BS ISO/IEC 24727-2 : 2008
Current
The latest, up-to-date edition.
IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 2: GENERIC CARD INTERFACE
Hardcopy , PDF
English
01-01-2008
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviated terms
5 Organization for interoperability
6 Capability descriptions
Annex A (informative) - Profiles for the cryptographic
Information application on the generic card interface
Annex B (informative) - Instances of Profile A
Annex C (normative) - Cryptographic information
application for card-application service description
Annex D (informative) - Example of cryptographic
Information application for card-application
service description
Annex E (informative) - DID Discovery
Bibliography
Describes a generic card interface for integrated circuit cards.
Committee |
IST/17
|
DevelopmentNote |
Supersedes 06/30144721 DC. (01/2009) 2008 Edition Re-Issued in April 2014 & incorporates AMD 1 2014. (04/2014) Supersedes 12/30242039 DC. (05/2014)
|
DocumentType |
Standard
|
Pages |
50
|
PublisherName |
British Standards Institution
|
Status |
Current
|
Supersedes |
Standards | Relationship |
ISO/IEC 24727-2:2008 | Identical |
ISO/IEC 24727-1:2014 | Identification cards Integrated circuit card programming interfaces Part 1: Architecture |
ISO/IEC 7816-8:2016 | Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations |
ISO/IEC 7816-9:2004 | Identification cards Integrated circuit cards Part 9: Commands for card management |
ISO/IEC 9979:1999 | Information technology Security techniques Procedures for the registration of cryptographic algorithms |
ISO/IEC 20060:2010 | Information technology Open Terminal Architecture (OTA) Virtual machine |
ISO/IEC 7816-4:2013 | Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange |
ISO/IEC 7816-15:2016 | Identification cards Integrated circuit cards Part 15: Cryptographic information application |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.