{"id":446404,"date":"2024-10-20T08:46:38","date_gmt":"2024-10-20T08:46:38","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-7816-42020a12023\/"},"modified":"2024-10-26T16:21:16","modified_gmt":"2024-10-26T16:21:16","slug":"bs-iso-iec-7816-42020a12023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-7816-42020a12023\/","title":{"rendered":"BS ISO\/IEC 7816-4:2020+A1:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 4 Symbols and abbreviated terms <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5 Command-response pairs 5.1 Conditions of operation <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.2 Syntax <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.3 Chaining procedures 5.3.1 General 5.3.2 Payload fragmentation 5.3.3 Command chaining <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5.3.4 Response chaining <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 5.4 Class byte 5.4.1 Coding <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.4.2 Logical channels <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.5 Instruction byte <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 5.6 Status bytes <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 6 Data objects 6.1 General 6.2 SIMPLE-TLV data objects <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 6.3 BER-TLV data objects 6.4 Constructed DOs versus primitive DOs 7 Structures for applications and data 7.1 Available structures <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 7.2 Validity area 7.2.1 Definitions and attributes 7.2.2 Basic rules for VA handling and use <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 7.3 Structure selection 7.3.1 Structure selection methods <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 7.3.2 File reference data element and DO <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 7.3.3 General reference data element and DO 7.3.4 Data referencing methods in elementary files <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 7.4 File and data control information 7.4.1 File control information retrieval 7.4.2 Data control information retrieval <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 7.4.3 Control parameters <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 7.4.4 Short EF identifier 7.4.5 File descriptor byte <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 7.4.6 Profile indicator <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 7.4.7 Data descriptor byte 7.4.8 DF and EF list data elements 7.4.9 Instance number data element 7.4.10 Life cycle status <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 7.4.11 Indirect referencing by short EF identifier using DO’A2′ 7.4.12 Interface and life cycle status dependent security attribute template <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 8 Specific use of DOs and related concepts 8.1 ber-tlv payloads and padding 8.1.1 General 8.1.2 Padding conditions 8.1.3 Padding procedure <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 8.2 Template referenced by curConstructedDO and data object generations 8.2.1 Template referenced by curConstructedDO and DO referenced by curDO 8.2.2 Template extension <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 8.2.3 Data object pruned-tree 8.2.4 Data object life cycle 8.3 Identification of data elements and data objects 8.3.1 Principles 8.3.2 Tag interpretation in command and response data fields or payloads <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 8.3.3 Tag allocation 8.3.4 Standard tag allocation scheme 8.3.5 Compatible tag allocation scheme <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 8.3.6 Coexistent tag allocation scheme 8.3.7 Avoidance of independent tag allocation schemes 8.4 Referencing and retrieval of DOs and data elements 8.4.1 General <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 8.4.2 Element list 8.4.3 Tag list 8.4.4 Header list 8.4.5 Extended header and extended header list <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 8.4.6 Resolving an extended header <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 8.4.7 Resolving an extended header list 8.4.8 Wrapper <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 8.4.9 Tagged wrapper 9 Security architecture 9.1 General <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 9.2 Cryptographic mechanism identifier template 9.3 Security attributes 9.3.1 General 9.3.2 Security attributes targets <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 9.3.3 Compact format <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 9.3.4 Expanded format <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 9.3.5 Access rule references <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 9.3.6 Security attributes for data objects <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 9.3.7 Security parameters template <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | 9.3.8 Security attributes for logical channels <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 9.4 Security support data elements <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 10 Secure messaging 10.1 General 10.2 SM fields and SM DOs 10.2.1 SM protection of command payloads 10.2.2 SM protection of chained commands and responses <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 10.2.3 SM DOs <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 10.3 Basic SM DOs 10.3.1 SM DOs for encapsulating plain values 10.3.2 SM DOs for confidentiality <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 10.3.3 SM DOs for authentication <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 10.4 Auxiliary SM DOs 10.4.1 General <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 10.4.2 Control reference templates 10.4.3 Control reference DOs in control reference templates <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | 10.4.4 Security environments <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 10.4.5 Response descriptor template 10.5 SM impact on command-response pairs <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 11 Commands for interchange 11.1 General 11.2 Selection 11.2.1 General 11.2.2 select command <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 11.2.3 manage channel command <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 11.3 Data unit handling 11.3.1 Data units 11.3.2 General <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | 11.3.3 read binary command 11.3.4 write binary command <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 11.3.5 update binary command 11.3.6 search binary command <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 11.3.7 erase binary command 11.3.8 compare binary function 11.4 Record handling 11.4.1 Records <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | 11.4.2 General <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | 11.4.3 read record (s) command <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 11.4.4 write record command <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 11.4.5 update record command <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | 11.4.6 append record command <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | 11.4.7 search record command <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | 11.4.8 erase record (s) command <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | 11.4.9 activate record (s) command <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 11.4.10 deactivate record (s) command <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 11.4.11 compare record function 11.5 Data object handling 11.5.1 General <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | 11.5.2 select data command <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 11.5.3 get data\/get next data commands \u2014 even INS codes <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | 11.5.4 get data\/get next data commands \u2014 odd INS codes <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | 11.5.5 General properties of put data\/put next data\/update data commands <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | 11.5.6 put data command 11.5.7 put next data command <\/td>\n<\/tr>\n | ||||||
116<\/td>\n | 11.5.8 update data command <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | 11.5.9 compare data function 11.6 Basic security handling 11.6.1 General <\/td>\n<\/tr>\n | ||||||
118<\/td>\n | 11.6.2 internal authenticate command <\/td>\n<\/tr>\n | ||||||
119<\/td>\n | 11.6.3 get challenge command 11.6.4 external authenticate command <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | 11.6.5 general authenticate command <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | 11.6.6 verify command <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | 11.6.7 change reference data command 11.6.8 enable verification requirement command 11.6.9 disable verification requirement command <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | 11.6.10 reset retry counter command <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | 11.6.11 manage security environment command <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | 11.7 Miscellaneous 11.7.1 compare command <\/td>\n<\/tr>\n | ||||||
128<\/td>\n | 11.7.2 get attribute command <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | 11.8 Transmission handling 11.8.1 get response command 11.8.2 envelope command <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | 12 Application-independent card services 12.1 General 12.2 Card identification 12.2.1 General <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | 12.2.2 Historical bytes <\/td>\n<\/tr>\n | ||||||
136<\/td>\n | 12.2.3 Initial data string recovery 12.2.4 Waiting time management <\/td>\n<\/tr>\n | ||||||
138<\/td>\n | 12.3 Application identification and selection 12.3.1 General 12.3.2 EF.DIR <\/td>\n<\/tr>\n | ||||||
139<\/td>\n | 12.3.3 EF\u200b.ATR\/\u200bINFO 12.3.4 Application identifier <\/td>\n<\/tr>\n | ||||||
141<\/td>\n | 12.3.5 Application template and related data elements 12.3.6 Application selection <\/td>\n<\/tr>\n | ||||||
142<\/td>\n | 12.4 Selection by path <\/td>\n<\/tr>\n | ||||||
143<\/td>\n | 12.5 Data retrieval 12.6 Card-originated byte string 12.6.1 General 12.6.2 Triggering by the card <\/td>\n<\/tr>\n | ||||||
144<\/td>\n | 12.6.3 Queries and replies 12.6.4 Formats 12.7 General feature management 12.7.1 General 12.7.2 On-card services <\/td>\n<\/tr>\n | ||||||
145<\/td>\n | 12.7.3 Interface services 12.7.4 Profile services 12.7.5 Provision of additional information <\/td>\n<\/tr>\n | ||||||
146<\/td>\n | 12.8 APDU management 12.8.1 Extended length information 12.8.2 List of supported INS codes <\/td>\n<\/tr>\n | ||||||
147<\/td>\n | Annex A (informative) Examples of object identifiers and tag allocation schemes <\/td>\n<\/tr>\n | ||||||
150<\/td>\n | Annex B (informative) Examples of secure messaging <\/td>\n<\/tr>\n | ||||||
158<\/td>\n | Annex C (informative) Examples of authenticate functions by general authenticate commands <\/td>\n<\/tr>\n | ||||||
167<\/td>\n | Annex D (informative) Application identifiers using issuer identification numbers <\/td>\n<\/tr>\n | ||||||
168<\/td>\n | Annex E (informative) BER encoding rules <\/td>\n<\/tr>\n | ||||||
170<\/td>\n | Annex F (informative) ber-tlv data object handling <\/td>\n<\/tr>\n | ||||||
178<\/td>\n | Annex G (informative) Template extension by tagged wrapper <\/td>\n<\/tr>\n | ||||||
182<\/td>\n | Annex H (informative) Parsing an extended header against its target DO <\/td>\n<\/tr>\n | ||||||
184<\/td>\n | Annex I (informative) Use case of WTX (waiting time extension) procedure and application waiting time procedure <\/td>\n<\/tr>\n | ||||||
188<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Identification cards. Integrated circuit cards – Organization, security and commands for interchange<\/b><\/p>\n |