cardlet.

Applet with [AID01] as AID is installed on the UICC. [AID01] is of size 16 bytes.o When the cardlet is selected from the contactless interface, a transaction event

is sent to the DUT containing additional data generated by the cardlet.The additional data shall be constructed such that its occurrence in the logcat fileguarantees that it originated from the transaction event. Examples: the AID of thecardlet, or random bytes of sufficient length.

Access Control is allowing communication between any applet in the UICC and [app01]

Step Direction Sequence Expected Result

15.9.3.2.1

Page 539: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 539 of 606

Step Direction Sequence Expected Result

1 UserDUT

Clear pre-existing logs on the device using thefollowing command:adb logcat -b radio -b main –c

2 UserDUT

While the field is off, place the DUT in the areawhere the field will be powered on

3 UserPCD

Power on the field

4 PCDDUT

DUT UICC

Send “SELECT APDU” command with AID01 asparameter.

SW: 90 00 is returnedApp01 has received thepush transaction event fromthe cardlet containing theadditional data provided bythe cardlet

5 UserPCD

Power off the field

6 UserDUT

Extract the logcat “main” and “radio” logs of thedevices using the following command:adb logcat -v time -d > main.txtadb logcat -b radio -v time -d > radio.txtSee Note

No occurrence of AID01 isfound in logsNo occurrence of theadditional data generated bythe cardlet is found in logs

Note: In order to ensure that the logcat content is complete the test tool needs to ensurethat the main.txt and radio.txt contains the complete log data from Step2 to Step5.

Test Sequence No 2: APDU Logs for OMAPI access

nt l ondtonsIiiaC ii

Application [app01] registers in its Manifest the following permissions:- android.permission.NFC- For devices before Android P : org.simalliance.openmobileapi.SMARTCARD

Note: For devices based on Android P or following Android releases:org.simalliance.openmobileapi.SMARTCARD will not be used by the device.

It is allowed to use the same application for both devices before Android P anddevices based on Android P or following Android releases

Applet with [AID01] as AID is installed on the UICC. [AID01] is of size 16 bytes.

Step Direction Sequence Expected Result

15.9.3.2.2

Page 540: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 540 of 606

Step Direction Sequence Expected Result

1 UserDUT

Clear pre-existing logs on the device using thefollowing command:adb logcat -b radio -b main –c

2 DUT UICC

Send “SELECT APDU” command with AID01 asparameter on the contact interface usingOpenMobileAPI

SW: 90 00 is returned

3 UserDUT

Extract the logcat “main” and “radio” logs of thedevices using the following command:adb logcat -v time -d > main.txtadb logcat -b radio -v time -d > radio.txt

and verify if AID01 is found in the logsSee Note

No occurrence of AID01 isfound

Note: In order to ensure that the logcat content is complete the test tool needs to ensurethat the main.txt and radio.txt contains the complete log data of Step2.

16 BlackBerry specific test cases

17 Windows Phone specific test cases

18 VOID

19 Other OS specific test casesOther OS specific test cases can be added based on contributions.

Page 541: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 541 of 606

Annex A Reference ApplicationThe following Annex provides clarification on the application to be used to complete thereference transaction.

A.1 DescriptionThe applet simulates an internal file structure described in paragraph Error! Referencesource not found..The operations permitted are the file selection described in section Error! Referencesource not found., the file reading described in section Error! Reference source notfound. and the file update that is described in paragraph Error! Reference source notfound..The applet also implements the External Authenticate command described in paragraphError! Reference source not found..

A.2 AID Package A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 50 Applet A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 41

A.3 Structure File

The structure file of the applet test is as follows:

5F 00 (DR) Folder

1F 00 (EF) First file in the folder initialized to 00

The file size is 128 byte.

A.4 Commands Permitted

A.4.1 SELECT

This command is used to select the applet, the directory (5F 00) or files (1F 00, 1F 01)

Code Value Meaning

CLA 00

INS A4

P1 04 o 00 04 when you select the applet00 when you select the directoryor files

P2 00

Lc Data Length

Data Data Applet AID or Directory AID orfiles AID

Table A.1: Select command details

Page 542: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 542 of 606

A.4.2 READ BINARY

This command is used to read the contents of the selected file

Code Value Meaning

CLA 00

INS B0

P1 00

P2 00

Le 80

Table A.2: Read Binary command details

A.4.3 UPDATE BINARY

This command is used to update the contents of the selected file

Code Value Meaning

CLA 00

INS D6

P1 00

P2 00

Lc 80

Data Data to be updated

Table A.3: Update Binary command details

A.4.4 EXTERNAL AUTHENTICATEThis command is used to verify the input data encrypted, to be equal to the applet's datadecrypted.

The input data correspond to the string "00 01 02 03 04 05 06 07" encrypted 3DES with 3keys (K1 = A0 A1 A2 A3 A4 A5 A6 A7, K2 = B0 B1 B2 B3 B4 B5 B6 B7, K3 = C0 C1 C2 C3C4 C5 C6 C7) and CBC (ICV = D0 D1 D2 D3 D4 D5 D6 D7).

The applet decrypted input data, if the data correspond to the string in clear (00 01 02 03 0405 06 07) the applet will respond with 90 00, otherwise with 69 84.

Page 543: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 543 of 606

Code Value Meaning

CLA 04

INS 82

P1 00

P2 00

Lc 08

Data 9E EA C0 F9 4D 60 53 34

Table A.4: External Authenticate command details

A.5 Source Code (Java)

The Java Source Code can be obtained from the GSMA TSG NFC Public GitHub here:

https://github.com/GSMATerminals/NFC-Test-Book-Public

Page 544: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 544 of 606

Annex B Reference to other test planThe GSMA NFC Handset Test Book refers to test specification developed by otherorganisations (EMVCo, ETSI, 3GPP, GlobalPlatform, NFC Forum, OMA and SIMalliance).These organisations defined their own requirements for test benches, test applicability andpass criteria’s.

B.1 SIMallianceReference test Specification: The test book refers to “SIMalliance Open Mobile API testspecification for Transport API [5]

“SIMalliance Open Mobile API test specification for Transport API” specifies anumber of optional features for the device. The following table lists which optionalfeatures are mandatory according to GSMA requirements based on SE type:

Options Name GSMA Status for UICC GSMA Status foreSE

access to the basic channel isblocked by the DUT

OP-002 Mandatory Optional

access to the basic channel isallowed by the DUT

OP-003 SHALL not be supported Optional

access to the default applet isblocked by the DUT

OP-011 Mandatory Optional

access to the default applet isallowed by the DUT

OP-010 SHALL not be supported Optional

Table B.1.1: Optional Features that are mandatory

Note: for some specific behaviour of the test tool when testing the “SIMalliance OMAPITransport API Test Specification” [5], see section 2.5.1.1.

The test cases listed in Table B.1.2 are applicable according to the applicability table of thereferred SIMalliance test specification:Each test case listed below contains one, or more ID-s listed explicitly in “SIMallianceOMAPI Transport API Test Specification” [5]. The ID-s shall be handled as separate testcases.The "TS.26 versions" column gives the item in the "Test Case number and description"column the applicable requirements version:

- Version x.y “onwards”: if the requirement is applicable from this TS.26 version andfor the later versions

- “Up to” Version x.y: if the requirement is applicable until this TS.26 version and it hasbeen changed or replaced for the later TS.26 versions

OMAPI applicability for Android P:The SIMalliance Open Mobile API test specification shall also be used to testdevices implementing Android P or later, where usage of the SIMalliance API isreplaced with usage of the “android.se.omapi” package.

Page 545: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 545 of 606

Some of the test cases or IDs are not applicable for devices implementing Android Por later. For these items there is an “Applicability” statement added in the “Test casenumber and description” column in the Table B.1.2

TS.27Numbering

SIMallianceSection[5]

Test case number and description

Test caseIDs

TS.26versions

6.3.1.6.1.1 6.1.1SIMalliance APIs - Constructor:SEService(Context context,SEService.CallBack listener)

ID1 – ID6 6.0onwards

6.3.1.6.1.2 6.1.2 SIMalliance APIs - Method: Reader[]getReaders()

ID1 6.0onwards

6.3.1.6.1.3 6.1.3 SIMalliance APIs - Method: booleanisConnected()

ID1, ID2 6.0onwards

6.3.1.6.1.4 6.1.4 SIMalliance APIs - Method: voidshutdown()

ID1 - ID3 6.0onwards

6.3.1.6.1.5 6.1.5 SIMalliance APIs - Method: StringgetVersion()

ID1 6.0 to 9.0

6.3.1.6.2.1 6.2.1

SIMalliance APIs - Method: voidserviceConnected(SEService service)Applicability: this test case is onlyapplicable if the device supportsO_BEFORE_ANDROID_P.

ID1 6.0onwards

6.3.1.6.3.1 6.3.1 SIMalliance APIs - Method: StringgetName()

ID1 6.0onwards

6.3.1.6.3.1eSE 6.3.1 SIMalliance APIs - Method: StringgetName()

ID1 11.0onwards

6.3.1.6.3.2 6.3.2 SIMalliance APIs - Method SEServicegetSEService()

ID1 6.0onwards

6.3.1.6.3.3 6.3.3 SIMalliance APIs - Method: booleanisSecureElementPresent()

ID1, ID2 6.0onwards

6.3.1.6.3.3eSE 6.3.3 SIMalliance APIs - Method: booleanisSecureElementPresent()

ID1 11.0onwards

6.3.1.6.3.4 6.3.4 SIMalliance APIs - Method: SessionopenSession()

ID1 – ID3 6.0onwards

6.3.1.6.3.5 6.3.5 SIMalliance APIs - Method: voidcloseSessions()

ID1, ID2 6.0onwards

6.3.1.6.3.6 6.3.6

Reader:Event types valueApplicability: this test case is onlyapplicable if the device supportsO_BEFORE_ANDROID_P.

ID1, ID2 10.0onwards

Page 546: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 546 of 606

TS.27Numbering

SIMallianceSection[5]

Test case number and description

Test caseIDs

TS.26versions

6.3.1.6.3.7 6.3.7

Method:void registerReaderEventCallback(Reader.EventCallBack cb)Applicability: this test case is onlyapplicable if the device supportsO_BEFORE_ANDROID_P.

ID1 - ID8 10.0onwards

6.3.1.6.3.8 6.3.8

Method:voidunregisterReaderEventCallback(Reader.EventCallBack cb)Applicability: this test case is onlyapplicable if the device supportsO_BEFORE_ANDROID_P.

ID1 – ID5 10.0onwards

6.3.1.6.4.1 6.4.1SIMalliance APIs - Method: ReadergetReader()

ID1, ID2 6.0onwards

6.3.1.6.4.2 6.4.2 SIMalliance APIs - Method: byte[]getATR()

ID1 – ID3 6.0onwards

6.3.1.6.4.3 6.4.3 SIMalliance APIs - Method: void close() ID1, ID2 6.0onwards

6.3.1.6.4.4 6.4.4 SIMalliance APIs - Method: booleanisClosed()

ID1, ID2 6.0onwards

6.3.1.6.4.5 6.4.5 SIMalliance APIs - Method: voidcloseChannels()

ID1, ID2 6.0onwards

6.3.1.6.4.6 6.4.6 SIMalliance APIs - Method: ChannelopenBasicChannel()

ID7 6.0onwards

6.3.1.6.4.7 6.4.7 SIMalliance APIs - Method: ChannelopenLogicalChannel()

ID1, ID2,ID3b, ID5a,ID5b, ID5c,ID5d,ID6 – ID17

6.0onwards

6.3.1.6.4.7b 6.4.7 SIMalliance APIs - Method: ChannelopenLogicalChannel()

ID18 – ID23 10.0onwards

6.3.1.6.4.7eSE 6.4.7 SIMalliance APIs - Method: ChannelopenLogicalChannel()

ID1, ID2,ID3a, ID4a,ID5a, ID5b,ID5c, ID5d,ID6,ID7 – ID23

11.0onwards

6.3.1.6.4.8 6.4.8SIMalliance APIs - Method: ChannelopenLogicalChannel – Extended logicalchannels

ID1 – ID3 8.0onwards

Page 547: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 547 of 606

TS.27Numbering

SIMallianceSection[5]

Test case number and description

Test caseIDs

TS.26versions

6.3.1.6.4.9 6.4.9 SIMalliance APIs - Method: ChannelopenBasicChannel (with P2)

ID7 8.0onwards

6.3.1.6.4.10 6.4.10 SIMalliance APIs - Method: ChannelopenLogicalChannel (with P2)

ID1, ID2,ID3b, ID5a,ID5b, ID5c,ID5d,ID6 – ID20

8.0onwards

6.3.1.6.4.10b 6.4.10 SIMalliance APIs - Method: ChannelopenLogicalChannel (with P2)

ID21 – ID26 10.0onwards

6.3.1.6.4.11 6.4.11SIMalliance APIs - Method: ChannelopenLogicalChannel (with P2) – Extendedlogical channels

ID1 – ID3 8.0onwards

6.3.1.6.5.1 6.5.1 SIMalliance APIs - Method: void close() ID1, ID3 – ID6 6.0onwards

6.3.1.6.5.2 6.5.2 SIMalliance APIs - Method: booleanisBasicChannel()

ID2 6.0onwards

6.3.1.6.5.3 6.5.3

SIMalliance APIs - Method: booleanisClosed()Applicability: this test case is onlyapplicable if the device supportsO_BEFORE_ANDROID_P.

ID1, ID2 6.0onwards

6.3.1.6.5.4 6.5.4 SIMalliance APIs - Method: byte[]getSelectResponse()

ID1, ID2,ID4 – ID12

6.0onwards

6.3.1.6.5.4b 6.5.4 SIMalliance APIs - Method: byte[]getSelectResponse()

ID13 – ID32 10.0onwards

6.3.1.6.5.5 6.5.5SIMalliance APIs - Method: SessiongetSession()

ID1 6.0onwards

6.3.1.6.5.6 6.5.6 SIMalliance APIs - Method: byte[]transmit(byte[] command)

ID2 – ID21,ID23 – ID29

6.0onwards

6.3.1.6.5.6b 6.5.6

SIMalliance APIs - Method: byte[]transmit(byte[] command)

ID30 – ID33 10.0onwards

SIMalliance APIs - Method: byte[]transmit(byte[] command)Applicability: these IDs are only applicableif the device supportsO_BEFORE_ANDROID_P.

ID34 – ID39 10.0onwards

Page 548: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 548 of 606

TS.27Numbering

SIMallianceSection[5]

Test case number and description

Test caseIDs

TS.26versions

6.3.1.6.5.6eSE 6.5.6

SIMalliance APIs - Method: byte[]transmit(byte[] command)

ID2 – ID7,ID9 – ID11,ID15 – ID21,ID23 – ID33

11.0onwards

SIMalliance APIs - Method: byte[]transmit(byte[] command)Applicability: these IDs are only applicableif the device supportsO_BEFORE_ANDROID_P.

ID34 – ID39 11.0onwards

6.3.1.6.5.7 6.5.7 SIMalliance APIs - Method: Boolean[]selectNext()

ID1 – ID5,ID7 – ID9

6.0onwards

6.3.1.6.5.7eSE 6.5.7 SIMalliance APIs - Method: Boolean[]selectNext()

ID1 – ID4,ID7 – ID9

11.0onwards

Table B.1.2: SIMalliance test case

B.2 EMVCo

The GSMA requires device manufacturer to pass the EMVCo Level 1 testing according toEMVCo test plan in the scope of a device evaluation. This applies for Analog, Digital [38],Performance and Interoperability testing [39].

Completion of EMVCo testing is not considered a pre-requisite for a device vendor to starttesting for all test cases in defined in the GSMA TS.27 NFC Handset Test Book. A devicevendor may have all test cases defined in the GSMA TS.27 NFC Handset Test Bookconducted before testing with EMVCo or in parallel with testing with EMVCo.

B.3 VOID

B.4 ETSI TS 102 613 SWPReference test Specification: ETSI TS 102 694-1 [11]

ETSI TS 102 694-1 [11] specifies a number of optional features for the device. The followingtable lists which optional features from ETSI TS 102 694-1 [11] are mandatory (M) orrecommended (R) according to GSMA requirements:

Item Option Mnemonic GSMA Status

1 Class B O_CLASS_B R

2 Class C full power mode O_CLASS_C_FULL M

3 Class C low power mode O_CLASS_C_LOW C001

7 Window size of 3 O_WS_3 R

8 Window size of 4 O_WS_4 R

Page 549: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 549 of 606

Item Option Mnemonic GSMA Status

9 HCI as per ETSI TS 102 622 [10] O_102_622 M

11 CLT, ISO/IEC 18092 [28] O_CLT_F M

18 Card Emulation, ISO/IEC 14443-4 typeA

O_CE_A M

19 Card Emulation, ISO/IEC 14443-4 typeB

O_CE_B M

21 Terminal supports CLT, ISO/IEC 14443-3 [5] Type A independently of whetherthe UICC indicates support of extendedbit durations

O_CLT_A_FULL C002

22 Terminal supports CLT, ISO/IEC 14443-3 [5] Type A only when the UICCindicates support of extended bitdurations down to 0,590 µs

O_CLT_A_EXTENDED_ONLY

C002

C001: IF O_BAT_OFF THEN M ELSE OC002: Either O_CLT_A_FULL or O_CLT_A_EXTENDED_ONLY shall be supported but notboth.Note 1: The option “Class C low power mode” is related to the option O_BAT_OFF as definedwithin TS.27 Section 2.1.4. The test cases which are conditional for “Class C low power mode” willbe performed according to condition C001 as defined above.

Table B.4.1: Optional Features from ETSI TS 102 694-1

The following test cases are applicable:

1) Test cases verified by GCF WI 133 are listed in the Table below. These test casesare validated by GCF.

Index TC Title

5.3.2.2.2 Test case 1: activation of SWP additionally to other interfaces

5.3.2.2.3 Test case 2: activation of SWP in low power mode

5.3.2.3.2 Test case 1: SWP initial activation in full power mode – normal procedure

5.3.2.3.4 Test case 3: SWP initial activation in full power mode – corrupted ACT_SYNCframe (repeat the last frame)

5.3.2.3.5 Test case 4: SWP initial activation in full power mode – no ACT_SYNC frame(repeat the last frame)

5.3.2.3.7Test case 6: SWP initial activation failed in full power mode – no ACT_SYNCframe (multiple)

5.3.2.3.9 Test case 8: SWP Initial activation in full power mode – no ACT_READY frame(repeat last frame)

5.3.2.3.10 Test case 9: SWP initial activation failed in full power mode – corruptedACT_READY frame (multiple)

Page 550: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 550 of 606

Index TC Title

5.3.2.3.12 Test case 11: SWP initial activation in low power mode

5.3.2.3.13 Test case 12:SWP initial activation in low power mode – corrupted ACT_SYNCframe (repeat the last frame)

5.3.2.3.14 Test case 13: SWP initial activation in low power mode – no ACT_SYNC frame(repeat the last frame)

5.3.2.3.15 Test case 14: SWP initial activation failed in low power mode – corruptedACT_SYNC frame (multiple)

5.3.2.3.16 Test case 15: SWP initial activation failed in low power mode – no ACT_SYNCframe (multiple)

5.3.2.3.17 Test case 16: SWP subsequent activation in full power mode

5.4.1.3.2 Test case 1: current provided in low power mode, no spikes

5.4.1.3.3 Test case 2: current provided in low power mode, with spikes

5.4.1.4.2 Test case 1: communication with S2 variation in full power mode

5.4.1.4.3 Test case 2: communication with S2 variation in low power mode

5.4.1.5.2.2 Test case 1: communication with S2 variation in full power mode

5.4.1.5.2.3 Test case 2: communication with S2 variation in low power mode

5.5.1.2 Test case 1: S1 waveforms, default bit duration

5.5.1.3 Test case 2: S1 waveforms, extended bit durations

5.5.3.2 Test case 1: SWP states and transitions, communication

5.5.4.2 Test case 1: power provided in full power mode

5.5.4.3 Test case 2: switching from full to low power mode

5.5.4.4 Test case 3: switching from low to full power mode

5.6.2.2.2 Test case 1: interpretation of incorrectly formed frames – SHDLC RSET frames

5.6.2.2.3 Test case 2: interpretation of incorrectly formed frames – SHDLC I-frames

5.6.2.3.2 Test case 1: behaviour of CLF with bit stuffing in frame

5.6.3.2.2 Test case 1: ignore ACT LLC frame reception after the SHDLC linkestablishment

5.6.3.2.3 Test case 2: ignore ACT LLC frame reception in CLT session

5.6.3.2.5 Test case 4: closing condition of CLT session whereas SHDLC link has beenestablished before CLT session

5.6.4.2.2 Test case 1: not matching SYNC_ID verification in low power mode

5.7.1.2 Test Case 1: data passed up to the next layer

5.7.1.3 Test Case 2: error management – corrupted I-frame

5.7.1.4 Test Case 3: error management – corrupted RR frame

5.7.6.4.2 Test case 1: initial state at link reset – reset by the UICC

5.7.7.3.2 Test Case 1: link establishment by the UICC

Page 551: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 551 of 606

Index TC Title

5.7.7.3.3 Test case 2: Link establishment and connection time out

5.7.7.3.4 Test case 3: requesting unsupported window size and/or SREJ support - linkestablishment by UICC

5.7.7.3.5 Test case 4: forcing lower window size and SREJ not used – link establishmentby the T

5.7.7.5.2 Test case 1: I-frame transmission

5.7.7.5.3 Test case 2: I-frame reception - single I-Frame reception

5.7.7.5.4 Test case 3: I-frame reception - multiple I-Frame reception

5.7.7.6.2 Test case 1: REJ transmission – multiple I-frames received

5.7.7.6.3 Test case 2: REJ reception

5.7.7.7.2 Test case 1: retransmission of multiple frames

5.7.7.8.2 Test case 1: RNR reception

5.8.5.2 Test case 1: ISO/IEC14443-3 Type A, no administrative command

5.8.6.3.1.2 Test case 1: opening a CLT session with CL_PROTO_INF(A)

5.9.2.1.2 Test case 1: CLF processing time - Type A aligned communication, with RFresponse

5.9.2.1.3 Test case 2: CLF processing time, no RF response

5.9.2.2.2 Test case 1: CLF processing time, Request Guard Time - Type A statetransition

5.9.2.2.3 Test case 2: CLF processing time, Request Guard Time from HALT state- TypeA state transition

Table B.4.2: List of applicable test cases from GCF WI 133

2) Test cases verified by GCF WI 190 [26] are listed in Table B.4.3. These test casesare validated by GCF.

Index TC Title

5.3.2.3.6 Test case 5: SWP initial activation failed in full power mode – corruptedACT_SYNC frame (multiple)

5.3.2.3.8 Test case 7: SWP Initial activation in full power mode – corrupted ACT_READYframe (repeat last frame)

5.3.2.3.11 Test case 10: SWP initial activation failed in full power mode – no ACT_READYframe (multiple)

5.3.2.3.19 Test case 18: SWP initial activation in full power mode – send ACT frames inwrong order, ACT_READY frame after activation (repeat the last frame)

5.5.3.3 SWP resume after upper layer indication that the UICC requires no moreactivity on this interface

5.7.7.8.3 Test case 2: Empty I-frame transmission

Page 552: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 552 of 606

Index TC Title

5.8.6.3.2.2 Opening a CLT session with CL_PROTO_INF(F)

5.8.6.3.2.3 Empty CLT(F) Frame

5.8.6.3.2.4 RF off during CLT session not expecting Empty CLT

5.8.6.3.2.5 RF off during CLT session expecting Empty CLT

5.9.1.2.2 Transceiving non-chained data over RF in Card Emulation

Table B.4.3: List of additional test cases

B.5 ETSI TS 102 622 [10] HCIReference test Specification: ETSI TS 102 695-1

ETSI TS 102 695-1 specifies a number of optional features for the device. The followingtable lists which optional features from ETSI TS 102 695-1 are mandatory (M) orrecommended (R) according to GSMA requirements:

Item Option Mnemonic GSMA Status

1 Data link layer specified in TS 102 613is used

O_102_613 M

2 Card RF gate for technology A issupported

O_CE_TypeA M

3 Card RF gate for technology B issupported

O_CE_TypeB M

4 Reader RF gate for technology A issupported

O_Reader_TypeA M

5 Reader RF gate for technology B issupported

O_Reader_TypeB M

6 Card RF gate for technology F issupported

O_CE_TypeF M

7 Low power mode is supported O_Low_Power_Mode C001

8 Item 2 and item 3 are supported. O_CE_TypeA ANDO_CE_TypeB

M

9 Item 6 and either item 2 or item 3 issupported

(O_CE_TypeA ORO_CE_TypeB) ANDO_CE_TypeF

M

10 CLT for Type A as specified in ETSI TS102 613 [9] is supported.

O_CE_CLT_TypeA M

11 Item 10 and item 3 are supported. O_CE_CLT_TypeA ANDO_CE_TypeB

M

12 Connectivity gate is supported in theterminal host

O_Conn M

C001: IF O_BAT_OFF THEN M ELSE O

Page 553: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 553 of 606

Table B.5.1: Optional Features from ETSI TS 102 695-1

The following test cases shall be verified:

1) Test cases verified by GCF WI 133 are listed in Table B.5.2. These test cases arevalidated by GCF.

All the test cases listed by work item 133 shall be run.

Index TC Title

5.1.3.2 TC 1: existence of gates

5.1.4.2 TC 1: static pipe deletion

5.1.4.3 TC 2: initial pipe state and persistence of pipe state and registry value

5.1.5.2 TC 1: registry deletion

5.2.2.2 TC 1: commands/events on pipe which is not open

5.3.1.2.3.2 TC 1: ANY_OPEN_PIPE reception

5.3.1.2.4.2 TC 1: ANY_CLOSE_PIPE reception

5.3.2.2 TC 1: response to unknown command

5.3.3.2 TC 1: reception of unknown events

5.4.2.1.1.2 TC 1: SESSION_IDENTITY

5.4.2.1.1.3 TC 2: MAX_PIPE

5.4.2.1.1.4 TC 3: WHITELIST

5.4.2.1.1.5 TC 4: HOST_LIST

5.4.2.3.1.2 TC 1: registry parameters

5.5.1.2.2 TC 1: valid pipe deletion from host to host controller

5.5.1.3.2 TC 1: identity reference data when TS 102 613 is used

5.5.1.3.3 TC 2: reception of ADM_CLEAR_ALL_PIPE – static pipes, dynamic pipesto host

5.5.4.2 TC 1: inhibited state

5.5.4.3 TC 2: inhibited state, followed by subsequent successful identity check

5.5.5.2 TC 1: processing of EVT_POST_DATA

5.6.1.2 TC 1: RF gate of type A

5.6.1.3 TC 2: RF gate of type B

5.6.3.3.4.2.2 TC 1: UID_REG - default

5.6.3.3.4.2.3 TC 2: SAK

5.6.3.3.4.2.4 TC 3: ATS – default parameters

5.6.3.3.4.2.5 TC 4: APPLICATION_DATA

Page 554: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 554 of 606

Index TC Title

5.6.3.3.4.2.6 TC 5: DATARATE_MAX

5.6.3.3.4.3.2 TC 1: PUPI_REG – default

5.6.3.3.4.3.3 TC 2: ATQB – verify the different parameter

5.6.3.3.4.3.4 TC 3: HIGHER_LAYER_RESPONSE

5.6.4.1.2 TC 1: ISO/IEC14443-3 Type A – Full Power Mode

5.6.4.1.3 TC 2: ISO/IEC14443-3 Type B

Table B.5.2: List of applicable test cases from GCF WI 133

2) Test cases verified by GCF WI 190 [26] are listed in Table B.5.3. These test casesare validated by GCF.

Index TC Title

5.6.1.4 Test case x: RF gate of type F

5.6.4.1.4 Test case 3: Routing EVT_FIELD_ON and EVT_FIELD_OFF to RF Gatewith lowest GID

5.6.4.2.2 Test case 1: None ISO/IEC 14443-4 type A

5.6.4.2.3 Test case 2: Routing EVT_FIELD_ON and EVT_FIELD_OFF to RF Gatewith lowest GID

5.6.4.4.2 Test case 1: ISO/IEC 18092 Type F

5.6.4.4.3 Test case y: RF off during ISO/IEC 18092 [28] Type F commandshandling

5.6.4.4.4 Test case 3: Routing EVT_FIELD_ON and EVT_FIELD_OFF to RF Gatewith lowest GID

5.7.2.3.1.2 Test case 1: ISO/IEC 14443-4 compliant type A

Table B.5.3: List of additional test cases

B.6 ETSI TS 102.384 [13], 3GPP 31.124Reference test Specification: ETSI TS 102 384 [13] and 3GPP TS 31.124 v10.0.0

The test cases in Table B.6.1 are applicable to verify TS26_NFC_REQ_078 as following:

1) Applicable test cases verified by GCF WI 035 are listed in Table B.6.1. These testcases are validated by GCF.

Ref Spec Index TC Title Sequence Name

Page 555: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 555 of 606

Ref Spec Index TC Title Sequence Name

3GPP TS31.124 27.22.4.27.2 Open Channel (related to

GPRS)

OPEN CHANNEL, immediatelink establishment, GPRS, nolocal address, no alphaidentifier, no network accessname

3GPP TS31.124 27.22.4.27.2 Open Channel (related to

GPRS)

OPEN CHANNEL, immediatelink establishment GPRS, noalpha identifier, with networkaccess name

3GPP TS31.124 27.22.4.27.2 Open Channel (related to

GPRS)

OPEN CHANNEL, immediatelink establishment, GPRS, withalpha identifier

3GPP TS31.124 27.22.4.27.2 Open Channel (related to

GPRS)

OPEN CHANNEL, immediatelink establishment, GPRS, withnull alpha identifier

3GPP TS31.124 27.22.4.27.2 Open Channel (related to

GPRS)

OPEN CHANNEL, immediatelink establishment, GPRS,command performed withmodifications (buffer size)

3GPP TS31.124 27.22.4.27.2 Open Channel (related to

GPRS)

OPEN CHANNEL, immediatelink establishment, GPRS,open command with alphaidentifier, User did not acceptthe proactive command

3GPP TS31.124

27.22.4.27.2 Open Channel (related toGPRS)

OPEN CHANNEL, immediatelink establishment, GPRS,open command with alphaidentifier, User did not acceptthe proactive command

3GPP TS31.124 27.22.4.28.1 CLOSE

CHANNEL(normal) CLOSE CHANNEL, successful

3GPP TS31.124 27.22.4.28.1 CLOSE

CHANNEL(normal)CLOSE CHANNEL, with aninvalid channel identifier

3GPP TS31.124

27.22.4.28.1 CLOSECHANNEL(normal)

CLOSE CHANNEL, on analready closed channel

3GPP TS31.124 27.22.4.29.1 RECEIVE DATA

(NORMAL)RECEIVE DATA, alreadyopened channel, GPRS

3GPP TS31.124 27.22.4.30.1 SEND DATA (normal)

SEND DATA, immediate mode,GPRS

3GPP TS31.124 27.22.4.30.1 SEND DATA (normal) SEND DATA, Store mode,

GPRS

3GPP TS31.124 27.22.4.30.1 SEND DATA (normal) SEND DATA, Store mode, Tx

buffer fully used, GPRS

Page 556: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 556 of 606

Ref Spec Index TC Title Sequence Name

3GPP TS31.124

27.22.4.30.1 SEND DATA (normal)SEND DATA, 2 consecutiveSEND DATA Store mode,GPRS

3GPP TS31.124 27.22.4.30.1 SEND DATA (normal)

SEND DATA, immediate modewith a bad channel identifier,GPRS

3GPP TS31.124 27.22.4.31 GET CHANNEL STATUS

GET STATUS, with a BIPchannel currently opened,GPRS

3GPP TS31.124 27.22.4.31 GET CHANNEL STATUS GET STATUS, after a link

dropped, GPRS

3GPP TS31.124 27.22.7.10 Data available event EVENT DOWNLOAD – Data

available, GPRS

3GPP TS31.124 27.22.7.11 Channel Status event

EVENT DOWNLOAD –Channel Status on a linkdropped

Table B.6.1: List of applicable test cases from GCF WI – 035 [15]

The applicable test cases to verify TS26_NFC_REQ_079

1) The applicable test case from 3GPP TS 31.124 is listed in Table B.6.2.

Ref Spec Index TC Title Sequence Name

3GPP TS31.124 27.22.4.27.2 Open Channel (related to

GPRS)

OPEN CHANNEL, immediatelink establishment, no alphaidentifier, with network accessname

Table B.6.2: applicable test cases from GCF WI 035

The test cases are applicable to verify TS26_NFC_REQ_081 as following:

2) The test case verified by GCF WI 035 listed in Table B.6.3

Ref Spec Index TC Title Sequence name

3GPP TS31.124

27.22.5.1 SMS-PP Data Download Seq 1.9: SMS-PP Data Downloadover CS/PS, UTRAN/GERAN

Table B.6.3: Applicable test cases

The test cases are applicable to verify Annex B as following:

1) The test case verified by GCF WI 035 listed in Table B.6.4

Page 557: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 557 of 606

Ref Spec Index TC Title Sequence name

3GPP TS31.124

27.22.4.26.1

LAUNCH BROWSER(No session alreadylaunched)

LAUNCH BROWSER, connect to the default URL

3GPP TS31.124

27.22.4.26.1

LAUNCH BROWSER(No session alreadylaunched)

LAUNCH BROWSER, connect to the specifiedURL, alpha identifier length=0

3GPP TS31.124

27.22.4.26.1

LAUNCH BROWSER(No session alreadylaunched)

LAUNCH BROWSER, Browser identity, no alphaidentifier

3GPP TS31.124

27.22.4.26.1

LAUNCH BROWSER(No session alreadylaunched)

LAUNCH BROWSER, one bearer specified andgateway/proxy identity

3GPP TS31.124

27.22.4.26.2

LAUNCH BROWSER(Interaction withcurrent session)

LAUNCH BROWSER, use the existing browser,connect to the default URL

3GPP TS31.124

27.22.4.26.2

LAUNCH BROWSER(Interaction withcurrent session)

LAUNCH BROWSER, close the existing browsersession and launch new browser session, connectto the default URL

3GPP TS31.124

27.22.4.26.2

LAUNCH BROWSER(Interaction withcurrent session)

LAUNCH BROWSER, if not already launched

3GPP TS31.124

27.22.7.9.1

Browser termination(normal)

EVENT DOWNLOAD - Browser termination

Table B.6.4: Applicable test cases

The test cases in Table B.6.5 are applicable to verify Annex B

Ref Spec Index TC Title Sequence name

ETSI TS102 384

27.22.7.18

HCI connectivityevent

HCI connectivity event (normal)

ETSI TS102 384

27.22.4.32

ACTIVATE ACTIVATE

Table B.6.5: List of additional test cases

B.7 Void

B.8 GP Secure Element Access Control

Reference test Specification: The test book refers to “GlobalPlatform - SEAC DeviceSideTest Plan v1.0.6” specification.

Page 558: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 558 of 606

The following table indicates which test cases are included in the current version of the TestBook:

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.1.1

ACE_DETECT_CORRUPTED_RUL

ES_IN_ARF

1 ACCESS_DENIED_CORRUPTED_ARF_ERROR_00_No_EF_DIR (0b-1c-c7) No

5.4.1.2 2ACCESS_DENIED_CORRUPTED_ARF_ERROR_01_No_PKCS15_Referenced_in_EF_DIR(0b-20-bd)

No

5.4.1.3 3 ACCESS_DENIED_CORRUPTED_ARF_ERROR_02_ODF_Bad_Padding (0b-8a-03)

Yes

5.4.1.4 4 ACCESS_DENIED_CORRUPTED_ARF_ERROR_03_DODF_Without_OID (0b-5b-03) Yes

5.4.1.5 5ACCESS_DENIED_CORRUPTED_ARF_ERROR_04_DODF_With_BadLength_BadOffset(0b-86-a3)

Yes

5.4.1.6 6 ACCESS_DENIED_CORRUPTED_ARF_ERROR_05_ACMF_Not_Found (0b-81-11) Yes

5.4.1.7 7 ACCESS_DENIED_CORRUPTED_ARF_ERROR_06_ACMF_Zero_Length (0b-d1-10) No

5.4.1.8 8 ACCESS_DENIED_CORRUPTED_ARF_ERROR_07_ACMF_Bad_Padding (0b-df-cf)

No

5.4.1.9 9 ACCESS_DENIED_CORRUPTED_ARF_ERROR_08_ACRF_Not_Found (0b-d2-a1) Yes

5.4.1.10 10 ACCESS_DENIED_CORRUPTED_ARF_ERROR_09_ACRF_Zero_Length (0b-15-c1) Yes

5.4.1.11 11 ACCESS_DENIED_CORRUPTED_ARF_ERROR_0A_ACRF_Bad_Padding (0b-19-6f) No

5.4.1.12 12 ACCESS_DENIED_CORRUPTED_ARF_ERROR_0B_ACRF_Without_Any_Rule (0b-dc-4f) Yes

5.4.1.13 13 ACCESS_DENIED_CORRUPTED_ARF_ERROR_0C_ACCF_Not_Found (0b-ff-4d) Yes

5.4.1.14 14 ACCESS_DENIED_CORRUPTED_ARF_ERROR_0D_ACCF_Zero_Length (0b-fb-57) Yes

5.4.1.15 15 ACCESS_DENIED_CORRUPTED_ARF_ERROR_0E_ACCF_Bad_Padding (0b-f8-05)

No

5.4.1.16 16ACCESS_DENIED_CORRUPTED_ARF_ERROR_0F_ACCF_Wrong_Certificate_Length(0b-9c-9a)

Yes

Page 559: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 559 of 606

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.2.1

ACE_DETECT_CORRUPTED_RUL

ES

1 ACCESS_DENIED_ERROR_APDU_AR_DO_Bad_Length (c0-c4-e9) Yes

5.4.2.2 2 ACCESS_DENIED_ERROR_APDU_AR_DO_Bad_value (c0-62-b5) Yes

5.4.2.3 3 ACCESS_DENIED_ERROR_NFC_AR_DO_Bad_Length (c0-90-88) Yes

5.4.2.4 4ACCESS_DENIED_ERROR_NFC_AR_DO_Bad_Value (c0-d7-66) Yes

5.4.3.1

ACCESS_DENIED

1 ACCESS_DENIED_SUCCESS__ARA_M_locked (c0-36-1d) Yes

5.4.3.2 2 ACCESS_DENIED_SUCCESS__ARA_M_not_present (c0-36-1e) Yes

5.4.3.3 3 ACCESS_DENIED_SUCCESS__ARA_M_not_selectable (c0-f6-26) Yes

5.4.4.1 ALGORITHM_SPECIFIC_DEVICE_APP_AND_SPECIFI

C_SE_APP

1ALGORITHM_A_SUCCESS__R1_SEApp1_DevApp1__R2_All_All__request_DevApp2_SEApp1 (c0-ee-09)

Yes

5.4.4.2 2ALGORITHM_A_SUCCESS__R1_SEApp1_DevApp1__R2_All_All__request_DevApp2_SEApp1 (ff-ee-09)

Yes

5.4.5.1

ALGORITHM_SPECIFIC_DEVICE_APP_AND_GENERI

C_SE_APP

1ALGORITHM_C_SUCCESS__R1_All_SEApp_DevApp1__R2_All_All__request_DevApp2_SEApp1 (c0-d4-fb)

Yes

5.4.5.2 2ALGORITHM_C_SUCCESS__R1_All_SEApp_DevApp1__R2_All_All__request_DevApp2_SEApp1 (ff-d4-fb)

Yes

5.4.5.3 3ALGORITHM_C_SUCCESS__R1_All_SEApp_DevApp1_ALWAYS__R2_All_SEApp_DevApp2_NEVER (c0-40-30)

Yes

5.4.5.4 4ALGORITHM_C_SUCCESS__R1_All_SEApp_DevApp1_ALWAYS__R2_All_SEApp_DevApp2_NEVER (ff-40-30)

Yes

5.4.5.5 5ALGORITHM_C_SUCCESS__R1_All_SEApp_DevApp1_NEVER__R2_All_SEApp_DevApp2_ALWAYS (c0-80-26)

Yes

5.4.5.6 6ALGORITHM_C_SUCCESS__R1_All_SEApp_DevApp1_NEVER__R2_All_SEApp_DevApp2_ALWAYS (ff-80-26)

Yes

5.4.6.1ALGORITHM_GENERIC_DEVICE_APP_AND_GENE

1ALGORITHM_D_SUCCESS__All_SEApp_All_DevApp_APDU_access_ALWAYS (c0-2e-b0)

Yes

Page 560: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 560 of 606

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.6.2RIC_SE_APP

2 ALGORITHM_D_SUCCESS__All_SEApp_All_DevApp_APDU_access_ALWAYS (ff-2e-b0) Yes

5.4.6.3 3 ALGORITHM_D_SUCCESS__No_Rule (c0-cf-16) Yes

5.4.6.4 4 ALGORITHM_D_SUCCESS__No_Rule (ff-cf-16) Yes

5.4.7.1ANNEX_D_EXAM

PLE_01

1ANNEX_D_SUCCESS__example_01 (c0-38-cb) Yes

5.4.7.2 2 ANNEX_D_SUCCESS__example_01 (ff-38-cb) Yes

5.4.8.1ANNEX_D_EXAM

PLE_02

1 ANNEX_D_SUCCESS__example_02 (c0-a1-46) Yes

5.4.8.2 2 ANNEX_D_SUCCESS__example_02 (ff-a1-46) Yes

5.4.9.1ANNEX_D_EXAM

PLE_03

1 ANNEX_D_SUCCESS__example_03 (c0-39-49) Yes

5.4.9.2 2 ANNEX_D_SUCCESS__example_03 (ff-39-49) Yes

5.4.10.1ANNEX_D_EXAM

PLE_04

1 ANNEX_D_SUCCESS__example_04 (c0-2f-62) Yes

5.4.10.2 2 ANNEX_D_SUCCESS__example_04 (ff-2f-62)

Yes

5.4.11.1ANNEX_D_EXAM

PLE_05

1 ANNEX_D_SUCCESS__example_05 (c0-d2-97) Yes

5.4.11.2 2ANNEX_D_SUCCESS__example_05 (ff-d2-97) Yes

5.4.12.1ANNEX_D_EXAM

PLE_06

1 ANNEX_D_SUCCESS__example_06 (c0-51-08) Yes

5.4.12.2 2 ANNEX_D_SUCCESS__example_06 (ff-51-08) Yes

5.4.13.1ANNEX_D_EXAM

PLE_07

1 ANNEX_D_SUCCESS__example_07 (c0-e0-83) Yes

5.4.13.2 2 ANNEX_D_SUCCESS__example_07 (ff-e0-83) Yes

5.4.14.1ANNEX_D_EXAM

PLE_09

1 ANNEX_D_SUCCESS__example_09 (c0-4c-cb)

Yes

5.4.14.2 2 ANNEX_D_SUCCESS__example_09 (ff-4c-cb) Yes

Page 561: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 561 of 606

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.15.1ANNEX_D_EXAM

PLE_10

1 ANNEX_D_SUCCESS__example_10 (c0-ad-7d) Yes

5.4.15.2 2 ANNEX_D_SUCCESS__example_10 (ff-ad-7d) Yes

5.4.16.1ANNEX_D_EXAM

PLE_11

1 ANNEX_D_SUCCESS__example_11 (c0-f4-52) Yes

5.4.16.2 2ANNEX_D_SUCCESS__example_11 (ff-f4-52) Yes

5.4.17.1ANNEX_D_EXAM

PLE_12

1 ANNEX_D_SUCCESS__example_12 (c0-24-84) Yes

5.4.17.2 2 ANNEX_D_SUCCESS__example_12 (ff-24-84) Yes

5.4.18.1ANNEX_D_EXAM

PLE_13

1 ANNEX_D_SUCCESS__example_13 (c0-29-86) Yes

5.4.18.2 2 ANNEX_D_SUCCESS__example_13 (ff-29-86) Yes

5.4.19.1ANNEX_D_EXAM

PLE_14

1 ANNEX_D_SUCCESS__example_14 (c0-72-b7) Yes

5.4.19.2 2 ANNEX_D_SUCCESS__example_14 (ff-72-b7) Yes

5.4.20.1ANNEX_D_EXAM

PLE_15

1 ANNEX_D_SUCCESS__example_15 (c0-db-cb)

Yes

5.4.20.2 2 ANNEX_D_SUCCESS__example_15 (ff-db-cb) Yes

5.4.21.1ANNEX_D_EXAM

PLE_16

1ANNEX_D_SUCCESS__example_16 (c0-cf-17) Yes

5.4.21.2 2 ANNEX_D_SUCCESS__example_16 (ff-cf-17) Yes

5.4.22.1ANNEX_D_EXAM

PLE_17

1 ANNEX_D_SUCCESS__example_17 (c0-0b-29) Yes

5.4.22.2 2 ANNEX_D_SUCCESS__example_17 (ff-0b-29) Yes

5.4.23.1ANNEX_D_EXAM

PLE_18

1 ANNEX_D_SUCCESS__example_18 (c0-71-16) Yes

5.4.23.2 2 ANNEX_D_SUCCESS__example_18 (ff-71-16)

Yes

5.4.24.1 APDU_FILTER_DEFINITION 1 APDU_FILTER_DEFINITION_SUCCESS__A

LWAYS__true (c0-01-e8) Yes

Page 562: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 562 of 606

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.24.2 2 APDU_FILTER_DEFINITION_SUCCESS__ALWAYS__true (ff-01-e8) Yes

5.4.24.3 3 APDU_FILTER_DEFINITION_SUCCESS__FILTER__1_filter__true (c0-dc-08) Yes

5.4.24.4 4 APDU_FILTER_DEFINITION_SUCCESS__FILTER__1_filter__true (ff-dc-08) Yes

5.4.24.5 5APDU_FILTER_DEFINITION_SUCCESS__FILTER__2_filters__true (c0-6c-24) Yes

5.4.24.6 6 APDU_FILTER_DEFINITION_SUCCESS__FILTER__2_filters__true (ff-6c-24) Yes

5.4.24.7 7 APDU_FILTER_DEFINITION_SUCCESS__FILTER__3_filters__true (c0-44-7d) Yes

5.4.24.8 8 APDU_FILTER_DEFINITION_SUCCESS__FILTER__3_filters__true (ff-44-7d) Yes

5.4.24.9 9 APDU_FILTER_DEFINITION_SUCCESS__NEVER__false (c0-82-ed) Yes

5.4.24.10 10 APDU_FILTER_DEFINITION_SUCCESS__NEVER__false (ff-82-ed) Yes

5.4.25.1ACE_MANAGE_BI

G_RULES

1 BIG_RULES_MANAGEMENT_One_Big_Rule(c0-64-2b) Yes

5.4.25.2 2 BIG_RULES_MANAGEMENT_One_Big_Rule(ff-64-2b)

Yes

5.4.26.1

RULE_CONFLICT_RESOLUTION_MORE_RESTRICTI

VE

1CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_1_filter_0_match__R2_apdu_always (c0-68-d7)

Yes

5.4.26.2 2CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_1_filter_0_match__R2_apdu_always (ff-68-d7)

Yes

5.4.26.3 3CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_1_filter_1_match__R2_apdu_always (c0-fb-a4)

Yes

5.4.26.4 4CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_1_filter_1_match__R2_apdu_always (ff-fb-a4)

Yes

5.4.26.5 5CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_1_filter_2_match__R2_apdu_always (c0-87-cd)

Yes

5.4.26.6 6CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_1_filter_2_match__R2_apdu_always (ff-87-cd)

Yes

Page 563: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 563 of 606

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.26.7 7CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_2_filters_1_match_each__R2_apdu_always (c0-d7-15)

Yes

5.4.26.8 8CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_2_filters_1_match_each__R2_apdu_always (ff-d7-15)

Yes

5.4.26.9 9CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_always__R2_apdu_1_filter_0_match (c0-c9-58)

Yes

5.4.26.10 10CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_always__R2_apdu_1_filter_0_match (ff-c9-58)

Yes

5.4.26.11 11CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_always__R2_apdu_1_filter_1_match (c0-2d-54)

Yes

5.4.26.12 12CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_always__R2_apdu_1_filter_1_match (ff-2d-54)

Yes

5.4.26.13 13CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_always__R2_apdu_1_filter_2_match (c0-e1-ed)

Yes

5.4.26.14 14CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_always__R2_apdu_1_filter_2_match (ff-e1-ed)

Yes

5.4.26.15 15CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_always__R2_apdu_2_filters_1_match_each (c0-9b-af)

Yes

5.4.26.16 16CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_always__R2_apdu_2_filters_1_match_each (ff-9b-af)

Yes

5.4.26.17 17CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_always__R2_apdu_always (c0-73-51)

Yes

5.4.26.18 18CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_always__R2_apdu_always (ff-73-51)

Yes

5.4.26.19 19CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_always__R2_apdu_never (c0-42-e5)

Yes

5.4.26.20 20CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_always__R2_apdu_never (ff-42-e5)

Yes

Page 564: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 564 of 606

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.26.21 21CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_filter__R2_apdu_filter (c0-55-e2)

Yes

5.4.26.22 22CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_filter__R2_apdu_filter (ff-55-e2) Yes

5.4.26.23 23CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_filter__R2_apdu_never (c0-78-2b)

Yes

5.4.26.24 24CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_filter__R2_apdu_never (ff-78-2b)

Yes

5.4.26.25 25CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_never__R2_apdu_always (c0-b4-23)

Yes

5.4.26.26 26CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_never__R2_apdu_always (ff-b4-23)

Yes

5.4.26.27 27CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_never__R2_apdu_filter (c0-21-c2)

Yes

5.4.26.28 28CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_never__R2_apdu_filter (ff-21-c2)

Yes

5.4.26.29 29CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_never__R2_apdu_never (c0-e1-e4)

Yes

5.4.26.30 30CONFLICT_SUCCESS__1_SEApp_1_DevApp__R1_apdu_never__R2_apdu_never (ff-e1-e4)

Yes

5.4.26.31 31CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_1_filter_0_match__R2_apdu_always (c0-58-e2)

Yes

5.4.26.32 32CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_1_filter_0_match__R2_apdu_always (ff-58-e2)

Yes

5.4.26.33 33CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_1_filter_1_match__R2_apdu_always (c0-0c-1d)

Yes

5.4.26.34 34CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_1_filter_1_match__R2_apdu_always (ff-0c-1d)

Yes

Page 565: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 565 of 606

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.26.35 35CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_1_filter_2_match__R2_apdu_always (c0-c4-0e)

Yes

5.4.26.36 36CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_1_filter_2_match__R2_apdu_always (ff-c4-0e)

Yes

5.4.26.37 37CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_2_filters_1_match_each__R2_apdu_always (c0-29-e9)

Yes

5.4.26.38 38CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_2_filters_1_match_each__R2_apdu_always (ff-29-e9)

Yes

5.4.26.39 39CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_always__R2_apdu_1_filter_0_match (c0-c8-fb)

Yes

5.4.26.40 40CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_always__R2_apdu_1_filter_0_match (ff-c8-fb)

Yes

5.4.26.41 41CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_always__R2_apdu_1_filter_1_match (c0-49-26)

Yes

5.4.26.42 42CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_always__R2_apdu_1_filter_1_match (ff-49-26)

Yes

5.4.26.43 43CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_always__R2_apdu_1_filter_2_match (c0-00-3a)

Yes

5.4.26.44 44CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_always__R2_apdu_1_filter_2_match (ff-00-3a)

Yes

5.4.26.45 45CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_always__R2_apdu_2_filters_1_match_each (c0-c2-82)

Yes

5.4.26.46 46CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_always__R2_apdu_2_filters_1_match_each (ff-c2-82)

Yes

5.4.26.47 47CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_always__R2_apdu_always(c0-41-a5)

Yes

5.4.26.48 48CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_always__R2_apdu_always (ff-41-a5)

Yes

Page 566: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 566 of 606

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.26.49 49CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_always__R2_apdu_never (c0-16-b9)

Yes

5.4.26.50 50CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_always__R2_apdu_never (ff-16-b9)

Yes

5.4.26.51 51CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_filter__R2_apdu_filter (c0-03-40)

Yes

5.4.26.52 52CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_filter__R2_apdu_filter (ff-03-40)

Yes

5.4.26.53 53CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_filter__R2_apdu_never (c0-d7-89)

Yes

5.4.26.54 54CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_filter__R2_apdu_never (ff-d7-89)

Yes

5.4.26.55 55CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_never__R2_apdu_always (c0-2d-17)

Yes

5.4.26.56 56CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_never__R2_apdu_always (ff-2d-17)

Yes

5.4.26.57 57CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_never__R2_apdu_filter (c0-50-39)

Yes

5.4.26.58 58CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_never__R2_apdu_filter (ff-50-39)

Yes

5.4.26.59 59CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_never__R2_apdu_never (c0-29-95)

Yes

5.4.26.60 60CONFLICT_SUCCESS__1_SEApp_All_DevApp__R1_apdu_never__R2_apdu_never (ff-29-95)

Yes

5.4.26.61 61CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_1_filter_0_match__R2_apdu_always (c0-9c-1e)

Yes

5.4.26.62 62CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_1_filter_0_match__R2_apdu_always (ff-9c-1e)

Yes

Page 567: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 567 of 606

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.26.63 63CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_1_filter_1_match__R2_apdu_always (c0-91-2e)

Yes

5.4.26.64 64CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_1_filter_1_match__R2_apdu_always (ff-91-2e)

Yes

5.4.26.65 65CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_1_filter_2_match__R2_apdu_always (c0-e8-cf)

Yes

5.4.26.66 66CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_1_filter_2_match__R2_apdu_always (ff-e8-cf)

Yes

5.4.26.67 67CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_2_filters_1_match_each__R2_apdu_always (c0-b3-b0)

Yes

5.4.26.68 68CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_2_filters_1_match_each__R2_apdu_always (ff-b3-b0)

Yes

5.4.26.69 69CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_always__R2_apdu_1_filter_0_match (c0-dd-11)

Yes

5.4.26.70 70CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_always__R2_apdu_1_filter_0_match (ff-dd-11)

Yes

5.4.26.71 71CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_always__R2_apdu_1_filter_1_match (c0-28-6e)

Yes

5.4.26.72 72CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_always__R2_apdu_1_filter_1_match (ff-28-6e)

Yes

5.4.26.73 73CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_always__R2_apdu_1_filter_2_match (c0-73-cf)

Yes

5.4.26.74 74CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_always__R2_apdu_1_filter_2_match (ff-73-cf)

Yes

5.4.26.75 75CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_always__R2_apdu_2_filters_1_match_each (c0-db-29)

Yes

5.4.26.76 76CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_always__R2_apdu_2_filters_1_match_each (ff-db-29)

Yes

Page 568: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 568 of 606

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.26.77 77CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_always__R2_apdu_always(c0-3c-2b)

Yes

5.4.26.78 78CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_always__R2_apdu_always (ff-3c-2b)

Yes

5.4.26.79 79CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_always__R2_apdu_never (c0-99-f5)

Yes

5.4.26.80 80CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_always__R2_apdu_never (ff-99-f5)

Yes

5.4.26.81 81CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_filter__R2_apdu_filter (c0-81-35)

Yes

5.4.26.82 82CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_filter__R2_apdu_filter (ff-81-35)

Yes

5.4.26.83 83CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_filter__R2_apdu_never (c0-5c-7f)

Yes

5.4.26.84 84CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_filter__R2_apdu_never (ff-5c-7f)

Yes

5.4.26.85 85CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_never__R2_apdu_always (c0-f2-08)

Yes

5.4.26.86 86CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_never__R2_apdu_always (ff-f2-08)

Yes

5.4.26.87 87CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_never__R2_apdu_filter (c0-bf-dc)

Yes

5.4.26.88 88CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_never__R2_apdu_filter (ff-bf-dc)

Yes

5.4.26.89 89CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_never__R2_apdu_never___false (c0-7a-bc)

Yes

5.4.26.90 90CONFLICT_SUCCESS__All_SEApp_1_DevApp__R1_apdu_never__R2_apdu_never___false (ff-7a-bc)

Yes

Page 569: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 569 of 606

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.26.91 91CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_1_filter_0_match__R2_apdu_always (c0-b0-96)

Yes

5.4.26.92 92CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_1_filter_0_match__R2_apdu_always (ff-b0-96)

Yes

5.4.26.93 93CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_1_filter_1_match__R2_apdu_always (c0-52-54)

Yes

5.4.26.94 94CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_1_filter_1_match__R2_apdu_always (ff-52-54)

Yes

5.4.26.95 95CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_1_filter_2_match__R2_apdu_always (c0-70-6c)

Yes

5.4.26.96 96CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_1_filter_2_match__R2_apdu_always (ff-70-6c)

Yes

5.4.26.97 97CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_2_filters_1_match_each__R2_apdu_always (c0-58-13)

Yes

5.4.26.98 98CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_2_filters_1_match_each__R2_apdu_always (ff-58-13)

Yes

5.4.26.99 99CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_always__R2_apdu_1_filter_0_match (c0-4b-98)

Yes

5.4.26.100 100CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_always__R2_apdu_1_filter_0_match (ff-4b-98)

Yes

5.4.26.101 101CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_always__R2_apdu_1_filter_1_match (c0-38-d9)

Yes

5.4.26.102 102CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_always__R2_apdu_1_filter_1_match (ff-38-d9)

Yes

5.4.26.103 103CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_always__R2_apdu_1_filter_2_match (c0-85-6b)

Yes

5.4.26.104 104CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_always__R2_apdu_1_filter_2_match (ff-85-6b)

Yes

Page 570: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 570 of 606

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.26.105 105CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_always__R2_apdu_2_filters_1_match_each (c0-3c-9f)

Yes

5.4.26.106 106CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_always__R2_apdu_2_filters_1_match_each (ff-3c-9f)

Yes

5.4.26.107 107CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_always__R2_apdu_always(c0-06-0b)

Yes

5.4.26.108 108CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_always__R2_apdu_always(ff-06-0b)

Yes

5.4.26.109 109CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_always__R2_apdu_never(c0-c8-59)

Yes

5.4.26.110 110CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_always__R2_apdu_never (ff-c8-59)

Yes

5.4.26.111 111CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_filter__R2_apdu_filter (c0-76-bc)

Yes

5.4.26.112 112CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_filter__R2_apdu_filter (ff-76-bc)

Yes

5.4.26.113 113CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_filter__R2_apdu_never (c0-b0-d6)

Yes

5.4.26.114 114CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_filter__R2_apdu_never (ff-b0-d6)

Yes

5.4.26.115 115CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_never__R2_apdu_always(c0-09-ca)

Yes

5.4.26.116 116CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_never__R2_apdu_always (ff-09-ca)

Yes

5.4.26.117 117CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_never__R2_apdu_filter (c0-b1-4f)

Yes

5.4.26.118 118CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_never__R2_apdu_filter (ff-b1-4f)

Yes

Page 571: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 571 of 606

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.26.119 119CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_never__R2_apdu_never (c0-74-d7)

Yes

5.4.26.120 120CONFLICT_SUCCESS__All_SEApp_All_DevApp__R1_apdu_never__R2_apdu_never (ff-74-d7)

Yes

5.4.26.121 121CONFLICT_SUCCESS__R1_1_SEApp_1_DevApp_ALWAYS__R2_All_SEApp_1_DevApp_NEVER (c0-61-bf)

Yes

5.4.26.122 122CONFLICT_SUCCESS__R1_1_SEApp_1_DevApp_ALWAYS__R2_All_SEApp_1_DevApp_NEVER (ff-61-bf)

Yes

5.4.26.123 123CONFLICT_SUCCESS__R1_1_SEApp_1_DevApp_NEVER__R2_All_SEApp_1_DevApp_ALWAYS (c0-38-79)

Yes

5.4.26.124 124CONFLICT_SUCCESS__R1_1_SEApp_1_DevApp_NEVER__R2_All_SEApp_1_DevApp_ALWAYS (ff-38-79)

Yes

5.4.27.1

RULES_CACHED_IN_DEVICE_ACCESS_GRANTED_

OR_NOT

1RULES_CACHED_IN_DEVICE_ACCESS_GRANTED_SUCCESS__access_granted (c0-39-94)

Yes

5.4.27.2 2RULES_CACHED_IN_DEVICE_ACCESS_GRANTED_SUCCESS__access_granted (ff-39-94)

Yes

5.4.27.3 3RULES_CACHED_IN_DEVICE_ACCESS_GRANTED_SUCCESS__access_not_granted(c0-40-f5)

Yes

5.4.27.4 4RULES_CACHED_IN_DEVICE_ACCESS_GRANTED_SUCCESS__access_not_granted(ff-40-f5)

Yes

5.4.27.5 5 RULES_CACHED_IN_DEVICE_FILTER_APDU_SUCCESS__filter_not_passed (c0-5a-ed)

Yes

5.4.27.6 6 RULES_CACHED_IN_DEVICE_FILTER_APDU_SUCCESS__filter_not_passed (ff-5a-ed) Yes

5.4.27.7 7RULES_CACHED_IN_DEVICE_FILTER_APDU_SUCCESS__filter_passed (c0-27-ed) Yes

5.4.27.8 8 RULES_CACHED_IN_DEVICE_FILTER_APDU_SUCCESS__filter_passed (ff-27-ed) Yes

5.4.28.1RULE_SPECIFIC_EXCLUDES_GEN

ERIC_ONE1

RULES_SPECIFIC_EXCLUDE_GENERIC_SUCCESS__R1_SEApp1_DevApp1_ALWAYS__R2_SEApp1_DevApp2_NEVER (c0-25-7c)

Yes

Page 572: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 572 of 606

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.28.2 2RULES_SPECIFIC_EXCLUDE_GENERIC_SUCCESS__R1_SEApp1_DevApp1_ALWAYS__R2_SEApp1_DevApp2_NEVER (ff-61-94)

Yes

5.4.28.3 3RULES_SPECIFIC_EXCLUDE_GENERIC_SUCCESS__R1_SEApp1_DevApp1_NEVER__R2_SEApp1_DevApp2_ALWAYS (c0-1d-e7)

Yes

5.4.28.4 4RULES_SPECIFIC_EXCLUDE_GENERIC_SUCCESS__R1_SEApp1_DevApp1_NEVER__R2_SEApp1_DevApp2_ALWAYS (ff-1d-e7)

Yes

5.4.28.5 5RULES_SPECIFIC_EXCLUDE_GENERIC_SUCCESS__rule_SEApp1_DevApp1__no_rule_SEApp1_DevApp2 (c0-a3-3d)

Yes

5.4.28.6 6RULES_SPECIFIC_EXCLUDE_GENERIC_SUCCESS__rule_SEApp1_DevApp1__no_rule_SEApp1_DevApp2 (ff-a3-3d)

Yes

5.4.29.1

RULES_TARGET

1RULES_TARGET_SUCCESS__1_SEApp__1_DevApp__APDU_Access_ALWAYS (c0-0f-f2)

Yes

5.4.29.2 2 RULES_TARGET_SUCCESS__1_SEApp__1_DevApp__APDU_Access_ALWAYS (ff-0f-f2)

Yes

5.4.29.3 3 RULES_TARGET_SUCCESS__1_SEApp__1_DevApp__APDU_Access_FILTER (c0-ca-f7) Yes

5.4.29.4 4RULES_TARGET_SUCCESS__1_SEApp__1_DevApp__APDU_Access_FILTER (ff-ca-f7) Yes

5.4.29.5 5RULES_TARGET_SUCCESS__1_SEApp__1_DevApp__APDU_Access_NEVER__NFC_Access_NEVER (c0-c5-18)

Yes

5.4.29.6 6RULES_TARGET_SUCCESS__1_SEApp__1_DevApp__APDU_Access_NEVER__NFC_Access_NEVER (ff-c5-18)

Yes

5.4.29.7 7RULES_TARGET_SUCCESS__1_SEApp__2_DevApp__APDU_Access_ALWAYS (c0-9c-6f)

Yes

5.4.29.8 8 RULES_TARGET_SUCCESS__1_SEApp__2_DevApp__APDU_Access_ALWAYS (ff-9c-6f) Yes

5.4.29.9 9RULES_TARGET_SUCCESS__1_SEApp__All_DevApp__APDU_Access_ALWAYS (c0-3c-d7)

Yes

5.4.29.10 10RULES_TARGET_SUCCESS__1_SEApp__All_DevApp__APDU_Access_ALWAYS (ff-3c-d7)

Yes

Page 573: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 573 of 606

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.29.11 11RULES_TARGET_SUCCESS__1_SEApp__All_DevApp__APDU_Access_FILTER (c0-8b-13)

Yes

5.4.29.12 12RULES_TARGET_SUCCESS__1_SEApp__All_DevApp__APDU_Access_FILTER (ff-8b-13)

Yes

5.4.29.13 13RULES_TARGET_SUCCESS__1_SEApp__All_DevApp__APDU_Access_NEVER (c0-68-75)

Yes

5.4.29.14 14RULES_TARGET_SUCCESS__1_SEApp__All_DevApp__APDU_Access_NEVER (ff-68-75)

Yes

5.4.29.15 15RULES_TARGET_SUCCESS__All_SEApp__1_DevApp__APDU_Access_ALWAYS (c0-64-b0)

Yes

5.4.29.16 16RULES_TARGET_SUCCESS__All_SEApp__1_DevApp__APDU_Access_ALWAYS (ff-64-b0)

Yes

5.4.29.17 17RULES_TARGET_SUCCESS__All_SEApp__1_DevApp__APDU_Access_FILTER (c0-9c-4f)

Yes

5.4.29.18 18 RULES_TARGET_SUCCESS__All_SEApp__1_DevApp__APDU_Access_FILTER (ff-9c-4f) Yes

5.4.29.19 19RULES_TARGET_SUCCESS__All_SEApp__1_DevApp__APDU_Access_NEVER (c0-88-b4)

Yes

5.4.29.20 20RULES_TARGET_SUCCESS__All_SEApp__1_DevApp__APDU_Access_NEVER (ff-88-b4)

Yes

5.4.29.21 21RULES_TARGET_SUCCESS__All_SEApp__All_DevApp__APDU_Access_ALWAYS (c0-1a-31)

Yes

5.4.29.22 22RULES_TARGET_SUCCESS__All_SEApp__All_DevApp__APDU_Access_ALWAYS (ff-1a-31)

Yes

5.4.29.23 23RULES_TARGET_SUCCESS__All_SEApp__All_DevApp__APDU_Access_FILTER (c0-59-59)

Yes

5.4.29.24 24RULES_TARGET_SUCCESS__All_SEApp__All_DevApp__APDU_Access_FILTER (ff-59-59)

Yes

Page 574: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 574 of 606

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.29.25 25RULES_TARGET_SUCCESS__All_SEApp__All_DevApp__APDU_Access_NEVER (c0-55-81)

Yes

5.4.29.26 26RULES_TARGET_SUCCESS__All_SEApp__All_DevApp__APDU_Access_NEVER (ff-55-81)

Yes

5.4.29.27 27RULES_TARGET_SUCCESS__All_SEApp__All_DevApp__NFC_Access_ALWAYS (c0-b1-9a)

Yes

5.4.29.28 28RULES_TARGET_SUCCESS__All_SEApp__All_DevApp__NFC_Access_ALWAYS (ff-b1-9a)

Yes

5.4.30.1

RULES_CACHED_IN_DEVICE_REFRESH_TAG_DEVI

CE_SIDE

1 RULES_UPDATED_SUCCESS__All_rules_deleted (c0-53-95) Yes

5.4.30.2 2 RULES_UPDATED_SUCCESS__All_rules_deleted (ff-53-95)

Yes

5.4.30.3 3RULES_UPDATED_SUCCESS__Old_All_SEApp_DevApp1_ALWAYS__New_All_SEApp_All_DevApp_ALWAYS (c0-60-75)

Yes

5.4.30.4 4RULES_UPDATED_SUCCESS__Old_All_SEApp_DevApp1_ALWAYS__New_All_SEApp_All_DevApp_ALWAYS (ff-60-75)

No

5.4.30.5 5RULES_UPDATED_SUCCESS__Old_All_SEApp_DevApp1_NEVER__New_All_SEApp_DevApp2_ALWAYS (c0-d9-54)

Yes

5.4.30.6 6RULES_UPDATED_SUCCESS__Old_All_SEApp_DevApp1_NEVER__New_All_SEApp_DevApp2_ALWAYS (ff-d9-54)

Yes

5.4.30.7 7RULES_UPDATED_SUCCESS__Rule_All_SEApp_DevApp1_NEVER__Delete_All_SEApp_All_DevApp (c0-df-ce)

Yes

5.4.30.8 8RULES_UPDATED_SUCCESS__Rule_All_SEApp_DevApp1_NEVER__Delete_SEApp1_DevApp1_ALWAYS (c0-07-84)

Yes

5.4.30.9 9RULES_UPDATED_SUCCESS__rule_equally_restrictive_added__filters_merged (c0-e5-98) Yes

5.4.30.10 10 RULES_UPDATED_SUCCESS__rule_equally_restrictive_added__filters_merged (ff-e5-98) No

5.4.30.11 11 RULES_UPDATED_SUCCESS__rule_less_restrictive_added (c0-e8-d9) Yes

Page 575: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 575 of 606

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.30.12 12 RULES_UPDATED_SUCCESS__rule_less_restrictive_added (ff-e8-d9) No

5.4.30.13 13RULES_UPDATED_SUCCESS__rule_modified_from_APDU_access_ALWAYS_to_NEVER (c0-06-c3)

Yes

5.4.30.14 14RULES_UPDATED_SUCCESS__rule_modified_from_APDU_access_ALWAYS_to_NEVER (ff-06-c3)

Yes

5.4.30.15 15RULES_UPDATED_SUCCESS__rule_modified_from_APDU_access_NEVER_to_ALWAYS (c0-90-64)

Yes

5.4.30.16 16RULES_UPDATED_SUCCESS__rule_modified_from_APDU_access_NEVER_to_ALWAYS (ff-90-64)

No

5.4.30.17 17 RULES_UPDATED_SUCCESS__rule_more_restrictive_added (c0-90-c9)

Yes

5.4.30.18 18 RULES_UPDATED_SUCCESS__rule_more_restrictive_added (ff-90-c9) Yes

5.4.30.19 19RULES_UPDATED_SUCCESS__rule_with_higher_priority_added (c0-a2-fd) Yes

5.4.30.20 20 RULES_UPDATED_SUCCESS__rule_with_higher_priority_added (ff-a2-fd) Yes

5.4.30.21 21 RULES_UPDATED_SUCCESS__rule_with_lower_priority_added (c0-93-41) Yes

5.4.30.22 22 RULES_UPDATED_SUCCESS__rule_with_lower_priority_added (ff-93-41) No

5.4.31.1

SPECIFIC_CASE_ARF

1 SPECIFIC_CASE_ARF_ACCF_with_many_dummy_hashes (0b-a7-07) Yes

5.4.31.2 2 SPECIFIC_CASE_ARF_ACRF_with_many_dummy_se_aids (0b-b9-07) Yes

5.4.31.3 3 SPECIFIC_CASE_ARF_one_ACCF_with_2_hashes (0b-85-07) Yes

5.4.31.4 4SPECIFIC_CASE_ARF_shared_ACCF_for_2_different_rules (0b-11-07) No

5.4.32.1SPECIFIC_RULES_HAVE_PRIORITY

1SPECIFIC_RULES_PRIORITY_SUCCESS__R1_1_SEApp_1_DevApp__R2_1_SEApp_All_DevApp (c0-3f-5e)

Yes

5.4.32.2 2SPECIFIC_RULES_PRIORITY_SUCCESS__R1_1_SEApp_1_DevApp__R2_1_SEApp_All_DevApp (ff-3f-5e)

Yes

Page 576: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 576 of 606

TS.27Numbering Requirement

IDTestCase

GlobalPlatform Test case Included

5.4.32.3 3SPECIFIC_RULES_PRIORITY_SUCCESS__R1_1_SEApp_1_DevApp__R2_All_SEApp_1_DevApp (c0-e2-eb)

Yes

5.4.32.4 4SPECIFIC_RULES_PRIORITY_SUCCESS__R1_1_SEApp_1_DevApp__R2_All_SEApp_1_DevApp (ff-e2-eb)

Yes

5.4.32.5 5SPECIFIC_RULES_PRIORITY_SUCCESS__R1_1_SEApp_All_DevApp__R2_All_SEApp_1_DevApp (c0-9e-3b)

Yes

5.4.32.6 6SPECIFIC_RULES_PRIORITY_SUCCESS__R1_1_SEApp_All_DevApp__R2_All_SEApp_1_DevApp (ff-9e-3b)

Yes

5.4.32.7 7SPECIFIC_RULES_PRIORITY_SUCCESS__R1_1_SEApp_All_DevApp__R2_All_SEApp_All_DevApp (c0-db-bd)

Yes

5.4.32.8 8SPECIFIC_RULES_PRIORITY_SUCCESS__R1_1_SEApp_All_DevApp__R2_All_SEApp_All_DevApp (ff-db-bd)

Yes

5.4.32.9 9SPECIFIC_RULES_PRIORITY_SUCCESS__R1_All_SEApp_1_DevApp__R2_All_SEApp_All_DevApp (c0-9b-05)

Yes

5.4.32.10 10SPECIFIC_RULES_PRIORITY_SUCCESS__R1_All_SEApp_1_DevApp__R2_All_SEApp_All_DevApp (ff-9b-05)

Yes

Table B.8.1: Global Platform Secure Element Access Control Test Cases

Page 577: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 577 of 606

B.9 NFC Forum Tag Operation, Analog and Digital Testing

B.9.1 Tag OperationReference test Specification: The test book refers to “NFC Forum Test Cases for Type 1Tag Operation” specification. The following table indicates which test cases are included inthe current version of the Test Book:

TS.27 Numbering NFC Forum Test case description

3.3.3.24.1.3.5.4.3 3.5.4.3Read/Write Testing Static - Read Operation 2[TC_T1T_READ_BV_2] - FFS

3.3.3.24.1.3.5.4.4 3.5.4.4Read/Write Testing Static - Write Operation 2[TC_T1T_WRITE_BV_2] - FFS

3.3.3.24.1.3.3.4.5 3.5.4.5Read/Write Testing Static - Read Operation 3[TC_T1T_READ_BV_3] - FFS

3.3.3.24.1.3.5.4.6 3.5.4.6Read/Write Testing Static - Write Operation 3 to a READ_ONLYtag [TC_T1T_WRITE_BV_3] - FFS

3.3.3.24.1.3.5.4.9 3.5.4.9Read/Write Testing Dynamic - Read Operation 5[TC_T1T_READ_BV_5]

3.3.3.24.1.3.5.4.10 3.5.4.10Read/Write Testing Dynamic - Write Operation 5[TC_T1T_WRITE_BV_5]

3.3.3.24.1.3.5.4.11 3.5.4.11 Transition to READ ONLY [TC_T1T_TRANS_BV_1]

Table B.9.1: NFC Forum Test Cases for Type 1 Tag Operation

Reference test Specification: The test book refers to “NFC Forum Test Cases for Type 2Tag Operation” specification.

The following table indicates which test cases are included in the current version of the TestBook:

TS.27 Numbering NFC Forum Test case description

3.3.3.24.2.3.5.2.1 3.5.2.1 NDEF Read from Version 1.2 Type 2 tag [TC_T2T_NDA_BV_1]

3.3.3.24.2.3.5.2.2 3.5.2.2 NDEF Read from Version 2.0 Type 2 tag [TC_T2T_NDA_BV_2]

3.3.3.24.2.3.5.4.1 3.5.4.1 NDEF Detection and Read from Type 2 tag (x = 0 to 2)[TC_T2T_NDA_BV_3_x]

3.3.3.24.2.3.5.4.2 3.5.4.2 NDEF Write on INITIALIZED Type 2 tag (x = 0 to 2)[TC_T2T_NDA_BV_4_x]

3.3.3.24.2.3.5.4.3 3.5.4.3 NDEF Write on READ-ONLY Type 2 tag [TC_T2T_NDA_BV_5]

3.3.3.24.2.3.5.4.4 3.5.4.4 Transitions from READ/WRITE to READ-ONLY (x = 0 to 2)[TC_T2T_NDA_BV_6_x]

Table B.9.2: NFC Forum Test Cases for Type 2 Tag Operation

Reference test Specification: The test book refers to “NFC Forum Test Cases for Type 3Tag Operation”.

Page 578: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 578 of 606

The following table indicates which test cases are included in the current version of the TestBook:

TS.27 Numbering NFC Forum Test case description

3.3.3.24.3.3.1.1.1 3.1.1.1 Manufacture Parameter (PMm) and Maximum Timing[TC_T3T_MEM_BV_1]

3.3.3.24.3.3.3.1.1 3.3.1.1 Frame Structure and Communication Protocol[TC_T3T_FTH_BV_1]

3.3.3.24.3.3.4.1.1 3.4.1.1 Update Command and Check Command [TC_T3T_CSE_BV_1]

3.3.3.24.3.3.4.2.1 3.4.2.1 Block List Format [TC_T3T_CSE_BV_2]

3.3.3.24.3.3.5.1.1 3.5.1.1 NDEF Management data RWFlag [TC_T3T_NDA_BV_1]

3.3.3.24.3.3.5.2.1 3.5.2.1 Versioning (x=0 to 2) [TC_T3T_NDA_BV_2_x]

3.3.3.24.3.3.5.3.1 3.5.3.1 NDEF Detection and Read Sequence (x=0 or 1)[TC_T3T_NDA_BV_3_x]

3.3.3.24.3.3.5.3.2 3.5.3.2 NDEF Write Sequence [TC_T3T_NDA_BV_4]

Table B.9.3: NFC Forum Test Cases for Type 3 Tag Operation

Reference test Specification: The test book refers to “NFC Forum Test Cases for Type 4Tag”.The following table indicates which test cases are included in the current version of theTest Book:

TS.27 Numbering NFC Forum Test case description

3.3.3.24.4.3.5.2.1 3.5.2.1 NDEF Read from Version 2.2 Type 4 Tag [TC_T4T_NDA_BV_1]

3.3.3.24.4.3.5.2.2 3.5.2.2 NDEF Read from Version 3.0 Type 4 Tag [TC_T4T_NDA_BV_2]

3.3.3.24.4.3.5.4.1 3.5.4.1 NDEF Detection and Read from Type 4 Tag[TC_T4T_NDA_BV_3]

3.3.3.24.4.3.5.4.2 3.5.4.2 NDEF Write on INITIALISED Type 4 Tag [TC_T4T_NDA_BV_4]

3.3.3.24.4.3.5.4.3 3.5.4.3 NDEF Write on READ-ONLY Type 4 Tag [TC_T4T_NDA_BV_5]

Table B.9.4: NFC Forum Test Cases for Type 4 Tag Operation

B.9.2 Analog TestsThis Annex refers to test cases from any version including “NFC Forum Test Cases forAnalog v2.0” [40].

B.9.2.1 NFC Forum Test Cases for Analog (all valid versions)The following table lists the test cases relevant for all referenced versions of NFC ForumAnalog test specifications.

TS.27 Numbering NFC Forum Test case description

3.3.3.25.9.1.1.1 9.1.1.1 Power Reception Test for NFC-A at Minimum Conditions

3.3.3.25.9.1.1.2 9.1.1.2 Power Reception Test for NFC-A at Nominal Conditions

3.3.3.25.9.1.1.3 9.1.1.3 Power Reception Test for NFC-A at Maximum Conditions

3.3.3.25.9.1.1.4 9.1.1.4 Power Reception Test for NFC-B at Minimum Conditions

Page 579: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 579 of 606

TS.27 Numbering NFC Forum Test case description

3.3.3.25.9.1.1.5 9.1.1.5 Power Reception Test for NFC-B at Nominal Conditions

3.3.3.25.9.1.1.6 9.1.1.6 Power Reception Test for NFC-B at Maximum Conditions

3.3.3.25.9.1.1.7 9.1.1.7 Power Reception Test for NFC-F at Minimum Conditions

3.3.3.25.9.1.1.8 9.1.1.8 Power Reception Test for NFC-F at Nominal Conditions

3.3.3.25.9.1.1.9 9.1.1.9 Power Reception Test for NFC-F at Maximum Conditions

3.3.3.25.9.1.1.11 9.1.1.11 Carrier Frequency Test

3.3.3.25.9.1.2.1 9.1.2.1 Modulation Polling Device to Listening Device at Limit Conditions– NFC-A

3.3.3.25.9.1.2.2 9.1.2.2 Modulation Polling Device to Listening Device at Limit Conditions– NFC-B

3.3.3.25.9.1.2.3 9.1.2.3 Modulation Polling Device to Listening Device at Limit Conditions– NFC-F

3.3.3.25.9.1.3.4 9.1.3.4 Subcarrier Modulation – NFC-A

3.3.3.25.9.1.3.5 9.1.3.5 Subcarrier Modulation – NFC-B

3.3.3.25.9.2.1.2 9.2.1.2 Maximum Power Emission Measurement

3.3.3.25.9.2.1.3 9.2.1.3 Carrier Frequency Measurement

3.3.3.25.9.2.1.5 9.2.1.5 Threshold Level Test

3.3.3.25.9.2.2.1 9.2.2.1 Modulation Polling Device to Listening Device – NFC-A

3.3.3.25.9.2.2.2 9.2.2.2 Modulation Polling Device to Listening Device – NFC-B

3.3.3.25.9.2.2.3 9.2.2.3 Modulation Polling Device to Listening Device – NFC-FTable B.9.5: NFC Forum Test Cases for Analog (all valid versions)

Page 580: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 580 of 606

B.9.2.2 VOID

B.9.2.3 NFC Forum Test Cases for Analog V2.0 only

The following table lists the test cases specific for NFC Forum Analog V2.0.

TS.27 Numbering NFC Forum Test case description

3.3.3.27.9.1.1.10 9.1.1.10 Loading Effect Measurement

3.3.3.27.9.1.1.12 9.1.1.12 Power On and Off Test for NFC-A

3.3.3.27.9.1.1.13 9.1.1.13 Power On and Off Test for NFC-B

3.3.3.27.9.1.1.14 9.1.1.14 Power On and Off Test for NFC-F

3.3.3.27.9.1.3.1 9.1.3.1 Load Modulation Amplitude for NFC-A

3.3.3.27.9.1.3.2 9.1.3.2 Load Modulation Amplitude for NFC-B

3.3.3.27.9.1.3.3 9.1.3.3 Load Modulation Amplitude for NFC-F

3.3.3.27.9.2.1.1 9.2.1.1 Minimum Power Emission Measurement

3.3.3.27.9.2.1.4 9.2.1.4 Reset Characteristics Measurement

3.3.3.27.9.2.3.1 9.2.3.1 Load Modulation Reception Test for NFC-A

3.3.3.27.9.2.3.2 9.2.3.2 Load Modulation Reception Test for NFC-B

3.3.3.27.9.2.3.3 9.2.3.3 Load Modulation Reception Test for NFC-F

Table B.9.6: NFC Forum Test Cases for Analog V2.0 only

B.9.3 Digital TestsThe device manufacturers shall prove the correct implementation of NFC Forum Digital andActivity specification. This proof can be provided by confirming

a) that the DUT uses a CLF with NFC Forum Certification Release [19] and complies tothe related rules for integrating a certified platform into the DUT.

Or

b) that the tests according to NFC Forum-TS-Digital Protocol- [19] and NFC Forum-TS-Activity [19] have been successfully performed by the device manufacturer.

Starting 1st January 2019 option a) SHALL be completed.

Page 581: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 581 of 606

B.10 ETSI TS 102 221 UICC-Terminal interfaceReference test Specification: ETSI TS 102 230-1 [41]

The following test cases are applicable:

1) Test cases verified by GCF WI 263 are listed in the table below. These test casesare validated by GCF.

Index TC Title

9.1.1 TERMINAL CAPABILITY – Additional interfaces support

Table B.10.1: List of applicable test cases from GCF WI 263

Page 582: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 582 of 606

Annex C Reference Tags - Real NFC TagsThe following is a list of currently available reference NFC tags that can be used in thescope of this document. Other suitable tags can also be used; for example, tags listed inprevious version of TS.27 are considered suitable.

Topaz512 (Type 1 Tag, Broadcom) NDEF Formatted for 466 bytes of Dynamic UserMemory, Antenna Size = 43x43mm

NTAG213 (Type 2 Tag, NXP) NDEF Formatted for 144 bytes of Dynamic UserMemory, Antenna Size = 42mm diameter

NTAG213 (Type 2 Tag, NXP) NDEF Formatted for up to 48 bytes of Static UserMemory, Antenna Size = 42mm diameter

Mifare Ultralight EV1 (Type 2 Tag, NXP), to be NDEF formatted, for 48 Bytes ofStatic User Memory, Antenna Size = 80x50mm

FeliCa Lite-S (Type 3 Tag, Sony Corp.) NDEF Formatted for 208 bytes of UserMemory, Antenna Size = 43x43mm

Mifare DESFire (Type 4A Tag, NXP) NDEF Formatted for 2k bytes of User Memory,Antenna Size = 80x50mm

RF430CL330H associated with RF430CL330HTB board antenna coil (Type 4B Tag,Texas Instruments) NDEF Formatted for 3k bytes of User Memory, Antenna Size =40mmx35mm

NOTE 1: The provided lists of NFC Tags do not include NFC Type 1 Tag with StaticMemory layout. Currently there are no commercially available Type 1 Tagswith Static Memory Layout.

Page 583: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 583 of 606

Annex D NFC Device Implementation statement (Informative)The xls below indicates the device features and all test cases from the present version ofthe Test Book:

TS27_Device_feature_statement_v13-0.xlsx

Page 584: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 584 of 606

Annex E Test Case configuration files

E.1 Reference PKCS#15 files

E.1.1 Directory file (EF_DIR)

Files Type Elementary File

Data Structure Record

File ID 3F00 2F00

Access Conditions

READ Always

Data Object Additional record for EF_DIR

T T T T T L V

61 14

4F 0C A000000063504B43532D3135

51 04 3F00 7F50

E.1.2 Object Directory File (EF_ODF)

Files Type Elementary File

Data Structure Transparent

File ID 5031

Access Conditions

READ Always

Data Object

T T T T T L V

A5 06

30 04

04 02 5205

A7 06

30 04

04 02 5207

E.1.3 Data Object Directory File (EF_DODF)

Page 585: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 585 of 606

Files Type Elementary File

Data Structure Transparent

File ID 5207

Access Conditions

READ Always

Data Object

T T T T T L V

A1 29

30 00

30 0F

0C 0D 4750205345204163632043746C

A1 14

30 12

06 0A 2A864886FC6B81480101

30 04

04 02 4200

E.1.4 Certificate Directory File (EF_CDF)

Files Type Elementary File

Data Structure Transparent

File ID 5205

Access Conditions

READ Always

Data Object Certificate #1

T T T T T L V

30 1D

30 0C

0C 0A 47534D41203031204341

30 03

04 01 01

A1 08

30 06

Page 586: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 586 of 606

30 04

04 02 4361

Data Object Certificate #2

T T T T T L V

30 1D

30 0C

0C 0A 47534D41203032204341

30 03

04 01 02

A1 08

30 06

30 04

04 02 4362

E.2 Reference GSMA files for PKCS#15 structure

E.2.1 Certificate Files

The content of the file is not described in this document but it is understood that itshould be filled by X.509 certificates [29].

Certificate #01

Files Type Elementary File

Data Structure Transparent

File ID 4361

Access Conditions

READ Always

Certificate #02

Files Type Elementary File

Data Structure Transparent

File ID 4362

Access Conditions

READ Always

Page 587: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 587 of 606

E.2.2 Access Control Files

EF ACMain

Files Type Elementary File

Data Structure Transparent

File ID 4200

Access Conditions

READ Always

Data Object

T T T T T L V

30 10

04 08 0102030405060708

30 04

04 02 4300

EF ACRules

Files Type Elementary File

Data Structure Transparent

File ID 4300

Access Conditions

READ Always

E.3 AIDs referenced by PKCS#15 files

The reference PKCS#15 structures are using the following AID-s:AID01 = ‘A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31’

AID02 = ‘A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 32’

AID03 = ‘A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 33’

E.4 Specific configuration files for test case 5.3.1.1

PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

Page 588: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 588 of 606

|- EF ACConditions1 (4310)

ACRules:

30 08 82 00 30 04 04 02 43 10

ACConditions1:

30 16 04 14 [Hash of Certificate #01 (20 bytes)]

E.5 Specific configuration files for test case 5.3.1.2

PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

ACRules:

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 30 04 04 02 43 10

ACConditions1:

30 00

E.6 Specific configuration files for test case 5.3.1.3

PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

ACRules:

30 08 82 00 30 04 04 02 43 10

ACConditions1:

30 00

E.7 Specific configuration files for test case 5.3.1.4

PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

Page 589: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 589 of 606

ACRules:

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 30 04 04 02 43 10

ACConditions1:

30 16 04 14 [Hash of Certificate #01 (20 bytes)]

E.8 Specific configuration files for test case 5.3.1.5PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

|- EF ACConditions2 (4311)

ACRules:

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 30 04 04 02 43 10

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 30 04 04 02 43 11

ACConditions1:

30 16 04 14 [Hash of Certificate #01 (20 bytes)]

ACConditions2:

30 16 04 14 [Hash of Certificate #02 (20 bytes)]

E.9 Specific configuration files for test case 5.3.1.6PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

ACRules:

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 30 04 04 02 43 10

ACConditions1:

30 16 04 14 [Hash of Certificate #01 (20 bytes)]

30 16 04 14 [Hash of Certificate #02 (20 bytes)]

Page 590: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 590 of 606

E.10 Specific configuration files for test case 5.3.1.7PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

|- EF ACConditions2 (4311)

ACRules:

30 08 82 00 30 04 04 02 43 10

30 08 82 00 30 04 04 02 43 11

ACConditions1:

30 16 04 14 [Hash of Certificate #01 (20 bytes)]

ACConditions2:

30 16 04 14 [Hash of Certificate #02 (20 bytes)]

E.11 Specific configuration files for test case 5.3.1.8PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

ACRules:

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 30 04 04 02 43 10

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 32 30 04 04 02 43 10

ACConditions1:

30 16 04 14 [Hash of Certificate #01 (20 bytes)]

E.12 Specific configuration files for test case 5.3.1.9PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

Page 591: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 591 of 606

|- EF ACConditions1 (4310)

|- EF ACConditions2 (4311)

ACRules:

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 30 04 04 02 43 10

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 30 04 04 02 43 11

ACConditions1:

30 16 04 14 [Hash of Certificate #01 (20 bytes)]

ACConditions2:

30 00

E.13 Specific configuration files for test case 5.3.2.1

PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

ACRules:

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 30 04 04 02 43 10

ACConditions1:

30 00

E.14 Specific configuration files for test case 5.3.2.1 Step5PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

ACRules:

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 30 04 04 02 43 10

ACConditions1:

30 08 04 06 [6 first bytes of the hash of Certificate #01] <!-- corrupted Hash -->

Page 592: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 592 of 606

E.15 Specific configuration files for test case 5.3.2.2PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

ACRules:

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 30 04 04 02 43 10

ACConditions1:

30 00

E.16 Specific configuration files for test case 5.3.3.1PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

ACRules:

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 30 04 04 02 43 10

ACConditions1:

30 16 04 14 [Hash of Certificate #01 (20 bytes)]

E.17 Specific configuration files for test case 5.3.3.1PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

ACRules:

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 30 04 04 02 43 10

ACConditions1:

30 16 04 14 [Hash of Certificate #01 (20 bytes)]

PKCS#15 file system

|- EF ACRules (4300) --> shall reference EF ACConditions files

Page 593: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 593 of 606

|- EF ACConditions1 (4310)

ACRules:

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 32 30 04 04 02 43 10

ACConditions1:

30 16 04 14 [Hash of Certificate #02 (20 bytes)]

E.18 Specific configuration files for test case 5.3.4.1PKCS#15 file system

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

ACRules:

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 30 04 04 02 43 10

ACConditions1:

30 16 04 14 [Hash of Certificate #01 (20 bytes)]

E.19 Specific configuration files for test case 5.3.5.1PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

|- EF ACConditions2 (4311)

ACRules:

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 30 04 04 02 43 10

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 32 30 04 04 02 43 11

ACConditions1:

30 16 04 14 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01

30 16 04 14 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02

30 16 04 14 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03

30 16 04 14 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04

30 16 04 14 05 05 05 05 05 05 05 05 05 05 05 05 05 05 05 05 05 05 05 05

Page 594: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 594 of 606

30 16 04 14 06 06 06 06 06 06 06 06 06 06 06 06 06 06 06 06 06 06 06 06

30 16 04 14 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07

30 16 04 14 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08

30 16 04 14 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09

30 16 04 14 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A

30 16 04 14 [Hash of Certificate #01 (20 bytes)]

ACConditions2:

30 16 04 14 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01

30 16 04 14 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02

30 16 04 14 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03

30 16 04 14 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04

30 16 04 14 05 05 05 05 05 05 05 05 05 05 05 05 05 05 05 05 05 05 05 05

30 16 04 14 06 06 06 06 06 06 06 06 06 06 06 06 06 06 06 06 06 06 06 06

30 16 04 14 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07 07

30 16 04 14 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08 08

30 16 04 14 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09

30 16 04 14 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A 0A

30 16 04 14 [Hash of Certificate #02 (20 bytes)]

E.20 Specific configuration files for test case 5.3.5.2

PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

|- EF ACConditions2 (4311)

|- EF ACConditions3 (4312)

ACRules:

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 30 04 04 02 43 10

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 32 30 04 04 02 43 11

30 1A A0 12 04 10 A0 04 00 00 00 00 00 00 00 00 00 00 00 00 00 01 30 04 04 02 43 12

30 1A A0 12 04 10 A0 04 00 00 00 00 00 00 00 00 00 00 00 00 00 02 30 04 04 02 43 12

...

<!--44 rules with dummy AID-->

...

30 1A A0 12 04 10 A0 04 00 00 00 00 00 00 00 00 00 00 00 00 00 47 30 04 04 02 43 12

Page 595: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 595 of 606

30 1A A0 12 04 10 A0 04 00 00 00 00 00 00 00 00 00 00 00 00 00 48 30 04 04 02 43 12

ACConditions1:

30 16 04 14 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01

30 16 04 14 [Hash of Certificate #01 (20 bytes)]

ACConditions2:

30 16 04 14 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01

30 16 04 14 [Hash of Certificate #02 (20 bytes)]

ACConditions3:

30 16 04 14 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03

30 16 04 14 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04

E.21 Specific configuration files for test case 5.3.6.2PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

ACRules:

<!-- ACRF is absent -->

ACConditions:

<!-- ACCF is absent -->

E.22 Specific configuration files for test case 5.3.6.3

PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

ACRules:

<!-- ACRF is present but empty -->

ACConditions:

<!-- ACCF is absent -->

E.23 Specific configuration files for test case 5.3.6.4PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

Page 596: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 596 of 606

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

ACRules:

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 30 04 04 02 43 10

ACConditions1:

30 12 04 10 [16 first bytes of the hash of Certificate #01]

E.24 Specific configuration files for test case 5.3.6.5

PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

ACRules:

30 1A A0 12 04 10 A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 30 04 04 02 43 10

ACConditions1:

30 18 04 16 F5 75 8A C7 F3 1C 1C F7 7F 45 1D 37 E3 15 CA 03 F9 89 59 2A 00 00

E.25 Specific configuration files for test case 8.3.4.1

PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

ACRules:

30 08 82 00 30 04 04 02 43 10

ACConditions1:

30 00

E.26 Specific configuration files for test case 8.3.4.2PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

Page 597: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 597 of 606

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

ACRules:

30 08 82 00 30 04 04 02 43 10

ACConditions1:

30 00

E.27 Specific configuration files for test case 8.3.4.3PKCS#15 application (AID: A0 00 00 00 63 50 4B 43 53 2D 31 35)

|- EF ACRules (4300) --> shall reference EF ACConditions files

|- EF ACConditions1 (4310)

ACRules:

30 08 82 00 30 04 04 02 43 10

ACConditions1:

30 16 04 14 [Hash of Certificate #02 (20 bytes)]

Page 598: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 598 of 606

Annex F Configuration for Device with eSEIn order to run the TS.27 test cases a device with eSE shall be configured as describedbelow. This is the responsibility of the device vendor to set this configuration for the devicesunder test.

No nonAID based applications are installed on the eSE The eSE shall be configured with an ISD personalized with CIN and IIN The following applets shall be installed on the eSE under the ISD:

o Two instances of Applet1 - defined in 2.5.3.5 eSE Applications – with thefollowing instance AIDs: AID01: A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 31 AID03: A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 33

For the installation parameters see – Annex F.1

o One instance of Applet2 – defined in 2.5.3.5 eSE Applications – with thefollowing instance AID: AID02: A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 32

o Three instances of Applet3 – defined in 2.5.3.5 eSE Applications – with thefollowing instance AIDs: AID07: A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 37 AID08: A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 38 AID09: A0 00 00 05 59 50 00 00 00 00 00 00 52 41 44 39

For the installation parameters see – Annex F.1

o SIMalliance Test Applets – available on the simalliance website [43]For the installation parameters see – Annex F.2

The eSE shall be configured with an ARA-M applet complying GP SEACspecification [7].

o The AID of this application is defined in Section 2.1 of GP SEAC specification[7]

o The ARA-M applet shall contain the following access rules: Access rules as defined in SIMallinace OMAPI Test Specification [5]

– AnnexB - Access Control Applet (ARA) Access rule to allow APDU access to AID01, AID02, AID03, AID07,

AID08, AID09 from any mobile application (implicitely part of “allowall” rule)

A sample ARA applet containing the access rules listed above is available at [44].For the installation parameters see – Annex F.3

Page 599: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 599 of 606

F.1 Installation parameters for the GSMA applets

Applet

Cap file (as available onGSMA GitHUB) Applet AID (Instance AID)

EMAID(Class

AID)

ELF AID (Load AID)Loadparams

Installation

Params

Persodata

Privileges

Applet1 -AID0

1

com.gsma.test.nfc.Applet1_A0xxx31.cap

A0000005595000000000000052414431

same asAppletAID

A0000005595000000000000052414401 NA C9 00 NA 00000

0'

Applet1 -AID0

3

com.gsma.test.nfc.Applet1_A0xxx33.cap

A0000005595000000000000052414433

same asAppletAID

A0000005595000000000000052414403 NA C9 00 NA 00000

0'

Applet2 -AID0

2

com.gsma.test.nfc.Applet2_A00xxx32.cap

A0000005595000000000000052414432

same asAppletAID

A0000005595000000000000052414402 NA C9 00 NA 00000

0'

Applet3 -AID0

7

com.gsma.test.nfc.Applet3_A00xxx37.cap

A0000005595000000000000052414437

same asAppletAID

A0000005595000000000000052414407 NA C9 00 NA 00000

0'

Applet3 -AID0

8

com.gsma.test.nfc.Applet3_A0xxx38.cap

A0000005595000000000000052414438

same asAppletAID

A0000005595000000000000052414408 NA C9 00 NA 00000

0'

Applet3 -AID0

9

com.gsma.test.nfc.Applet3_A0xxx39.cap

A0000005595000000000000052414439

same asAppletAID

A0000005595000000000000052414409 NA C9 00 NA 00000

0'

F.2 Installation parameters for the SIMalliance applets

Applet Cap file Applet AID (InstanceAID) EM AID (Class AID) ELF AID (Load

AID)

Loadparams

InstallationParams

Persodata

Privileges

TestApp omapitest1.cap

A000000600010001EE0501

A000000600010001EE0501

A000000600010001FF05 NA C9 00 NA 0000

00'

TestApp_SW6999 omapitest1.cap

A000000600010001EE0502

A000000600010001EE0502

A000000600010001FF05 NA C9 00 NA 0000

00'

TestApp_SW6280 omapitest1.cap

A000000600010001EE0503

A000000600010001EE0503

A000000600010001FF05 NA C9 00 NA 0000

00'

TestApp_SW6283 omapitest1.cap

A000000600010001EE0504

A000000600010001EE0504

A000000600010001FF05 NA C9 00 NA 0000

00'

TestApp_SW6310 omapitest1.cap

A000000600010001EE0505

A000000600010001EE0505

A000000600010001FF05 NA C9 00 NA 0000

00'

TestApp_SW63C1 omapitest1.cap

A000000600010001EE0506

A000000600010001EE0506

A000000600010001FF05 NA C9 00 NA 0000

00'TestApp_selectrespons

eomapites

t1.capA000000600010001EE0507

A000000600010001EE0507

A000000600010001FF05 NA C9 00 NA 0000

00'TestApp_SW6280_sele

ctresponseomapites

t1.capA000000600010001EE0508

A000000600010001EE0508

A000000600010001FF05 NA C9 00 NA 0000

00'TestApp_SW6283_sele

ctresponseomapites

t1.capA000000600010001EE0509

A000000600010001EE0509

A000000600010001FF05 NA C9 00 NA 0000

00'TestApp_SW6310_sele

ctresponseomapites

t1.capA000000600010001EE050A

A000000600010001EE050A

A000000600010001FF05 NA C9 00 NA 0000

00'TestApp_SW63C1_sele

ctresponseomapites

t1.capA000000600010001EE050B

A000000600010001EE050B

A000000600010001FF05 NA C9 00 NA 0000

00'

Page 600: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 600 of 606

TestApp_p1p2 omapitest1.cap

A000000600010001EE050C

A000000600010001EE050C

A000000600010001FF05 NA C9 00 NA 0000

00'

TestApp_clains omapitest1.cap

A000000600010001EE050D

A000000600010001EE050D

A000000600010001FF05 NA C9 00 NA 0000

00'

Partial_1_instance_1 omapitest1.cap

A000000600010001EE050E01

A000000600010001EE050E

A000000600010001FF05 NA C9 00 NA 0000

00'

Partial_1_instance_2 omapitest1.cap

A000000600010001EE050E02

A000000600010001EE050E

A000000600010001FF05 NA C9 00 NA 0000

00'TestApp_SW6280_parti

al_instance1omapites

t1.capA000000600010001EE050F01

A000000600010001EE050F

A000000600010001FF05 NA C9 00 NA 0000

00'TestApp_SW6280_parti

al_instance2omapites

t1.capA000000600010001EE050F02

A000000600010001EE050F

A000000600010001FF05 NA C9 00 NA 0000

00'TestApp_SW6283_parti

al_instance1omapites

t1.capA000000600010001EE051001

A000000600010001EE051101

A000000600010001FF05 NA C9 00 NA 0000

00'TestApp_SW6283_parti

al_instance2omapites

t1.capA000000600010001EE051002

A000000600010001EE051102

A000000600010001FF05 NA C9 00 NA 0000

00'

TestApp_SW61XX omapitest1.cap

A000000600010001EE0511

A000000600010001EE0510

A000000600010001FF05 NA C9 00 NA 0000

00'TestApp_Multi_SW61x

xomapites

t1.capA000000600010001EE0512

A000000600010001EE0512

A000000600010001FF05 NA C9 00 NA 0000

00'

TestApp_Get_Response omapitest1.cap

A000000600010001EE0513

A000000600010001EE0513

A000000600010001FF05 NA C9 00 NA 0000

00'TestApp_Case4_Swwar

ningomapites

t1.capA000000600010001EE0514

A000000600010001EE0514

A000000600010001FF05 NA C9 00 NA 0000

00'TestApp_multiselectabl

eomapites

t2.capA000000600010001EE5501

A000000600010001EE5501

A000000600010001FF55 NA C9 00 NA 0000

00'TestApp_Case4_SWwar

ning_nodataomapites

t3.capA000000600010001EE5601

A000000600010001EE5601

A000000600010001FF56 NA C9 00 NA 0000

00'AID_TestApp_p1p2_ets

iomapites

t3.capA000000600010001EE5602

A000000600010001EE5602

A000000600010001FF56 NA C9 00 NA 0000

00'TestApp_SW6280_sele

ctresponse_etsiomapites

t3.capA000000600010001EE5603

A000000600010001EE5603

A000000600010001FF56 NA C9 00 NA 0000

00'TestApp_SW6283_sele

ctresponse_etsiomapites

t3.capA000000600010001EE5604

A000000600010001EE5604

A000000600010001FF56 NA C9 00 NA 0000

00'TestApp_SW6310_sele

ctresponse_etsiomapites

t3.capA000000600010001EE5605

A000000600010001EE5605

A000000600010001FF56 NA C9 00 NA 0000

00'TestApp_SW63C1_sele

ctresponse_etsiomapites

t3.capA000000600010001EE5606

A000000600010001EE5606

A000000600010001FF56 NA C9 00 NA 0000

00'

Length_6 omapitest4.cap A00000060002 A000000600020001EE0

5150101010101A000000600020001FF05 NA C9 00 NA 0000

00'

Length_7 omapitest4.cap A0000006000200 A000000600020001EE0

5150101010101A000000600020001FF05 NA C9 00 NA 0000

00'

Length_8 omapitest4.cap A000000600020001 A000000600020001EE0

5150101010101A000000600020001FF05 NA C9 00 NA 0000

00'

Length_9 omapitest4.cap A000000600020001EE A000000600020001EE0

5150101010101A000000600020001FF05 NA C9 00 NA 0000

00'

Length_10 omapitest4.cap

A000000600020001EE05

A000000600020001EE05150101010101

A000000600020001FF05 NA C9 00 NA 0000

00'

Length_11 omapitest4.cap

A000000600020001EE0515

A000000600020001EE05150101010101

A000000600020001FF05 NA C9 00 NA 0000

00'

Length_12 omapitest4.cap

A000000600020001EE051501

A000000600020001EE05150101010101

A000000600020001FF05 NA C9 00 NA 0000

00'

Length_13 omapitest4.cap

A000000600020001EE05150101

A000000600020001EE05150101010101

A000000600020001FF05 NA C9 00 NA 0000

00'

Length_14 omapitest4.cap

A000000600020001EE0515010101

A000000600020001EE05150101010101

A000000600020001FF05 NA C9 00 NA 0000

00'

Length_15 omapitest4.cap

A000000600020001EE051501010101

A000000600020001EE05150101010101

A000000600020001FF05 NA C9 00 NA 0000

00'

Length_16 omapitest4.cap

A000000600020001EE05150101010101

A000000600020001EE05150101010101

A000000600020001FF05 NA C9 00 NA 0000

00'

F.3 Installation parameters for the GP ARA applet

Applet Capfile

Applet AID (InstanceAID) EM AID (Class AID) ELF AID (Load AID) Load

paramsInstallationParams

Persodata Privileges

Page 601: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 601 of 606

ARA-M ara.cap A00000015141434C00 A00000015141434C00 A00000015141434C NA C9 00 NA 00'

Annex G Document HistoryVersion Date Brief Description of Change Approval

AuthorityEditor /Company

1.2 10/09/13 First published version GSMAssociation

GSMA NFCProject

2.0 15/01/14 Updated in accordance with the NFC HandsetRequirements version 4.0 TSG

PaulGosden/GSMA

3.0 25/04/14

Updated Introduction, Scope, Abbreviations,Terms of Definitions, ReferencesAn enhanced document structure with a newtest case and section numbering.A new test case layout with aligned structure

for all test cases.Addition of tables for recommended Test CaseApplicability and a list of optional devicefeatures.Improvements to the definition of the TestEnvironmentImprovements of existing Test CasesAddition of new Test Cases or deletion of TestCases (e.g. if covered by referencedspecifications or other Test Cases)Tables in the Annex with a complete list of testcases and an option and applicability table.

TSG P GosdenGSMA

4.0 10/10/14

The changes to the TS.27 NFC Handset TestBook V4.0 include the following: Alignment with TS.26 NFC HandsetRequirement V6.0. Test descriptions improvements withinmany sections. Adoption of Global Platform SEACTest Plan V1.06, section 5 (169 tests). New test cases added in sections 3, 7,8, 11, 12 and 15 (60 tests). Reference to GCF WI-190 included toalign with GCF(5 tests). Applicability table updated. Removal of SCWS. Tables in the Annex with a completelist of test cases, Option and Applicability table.

TSGKay Fritz,

DonnaMackay.

5.0 12/01/15

The changes to the TS.27 NFC Handset TestBook V5.0 include the following:Change to existing test cases: Test case improvements throughout

sections 3, 7, 8, 12, 13, 15. Renaming of AID RID from ”undefined” to

GSMA ID. Inclusion of details for handling of

application certificates. Applicability table updated. Adding iOS and

“Other OS” - contents for FFS. Removal of redundant tables in Annexes. Improved description of tables in section 2.

TSG Kay Fritz

Page 602: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 602 of 606

Version Date Brief Description of Change ApprovalAuthority

Editor /Company

Various editorial improvements throughoutthe document.

New and removed test cases: 36 new tests added to sections 8, 12, 13

and 15. 103 new tests from GlobalPlatform SEAC

Test Plan referenced in section 5. 2 tests removed from section 13 (due to

redundancy).

6.0 08/06/15

Change to existing test cases: Test case improvements in sections 3, 7, 8,

12, 13, 15. Baseline requirement reference to TS.26

V7.0. Java Source code in Annex A.5 moved to

GitHub. 11 tests removed (VOID’ed) from Sect 3

(FFS), 7 (FFS) and 12. None of these testswere allocated in GCF WI. (4 FFS testsleft).

Applicability table expanded with referenceto TS.26 version. (Proposed by GCF LS)

Annex D with complete list of test casesmoved to separate excel (Proposed byGCF LS). This excel also provide a copy(Non-Normative) of table with OptionalFeatures (sect 2.1.4) and list of externaltest cases (Annex B1, B.8, B.9).

New Optional Features added, sect 2.1.4. Clarification of mandatory features in TS.27

vs. optional features in external standards(sect 2.2.1).

Various editorial improvements throughoutthe document.

New test cases: 20 new tests added to section 12, 13 and

15. 3 tests updated from FFS to complete

status in section 12. 26 new tests from NFC Forum Tag

Operation tests referenced in section 3.

TSG Kay Fritz

6.1 20/07/15

Due to a duplicate test numbering in AnnexB.9, one extra digit is added after the mainnumber 3.3.3.24. This change applies only forthe test cases listed in Annex B.9.

TSG Kay Fritz

7.0 21/12/15

Specification alignment:TS.26 V8.0 alignment incl. TC updates to

align GSMA APIExisting TCs updated with conditional

branching for GSMA API versionNew section 2.6 with procedures for default

HCE/UICC routing and routing tablehandling

New DUT options for section 12 and 15New tests:

4 Secure Element Access API tests(OPMAPI)

TSG Kay Fritz

Page 603: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 603 of 606

Version Date Brief Description of Change ApprovalAuthority

Editor /Company

18 Android specific section 1533 Analogue NFC Forum test cases

Removed tests:1 GP SEAC test5 tests for NFC Forum Tag Type 1 with

static memoryGeneral improvements:

New table for information to be provided byvendor, sect 2.1.6

Updated applicability and new conditionsfor tests in section 7, 12, and 15

Various TC improvements to section 3, 7,8, 12,13, 15

Updated reference Tags.

8.0 22/02/16

Note 13 changes: Section 2.1.4: Optional feature “Support of

NFC Forum Analog Test” and related Note13 are removed.

Section 2.1.5: Test case applicability for3.3.3.25 changed to Mandatory and relatedcondition removed.

Other technical corrections: Section 2.5.3.2: Correction/clarifications in

definition of Device Applications. Section 2.6.2: Corrections to Applications

needed and test steps. Section 2.6.3: Comment added to

“Procedure to send a transaction event”.Editorial corrections:

Removal and replacement of references toISO 14443.

Other editorial corrections

TSG Kay Fritz

9.0 24/06/16

The changes to the TS.27 V9.0 include thefollowing: Compliant to and referencing latest TS.26

V9.0. 10 new test cases to reduce testing gaps in

the following sections: 7. Multiple Card Emulation Environment

(2 new tests) 12. Remote Management of NFC

Services (2 new tests) 13. General Device Support (3 new

tests) 15. Android specific test cases (3 new

tests) 2 Voided tests from section

7. Multiple Card EmulationEnvironments. See list of test casesbelow.

The versions of referenced ETSI and3GPP specifications are updated toreference a newer or the latest versions.

Reference to EMVCo updated MobileLevel 1 Analog, Digital, Interoperability andperformance testing requirements.

New reference Type 2 Tag with static

TSG Kay Fritz

Page 604: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 604 of 606

Version Date Brief Description of Change ApprovalAuthority

Editor /Company

memory added. TS.27 Annex C. Naming suffix added for test sequences

which previously did not have specificsequence names. See details below.

Various corrections and improvements toexisting test cases

Various editorial improvements.A version of TS.27 with track changes can berequested at GSMA.

10.0 23/12/16

The changes include the following: Compliant with TS.26 V10.0. New test cases introduced in the

following sections: Section 3. RF Protocol compliance

- referencing NFC Forum AnalogV2.0 tests.

Section 6. Secure Element AccessAPI - referencing new Open MobileAPI tests.

Section 7. Multiple Card EmulationEnvironments. New test to coverthe new requirementsTS26_NFC_REQ_167 for size ofrouting table.

Section 13. General DeviceSupport. New test to address issuefrom field with re-selecting applet.

Section 15: Android specific testcases. New test to cover thatFELICA is mandatory. New test toreturn the version of OMAPIversion implemented.

Tests removed (Voided) in the section Section 12.4: Redundant test cases

removed. New device options (Item 28+29) in

table 2.1.4. Applicability table 2.1.5 updated. Updated versions of ETSI, 3GPP,

OMAPI, NFC Forum specifications. Procedure to identify the size of the

AID routing table updated in section2.6.2.

New general procedure to check ifUICC is accessible, section 2.6.4.

Various corrections and improvementsto existing test cases in the followingsections: Section 7, 8, 12, 13, 15.

Table B4.1 and Table B5.1 areupdated to reflect ISO/IEC 18092 TypeF is mandatory and to include changesof the tables from ETSI TS 102 694-1and TS 102 695-1 respectively. Pleasenote still some of the options areMandatory in TS.27 while Optional inthe ETSI specifications.

TSG Kay Fritz

Page 605: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 605 of 606

Version Date Brief Description of Change ApprovalAuthority

Editor /Company

Various editorial improvements incl. re-numbering of tables/figures.

A version of TS.27 with track changes can berequested at GSMA.

11.0 12/06/17

This release included the following changes: Section 2.1.4: A new DUT option (31)

for Android Nougat introduced. Section 2.6.2: The procedures for

Initial Default Routing to UICC andHCE updated.

Various test cases corrections insections 8.3, 13.3, 15.5.3, 15.7.3, and15.9.3.

Test 13.3.3.1, 13.3.4.1, 13.3.5.1:Clarification that these tests are alsoreferenced in 6.3.1.6.5.6 and can beremoved from work items.

New Annex B.10 referencing ETSI TS102 221: 9.1 TERMINAL CAPABILITY– from GCF WI-263.

A version of TS.27 with track changes betweenV10 and V11 can be requested from GSMA.See section associated Liaison Statement fordetailed list of TS.27 changes.

TSG#28 Kay Fritz

12.0 04/12/17

This release includes the following: 7 new tests for card emulation with

Display Off/Locked and DeviceSwitched Off.

6 new tests for extended APDU length. 5 new tests for Non-AID based

services. 16 new tests for eSE based NFC

services. NFC Forum Digital testing compliance

to be proved by referencing a NFCForum compliant CLF chipset orcorresponding testing.

Test cases using and testing GSMAAPI have been made optional. 18 newtests using Android native API areintroduced to replace tests which wereusing GSMA API.

Various improvements to existingtests.

A version of TS.27 with track changes betweenV11 and V12 can be requested from GSMA.See also associated Liaison Statement fordetailed list of TS.27 new test cases.

TSG#30 Kay Fritz

Page 606: NFC Handset Test Book 04 June 2018 - gsma.com · GSM Association Non-confidential NFC Handset Test Book V13.0 Page 7 of 606 E.20 Specific configuration files for test case 5.3.5.2

GSM Association Non-confidentialNFC Handset Test Book

V13.0 Page 606 of 606

Version Date Brief Description of Change ApprovalAuthority

Editor /Company

13.0 04/06/18

This release includes the following: Android P impacted test cases are updated

and new Device Option introduced tomanage test applicability for devicesimplementing before Android P and fromAndroid P and onwards. This is implementedin the Device Options section 2.1.4 and theApplicability Table section 2.1.5.

A number of existing test cases are NotApplicable for devices implementing AndroidP and onwards. See list of tests in sectionError! Reference source not found..

Updated Device Application compatible withAndroid P is described in section 2.5.3.1.1.

For more details on impact, see alsoseparate LS:TSGNFC_211_LS_AndroidP_impact_V7.

Single CEE tests voided (2 tests) due toremoval of Single CEE requirements.

eSE applet description: Improveddescription and references to the appletsused for eSE test cases, including newAnnex F with eSE applet installationparameters.

NFC Forum Analog V1.0 tests have beenremoved. Section 3.3.3.26 and AnnexB.9.2.2 Voided.

Existing TS.26 requirements referenced astested within existing test cases: Thefollowing 7 requirements referenced astested within existing tests cases:

TS26_NFC_REQ_084,TS26_NFC_REQ_122,TS26_NFC_REQ_122.2,TS26_NFC_REQ_152,TS26_NFC_REQ_152.2,TS26_NFC_REQ_162,TS26_NFC_REQ_173,TS26_NFC_REQ_173.1.

Document Cross Reference updated withreference to newer specifications.

Various improvements to existing tests.

TSG Kay Fritz/Vodafone

It is our intention to provide a quality product for your use. If you find any errors oromissions, please contact us with your comments. You may notify us at [email protected]

Your comments or suggestions & questions are always welcome.