• There are no items in your cart

UNI EN 726-7 : 1999

Current

Current

The latest, up-to-date edition.

IDENTIFICATION CARD SYSTEMS - TELECOMMUNICATIONS INTEGRATED CIRCUIT(S) CARDS AND TERMINALS - SECURITY MODULE

Published date

10-31-1999

Foreword
1 Scope
2 Normative References
3 Definitions and Abbreviations
      3.1 Definitions
      3.2 Abbreviations
4 Physical characteristics of the SM
5 Electronic signals and transmissions protocols
6 Logical model for SM
7 General Concepts
      7.1 General security principles
             7.1.1 Access conditions
             7.1.2 Sequence control
      7.2 SM Life Cycle
      7.3 Configuration of the system
      7.4 SM security functions
8 Description of the functions of a SM
      8.1 Functions without MAC
             8.1.1 SELECT KEYSET
             8.1.2 DIVERSIFY KEYSET
             8.1.3 ASK PARAMETER
      8.2 Functions used to compute a crytogram or
             message authentication codes (MAC)
             8.2.1 COMPUTE LOAD KEY
             8.2.2 COMPUTE MAC
             8.2.3 COMPUTE CRYPTOGRAMform of an IC card
      8.3 Functions verifying crytograms or message
             authentication codes (MAC)
             8.3.1 VERIFY MAC
             8.3.2 UPDATE (SM)
             8.3.3 INCREASE (SM)
             8.3.4 DECREASE (SM)
             8.3.5 VERIFY CRYPTOGRAM
      8.4 Functions to downloading of keys from the SM
             to the UC
      8.5 Functionality on SM-EW interface
      8.6 Linking functions with keys
      8.7 Limitations of the usage of keys
9 Data Elements
      9.1 Data for SM identification
             9.1.1 SM identifier
      9.2 UC data
             9.2.1 IC serial number of user card
             9.2.2 Application Expiry data
             9.2.3 Application Identifier (AID)
             9.2.4 Key file version
             9.2.5 Algorithm identifier
             9.2.6 Amount
             9.2.7 Value
             9.2.8 Type of units
      9.3 Status conditions return by the SM
             9.3.1 Functions versus possible status
                      responses
Annex A (normative) The case of a SM in the form of an
                    IC card
Annex B (informative) Example of scenarios for SM in the
                      form of an IC card
Annex C (informative) Bibliography

Defines: - the necessary security services/mechanisms to provide cryptographic and application security information for the processing of telecommunications transactions - the general card related functions embedded in the SM-terminal protocols including minimum data exchange - the minimum security requirements for a Security Module (SM). considering several types of SMs at different locations in the system and different system configurations.

Committee
CT 500
DocumentType
Standard
PublisherName
Ente Nazionale Italiano di Unificazione (UNI)
Status
Current

Standards Relationship
UNE-EN 726-7:2000 Identical
DIN EN 726-7:2000-01 Identical
NS EN 726-7 : 1ED 1999 Identical
I.S. EN 726-7:1999 Identical
NBN EN 726-7 : 1999 Identical
NF EN 726-7 : 1999 Identical
BS EN 726-7:1999 Identical
EN 726-7:1999 Identical
NEN EN 726-7 : 1999 Identical

View more information
Sorry this product is not available in your region.

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.