Identification Cards - Integrated Circuit Cards - Part 4: Organization, Security And Commands For Interchange
This document is intended to be used in any sector of activity. It specifies:
— contents of command-response pairs exchanged at the interface,
— means of retrieval of data elements and data objects in the card,
— structures and contents of historical bytes to describe operating characteristics of the card,
— structures for applications and data in the card, as seen at the interface when processing commands,
— access methods to files and data in the card,
— a security architecture defining access rights to files and data in the card,
— means and mechanisms for identifying and addressing applications in the card,
— methods for secure messaging,
— access methods to the algorithms processed by the card. It does not describe these algorithms.
It does not cover the internal implementation within the card or the outside world.
This document is independent from the physical interface technology. It applies to cards accessed by one or more of the following methods: contacts, close coupling and radio frequency. If the card supports simultaneous use of more than one physical interface, the relationship between what happens on different physical interfaces is out of the scope of this document.
This product is a single user license only. Copying and/or networking is prohibited. By purchasing this product, you agree to abide by the AIM End User License Agreement.