INCITS/ISO/IEC 24727-2 : 2009(R2014)
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 2: GENERIC CARD INTERFACE
12-01-2013
15-02-2020
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviated terms
5 Organization for interoperability
6 Capability descriptions
Annex A (informative) - Profiles for the cryptographic information
application on the generic card Interface
Annex B (informative) - Instances of profile A
Annex C (normative) - Cryptographic information application for
card-application service description
Annex D (informative) - Example of cryptographic information
application for card-application ervice description
Annex E (informative) - DID Discovery
Bibliography
Describes a generic card interface for integrated circuit cards.
| Committee |
B10.12
|
| DocumentType |
Standard
|
| PublisherName |
Information Technology Industry Council
|
| Status |
Superseded
|
| SupersededBy |
| Standards | Relationship |
| ISO/IEC 24727-2:2008 | Identical |
| ISO/IEC 24727-1:2014 | Identification cards — Integrated circuit card programming interfaces — Part 1: Architecture |
| ISO/IEC 7816-8:2016 | Identification cards — Integrated circuit cards — Part 8: Commands and mechanisms for security operations |
| ISO/IEC 7816-9:2004 | Identification cards — Integrated circuit cards — Part 9: Commands for card management |
| ISO/IEC 9979:1999 | Information technology — Security techniques — Procedures for the registration of cryptographic algorithms |
| ISO/IEC 20060:2010 | Information technology — Open Terminal Architecture (OTA) — Virtual machine |
| ISO/IEC 7816-4:2013 | Identification cards — Integrated circuit cards — Part 4: Organization, security and commands for interchange |
| ISO/IEC 7816-15:2016 | Identification cards — Integrated circuit cards — Part 15: Cryptographic information application |
| ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.