ANSI INCITS 504-2 : 2013(R2018)
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
INFORMATION TECHNOLOGY - GENERIC IDENTITY COMMAND SET - PART 2: CARD ADMINISTRATIVE COMMAND SET
Hardcopy , PDF
01-01-2013
29-03-2024
Foreword
1. Overview
2. Definitions, abbreviations and conventions
3. Card Manager Application
4. Application Management
5. File Management
6. Key Management
7. Authentication Object Management
8. Administrative Command Set
Annex A (Informative) - Bibliography
Specifies the minimally sufficient set of commands to support the management of the card-applications, files, data objects and security objects of card-applications.
| DocumentType |
Revision
|
| Pages |
63
|
| ProductNote |
THIS STANDARD ALSO REFERS INCITS 504-1,
|
| PublisherName |
Information Technology Industry Council
|
| Status |
Superseded
|
| SupersededBy | |
| Supersedes |
| ANSI INCITS 504-3 : 2016 | INFORMATION TECHNOLOGY - GENERIC IDENTITY COMMAND - PART 3: GICS PLATFORM TESTING REQUIREMENTS |
| ANSI INCITS 504-4 : 2013(R2018) | INFORMATION TECHNOLOGY - GENERIC IDENTITY COMMAND SET - PART 4: CARD APPLICATION PROFILE TEMPLATE |
| ISO/IEC 24727-6:2010 | Identification cards — Integrated circuit card programming interfaces — Part 6: Registration authority procedures for the authentication protocols for interoperability |
| ISO/IEC 7816-6:2016 | Identification cards — Integrated circuit cards — Part 6: Interindustry data elements for interchange |
| ISO/IEC 24727-1:2014 | Identification cards — Integrated circuit card programming interfaces — Part 1: Architecture |
| ISO/IEC 8825-1:2015 | Information technology — ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) — Part 1: |
| ISO/IEC 24727-2:2008 | Identification cards — Integrated circuit card programming interfaces — Part 2: Generic card interface |
| ISO/IEC 7816-8:2016 | Identification cards — Integrated circuit cards — Part 8: Commands and mechanisms for security operations |
| ISO/IEC 7816-9:2004 | Identification cards — Integrated circuit cards — Part 9: Commands for card management |
| ISO/IEC 7816-4:2013 | Identification cards — Integrated circuit cards — Part 4: Organization, security and commands for interchange |
| ISO/IEC 24727-4:2008 | Identification cards — Integrated circuit card programming interfaces — Part 4: Application programming interface (API) administration |
| ISO/IEC 24727-5:2011 | Identification cards — Integrated circuit card programming interfaces — Part 5: Testing procedures |
| ISO/IEC 7816-13:2007 | Identification cards — Integrated circuit cards — Part 13: Commands for application management in a multi-application environment |
| ISO/IEC 11770-1:2010 | Information technology — Security techniques — Key management — Part 1: Framework |
| ISO/IEC 24727-3:2008 | Identification cards — Integrated circuit card programming interfaces — Part 3: Application interface |
| ISO/IEC 7816-11:2004 | Identification cards — Integrated circuit cards — Part 11: Personal verification through biometric methods |
| ISO/IEC 9797:1994 | Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.