Partie Application des informations cryptographiques. STANDARD. ISO/IEC. Reference number. ISO/IEC (E). ISO/IEC (E). PDF disclaimer. This PDF file may contain embedded typefaces. In accordance with Adobe’s licensing policy, this file. ISO/IEC /AMD Standard | Amendment 1 – Identification cards – Integrated circuit cards – Part Cryptographic information.

Author: Zolozragore Goltira
Country: Bulgaria
Language: English (Spanish)
Genre: Health and Food
Published (Last): 16 February 2015
Pages: 263
PDF File Size: 7.71 Mb
ePub File Size: 6.49 Mb
ISBN: 127-7-25169-860-5
Downloads: 93531
Price: Free* [*Free Regsitration Required]
Uploader: Kigajin

Cards with contacts — Dimensions and location of the contacts”.

ISO/IEC 7816

Created inupdated in According to its abstract, it specifies interindustry commands for integrated circuit cards both with contacts and lec contacts for card and file management, e. Commands for card management”.

List of International Electrotechnical Commission standards. Personal verification through biometric methods”. This part specifies commands for application management in a multi-application environment. Interindustry data elements for interchange”.

ISO/IEC – Wikipedia

ISO standards by standard number. From Wikipedia, the free encyclopedia. It gives the identifier, name, description, format, coding and layout of each DE and defines the means of retrieval of DEs from the card. This application contains information on cryptographic functionality.


Electronic signals and answer to reset for synchronous cards”. Views Read Edit View history.

ISO/IEC /AMD | IEC Webstore

iev Commands for application management in a multi-application environment”. According to its abstract, it specifies the Data Elements DEs used for interindustry interchange based on integrated circuit cards ICCs both with contacts and without contacts. Cards with contacts — Physical characteristics”.

Cards with contacts — Electrical interface and transmission protocols”. An annex is provided that shows how to control the loading of data secure download into the card, by means of verifying the access rights of the loading entity and protection of the transmitted data with secure messaging.

This part specifies the power, signal structures, and the structure for the answer to reset between an integrated circuit card s with synchronous transmission and an interface device such as a terminal.

This page was last edited on 19 Aprilat In other projects Wikimedia Commons. Registration of application providers”.

Created in kso, amended in,updated in Created inupdated inupdated in Created inupdated inamended inupdated in Retrieved from ” https: Commands and mechanisms for security operations”. The loaded data may contain, for example, code, keys and applets. Cards with contacts — USB ixo interface and operating procedures”. According to its abstract, it specifies a card application.


According to its abstract, it specifies the operating conditions of an integrated circuit card that provides a USB interface. Annexes are provided that give examples of operations related to digital signatures, certificates and the import and export of asymmetric keys. The choice and conditions of use of cryptographic mechanisms may affect card exportability. Created inupdated inamended in Identification of persons using biometric methods is outside the scope of this standard.

Retrieved 19 April According to its abstract, it specifies interindustry commands for integrated circuit cards either with contacts or without contacts that may be used for cryptographic operations. By using this site, you agree to the Terms of Use and Privacy Policy. Organization, security and commands for interchange”. These commands cover the entire life cycle of the card and therefore some commands may be used before the card has been issued to the cardholder or after the card has expired.