ImageVerifierCode 换一换
格式:PDF , 页数:20 ,大小:223.17KB ,
资源ID:436483      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-436483.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ANSI INCITS ISO IEC 7816-9-2004 Identification Cards - Integrated circuit cards - Part 9 Commands for card management.pdf)为本站会员(proposalcash356)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ANSI INCITS ISO IEC 7816-9-2004 Identification Cards - Integrated circuit cards - Part 9 Commands for card management.pdf

1、INCITS/ISO/IEC 7816-9-2004 (ISO/IEC 7816-9:2004, IDT) Identification Cards - Integrated circuit cards - Part 9: Commands for card managementINCITS/ISO/IEC 7816-9-2004(ISO/IEC 7816-9:2004, IDT)INCITS/ISO/IEC 7816-9-2004ii ITIC 2005 All rights reserved PDF disclaimer This PDF file may contain embedded

2、 typefaces. In accordance with Adobes licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility of not

3、infringing Adobes licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters were

4、 optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below. Adopted by INCITS (InterNational Committee for Informat

5、ion Technology Standards) as an American National Standard. Date of ANSI Approval: 12/29/2005 Published by American National Standards Institute, 25 West 43rd Street, New York, New York 10036 Copyright 2005 by Information Technology Industry Council (ITI). All rights reserved. These materials are su

6、bject to copyright claims of International Standardization Organization (ISO), International Electrotechnical Commission (IEC), American National Standards Institute (ANSI), and Information Technology Industry Council (ITI). Not for resale. No part of this publication may be reproduced in any form,

7、including an electronic retrieval system, without the prior written permission of ITI. All requests pertaining to this standard should be submitted to ITI, 1250 Eye Street NW, Washington, DC 20005. Printed in the United States of America INCITS/ISO/IEC 7816-9-2004 ITIC 2005 - All rights reserved iii

8、Contents Page Foreword iv Introduction.v 1 Scope1 2 Normative references1 3 Terms and definitions .1 4 Abbreviations and notation1 5 Life cycle 2 5.1 File life cycle 2 6 Commands for card management .3 6.1 CREATE FILE command3 6.2 DELETE FILE command 3 6.3 DEACTIVATE FILE command .4 6.4 ACTIVATE FIL

9、E command .5 6.5 TERMINATE DF command .5 6.6 TERMINATE EF command .6 6.7 TERMINATE CARD USAGE command .7 Annex A (informative) Examples of security attributes used for download.8 Bibliography12 INCITS/ISO/IEC 7816-9-2004 iv ITIC 2005 - All rights reservedForeword ISO (the International Organization

10、for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective

11、organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information tec

12、hnology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of the joint technical committee is to prepare International Standards. Draft International Standa

13、rds adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote. Attention is drawn to the possibility that some of the elements of this document may be the su

14、bject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. ISO/IEC 7816-9 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 17, Cards and personal identification. This second edition, together with t

15、he second editions of ISO/IEC 7816-4, ISO/IEC 7816-5, ISO/IEC 7816-6 and ISO/IEC 7816-8, after an in-depth reorganization of these five parts, cancels and replaces ISO/IEC 7816-4:1995, ISO/IEC 7816-5:1994, ISO/IEC 7816-6:1996, ISO/IEC 7816-8:1999 and ISO/IEC 7816-9:2000. It also incorporates the Ame

16、ndments ISO/IEC 7816-4:1995/Amd.1:1997, ISO/IEC 7816-5:1994/Amd.1:1996 and ISO/IEC 7816-6:1996/Amd.1:2000 and the Technical Corrigendum ISO/IEC 7816-6:1996/Cor.1:1998. ISO/IEC 7816 consists of the following parts, under the general title Identification cards Integrated circuit cards: Part 1: Cards w

17、ith contacts Physical characteristics Part 2: Cards with contacts Dimensions and location of the contacts Part 3: Cards with contacts Electrical interface and transmission protocols Part 4: Organization, security and commands for interchange Part 5: Registration of application providers Part 6: Inte

18、rindustry data elements for interchange Part 7: Interindustry commands for Structured Card Query Language (SCQL) Part 8: Commands for security operations Part 9: Commands for card management Part 10: Cards with contacts Electronic signals and answer to reset for synchronous cards Part 11: Personal v

19、erification through biometric methods Part 15: Cryptographic information application INCITS/ISO/IEC 7816-9-2004 ITIC 2005 - All rights reserved vIntroduction ISO/IEC 7816 is a series of International Standards specifying integrated circuit cards and the use of such cards for interchange. These cards

20、 are identification cards intended for information exchange negotiated between the outside world and the integrated circuit in the card. As a result of an information exchange, the card delivers information (computation result, stored data), and/or modifies its content (data storage, event memorizat

21、ion). Five parts are specific to cards with galvanic contac ts and three of them specify electrical interfaces. ISO/IEC 7816-1 specifies physical characteristics for cards with contacts. ISO/IEC 7816-2 specifies dimensions and location of the contacts. ISO/IEC 7816-3 specifies electrical interface a

22、nd transmission protocols for asynchronous cards. ISO/IEC 7816-10 specifies electrical interface and answer to reset for synchronous cards. ISO/IEC 7816-12 specifies electrical interface and operating procedures for USB cards. All the other parts are independent from the physical interface technolog

23、y. They apply to cards accessed by contacts and/or by radio frequency. ISO/IEC 7816-4 specifies organization, security and commands for interchange. ISO/IEC 7816-5 specifies registration of application providers. ISO/IEC 7816-6 specifies interindustry data elements for interchange. ISO/IEC 7816-7 sp

24、ecifies commands for structured card query language. ISO/IEC 7816-8 specifies commands for security operations. ISO/IEC 7816-9 specifies commands for card management. ISO/IEC 7816-11 specifies personal verification through biometric methods. ISO/IEC 7816-15 specifies cryptographic information applic

25、ation. ISO/IEC 10536 specifies access by close coupling. ISO/IEC 14443 and 15693 specify access by radio frequency. Such cards are also known as contactless cards. AMERICAN NATIONAL STANDARD INCITS/ISO/IEC 7816-9-2004 ITIC 2005 - All rights reserved 1Identification cards Integrated circuit cards Par

26、t 9: Commands for card management 1 Scope This document specifies interindustry commands for card and file management. These commands cover the entire life cycle of the card and therefore some commands may be used before the card has been issued to the cardholder or after the card has expired. It do

27、es not cover the internal implementation within the card and/or the outside world. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the

28、 referenced document (including any amendments) applies. ISO/IEC 7816-4:1), Identification cards Integrated circuit cards Organization, security and commands for interchange 3 Terms and definitions For the purposes of this document, the following terms and definitions apply. 3.1 secure messaging set

29、 of means for cryptographic protection of parts of command-response pairs ISO/IEC 7816-4 4 Abbreviations and notation For the purposes of this document, the following abbreviations apply. APDU application protocol data unit FCP file control parameters LCS life cycle status 1) To be published. INCITS

30、/ISO/IEC 7816-9-2004 2 ITIC 2005 - All rights reserved5 Life cycle A life cycle status may be associated with any object in the card and with the card itself. The card shall use the life cycle status in combination with additional security attributes, to determine whether an operation on an object i

31、s in accordance with a security policy. The life cycle status reflects the use of objects according to the following rules. If an object is in creation state, then no security attribute for that object shall apply. If an object is in initialisation state, then any secu rity attribute specific to thi

32、s state may apply. If an object is in operational state, then ever y associated security attribute shall apply. If an object is in termination state, then the value of the object shall not be modified but the object may be used as specified by its associated security attributes, e.g., it may be dele

33、ted. Transitions between primary life cycle states are irreversible and occur only from creation to termination. In addition, the application may define secondary life cycle states: each primary state may have reversible secondary states. Changes are controlled by the card and may be performed in a

34、pre-defined order, reflecting reversible or irreversible changes in states. The following commands for card and file management may be used for initiating a life cycle state transition. CREATE FILE ACTIVATE FILE TERMINATE EF DELETE FILE DEACTIVATE FILE TERMINATE DF TERMINATE CARD USAGE Commands may

35、set the value of the life cycle status when they execute. However the card shall maintain the integrity of this value in accordance with this document. 5.1 File life cycle Figure 1 is a conceptual representation of the file life cycle states and the commands that invoke a transition upon successful

36、completion. It does not show the conditions of execution of those commands (see ISO/IEC 7816-4). File notexisting CreatefileLCS=01Operationalstate (active)TerminationstateOperationalstate(deactivated)CardterminationstateTerminate EFTerminate DFTerminate DFTerminatecard usageFile nexistiotngDelete fi

37、le(DF, EF)Delete file (DF/EF)DeactivatefileActivatefileCreationstateActivatefileCreate file LCS=04 or 05Terminate EFInitialisationstateProprietaryCreate fileLCS=03ActivatefileDelete file (DF/EF)Figure 1 Diagram for file life cycle INCITS/ISO/IEC 7816-9-2004 ITIC 2005 - All rights reserved 36 Command

38、s for card management It shall not be mandatory for all cards complying with this document to support all those commands or all the options of a supported command. The commands can be performed only if the security status satisfies the security attributes for the command. For these commands, bits 4

39、and 3 have no meaning and shall be ignored. For each command, a non-exhaustive list of status conditions is provided, (see also ISO/IEC 7816-4). 6.1 CREATE FILE command The CREATE FILE command initiates the creation of a file (DF or EF) placed immediately under the current DF. The command may alloca

40、te memory to the file it creates. The created file shall be set as the current file, unless otherwise specified. When more than one EF with a given short EF identifier exists in the same DF, the behaviour of the card is not defined in this document. The command can be performed only if the security

41、status satisfies the security attributes for the current DF. The file descriptor byte is mandatory. It indicates whether a DF or an EF is to be created. If a DF is created, then a DF name and / or a file identifier shall be specified. If an EF is created, then a file identifier and / or a short EF i

42、dentifier shall be specified. Table 1 CREATE FILE command-response pair CLA As defined in ISO/IEC 7816-4 INS E0 P1-P2 0000 File identifier and file parameters encoded in the command data field P1 not equal to 00: File descriptor byte P2 Short EF identifier on bits 8 to 4; bits 3 to 1 proprietary Lc

43、field Absent for encoding Nc = 0, present for encoding Nc 0 Data field FCP template (tag 62) and possible further templates or absent Le field Absent for encoding Ne = 0 Data field Absent SW1-SW2 See ISO/IEC 7816-4, Tables 5 and 6 where relevant, e.g. 6982, 6A84, 6A89, 6A8A NOTE If number Ncis zero,

44、 then the created file has default file control parameters. 6.2 DELETE FILE command The DELETE FILE command initiates the deletion of a referenced EF immediately under the current DF, or of a DF with its complete sub-tree. After successful completion of this command, the deleted file can no longer b

45、e selected. The current file after deletion of an EF is the current DF. The current DF after deletion of a DF is the parent DF, if not otherwise defined. The resources held by the file shall be released and the memory used by this file shall be set to the logical erased state. The deletion of the fi

46、le may additionally depend on the file life status. The MF shall not be deleted. INCITS/ISO/IEC 7816-9-2004 4 ITIC 2005 - All rights reservedIf P1-P2 = 0000 and the command data field is absent, then the command applies to a file that has been selected by the command executed directly before. Furthe

47、rmore, if the selected file is selected on another logical channel the execution of the command is aborted and an appropriate error is returned in the response. Other meanings of P1-P2, including the rules defining the uniqueness of file identifiers, are defined in the SELECT command. Table 2 DELETE

48、 FILE command-response pair CLA As defined in ISO/IEC 7816-4 INS E4 P1-P2 0000 Deletes current file Other values: as defined for the SELECT command (see ISO/IEC 7816-4) Lcfield Absent for encoding Nc = 0, present for encoding Nc 0 Data field As defined for the SELECT command (see ISO/IEC 7816-4) Lef

49、ield Absent for encoding Ne = 0 Data field Absent SW1-SW2 See ISO/IEC 7816-4, Tables 5 and 6 where relevant, e.g. 6982, 6985 6.3 DEACTIVATE FILE command The DEACTIVATE FILE command initiates a reversible deactivation of a file. After a successful completion of the command, in addition to the SELECT command, only the ACTIVATE FILE, DELETE FILE, TERMINATE EF and, in the case of a DF, TERMINATE DF commands shall be allowed. When applied to a deactivated file, t

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1