I.S. EN 726-7:1999
Current
The latest, up-to-date edition.
IDENTIFICATION CARD SYSTEMS - TELECOMMUNICATIONS INTEGRATED CIRCUIT(S) AND TERMINALS - SECURITY MODULE
Hardcopy , PDF
English
01-01-1999
For Harmonized Standards, check the EU site to confirm that the Standard is cited in the Official Journal.
Only cited Standards give presumption of conformance to New Approach Directives/Regulations.
Dates of withdrawal of national standards are available from NSAI.
Foreword
1 Scope
2 Normative References
3 Definitions and Abbreviations
3.1 Definitions
3.2 Abbreviations
4 Physical characteristics of the SM
5 Electronic signals and transmissions protocols
6 Logical model for SM
7 General Concepts
7.1 General security principles
7.1.1 Access conditions
7.1.2 Sequence control
7.2 SM Life Cycle
7.3 Configuration of the system
7.4 SM security functions
8 Description of the functions of a SM
8.1 Functions without MAC
8.1.1 SELECT KEYSET
8.1.2 DIVERSIFY KEYSET
8.1.3 ASK PARAMETER
8.2 Functions used to compute a crytogram or
message authentication codes (MAC)
8.2.1 COMPUTE LOAD KEY
8.2.2 COMPUTE MAC
8.2.3 COMPUTE CRYPTOGRAMform of an IC card
8.3 Functions verifying crytograms or message
authentication codes (MAC)
8.3.1 VERIFY MAC
8.3.2 UPDATE (SM)
8.3.3 INCREASE (SM)
8.3.4 DECREASE (SM)
8.3.5 VERIFY CRYPTOGRAM
8.4 Functions to downloading of keys from the SM
to the UC
8.5 Functionality on SM-EW interface
8.6 Linking functions with keys
8.7 Limitations of the usage of keys
9 Data Elements
9.1 Data for SM identification
9.1.1 SM identifier
9.2 UC data
9.2.1 IC serial number of user card
9.2.2 Application Expiry data
9.2.3 Application Identifier (AID)
9.2.4 Key file version
9.2.5 Algorithm identifier
9.2.6 Amount
9.2.7 Value
9.2.8 Type of units
9.3 Status conditions return by the SM
9.3.1 Functions versus possible status
responses
Annex A (normative) The case of a SM in the form of an
IC card
Annex B (informative) Example of scenarios for SM in the
form of an IC card
Annex C (informative) Bibliography
Defines: - the necessary security services/mechanisms to provide cryptographic and application security information for the processing of telecommunications transactions - the general card related functions embedded in the SM-terminal protocols including minimum data exchange - the minimum security requirements for a Security Module (SM). considering several types of SMs at different locations in the system and different system configurations.
DocumentType |
Standard
|
Pages |
74
|
PublisherName |
National Standards Authority of Ireland
|
Status |
Current
|
Standards | Relationship |
DIN EN 726-7:2000-01 | Identical |
UNI EN 726-7 : 1999 | Identical |
EN 726-7:1999 | Identical |
BS EN 726-7:1999 | Identical |
UNE-EN 726-7:2000 | Identical |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.