• No Comments

ISO , Section 5 contains basic organizations, data structures, file organization, file referencing methods, data referencing methods, This part of ISO/IEC supports the following two categories of files: . 0 — x x x — — —, File type. ISO/IEC is intended to be used in any sector of activity. It specifies: a ) contents of command-response pairs exchanged at the interface,. b) means of. ISO/IEC (): “Information technology – Identification cards; Integrated . The key reference is indicated using tag ’83’ as defined in ISO/IEC [2].

Author: Nezshura Kajira
Country: Malta
Language: English (Spanish)
Genre: Medical
Published (Last): 12 December 2012
Pages: 98
PDF File Size: 17.6 Mb
ePub File Size: 14.33 Mb
ISBN: 412-7-45456-612-6
Downloads: 74005
Price: Free* [*Free Regsitration Required]
Uploader: Akinonos

This clause contains information on the logical structure of data as seen at the interface, when processing interindustry commands for interchange.

The security items algorithms, key and initial data used for processing the data field of a command message may be different from those used for producing the data field of the subsequent response messsage.

When there is a current record, the next occurrence shall be the closest record with the specified identifier but in a greater logical position than the current record. Within an EF of record structure, data unit referencing may not provide the intended result because the storage order of the records in the EF is not known, e.

The loaded data may contain, for example, code, keys and applets. This mechanism may be used for protecting the rights of a provider. In other projects Wikimedia Commons. The transmission and reception of data fields may be interleaved with the execution of security mechanisms. Inside the response descriptor, the security mechanisms are not yet 781-64 Data iecc considered to be stored in a single continuous sequence of records within an EF of record structure or of data units within fileyype EF of transparent structure.


ISO/IEC – Wikipedia

The length of Le is not null; therefore the Le field is present. By using this site, you agree to the Terms of Use and Privacy Policy. Each data field shall have one of the following three structures. Each security mechanism involves an algorithm, a key, an argument and often, initial data. This page was last edited on 19 Aprilat The MF is mandatory.

The length field consists of one or more consecutive bytes. There shall be independence of activity on one logical channel from activity on another one.

For the computation of a cryptogram not preceded by a padding indicator byte, the default mechanism is a stream cipher with exclusive-or of the string of data bytes to be concealed with a concealing string of the same length. Such a command APDU carries no length field.

When there is no current record, the next occurrence shall be equivalent to the first occurrence. From Wikipedia, the free encyclopedia. The computation of a cryptographic checksum is performed in the following consecutive stages: The blocking shall be continuous at the border between adjacent data objects to be integrated The padding ie apply at the end of each data object to be integrated followed either by a data object not to be integrated or by no further data object.

In case 4, the length Lc is not null; therefore the Lc field is present and the data field consists of the Lc subsequent bytes. The first 4 cases apply to all cards.

ISO part 4 section 5 APDU level data structures

For example, the last possible position of a template for cryptographic checksum is just before the first data object integrated in the computation. ISO standards by standard number. This mechanism filetyppe be used for protecting privacy and for reducing the possibilities of message filtering.


Global security status — It may be modified by the completion of an MF-related authentication procedure e. Data authentication — Using internal data, either secret or public, the card checks redundant data recived from the outside world.

ISO/IEC 7816

Linear file with records of variable size. The current output results from the current input. The goal of secure messaging SM flletype to protect [part of] the messages to and from a card by ensuring two basic security functions: In case 2, the length Lc is null; therefore the Lc field and the data field are empty.

There are two types of digital signatures: Cards with contacts — Electrical interface and transmission fipetype. According to its abstract, it specifies the operating conditions of an integrated circuit card that provides a USB interface.

The final check block is the last output. The card shall support at least one of the following four methods for structuring EFs: The previous occurrence shall be equvalent to the last occurrence.

F I G U R E 2

Each non TLV-coded data field shall consist of one or more data elements, according to the specifications of the respective command. Organization, filetyoe and commands for interchange”.

Cards with contacts — Physical characteristics”. Cards with contacts — Dimensions and location of the contacts”.