Partie Application des informations cryptographiques. STANDARD. ISO/IEC. Reference number. ISO/IEC (E). ISO/IEC (E). PDF disclaimer. This PDF file may contain embedded typefaces. In accordance with Adobe’s licensing policy, this file. ISO/IEC /AMD Standard | Amendment 1 – Identification cards – Integrated circuit cards – Part Cryptographic information.
|Published (Last):||23 March 2011|
|PDF File Size:||15.80 Mb|
|ePub File Size:||13.98 Mb|
|Price:||Free* [*Free Regsitration Required]|
Cards with contacts — Electrical interface and transmission protocols”.
According to its abstract, it specifies a card application. This application contains information on cryptographic functionality.
Registration of application providers”. These commands cover the entire life cycle of the card and therefore some commands may be used before the card has been issued to the cardholder or after the card has expired.
Commands and mechanisms for security operations”.
In other projects Wikimedia Commons. Created inupdated in Commands for card management”. Annexes are provided that give examples of operations related to digital signatures, certificates and the import and export of asymmetric keys.
The choice and conditions of use of cryptographic mechanisms may affect card exportability. Identification of persons using isi methods is outside the scope of this standard. Created inupdated inamended in Created inupdated ieccupdated in Cards with contacts — Physical characteristics”.
Personal verification through biometric methods”. Retrieved from ” https: According kec its abstract, it specifies the Data Elements DEs used for interindustry interchange based on integrated circuit cards ICCs both with contacts and without contacts.
According to its abstract, it specifies the operating conditions of an integrated izo card that provides a USB interface. The loaded data may contain, for example, code, keys and applets. ISO standards by standard number. According to its abstract, it specifies interindustry commands for integrated circuit cards both with contacts and without contacts for card and file is, e. According to its abstract, it specifies interindustry commands for integrated circuit cards either with contacts or without contacts that may be used for cryptographic operations.
An annex is provided that shows how to control the loading of data secure download into the card, by means of verifying the access rights of the loading entity and protection of the transmitted data with secure messaging.
Commands for application management in a multi-application environment”. List of International Electrotechnical Commission standards.
ISO/IEC /AMD | IEC Webstore
Created inamended in,updated in Retrieved 19 April It gives the identifier, name, description, format, coding and layout of each DE and defines the means of retrieval of DEs from the card. Cards with contacts — Dimensions and location of the contacts”. Organization, security and commands for interchange”.
Cards with contacts — USB electrical interface and operating procedures”. Created inupdated inamended inupdated in From Wikipedia, the free encyclopedia. This part specifies commands for application management in a multi-application environment. Views Read Edit View history.