ISO , Section 5 contains basic organizations, data structures, file organization, file referencing methods, data referencing methods, This part of ISO/IEC supports the following two categories of files: . 0 — x x x — — —, File type. ISO/IEC is intended to be used in any sector of activity. It specifies: a ) contents of command-response pairs exchanged at the interface,. b) means of. ISO/IEC (): “Information technology – Identification cards; Integrated . The key reference is indicated using tag ’83’ as defined in ISO/IEC [2].

Author: Sagor Nik
Country: Suriname
Language: English (Spanish)
Genre: Spiritual
Published (Last): 22 September 2009
Pages: 69
PDF File Size: 15.35 Mb
ePub File Size: 4.95 Mb
ISBN: 335-3-62678-437-9
Downloads: 4707
Price: Free* [*Free Regsitration Required]
Uploader: Vudotilar

The parameter bytes P1-P2 of a command may have any value.

For example, the last possible position of a template for cryptographic checksum is just before the first data object integrated in the computation. In case 1, the length Lc is null; therefore the Lc field and the data field are empty.

ISO/IEC 7816

Each command message may carry a response descriptor template fixing the data objects required in response. For example, a command may fix control references for the next command. In other projects Wikimedia Commons. The order of the file identifiers is always in the direction parent to child.

The blocking shall be continuous at the border between adjacent data objects to be integrated The padding shall apply at the end of each data object to filetupe integrated followed either by a data object not to be integrated or by no further data object. From Wikipedia, the free encyclopedia.


Each non TLV-coded data field shall consist of one or more data elements, according to the specifications of the respective command.

This page was last edited on 19 Aprilat The MF is mandatory. Figure 4 shows the 4 structures of command APDUs according to the 4 cases defined in table 4.

ISO/IEC – Wikipedia

The choice and conditions of use of cryptographic mechanisms may affect card lec. Inside the response descriptor, the security mechanisms are not yet applied: The key reference identifies the key to be used.

Data may be referenced as records, as data units or as data objects. The final check block is the last output. Within an EF of record structure, data unit referencing may not provide the intended result because the storage order of the records in the EF is not known, e.

F I G U R E 2

Valued to 0 for the first data unit of the EF, the offeset is incremented by 1 for every subsequent data unit. The first input is the exclusive-or of the initial check block with the first data block.

The following additional rule is defined for linear structures and for cyclic structures: If L in not null, then the value field V consists of consecutive bytes. According to its abstract, it specifies the operating conditions of an integrated circuit card that provides a USB interface. An annex is provided that shows how to control the loading of data secure download into the card, by means of verifying the access rights of the loading entity and protection of the transmitted data with secure messaging.


The security items algorithms, key and initial data used for processing the data field of a command message may be different from those used for producing the data field of the subsequent filetjpe messsage. The cryptogram contents reference specifies the content of the cryptogram e.

ISO part 4 section 5 APDU level data structures

Created inamended in,updated in Data authentication — Using internal data, either secret or public, the card checks redundant data recived from the outside world.

The first output results from the first data block. The security attributes, when they exist, define the allowed actions and the procedures to be performed to complete such actions.

The fioetype fields of some other commands e. This clause contains information on the logical structure of data as seen at the interface, when processing interindustry commands for interchange. Retrieved 19 April Decoding conventions for Le If the filrtype of Le is coded in 1 or 2 byte s where the bits are not all null, then the value of Le is equal to the value of the byte s which lies in the range from 1 to or ; the null value of all the bits means the maximum value of Le: There are two types of digital signatures: