ISO 7816-5 PDF

STANDARD. ISO/IEC. Second edition. Identification cards — Integrated circuit cards —. Part 5: Registration of application providers. ISO is one of most important standards in the smart card industry. Parts of ISO specify physical characteristics, dimensions and location of the. ISO , Section 5 contains basic organizations, data structures, file organization, file referencing methods, data referencing methods, record referencing.

Author: Jurisar Donris
Country: Belarus
Language: English (Spanish)
Genre: Marketing
Published (Last): 16 August 2016
Pages: 96
PDF File Size: 3.92 Mb
ePub File Size: 1.27 Mb
ISBN: 231-6-29006-321-2
Downloads: 97107
Price: Free* [*Free Regsitration Required]
Uploader: Kitaxe

NOTES An EF lso record structure may support data unit referencing and in case it does, data units may contain structural information along with data, e. The choice and conditions of use of cryptographic mechanisms may affect card exportability.

Alternately, using secret internal data, the card computes a data element cryptographic checksum or digital signature and inserts it in the data sent to the outside world. The last possible position of a control reference template is just before the first data object to which the referred mechanism applies.

Dedicated file DF Elementary file EF The logical organization of data in a card consists of following structural hierachy of dedicated files: Between those two identifiers, the path consists of the identifiers of the successive parent DFs isso any.

Data objects for confidentiality are intended iao carrying a cryptogram which plain value consists of one of the following 3 cases: This part specifies commands for application management in a multi-application environment. If an empty reference data object for auxiliary data is present in the response descriptor, then it shall be full in the response.

  GEOENGINEERING BUNDESWEHR PDF

Data authentication — Using internal data, either secret or public, the card checks redundant data recived from the outside world.

The digital signature computation is typically based upon asymmetric cryptographic techniques. Padding for authentication has no influence on transmission as the padding bytes shall not be transmitted.

In the absence of an algorithm reference and when no mechanism is implicitly selected for confidentiality a default mechanism shall apply. In other projects 786-5 Commons.

F I G U R E 2

Retrieved 19 April This mechanism may be used for protecting the right of the user. Data referencing method, record numbering method and data ios size are EF-dependent features. Machine-readable materials, Identity cards, Data representation, Data processing, Integrated circuits, Identification methods, Integrated circuit cards, Approval organizations, Acceptance approval.

Command-specific status — It only exists during the execution of a command involving authentication using secure messaging see 1. Is first output results from the first data block. The splitting into data blocks shall be performed in the following way. Within an EF of record structure, data unit referencing may not provide the intended result because the storage order of the records in the EF is not known, e.

ISO part 4 section 5 APDU level data structures

The length Le is null; therefore the Le field is empty. The transmission and reception of data fields may be interleaved with the execution of security mechanisms. If no file reference is present, then the key reference is valid in the current DF. Data objects for confidentiality are intended for carrying a cryptogram which plain value oso of one of the following 3 cases:. Enregistrement des fournisseurs d’application Title in German Identifikationskarten.

  IUBIRILE CROITORESEI PDF

ISO/IEC – Wikipedia

This clause defines 3 types of SM-related data objects: Logical channels are numbered from 0 to 3. If L is not null, then the value field V consists of L consecutive 77816-5.

It may be maintained, recovered or lost by file selection see 6. If the concept of logical channels is applied, the file specify security status may depend on the logical channel see 1.

ISO/IEC 7816

ISO standards by standard number. Therefore a spcecific response corresponds to a specific command, referred to as a command-response pair.

Ido algorithm, a key and, possibly initial data may be selected for each security mechanism implicitly, i. ISO part 4, section. Created inamended in,updated in It gives the identifier, name, description, format, coding and layout of each DE and defines the means of retrieval of DEs from the card.

The length Le is also null; therefore the Le field is empty. If the auxiliary data is less than k bytes, then it is headed by bits set to 0, up to the block length.