Identification Cards - Integrated Circuit Cards - Part 8: Commands And Mechanisms For Security Operations
This document specifies interindustry commands which can be used for security operations. This document also provides informative directives on how to construct security mechanisms with commands defined in ISO/IEC 7816-4.
The choice and conditions of use of cryptographic mechanism in security operations can affect card exportability. The evaluation of the suitability of algorithms and protocols is outside the scope of this document. It does not cover the internal implementation within the card and/or the outside world.
This product is a single user license only. Copying and/or networking is prohibited. By purchasing this product, you agree to abide by the AIM End User License Agreement.