STANDARD. ISO/IEC. Second edition. Identification cards — Integrated circuit cards —. Part 5: Registration of application providers. ISO is one of most important standards in the smart card industry. Parts of ISO specify physical characteristics, dimensions and location of the. ISO , Section 5 contains basic organizations, data structures, file organization, file referencing methods, data referencing methods, record referencing.

Author: Zulule Tygozragore
Country: Angola
Language: English (Spanish)
Genre: Life
Published (Last): 20 January 2013
Pages: 30
PDF File Size: 5.75 Mb
ePub File Size: 6.67 Mb
ISBN: 301-6-11205-941-7
Downloads: 81583
Price: Free* [*Free Regsitration Required]
Uploader: Taurisar

Dedicated file DF Elementary file EF The logical organization of data in a card consists of following structural hierachy of dedicated files: Short EF identifiers connot be used in a path or as a file identifier e.

The use of a block cipher may involve padding.

The file control information may be present for any file. The security status may also result from the completion of a security procedure related to the identification of the involved entities, if any, e. Global security status — It may be modified by the completion of an MF-related authentication procedure e. Command-response pairs work as currently described. The first output results from the first input. The parameter bytes P1-P2 of a command may have any value.

The goal of secure messaging SM is to protect [part of] the messages to oso from a card by ensuring two basic security functions: The length of Le is not null; therefore the Le field is present. In case 1, the body of the command APDU is empty.

ISO/IEC 7816

In case 3, the 78166-5 Lc is not null; therefore the Lc field is present and the data field consists of the Lc subsequent bytes. Linear file with records of variable size. Created inupdated inupdated in Your basket is empty. When a file cannot be implicitly selected, it 78165 be possible to select it by at least one of the following methods:.


When there is a current record, the next occurrence shall be the closest record with the specified identifier but in a greater logical position than the current record. The MF is mandatory.

The response descriptor template, if present in the data field of the command APDU, shall fix the structure of the corresponding response. The tag field T consists of a single byte encoding only a number from 1 to e. No byte is used for Le valued to 0. An annex is provided that shows how to control the loading of data secure download into the card, by means of verifying the access rights of the loading entity and protection of the transmitted data with secure messaging.

List of International Electrotechnical Commission standards. This mechanism may be used for protecting the rights of 7816–5 provider. Electronic signals and answer to reset for synchronous cards”. Referencing by path — Any file may be referenced by a path concatentation of file identifiers.

In addition to the cryptogram mechanism, data confidentiality can be achieved by data concealment. This page was last edited on 19 Idoat If L is null, then the data object is empty: According to its abstract, it specifies interindustry commands for integrated circuit cards either with contacts or without contacts that may be used for cryptographic operations. It may be maintained, recovered or lost by file selection see 6.


The first output results 78816-5 the first data block. Padding for authentication has no influence on transmission as the padding bytes shall not be transmitted.

ISO – important industry standard for integrated circuit cards

The following attributes are defined for EFs structured in records: When a file cannot be implicitly selected, it shall be possible to select it by at least one of the following methods: We use cookies to make our website easier to use and to better understand your needs. By using this site, you agree to the Terms of Use and Privacy Policy. Consequently, the body consists of the Lc field followed by the data field and the Le field. Enregistrement des 78816-5 d’application Title in German Identifikationskarten.

The computation of a cryptographic checksum is performed in the following consecutive stages: Each data object as defined in 1. Worldwide Standards We can source any standard from anywhere in the world. There shall be independence of activity on one logical channel from activity on another one.

Cyclic EF with records of fixed size. In case 4, the length Lc is not null; therefore the Lc field is present and the data field consists of the Lc subsequent bytes. The following additional rule is defined for linear structures and for cyclic structures: Commands for application management in a multi-application environment”. Figure 2 shows those for EF structures. Retrieved 19 April