Kenty PDF

ISO , Section 5 contains basic organizations, data structures, file organization, file referencing methods, data referencing methods, This part of ISO/IEC supports the following two categories of files: . 0 — x x x — — —, File type. ISO/IEC is intended to be used in any sector of activity. It specifies: a ) contents of command-response pairs exchanged at the interface,. b) means of. ISO/IEC (): “Information technology – Identification cards; Integrated . The key reference is indicated using tag ’83’ as defined in ISO/IEC [2].

Author: Niran Kajira
Country: Georgia
Language: English (Spanish)
Genre: Finance
Published (Last): 25 October 2014
Pages: 195
PDF File Size: 2.92 Mb
ePub File Size: 19.18 Mb
ISBN: 986-5-28200-375-5
Downloads: 93748
Price: Free* [*Free Regsitration Required]
Uploader: Kajir

The other DFs are optional.

F I G U R E 2

In other projects Wikimedia Commons. In case 1, diletype length Lc is null; therefore the Lc field and the data field are empty. File-specific security status — It may be modified by the completion of a DF-related authentication procedure e. No byte is used for Lc valued to 0 No data byte is present.

An application protocol data unit APDU contains either a command message or a response message, sent from the interface device to the card or conversely. Logical channel number according viletype 1.

ISO/IEC 7816

Data may be referenced as records, as data units or fiketype data objects. The computation of a digital signature related data objects. In case 1, the body of the command APDU is empty. The first output results from the first input. When a file cannot be implicitly selected, it shall be possible to select it by at least one of the following methods:. Data encipherment — Using secret internal data, the card deciphers a cryptogram received in a data field.

  BLUE BLOODS VAN ALEN LEGACY PDF

ISO/IEC – Wikipedia

Short EF identifiers connot be used in a path or as a file identifier e. If the response descriptor provides auxiliary data, then the respective data object shall be empty in the response. Within each EF of cyclic structure, the record numbers shall be sequentially assigned in the opposite order, i. This specification does not preclude the determination by sequential analysis of which mechanisms and which security items shall be used for processing the remaining part of the data field.

In case 3, the length Lc is not null; therefore the Lc field is present isso the data field consists of the Lc 8716-4 bytes. Data authentication — Using internal data, either secret or public, the card checks redundant data recived from the outside world. The following rules shall apply The card shall fill each empty primitive data object Each control reference template present in the response descriptor shall be present in the response at the same place with the same control references for algorithm, file and key.

In each message involving security mechanisms based on cryptography, the data field shall comply with the basic encoding rules of ASN.

The file control information may be present for any file. The path begins ieo the identifier of the MF or of the current DF and ends with the identifier of the file itself.

ISO part 4 section 5 APDU level data structures

The key reference identifies the key to be used. Each time a reference is made with a record identifier, an indication shall specify the logical position of the target record the first or last occurrence, the next or previous occurrence relative to the record pointer: Dedicated file DF Elementary file EF The logical organization of data in a card consists of following structural hierachy of dedicated files: Consequently, the body consists of the Lc field followed by the data field.

  DREMEL INTERACTIVE ANALYSIS OF WEB-SCALE DATASETS PDF

An annex is provided that shows how to control the loading of data secure download into the card, by means of verifying the access rights of the loading entity and protection of the transmitted data with secure messaging. It encodes a class, a type and a number.

The present specifications of the padding rules do not preclude such a feature. Linear file with records of variable size.

For the computation of a cryptogram not preceded by a padding indicator byte, the default mechanism is a stream cipher with exclusive-or of the string of data bytes to be concealed with a concealing string of the same ief. Record structure — The EF is seen at the interface as a sequence of individually identifiable records.

It gives the identifier, name, description, format, coding and layout of each DE and defines the means of retrieval of DEs from the card.

The FCI template is intended for conveying file control parameters and file management data. The current output results from the current input.