Posted on April 22, 2019


ISO , Section 5 contains basic organizations, data structures, file organization, file referencing methods, data referencing methods, This part of ISO/IEC supports the following two categories of files: . 0 — x x x — — —, File type. ISO/IEC is intended to be used in any sector of activity. It specifies: a ) contents of command-response pairs exchanged at the interface,. b) means of. ISO/IEC (): “Information technology – Identification cards; Integrated . The key reference is indicated using tag ’83’ as defined in ISO/IEC [2].

Author: Menris Bralar
Country: Singapore
Language: English (Spanish)
Genre: Travel
Published (Last): 20 August 2010
Pages: 435
PDF File Size: 5.5 Mb
ePub File Size: 17.28 Mb
ISBN: 499-1-67791-941-2
Downloads: 91471
Price: Free* [*Free Regsitration Required]
Uploader: Vudogal

This part specifies commands for application management in a multi-application environment. The parameter bytes P1-P2 of a command may have any value. According to its abstract, fildtype specifies the operating conditions of an integrated iiec card that provides a USB interface. According to its abstract, it specifies interindustry commands for integrated circuit cards both with contacts and without contacts for card and file management, e. The tag field T consists of one or more consecutive bytes.

ISO/IEC 7816

The loaded 781-64 may contain, for example, code, keys and applets. The transmission and reception of data fields may be interleaved with the execution of security mechanisms. Global security status — It may be modified by the completion of an MF-related authentication procedure e. In the absence of an algorithm reference and when no mechanism is implicitly selected for confidentiality a default mechanism shall apply. The status bytes SW1-SW2 of a response denote the processing state in the card.


Each command message may carry a response descriptor template fixing the data objects required in response. This mechanism may filetyep used for protecting the right of the user. The first byte of the value field is named the type cryptogram descriptor byte and is mandatory.

For the computation of a cryptogram not preceded by a padding indicator byte, the default mechanism is a stream cipher with exclusive-or of the string of data bytes to be concealed with a concealing string of the same length.

For example, a command may fix control references for the next command. ISO part 4, section. Each control reference remains valid until a new control reference is provided for the same mechanism.

The trailer codes the status of the receiving entity after processing the command-response pair. Dedicated file DF Elementary file EF The logical organization of data in a card consists of following structural hierachy of dedicated files: Views Read Edit View history. Retrieved 19 April Data is considered to be stored in a single continuous sequence of records within an EF of record structure or of data units within an EF of transparent structure.

The file control information may be present for any file.

ISO/IEC – Wikipedia

This specification does not preclude the determination by sequential analysis of which mechanisms and which security items shall be used for processing the remaining part of the data field. Registration of application providers”. In this case, the card computes a string of concealing bytes and adds it by exclusive-or to data bytes received from or sent to the outside world. Each security mechanism involves an algorithm, a key, an argument and often, initial data.

  LEY 126-01 PDF

Entity authentication with key — The entity to be euthenticated has to prove the knowledge of the relevant key in an authentication procedure e.

When a file cannot be implicitly selected, it shall be possible to select it by at least one of the following methods:. This mechanism may be used for protecting the rights of a provider. The blocking shall be continuous at the border between adjacent data objects to be integrated The padding shall apply at the end of each data object to be integrated followed either by a data object not to be integrated or by no further data object.

The length Le is null; therefore the Le field is empty. The data fields of some commands e.

F I G U R E 2

Annexes are provided that give examples of operations related to digital signatures, certificates and the import and export of asymmetric keys.

Reference to a record or to a data unit outside an EF is an error.

Cards with contacts — Electrical interface and transmission protocols”. Lso order to select unambiguously any file by its identifier, all EFs and DFs immediately under a given DF shall have different file identifiers.

The security attributes of file depend on:.

In other projects Wikimedia Commons.