UNI EN 726-7 : 1999
Current
The latest, up-to-date edition.
IDENTIFICATION CARD SYSTEMS - TELECOMMUNICATIONS INTEGRATED CIRCUIT(S) CARDS AND TERMINALS - SECURITY MODULE
31-10-1999
Foreword
1 Scope
2 Normative References
3 Definitions and Abbreviations
3.1 Definitions
3.2 Abbreviations
4 Physical characteristics of the SM
5 Electronic signals and transmissions protocols
6 Logical model for SM
7 General Concepts
7.1 General security principles
7.1.1 Access conditions
7.1.2 Sequence control
7.2 SM Life Cycle
7.3 Configuration of the system
7.4 SM security functions
8 Description of the functions of a SM
8.1 Functions without MAC
8.1.1 SELECT KEYSET
8.1.2 DIVERSIFY KEYSET
8.1.3 ASK PARAMETER
8.2 Functions used to compute a crytogram or
message authentication codes (MAC)
8.2.1 COMPUTE LOAD KEY
8.2.2 COMPUTE MAC
8.2.3 COMPUTE CRYPTOGRAMform of an IC card
8.3 Functions verifying crytograms or message
authentication codes (MAC)
8.3.1 VERIFY MAC
8.3.2 UPDATE (SM)
8.3.3 INCREASE (SM)
8.3.4 DECREASE (SM)
8.3.5 VERIFY CRYPTOGRAM
8.4 Functions to downloading of keys from the SM
to the UC
8.5 Functionality on SM-EW interface
8.6 Linking functions with keys
8.7 Limitations of the usage of keys
9 Data Elements
9.1 Data for SM identification
9.1.1 SM identifier
9.2 UC data
9.2.1 IC serial number of user card
9.2.2 Application Expiry data
9.2.3 Application Identifier (AID)
9.2.4 Key file version
9.2.5 Algorithm identifier
9.2.6 Amount
9.2.7 Value
9.2.8 Type of units
9.3 Status conditions return by the SM
9.3.1 Functions versus possible status
responses
Annex A (normative) The case of a SM in the form of an
IC card
Annex B (informative) Example of scenarios for SM in the
form of an IC card
Annex C (informative) Bibliography
Defines: - the necessary security services/mechanisms to provide cryptographic and application security information for the processing of telecommunications transactions - the general card related functions embedded in the SM-terminal protocols including minimum data exchange - the minimum security requirements for a Security Module (SM). considering several types of SMs at different locations in the system and different system configurations.
Committee |
CT 500
|
DocumentType |
Standard
|
PublisherName |
Ente Nazionale Italiano di Unificazione (UNI)
|
Status |
Current
|
Standards | Relationship |
UNE-EN 726-7:2000 | Identical |
DIN EN 726-7:2000-01 | Identical |
NS EN 726-7 : 1ED 1999 | Identical |
I.S. EN 726-7:1999 | Identical |
NBN EN 726-7 : 1999 | Identical |
NF EN 726-7 : 1999 | Identical |
BS EN 726-7:1999 | Identical |
EN 726-7:1999 | Identical |
NEN EN 726-7 : 1999 | Identical |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.