DD CEN/TS 15480-2:2007
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Identification card systems. European Citizen Card Logical data structures and card services
Hardcopy , PDF
07-31-2012
English
05-31-2007
Foreword
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations
4.1 Abbreviations
4.2 Coding conventions and notation
5 Data elements and data structures
5.1 Supported data Structures
5.2 Access to data structures
5.3 Answer to reset (ATR) / answer to
select (ATS)
5.4 General architecture and file supported
5.5 Selection of data structures
5.6 Access to files
6 Basic card services
6.1 General
6.2 Identification
6.3 User verification
6.4 Device authentication
6.5 Digital signature
6.6 Client/server authentication
6.7 Encryption key decipherment
7 Extended card services
7.1 General
7.2 Biometrics - on card matching
7.3 Passive authentication
7.4 Basic access control
7.5 Active authentication
7.6 Extended access control
7.7 Role authentication
Annex A (normative) Command set
A.1 CLASS byte coding
A.2 Command chaining mechanisms
A.3 Retrieval of response data longer
than 256 bytes
A.4 Logical channels
A.5 Short and extended length fields
A.6 Status words
A.7 Command set
Annex B (normative) Card Verifiable Certificates
B.1 Introduction
B.2 Use of the public key extracted from
the certificate
B.3 Validity of the key extracted from a
certificate
B.4 Structure of CVC
B.5 Steps of CVC verification
B.6 Commands to handle the CVC
Annex C (normative) Cryptographic Information
Application
C.1 Description
C.2 CIA data organisation
Annex D (normative) Mandatory and optional
features
D.1 General
D.2 Data elements and data structures
D.3 Card services
D.4 Command set
D.5 Algorithms
Annex E (normative) Key and signature formats for
elliptic curves over prime fields GF(p)
Annex F (informative) Access rules in expanded format
F.1 Object protection by access rules in
expanded format
F.2 Access rules in expanded format
F.3 Security attribute referencing
expanded format
F.4 Security attribute template for
physical interfaces
Annex G (informative) Example of data structure: the
Security Data Objects concept
G.1 SDO concept
Annex H (informative) Extended access control
for MRTDs
H.1 General
H.2 Extended access control protocol
H.3 CV certificates for EAC
Bibliography
Describes the logical characteristics and security features at the card/system interface for the European Citizen Card.
Committee |
IST/17
|
DevelopmentNote |
Supersedes 06/30147901 DC. (05/2007)
|
DocumentType |
Standard
|
Pages |
108
|
PublisherName |
British Standards Institution
|
RevisionOf | |
Status |
Superseded
|
SupersededBy | |
Supersedes |
PREN 14890-2 : DRAFT 2012 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
ISO/IEC 7816-6:2016 | Identification cards — Integrated circuit cards — Part 6: Interindustry data elements for interchange |
ISO/IEC 19794-2:2011 | Information technology — Biometric data interchange formats — Part 2: Finger minutiae data |
ISO/IEC 9798-3:1998 | Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques |
ISO/IEC 7816-8:2016 | Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations |
EN ISO 3166-1:2014 | Codes for the representation of names of countries and their subdivisions - Part 1: Country codes (ISO 3166-1:2013) |
ISO/IEC 14443-4:2016 | Identification cards Contactless integrated circuit cards Proximity cards Part 4: Transmission protocol |
PREN 14890-1 : DRAFT 2012 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
ISO/IEC 7816-4:2013 | Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange |
ISO/IEC 7816-3:2006 | Identification cards — Integrated circuit cards — Part 3: Cards with contacts — Electrical interface and transmission protocols |
ISO/IEC 9796-2:2010 | Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms |
ISO/IEC 15946-2:2002 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 2: Digital signatures |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO/IEC 7812-1:2017 | Identification cards — Identification of issuers — Part 1: Numbering system |
ISO 3166-1:2013 | Codes for the representation of names of countries and their subdivisions Part 1: Country codes |
ANSI X9.63 : 2011 | FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY |
ISO/IEC 7816-15:2016 | Identification cards Integrated circuit cards Part 15: Cryptographic information application |
ISO/IEC 7816-11:2004 | Identification cards Integrated circuit cards Part 11: Personal verification through biometric methods |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.