STANDARD. ISO/IEC. Second edition. Identification cards — Integrated circuit cards —. Part 5: Registration of application providers. ISO is one of most important standards in the smart card industry. Parts of ISO specify physical characteristics, dimensions and location of the. ISO , Section 5 contains basic organizations, data structures, file organization, file referencing methods, data referencing methods, record referencing.
|Published (Last):||24 September 2010|
|PDF File Size:||8.21 Mb|
|ePub File Size:||1.39 Mb|
|Price:||Free* [*Free Regsitration Required]|
The maximum number of bytes expected in the data field of the response APDU is denoted by Le length of expected data. Consequently, the body consists of the Lc field followed by the data field and the Le field.
ISO – important industry standard for integrated circuit cards
According to isk abstract, it specifies the Data Elements DEs used for interindustry interchange based on integrated circuit cards ICCs both with contacts and without contacts. In order to select unambiguously any file by its identifier, all EFs and DFs immediately under a given DF shall have different file identifiers. When a file cannot be implicitly selected, it shall be possible to select it by at least one of the following methods:.
Such a body carries 1 or 2 length fields; B1 is [part of] the first length field. For example, the last possible position of a template 7816-55 cryptographic checksum is just before the first data object integrated in the computation.
BS ISO/IEC 7816-5:2004
The data fields of some other commands e. The length of Le is not null; therefore the Le field is present. Machine-readable materials, Identity cards, Data representation, Data processing, Integrated circuits, Identification methods, Isi circuit cards, Approval organizations, Jso approval.
If a card supports the logical channel mechanism, then the maximum number of available logical channels is indicated in the card capabilities see 8. Interindustry data elements for interchange”. Figure 1 — Logical file organization example.
The status bytes SW1-SW2 of a response denote the processing state in the card. The following structures of EFs are defined: Created inamended in,updated in Cards with contacts — USB electrical interface and operating procedures”. Registration of application providers”. According to its abstract, it specifies a card application. Linear file with records of variable size. Figure 4 shows the 4 structures of command APDUs according to the 4 cases defined in table 4. Enregistrement des fournisseurs d’application.
Moreover, before transmitting the first data object for confidentiality using a stream cipher, a template for confidentiality shall provide auxiliary data for initializing the computation of the string of concealing bytes.
ISO part 4, section. It is an unsigned integer, limited to either 8 or 15 bits according to an option in the respective command. Entity authentication with password — The card compares data received from the outside world with secret internal data. After closing the logical channel number will be available for re-use. Therefore the first record record number one, 1 is the first created record. Consequently, the body consists of the Le field.
The following rules shall apply The card shall fill each empty primitive data object Each control reference template present in the response descriptor shall be present in the response at the same place with the same control references for algorithm, file and key.
Data is considered to be stored in a single continuous sequence of records within an EF of record structure or of data units within an EF of transparent structure. The security attributes of file depend on: For the computation of a cryptogram not preceded by a padding indicator byte, the default mechanism is a stream cipher with exclusive-or of the string of data bytes to be concealed with a concealing string of the same length.
Referencing by short EF identifier — Any EF may be referenced by a short EF identifier coded on 5 bits valued in the range from 1 to Record structure — The EF is seen at the interface as a sequence of individually identifiable records.
Logical channel number according to 1. Alternately, using secret internal data, the card computes a data element cryptographic checksum or digital signature and inserts it in the data sent to the outside world. Find Similar Items This product falls into the following categories. No byte is used for Le valued to 0. Therefore the first created record is in the first logical position. Cards with contacts — Physical characteristics”. This mechanism may be used for protecting the rights of a provider.
The following two types of EFs are defined: In each message involving security mechanisms based on cryptography, the data field shall comply with the basic encoding rules of ASN. The file control information may be present for any file.
ISO part 4 section 5 APDU level data structures
This page was last edited on 19 Aprilat The tag field T consists of one or more consecutive bytes. Therefore a spcecific response corresponds to a specific command, referred to as a command-response pair.
The blocking shall be continuous at the border between adjacent data objects to be integrated The padding shall apply at the end of each data object to be integrated followed either by a data object not to be integrated or by no further data object.
The MF is mandatory.