{"id":453808,"date":"2024-10-20T09:32:13","date_gmt":"2024-10-20T09:32:13","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-7816-82021a12023\/"},"modified":"2024-10-26T17:41:53","modified_gmt":"2024-10-26T17:41:53","slug":"bs-iso-iec-7816-82021a12023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-7816-82021a12023\/","title":{"rendered":"BS ISO\/IEC 7816-8:2021+A1:2023"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
10<\/td>\n4 Abbreviated terms <\/td>\n<\/tr>\n
11<\/td>\nBlank Page <\/td>\n<\/tr>\n
12<\/td>\nBlank Page <\/td>\n<\/tr>\n
13<\/td>\nBlank Page <\/td>\n<\/tr>\n
14<\/td>\n5 Interindustry commands for security operations
5.1 General
5.2 Generate asymmetric key pair command <\/td>\n<\/tr>\n
18<\/td>\n5.3 Perform security operation command
5.3.1 General <\/td>\n<\/tr>\n
33<\/td>\nBlank Page <\/td>\n<\/tr>\n
36<\/td>\n5.3.2 Compute cryptographic checksum operation
5.3.3 Compute digital signature operation
5.3.4 Hash operation <\/td>\n<\/tr>\n
37<\/td>\n5.3.5 Verify cryptographic checksum operation
5.3.6 Verify digital signature operation <\/td>\n<\/tr>\n
38<\/td>\nBlank Page <\/td>\n<\/tr>\n
39<\/td>\n5.3.7 Verify certificate operation <\/td>\n<\/tr>\n
44<\/td>\nAnnex A (informative) Examples of operations related to digital signature <\/td>\n<\/tr>\n
50<\/td>\nBlank Page <\/td>\n<\/tr>\n
51<\/td>\nAnnex B (informative) Examples of certificates interpreted by the card <\/td>\n<\/tr>\n
52<\/td>\nBlank Page <\/td>\n<\/tr>\n
65<\/td>\nAnnex C (informative) Examples of asymmetric key transfer <\/td>\n<\/tr>\n
68<\/td>\nAnnex D (informative) Alternatives to achieve the reversible change of security context <\/td>\n<\/tr>\n
70<\/td>\nAnnex E (informative) Examples of uses for generate asymmetric key pair command <\/td>\n<\/tr>\n
87<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Identification cards. Integrated circuit cards – Commands and mechanisms for security operations<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2024<\/td>\n88<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":453816,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[693,2641],"product_tag":[],"class_list":{"0":"post-453808","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-240-15","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/453808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/453816"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=453808"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=453808"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=453808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}