DIN CEN/TS 15480-2 : 2012
Current
The latest, up-to-date edition.
IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES
12-01-2013
Foreword<br>1 Scope<br>2 Normative references<br>3 Terms and definitions<br>4 Abbreviations<br> 4.1 Abbreviations<br> 4.2 Coding conventions and notation<br>5 Data elements and data structures<br> 5.1 Supported data Structures<br> 5.2 Access to data structures<br> 5.3 Answer to reset (ATR)/answer to select (ATS)<br> 5.4 General architecture and file supported<br> 5.5 Selection of data structures<br> 5.6 Access to files<br>6 Basic card services<br> 6.1 General<br> 6.2 Identification<br> 6.3 User verification<br> 6.4 Device authentication<br> 6.5 Digital signature<br> 6.6 Client/server authentication<br> 6.7 Encryption key decipherment<br>7 Extended card services<br> 7.1 General<br> 7.2 Biometrics - on card matching<br> 7.3 Passive authentication<br> 7.4 Basic access control<br> 7.5 Active authentication<br> 7.6 Extended access control<br> 7.7 Role authentication<br>Annex A (normative) Command set<br> A.1 CLASS byte cod<br> A.2 Command chaining mechanisms<br> A.3 Retrieval of response data longer<br> than 256 bytes<br> A.4 Logical channels<br> A.5 Short and extended length fields<br> A.6 Status words<br> A.7 Command set<br>Annex B (normative) Card Verifiable Certificates<br> B.1 Introduction<br> B.2 Use of the public key extracted<br> from the certificate<br> B.3 Validity of the key extracted<br> from a certificate<br> B.4 Structure of CVC<br> B.5 Certificate content<br> B.6 Signature<br> B.7 Coding of the certificate content<br> B.8 Steps of CVC verification<br> B.9 Commands to handle the CVC<br>Annex C (normative) Cryptographic Information Application<br> C.1 Description<br> C.2 CIA data organisation<br>Annex D (normative) Mandatory and optional features<br> D.1 General<br> D.2 Data elements and data structures<br> D.3 Card services<br> D.4 Command set<br> D.5 Algorithms<br>Annex E (normative) Key and signature formats for<br> elliptic curves over prime fields GF(p)<br> E.1 General<br> E.2 Elliptic curve parameters<br> E.3 Public key point<br> E.4 ECDSA signature format<br>Annex F (informative) Access rules in expanded format<br> F.1 Object protection by access<br> rules in expanded format<br> F.2 Access rules in expanded format<br> F.3 Security attribute referencing<br> expanded format<br> F.4 Security attribute template for<br> physical interfaces<br>Annex G (informative) Example of data structure: the<br> Security Data Objects concept<br> G.1 SDO concept<br>Annex H (informative) Extended access control for MRTDs<br> H.1 General<br> H.2 Extended access control protocol<br> H.3 CV certificates for EAC<br>Bibliography
DevelopmentNote |
Also numbered as DIN SPEC 91130-2. (09/2012)
|
DocumentType |
Standard
|
PublisherName |
German Institute for Standardisation (Deutsches Institut für Normung)
|
Status |
Current
|
Standards | Relationship |
CEN/TS 15480-2:2012 | Identical |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.