DD CEN/TS 15480-2:2007
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
Hardcopy , PDF
31-07-2012
English
31-05-2007
Foreword
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations
4.1 Abbreviations
4.2 Coding conventions and notation
5 Data elements and data structures
5.1 Supported data Structures
5.2 Access to data structures
5.3 Answer to reset (ATR) / answer to
select (ATS)
5.4 General architecture and file supported
5.5 Selection of data structures
5.6 Access to files
6 Basic card services
6.1 General
6.2 Identification
6.3 User verification
6.4 Device authentication
6.5 Digital signature
6.6 Client/server authentication
6.7 Encryption key decipherment
7 Extended card services
7.1 General
7.2 Biometrics - on card matching
7.3 Passive authentication
7.4 Basic access control
7.5 Active authentication
7.6 Extended access control
7.7 Role authentication
Annex A (normative) Command set
A.1 CLASS byte coding
A.2 Command chaining mechanisms
A.3 Retrieval of response data longer
than 256 bytes
A.4 Logical channels
A.5 Short and extended length fields
A.6 Status words
A.7 Command set
Annex B (normative) Card Verifiable Certificates
B.1 Introduction
B.2 Use of the public key extracted from
the certificate
B.3 Validity of the key extracted from a
certificate
B.4 Structure of CVC
B.5 Steps of CVC verification
B.6 Commands to handle the CVC
Annex C (normative) Cryptographic Information
Application
C.1 Description
C.2 CIA data organisation
Annex D (normative) Mandatory and optional
features
D.1 General
D.2 Data elements and data structures
D.3 Card services
D.4 Command set
D.5 Algorithms
Annex E (normative) Key and signature formats for
elliptic curves over prime fields GF(p)
Annex F (informative) Access rules in expanded format
F.1 Object protection by access rules in
expanded format
F.2 Access rules in expanded format
F.3 Security attribute referencing
expanded format
F.4 Security attribute template for
physical interfaces
Annex G (informative) Example of data structure: the
Security Data Objects concept
G.1 SDO concept
Annex H (informative) Extended access control
for MRTDs
H.1 General
H.2 Extended access control protocol
H.3 CV certificates for EAC
Bibliography
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.