• BS EN ISO/IEC 7816/4 : 1996

    Withdrawn A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

    INFORMATION TECHNOLOGY - IDENTIFICATION CARDS - INTEGRATED CIRCUIT(S) CARDS WITH CONTACTS - INTERINDUSTRY COMMANDS FOR INTERCHANGE

    Available format(s):  Hardcopy, PDF

    Withdrawn date:  14-09-2001

    Language(s):  English

    Published date:  31-12-1995

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Definitions
    4 Abbreviations and notation
    5 Basic organizations
        5.1 Data structures
        5.2 Security architecture of the card
        5.3 APDU message structure
        5.4 Coding conventions for command headers, data
              fields and response trailers
        5.5 Logical channels
        5.6 Secure messaging
    6 Basic interindustry commands
        6.1 READ BINARY command
        6.2 WRITE BINARY command
        6.3 UPDATE BINARY command
        6.4 ERASE BINARY command
        6.5 READ RECORDS(S) command
        6.6 WRITE RECORD command
        6.7 APPEND RECORD command
        6.8 UPDATE RECORD command
        6.9 GET DATA command
        6.10 PUT DATA command
        6.11 SELECT FILE command
        6.12 VERIFY command
        6.13 INTERNAL AUTHENTICATE command
        6.14 EXTERNAL AUTHENTICATE command
        6.15 GET CHALLENGE command
        6.16 MANAGE CHANNEL command
    7 Transmission-oriented interindustry commands
        7.1 GET RESPONSE command
        7.2 ENVELOPE command
    8 Historical bytes
    9 Application-independent card services
    Annexes
    A Transportation of APDU message by T=0
    B Transportation of APDU message by T=1
    C Record pointer management
    D Use of the basic encoding rules of ASN.1
    E Examples of card profiles
    F Use of secure messaging

    Abstract - (Show below) - (Hide below)

    Defines contents of messages, commands and responses transmitted to the card by the interface device, and the structure and content of the historical bytes sent by the card during the answer to reset. It describes file and data structure as at the interface when processing interindustry commands for interchange, access methods to files and data in the card, methods for secure messaging and access methods to the algorithms processed by the card, but does not describe these algorithms.

    General Product Information - (Show below) - (Hide below)

    Committee IST/17
    Development Note DRAFT FOR COMMENT 94/646721 DC
    Document Type Standard
    Publisher British Standards Institution
    Status Withdrawn
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO 10118-2 : 1994 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - HASH-FUNCTIONS - HASH-FUNCTIONS USING AN N-BIT BLOCK CIPHER ALGORITHM
    ISO/IEC 7816-6:2016 Identification cards — Integrated circuit cards — Part 6: Interindustry data elements for interchange
    ISO/IEC 8825:1990 Information technology — Open Systems Interconnection — Specification of Basic Encoding Rules for Abstract Syntax Notation One (ASN.1)
    ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
    ISO/IEC 7816-3:2006 Identification cards — Integrated circuit cards — Part 3: Cards with contacts — Electrical interface and transmission protocols
    ISO/IEC 7812-1:2017 Identification cards — Identification of issuers — Part 1: Numbering system
    ISO/IEC 7816-5:2004 Identification cards — Integrated circuit cards — Part 5: Registration of application providers
    ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
    ISO/IEC 9796:1991 Information technology Security techniques Digital signature scheme giving message recovery
    ISO/IEC 9797:1994 Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective