BS ISO/IEC 7816-4:2020+A1:2023
$215.11
Identification cards. Integrated circuit cards – Organization, security and commands for interchange
Published By | Publication Date | Number of Pages |
BSI | 2023 | 190 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
9 | Foreword |
10 | Introduction |
11 | 1 Scope 2 Normative references 3 Terms and definitions |
17 | 4 Symbols and abbreviated terms |
18 | 5 Command-response pairs 5.1 Conditions of operation |
19 | 5.2 Syntax |
20 | 5.3 Chaining procedures 5.3.1 General 5.3.2 Payload fragmentation 5.3.3 Command chaining |
21 | 5.3.4 Response chaining |
22 | 5.4 Class byte 5.4.1 Coding |
23 | 5.4.2 Logical channels |
24 | 5.5 Instruction byte |
27 | 5.6 Status bytes |
29 | 6 Data objects 6.1 General 6.2 SIMPLE-TLV data objects |
30 | 6.3 BER-TLV data objects 6.4 Constructed DOs versus primitive DOs 7 Structures for applications and data 7.1 Available structures |
32 | 7.2 Validity area 7.2.1 Definitions and attributes 7.2.2 Basic rules for VA handling and use |
33 | 7.3 Structure selection 7.3.1 Structure selection methods |
34 | 7.3.2 File reference data element and DO |
35 | 7.3.3 General reference data element and DO 7.3.4 Data referencing methods in elementary files |
36 | 7.4 File and data control information 7.4.1 File control information retrieval 7.4.2 Data control information retrieval |
37 | 7.4.3 Control parameters |
38 | 7.4.4 Short EF identifier 7.4.5 File descriptor byte |
39 | 7.4.6 Profile indicator |
40 | 7.4.7 Data descriptor byte 7.4.8 DF and EF list data elements 7.4.9 Instance number data element 7.4.10 Life cycle status |
41 | 7.4.11 Indirect referencing by short EF identifier using DO’A2′ 7.4.12 Interface and life cycle status dependent security attribute template |
43 | Blank Page |
44 | 8 Specific use of DOs and related concepts 8.1 ber-tlv payloads and padding 8.1.1 General 8.1.2 Padding conditions 8.1.3 Padding procedure |
45 | 8.2 Template referenced by curConstructedDO and data object generations 8.2.1 Template referenced by curConstructedDO and DO referenced by curDO 8.2.2 Template extension |
46 | 8.2.3 Data object pruned-tree 8.2.4 Data object life cycle 8.3 Identification of data elements and data objects 8.3.1 Principles 8.3.2 Tag interpretation in command and response data fields or payloads |
47 | 8.3.3 Tag allocation 8.3.4 Standard tag allocation scheme 8.3.5 Compatible tag allocation scheme |
48 | 8.3.6 Coexistent tag allocation scheme 8.3.7 Avoidance of independent tag allocation schemes 8.4 Referencing and retrieval of DOs and data elements 8.4.1 General |
49 | 8.4.2 Element list 8.4.3 Tag list 8.4.4 Header list 8.4.5 Extended header and extended header list |
50 | 8.4.6 Resolving an extended header |
51 | 8.4.7 Resolving an extended header list 8.4.8 Wrapper |
52 | 8.4.9 Tagged wrapper 9 Security architecture 9.1 General |
54 | 9.2 Cryptographic mechanism identifier template 9.3 Security attributes 9.3.1 General 9.3.2 Security attributes targets |
55 | 9.3.3 Compact format |
59 | 9.3.4 Expanded format |
63 | 9.3.5 Access rule references |
64 | 9.3.6 Security attributes for data objects |
65 | 9.3.7 Security parameters template |
70 | 9.3.8 Security attributes for logical channels |
71 | 9.4 Security support data elements |
72 | 10 Secure messaging 10.1 General 10.2 SM fields and SM DOs 10.2.1 SM protection of command payloads 10.2.2 SM protection of chained commands and responses |
73 | 10.2.3 SM DOs |
74 | 10.3 Basic SM DOs 10.3.1 SM DOs for encapsulating plain values 10.3.2 SM DOs for confidentiality |
75 | 10.3.3 SM DOs for authentication |
77 | 10.4 Auxiliary SM DOs 10.4.1 General |
78 | 10.4.2 Control reference templates 10.4.3 Control reference DOs in control reference templates |
80 | 10.4.4 Security environments |
82 | 10.4.5 Response descriptor template 10.5 SM impact on command-response pairs |
84 | 11 Commands for interchange 11.1 General 11.2 Selection 11.2.1 General 11.2.2 select command |
87 | 11.2.3 manage channel command |
88 | 11.3 Data unit handling 11.3.1 Data units 11.3.2 General |
89 | 11.3.3 read binary command 11.3.4 write binary command |
90 | 11.3.5 update binary command 11.3.6 search binary command |
91 | 11.3.7 erase binary command 11.3.8 compare binary function 11.4 Record handling 11.4.1 Records |
92 | 11.4.2 General |
93 | 11.4.3 read record (s) command |
95 | 11.4.4 write record command |
96 | 11.4.5 update record command |
98 | 11.4.6 append record command |
99 | 11.4.7 search record command |
103 | 11.4.8 erase record (s) command |
104 | 11.4.9 activate record (s) command |
105 | 11.4.10 deactivate record (s) command |
106 | 11.4.11 compare record function 11.5 Data object handling 11.5.1 General |
107 | 11.5.2 select data command |
111 | 11.5.3 get data/get next data commands — even INS codes |
113 | 11.5.4 get data/get next data commands — odd INS codes |
114 | 11.5.5 General properties of put data/put next data/update data commands |
115 | 11.5.6 put data command 11.5.7 put next data command |
116 | 11.5.8 update data command |
117 | 11.5.9 compare data function 11.6 Basic security handling 11.6.1 General |
118 | 11.6.2 internal authenticate command |
119 | 11.6.3 get challenge command 11.6.4 external authenticate command |
120 | 11.6.5 general authenticate command |
122 | 11.6.6 verify command |
123 | 11.6.7 change reference data command 11.6.8 enable verification requirement command 11.6.9 disable verification requirement command |
124 | 11.6.10 reset retry counter command |
125 | 11.6.11 manage security environment command |
126 | 11.7 Miscellaneous 11.7.1 compare command |
128 | 11.7.2 get attribute command |
129 | 11.8 Transmission handling 11.8.1 get response command 11.8.2 envelope command |
130 | 12 Application-independent card services 12.1 General 12.2 Card identification 12.2.1 General |
131 | Blank Page |
132 | 12.2.2 Historical bytes |
136 | 12.2.3 Initial data string recovery 12.2.4 Waiting time management |
138 | 12.3 Application identification and selection 12.3.1 General 12.3.2 EF.DIR |
139 | 12.3.3 EF.ATR/INFO 12.3.4 Application identifier |
141 | 12.3.5 Application template and related data elements 12.3.6 Application selection |
142 | 12.4 Selection by path |
143 | 12.5 Data retrieval 12.6 Card-originated byte string 12.6.1 General 12.6.2 Triggering by the card |
144 | 12.6.3 Queries and replies 12.6.4 Formats 12.7 General feature management 12.7.1 General 12.7.2 On-card services |
145 | 12.7.3 Interface services 12.7.4 Profile services 12.7.5 Provision of additional information |
146 | 12.8 APDU management 12.8.1 Extended length information 12.8.2 List of supported INS codes |
147 | Annex A (informative) Examples of object identifiers and tag allocation schemes |
150 | Annex B (informative) Examples of secure messaging |
158 | Annex C (informative) Examples of authenticate functions by general authenticate commands |
167 | Annex D (informative) Application identifiers using issuer identification numbers |
168 | Annex E (informative) BER encoding rules |
170 | Annex F (informative) ber-tlv data object handling |
178 | Annex G (informative) Template extension by tagged wrapper |
182 | Annex H (informative) Parsing an extended header against its target DO |
184 | Annex I (informative) Use case of WTX (waiting time extension) procedure and application waiting time procedure |
188 | Bibliography |