Shopping Cart

No products in the cart.

BS ISO/IEC 7816-4:2020+A1:2023

$215.11

Identification cards. Integrated circuit cards – Organization, security and commands for interchange

Published By Publication Date Number of Pages
BSI 2023 190
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
2 undefined
9 Foreword
10 Introduction
11 1 Scope
2 Normative references
3 Terms and definitions
17 4 Symbols and abbreviated terms
18 5 Command-response pairs
5.1 Conditions of operation
19 5.2 Syntax
20 5.3 Chaining procedures
5.3.1 General
5.3.2 Payload fragmentation
5.3.3 Command chaining
21 5.3.4 Response chaining
22 5.4 Class byte
5.4.1 Coding
23 5.4.2 Logical channels
24 5.5 Instruction byte
27 5.6 Status bytes
29 6 Data objects
6.1 General
6.2 SIMPLE-TLV data objects
30 6.3 BER-TLV data objects
6.4 Constructed DOs versus primitive DOs
7 Structures for applications and data
7.1 Available structures
32 7.2 Validity area
7.2.1 Definitions and attributes
7.2.2 Basic rules for VA handling and use
33 7.3 Structure selection
7.3.1 Structure selection methods
34 7.3.2 File reference data element and DO
35 7.3.3 General reference data element and DO
7.3.4 Data referencing methods in elementary files
36 7.4 File and data control information
7.4.1 File control information retrieval
7.4.2 Data control information retrieval
37 7.4.3 Control parameters
38 7.4.4 Short EF identifier
7.4.5 File descriptor byte
39 7.4.6 Profile indicator
40 7.4.7 Data descriptor byte
7.4.8 DF and EF list data elements
7.4.9 Instance number data element
7.4.10 Life cycle status
41 7.4.11 Indirect referencing by short EF identifier using DO’A2′
7.4.12 Interface and life cycle status dependent security attribute template
43 Blank Page
44 8 Specific use of DOs and related concepts
8.1 ber-tlv payloads and padding
8.1.1 General
8.1.2 Padding conditions
8.1.3 Padding procedure
45 8.2 Template referenced by curConstructedDO and data object generations
8.2.1 Template referenced by curConstructedDO and DO referenced by curDO
8.2.2 Template extension
46 8.2.3 Data object pruned-tree
8.2.4 Data object life cycle
8.3 Identification of data elements and data objects
8.3.1 Principles
8.3.2 Tag interpretation in command and response data fields or payloads
47 8.3.3 Tag allocation
8.3.4 Standard tag allocation scheme
8.3.5 Compatible tag allocation scheme
48 8.3.6 Coexistent tag allocation scheme
8.3.7 Avoidance of independent tag allocation schemes
8.4 Referencing and retrieval of DOs and data elements
8.4.1 General
49 8.4.2 Element list
8.4.3 Tag list
8.4.4 Header list
8.4.5 Extended header and extended header list
50 8.4.6 Resolving an extended header
51 8.4.7 Resolving an extended header list
8.4.8 Wrapper
52 8.4.9 Tagged wrapper
9 Security architecture
9.1 General
54 9.2 Cryptographic mechanism identifier template
9.3 Security attributes
9.3.1 General
9.3.2 Security attributes targets
55 9.3.3 Compact format
59 9.3.4 Expanded format
63 9.3.5 Access rule references
64 9.3.6 Security attributes for data objects
65 9.3.7 Security parameters template
70 9.3.8 Security attributes for logical channels
71 9.4 Security support data elements
72 10 Secure messaging
10.1 General
10.2 SM fields and SM DOs
10.2.1 SM protection of command payloads
10.2.2 SM protection of chained commands and responses
73 10.2.3 SM DOs
74 10.3 Basic SM DOs
10.3.1 SM DOs for encapsulating plain values
10.3.2 SM DOs for confidentiality
75 10.3.3 SM DOs for authentication
77 10.4 Auxiliary SM DOs
10.4.1 General
78 10.4.2 Control reference templates
10.4.3 Control reference DOs in control reference templates
80 10.4.4 Security environments
82 10.4.5 Response descriptor template
10.5 SM impact on command-response pairs
84 11 Commands for interchange
11.1 General
11.2 Selection
11.2.1 General
11.2.2 select command
87 11.2.3 manage channel command
88 11.3 Data unit handling
11.3.1 Data units
11.3.2 General
89 11.3.3 read binary command
11.3.4 write binary command
90 11.3.5 update binary command
11.3.6 search binary command
91 11.3.7 erase binary command
11.3.8 compare binary function
11.4 Record handling
11.4.1 Records
92 11.4.2 General
93 11.4.3 read record (s) command
95 11.4.4 write record command
96 11.4.5 update record command
98 11.4.6 append record command
99 11.4.7 search record command
103 11.4.8 erase record (s) command
104 11.4.9 activate record (s) command
105 11.4.10 deactivate record (s) command
106 11.4.11 compare record function
11.5 Data object handling
11.5.1 General
107 11.5.2 select data command
111 11.5.3 get data/get next data commands — even INS codes
113 11.5.4 get data/get next data commands — odd INS codes
114 11.5.5 General properties of put data/put next data/update data commands
115 11.5.6 put data command
11.5.7 put next data command
116 11.5.8 update data command
117 11.5.9 compare data function
11.6 Basic security handling
11.6.1 General
118 11.6.2 internal authenticate command
119 11.6.3 get challenge command
11.6.4 external authenticate command
120 11.6.5 general authenticate command
122 11.6.6 verify command
123 11.6.7 change reference data command
11.6.8 enable verification requirement command
11.6.9 disable verification requirement command
124 11.6.10 reset retry counter command
125 11.6.11 manage security environment command
126 11.7 Miscellaneous
11.7.1 compare command
128 11.7.2 get attribute command
129 11.8 Transmission handling
11.8.1 get response command
11.8.2 envelope command
130 12 Application-independent card services
12.1 General
12.2 Card identification
12.2.1 General
131 Blank Page
132 12.2.2 Historical bytes
136 12.2.3 Initial data string recovery
12.2.4 Waiting time management
138 12.3 Application identification and selection
12.3.1 General
12.3.2 EF.DIR
139 12.3.3 EF​.ATR/​INFO
12.3.4 Application identifier
141 12.3.5 Application template and related data elements
12.3.6 Application selection
142 12.4 Selection by path
143 12.5 Data retrieval
12.6 Card-originated byte string
12.6.1 General
12.6.2 Triggering by the card
144 12.6.3 Queries and replies
12.6.4 Formats
12.7 General feature management
12.7.1 General
12.7.2 On-card services
145 12.7.3 Interface services
12.7.4 Profile services
12.7.5 Provision of additional information
146 12.8 APDU management
12.8.1 Extended length information
12.8.2 List of supported INS codes
147 Annex A (informative) Examples of object identifiers and tag allocation schemes
150 Annex B (informative) Examples of secure messaging
158 Annex C (informative) Examples of authenticate functions by general authenticate commands
167 Annex D (informative) Application identifiers using issuer identification numbers
168 Annex E (informative) BER encoding rules
170 Annex F (informative) ber-tlv data object handling
178 Annex G (informative) Template extension by tagged wrapper
182 Annex H (informative) Parsing an extended header against its target DO
184 Annex I (informative) Use case of WTX (waiting time extension) procedure and application waiting time procedure
188 Bibliography
BS ISO/IEC 7816-4:2020+A1:2023
$215.11