{"id":446404,"date":"2024-10-20T08:46:38","date_gmt":"2024-10-20T08:46:38","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-7816-42020a12023\/"},"modified":"2024-10-26T16:21:16","modified_gmt":"2024-10-26T16:21:16","slug":"bs-iso-iec-7816-42020a12023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-7816-42020a12023\/","title":{"rendered":"BS ISO\/IEC 7816-4:2020+A1:2023"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
9<\/td>\nForeword <\/td>\n<\/tr>\n
10<\/td>\nIntroduction <\/td>\n<\/tr>\n
11<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
17<\/td>\n4 Symbols and abbreviated terms <\/td>\n<\/tr>\n
18<\/td>\n5 Command-response pairs
5.1 Conditions of operation <\/td>\n<\/tr>\n
19<\/td>\n5.2 Syntax <\/td>\n<\/tr>\n
20<\/td>\n5.3 Chaining procedures
5.3.1 General
5.3.2 Payload fragmentation
5.3.3 Command chaining <\/td>\n<\/tr>\n
21<\/td>\n5.3.4 Response chaining <\/td>\n<\/tr>\n
22<\/td>\n5.4 Class byte
5.4.1 Coding <\/td>\n<\/tr>\n
23<\/td>\n5.4.2 Logical channels <\/td>\n<\/tr>\n
24<\/td>\n5.5 Instruction byte <\/td>\n<\/tr>\n
27<\/td>\n5.6 Status bytes <\/td>\n<\/tr>\n
29<\/td>\n6 Data objects
6.1 General
6.2 SIMPLE-TLV data objects <\/td>\n<\/tr>\n
30<\/td>\n6.3 BER-TLV data objects
6.4 Constructed DOs versus primitive DOs
7 Structures for applications and data
7.1 Available structures <\/td>\n<\/tr>\n
32<\/td>\n7.2 Validity area
7.2.1 Definitions and attributes
7.2.2 Basic rules for VA handling and use <\/td>\n<\/tr>\n
33<\/td>\n7.3 Structure selection
7.3.1 Structure selection methods <\/td>\n<\/tr>\n
34<\/td>\n7.3.2 File reference data element and DO <\/td>\n<\/tr>\n
35<\/td>\n7.3.3 General reference data element and DO
7.3.4 Data referencing methods in elementary files <\/td>\n<\/tr>\n
36<\/td>\n7.4 File and data control information
7.4.1 File control information retrieval
7.4.2 Data control information retrieval <\/td>\n<\/tr>\n
37<\/td>\n7.4.3 Control parameters <\/td>\n<\/tr>\n
38<\/td>\n7.4.4 Short EF identifier
7.4.5 File descriptor byte <\/td>\n<\/tr>\n
39<\/td>\n7.4.6 Profile indicator <\/td>\n<\/tr>\n
40<\/td>\n7.4.7 Data descriptor byte
7.4.8 DF and EF list data elements
7.4.9 Instance number data element
7.4.10 Life cycle status <\/td>\n<\/tr>\n
41<\/td>\n7.4.11 Indirect referencing by short EF identifier using DO’A2′
7.4.12 Interface and life cycle status dependent security attribute template <\/td>\n<\/tr>\n
43<\/td>\nBlank Page <\/td>\n<\/tr>\n
44<\/td>\n8 Specific use of DOs and related concepts
8.1 ber-tlv payloads and padding
8.1.1 General
8.1.2 Padding conditions
8.1.3 Padding procedure <\/td>\n<\/tr>\n
45<\/td>\n8.2 Template referenced by curConstructedDO and data object generations
8.2.1 Template referenced by curConstructedDO and DO referenced by curDO
8.2.2 Template extension <\/td>\n<\/tr>\n
46<\/td>\n8.2.3 Data object pruned-tree
8.2.4 Data object life cycle
8.3 Identification of data elements and data objects
8.3.1 Principles
8.3.2 Tag interpretation in command and response data fields or payloads <\/td>\n<\/tr>\n
47<\/td>\n8.3.3 Tag allocation
8.3.4 Standard tag allocation scheme
8.3.5 Compatible tag allocation scheme <\/td>\n<\/tr>\n
48<\/td>\n8.3.6 Coexistent tag allocation scheme
8.3.7 Avoidance of independent tag allocation schemes
8.4 Referencing and retrieval of DOs and data elements
8.4.1 General <\/td>\n<\/tr>\n
49<\/td>\n8.4.2 Element list
8.4.3 Tag list
8.4.4 Header list
8.4.5 Extended header and extended header list <\/td>\n<\/tr>\n
50<\/td>\n8.4.6 Resolving an extended header <\/td>\n<\/tr>\n
51<\/td>\n8.4.7 Resolving an extended header list
8.4.8 Wrapper <\/td>\n<\/tr>\n
52<\/td>\n8.4.9 Tagged wrapper
9 Security architecture
9.1 General <\/td>\n<\/tr>\n
54<\/td>\n9.2 Cryptographic mechanism identifier template
9.3 Security attributes
9.3.1 General
9.3.2 Security attributes targets <\/td>\n<\/tr>\n
55<\/td>\n9.3.3 Compact format <\/td>\n<\/tr>\n
59<\/td>\n9.3.4 Expanded format <\/td>\n<\/tr>\n
63<\/td>\n9.3.5 Access rule references <\/td>\n<\/tr>\n
64<\/td>\n9.3.6 Security attributes for data objects <\/td>\n<\/tr>\n
65<\/td>\n9.3.7 Security parameters template <\/td>\n<\/tr>\n
70<\/td>\n9.3.8 Security attributes for logical channels <\/td>\n<\/tr>\n
71<\/td>\n9.4 Security support data elements <\/td>\n<\/tr>\n
72<\/td>\n10 Secure messaging
10.1 General
10.2 SM fields and SM DOs
10.2.1 SM protection of command payloads
10.2.2 SM protection of chained commands and responses <\/td>\n<\/tr>\n
73<\/td>\n10.2.3 SM DOs <\/td>\n<\/tr>\n
74<\/td>\n10.3 Basic SM DOs
10.3.1 SM DOs for encapsulating plain values
10.3.2 SM DOs for confidentiality <\/td>\n<\/tr>\n
75<\/td>\n10.3.3 SM DOs for authentication <\/td>\n<\/tr>\n
77<\/td>\n10.4 Auxiliary SM DOs
10.4.1 General <\/td>\n<\/tr>\n
78<\/td>\n10.4.2 Control reference templates
10.4.3 Control reference DOs in control reference templates <\/td>\n<\/tr>\n
80<\/td>\n10.4.4 Security environments <\/td>\n<\/tr>\n
82<\/td>\n10.4.5 Response descriptor template
10.5 SM impact on command-response pairs <\/td>\n<\/tr>\n
84<\/td>\n11 Commands for interchange
11.1 General
11.2 Selection
11.2.1 General
11.2.2 select command <\/td>\n<\/tr>\n
87<\/td>\n11.2.3 manage channel command <\/td>\n<\/tr>\n
88<\/td>\n11.3 Data unit handling
11.3.1 Data units
11.3.2 General <\/td>\n<\/tr>\n
89<\/td>\n11.3.3 read binary command
11.3.4 write binary command <\/td>\n<\/tr>\n
90<\/td>\n11.3.5 update binary command
11.3.6 search binary command <\/td>\n<\/tr>\n
91<\/td>\n11.3.7 erase binary command
11.3.8 compare binary function
11.4 Record handling
11.4.1 Records <\/td>\n<\/tr>\n
92<\/td>\n11.4.2 General <\/td>\n<\/tr>\n
93<\/td>\n11.4.3 read record (s) command <\/td>\n<\/tr>\n
95<\/td>\n11.4.4 write record command <\/td>\n<\/tr>\n
96<\/td>\n11.4.5 update record command <\/td>\n<\/tr>\n
98<\/td>\n11.4.6 append record command <\/td>\n<\/tr>\n
99<\/td>\n11.4.7 search record command <\/td>\n<\/tr>\n
103<\/td>\n11.4.8 erase record (s) command <\/td>\n<\/tr>\n
104<\/td>\n11.4.9 activate record (s) command <\/td>\n<\/tr>\n
105<\/td>\n11.4.10 deactivate record (s) command <\/td>\n<\/tr>\n
106<\/td>\n11.4.11 compare record function
11.5 Data object handling
11.5.1 General <\/td>\n<\/tr>\n
107<\/td>\n11.5.2 select data command <\/td>\n<\/tr>\n
111<\/td>\n11.5.3 get data\/get next data commands \u2014 even INS codes <\/td>\n<\/tr>\n
113<\/td>\n11.5.4 get data\/get next data commands \u2014 odd INS codes <\/td>\n<\/tr>\n
114<\/td>\n11.5.5 General properties of put data\/put next data\/update data commands <\/td>\n<\/tr>\n
115<\/td>\n11.5.6 put data command
11.5.7 put next data command <\/td>\n<\/tr>\n
116<\/td>\n11.5.8 update data command <\/td>\n<\/tr>\n
117<\/td>\n11.5.9 compare data function
11.6 Basic security handling
11.6.1 General <\/td>\n<\/tr>\n
118<\/td>\n11.6.2 internal authenticate command <\/td>\n<\/tr>\n
119<\/td>\n11.6.3 get challenge command
11.6.4 external authenticate command <\/td>\n<\/tr>\n
120<\/td>\n11.6.5 general authenticate command <\/td>\n<\/tr>\n
122<\/td>\n11.6.6 verify command <\/td>\n<\/tr>\n
123<\/td>\n11.6.7 change reference data command
11.6.8 enable verification requirement command
11.6.9 disable verification requirement command <\/td>\n<\/tr>\n
124<\/td>\n11.6.10 reset retry counter command <\/td>\n<\/tr>\n
125<\/td>\n11.6.11 manage security environment command <\/td>\n<\/tr>\n
126<\/td>\n11.7 Miscellaneous
11.7.1 compare command <\/td>\n<\/tr>\n
128<\/td>\n11.7.2 get attribute command <\/td>\n<\/tr>\n
129<\/td>\n11.8 Transmission handling
11.8.1 get response command
11.8.2 envelope command <\/td>\n<\/tr>\n
130<\/td>\n12 Application-independent card services
12.1 General
12.2 Card identification
12.2.1 General <\/td>\n<\/tr>\n
131<\/td>\nBlank Page <\/td>\n<\/tr>\n
132<\/td>\n12.2.2 Historical bytes <\/td>\n<\/tr>\n
136<\/td>\n12.2.3 Initial data string recovery
12.2.4 Waiting time management <\/td>\n<\/tr>\n
138<\/td>\n12.3 Application identification and selection
12.3.1 General
12.3.2 EF.DIR <\/td>\n<\/tr>\n
139<\/td>\n12.3.3 EF\u200b.ATR\/\u200bINFO
12.3.4 Application identifier <\/td>\n<\/tr>\n
141<\/td>\n12.3.5 Application template and related data elements
12.3.6 Application selection <\/td>\n<\/tr>\n
142<\/td>\n12.4 Selection by path <\/td>\n<\/tr>\n
143<\/td>\n12.5 Data retrieval
12.6 Card-originated byte string
12.6.1 General
12.6.2 Triggering by the card <\/td>\n<\/tr>\n
144<\/td>\n12.6.3 Queries and replies
12.6.4 Formats
12.7 General feature management
12.7.1 General
12.7.2 On-card services <\/td>\n<\/tr>\n
145<\/td>\n12.7.3 Interface services
12.7.4 Profile services
12.7.5 Provision of additional information <\/td>\n<\/tr>\n
146<\/td>\n12.8 APDU management
12.8.1 Extended length information
12.8.2 List of supported INS codes <\/td>\n<\/tr>\n
147<\/td>\nAnnex A (informative) Examples of object identifiers and tag allocation schemes <\/td>\n<\/tr>\n
150<\/td>\nAnnex B (informative) Examples of secure messaging <\/td>\n<\/tr>\n
158<\/td>\nAnnex C (informative) Examples of authenticate functions by general authenticate commands <\/td>\n<\/tr>\n
167<\/td>\nAnnex D (informative) Application identifiers using issuer identification numbers <\/td>\n<\/tr>\n
168<\/td>\nAnnex E (informative) BER encoding rules <\/td>\n<\/tr>\n
170<\/td>\nAnnex F (informative) ber-tlv data object handling <\/td>\n<\/tr>\n
178<\/td>\nAnnex G (informative) Template extension by tagged wrapper <\/td>\n<\/tr>\n
182<\/td>\nAnnex H (informative) Parsing an extended header against its target DO <\/td>\n<\/tr>\n
184<\/td>\nAnnex I (informative) Use case of WTX (waiting time extension) procedure and application waiting time procedure <\/td>\n<\/tr>\n
188<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Identification cards. Integrated circuit cards – Organization, security and commands for interchange<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n190<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":446411,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[693,2641],"product_tag":[],"class_list":{"0":"post-446404","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-240-15","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/446404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/446411"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=446404"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=446404"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=446404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}