?? iso-iec 7816-4 (first edition 1995-09-01).htm
字號:
<HTML><HEAD><TITLE>ISO/IEC 7816-4 (first edition 1995-09-01)</TITLE></HEAD><BODY BGCOLOR="white"><br><BR><script type="text/javascript"><!--google_ad_client = "pub-3768233548132609";google_ad_width = 728;google_ad_height = 90;google_ad_format = "728x90_as";google_ad_type = "text_image";google_ad_channel ="";//--></script><script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script></center><H1>ISO/IEC 7816 Part 4: Interindustry command for interchange</H1><HR><H2><A HREF="iso7816_4.html#ss1">1. Scope</A></H2><P><H2><A HREF="iso7816_4.html#ss2">2. Normative references</A></H2><P><H2><A HREF="iso7816_4.html#ss3">3. Definitions</A></H2><P><H2><A HREF="iso7816_4.html#ss4">4. Abbreviations and notation</A></H2><P><H2><A HREF="iso7816_4.html#ss5">5. Basic organizations</A></H2><UL><LI><A HREF="iso7816_4.html#ss5_1">5.1 Data structures</A><UL><LI><A HREF="iso7816_4.html#ss5_1_1">5.1.1 File organization</A></LI><LI><A HREF="iso7816_4.html#ss5_1_2">5.1.2 File referencing methods</A></LI><LI><A HREF="iso7816_4.html#ss5_1_3">5.1.3 Elementary file structures</A></LI><LI><A HREF="iso7816_4.html#ss5_1_4">5.1.4 Data referencing methods</A><UL><LI><A HREF="iso7816_4.html#ss5_1_4_1">5.1.4.1 Record referencing</A></LI><LI><A HREF="iso7816_4.html#ss5_1_4_2">5.1.4.2 Data unit referencing</A></LI><LI><A HREF="iso7816_4.html#ss5_1_4_3">5.1.4.3 Data object referencing</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss5_1_5">5.1.5 File control information</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss5_2">5.2 Security architecture of the card</A><UL><LI><A HREF="iso7816_4.html#ss5_2_1">5.2.1 Security status</A></LI><LI><A HREF="iso7816_4.html#ss5_2_2">5.2.2 Security attributes</A></LI><LI><A HREF="iso7816_4.html#ss5_2_3">5.2.3 Security mechanisms</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss5_3">5.3 APDU message structure</A><UL><LI><A HREF="iso7816_4.html#ss5_3_1">5.3.1 Command APDU</A></LI><LI><A HREF="iso7816_4.html#ss5_3_2">5.3.2 Decoding convention for command bodies</A></LI><LI><A HREF="iso7816_4.html#ss5_3_3">5.3.3 Response APDU</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss5_4">5.4 Coding conventions for command headers, data fields and response trailers</A><UL><LI><A HREF="iso7816_4.html#ss5_4_1">5.4.1 Class byte</A></LI><LI><A HREF="iso7816_4.html#ss5_4_2">5.4.2 Instruction byte</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss5_5">5.5 Logical channels</A></LI><LI><A HREF="iso7816_4.html#ss5_6">5.6 Secure messaging</A><UL><LI><A HREF="iso7816_4.html#ss5_6_1">5.6.1 SM format concept</A></LI><LI><A HREF="iso7816_4.html#ss5_6_2">5.6.2 Plain value data object</A></LI><LI><A HREF="iso7816_4.html#ss5_6_3">5.6.3 Data object for authentication</A><UL><LI><A HREF="iso7816_4.html#ss5_6_3_1">5.6.3.1 Cryptographic checksum data object</A></LI><LI><A HREF="iso7816_4.html#ss5_6_3_2">5.6.3.2 Digital signature data object</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss5_6_4">5.6.4 Data objects for confidentiality</A></LI><LI><A HREF="iso7816_4.html#ss5_6_5">5.6.5 Auxiliary security data objects</A><UL><LI><A HREF="iso7816_4.html#ss5_6_5_1">5.6.5.1 Control references</A></LI><LI><A HREF="iso7816_4.html#ss5_6_5_2">5.6.5.2 Response descriptor</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss5_6_6">5.6.6 SM status conditions</A></LI></UL></LI></UL></LI><P><H2><A HREF="iso7816_4.html#ss6">6 Basic interindustry commands</A></H2><UL><LI><A HREF="iso7816_4.html#ss6_1">6.1 READ BINARY command</A><UL><LI><A HREF="iso7816_4.html#ss6_1_1">6.1.1 Definition and scope</A></LI><LI><A HREF="iso7816_4.html#ss6_1_2">6.1.2 Conditional usage and security</A></LI><LI><A HREF="iso7816_4.html#ss6_1_3">6.1.3 Command message</A></LI><LI><A HREF="iso7816_4.html#ss6_1_4">6.1.4 Response message (nominal case)</A></LI><LI><A HREF="iso7816_4.html#ss6_1_5">6.1.5 Status conditions</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss6_2">6.2 WRITE BINARY command</A><UL><LI><A HREF="iso7816_4.html#ss6_2_1">6.2.1 Definition and scope</A></LI><LI><A HREF="iso7816_4.html#ss6_2_2">6.2.2 Conditional usage and security</A></LI><LI><A HREF="iso7816_4.html#ss6_2_3">6.2.3 Command message</A></LI><LI><A HREF="iso7816_4.html#ss6_2_4">6.2.4 Response message (nominal case)</A></LI><LI><A HREF="iso7816_4.html#ss6_2_5">6.2.5 Status conditions</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss6_3">6.3 UPDATE BINARY command</A><UL><LI><A HREF="iso7816_4.html#ss6_3_1">6.3.1 Definition and scope</A></LI><LI><A HREF="iso7816_4.html#ss6_3_2">6.3.2 Conditional usage and security</A></LI><LI><A HREF="iso7816_4.html#ss6_3_3">6.3.3 Command message</A></LI><LI><A HREF="iso7816_4.html#ss6_3_4">6.3.4 Response message (nominal case)</A></LI><LI><A HREF="iso7816_4.html#ss6_3_5">6.3.5 Status conditions</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss6_4">6.4 ERASE BINARY command</A><UL><LI><A HREF="iso7816_4.html#ss6_4_1">6.4.1 Definition and scope</A></LI><LI><A HREF="iso7816_4.html#ss6_4_2">6.4.2 Conditional usage and security</A></LI><LI><A HREF="iso7816_4.html#ss6_4_3">6.4.3 Command message</A></LI><LI><A HREF="iso7816_4.html#ss6_4_4">6.4.4 Response message (nominal case)</A></LI><LI><A HREF="iso7816_4.html#ss6_4_5">6.4.5 Status conditions</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss6_5">6.5 READ RECORD(S) command</A><UL><LI><A HREF="iso7816_4.html#ss6_5_1">6.5.1 Definition and scope</A></LI><LI><A HREF="iso7816_4.html#ss6_5_2">6.5.2 Conditional usage and security</A></LI><LI><A HREF="iso7816_4.html#ss6_5_3">6.5.3 Command message</A></LI><LI><A HREF="iso7816_4.html#ss6_5_4">6.5.4 Response message (nominal case)</A></LI><LI><A HREF="iso7816_4.html#ss6_5_5">6.5.5 Status conditions</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss6_6">6.6 WRITE RECORD command</A><UL><LI><A HREF="iso7816_4.html#ss6_6_1">6.6.1 Definition and scope</A></LI><LI><A HREF="iso7816_4.html#ss6_6_2">6.6.2 Conditional usage and security</A></LI><LI><A HREF="iso7816_4.html#ss6_6_3">6.6.3 Command message</A></LI><LI><A HREF="iso7816_4.html#ss6_6_4">6.6.4 Response message (nominal case)</A></LI><LI><A HREF="iso7816_4.html#ss6_6_5">6.6.5 Status conditions</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss6_7">6.7 APPEND RECORD command</A><UL><LI><A HREF="iso7816_4.html#ss6_7_1">6.7.1 Definition and scope</A></LI><LI><A HREF="iso7816_4.html#ss6_7_2">6.7.2 Conditional usage and security</A></LI><LI><A HREF="iso7816_4.html#ss6_7_3">6.7.3 Command message</A></LI><LI><A HREF="iso7816_4.html#ss6_7_4">6.7.4 Response message (nominal case)</A></LI><LI><A HREF="iso7816_4.html#ss6_7_5">6.7.5 Status conditions</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss6_8">6.8 UPDATE RECORD command</A><UL><LI><A HREF="iso7816_4.html#ss6_8_1">6.8.1 Definition and scope</A></LI><LI><A HREF="iso7816_4.html#ss6_8_2">6.8.2 Conditional usage and security</A></LI><LI><A HREF="iso7816_4.html#ss6_8_3">6.8.3 Command message</A></LI><LI><A HREF="iso7816_4.html#ss6_8_4">6.8.4 Response message (nominal case)</A></LI><LI><A HREF="iso7816_4.html#ss6_8_5">6.8.5 Status conditions</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss6_9">6.9 GET DATA command</A><UL><LI><A HREF="iso7816_4.html#ss6_9_1">6.9.1 Definition and scope</A></LI><LI><A HREF="iso7816_4.html#ss6_9_2">6.9.2 Conditional usage and security</A></LI><LI><A HREF="iso7816_4.html#ss6_9_3">6.9.3 Command message</A></LI><LI><A HREF="iso7816_4.html#ss6_9_4">6.9.4 Response message (nominal case)</A></LI><LI><A HREF="iso7816_4.html#ss6_9_5">6.9.5 Status conditions</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss6_10">6.10 PUT DATA command</A><UL><LI><A HREF="iso7816_4.html#ss6_10_1">6.10.1 Definition and scope</A></LI><LI><A HREF="iso7816_4.html#ss6_10_2">6.10.2 Conditional usage and security</A></LI><LI><A HREF="iso7816_4.html#ss6_10_3">6.10.3 Command message</A></LI><LI><A HREF="iso7816_4.html#ss6_10_4">6.10.4 Response message (nominal case)</A></LI><LI><A HREF="iso7816_4.html#ss6_10_5">6.10.5 Status conditions</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss6_11">6.11 SELECT FILE command</A><UL><LI><A HREF="iso7816_4.html#ss6_11_1">6.11.1 Definition and scope</A></LI><LI><A HREF="iso7816_4.html#ss6_11_2">6.11.2 Conditional usage and security</A></LI><LI><A HREF="iso7816_4.html#ss6_11_3">6.11.3 Command message</A></LI><LI><A HREF="iso7816_4.html#ss6_11_4">6.11.4 Response message (nominal case)</A></LI><LI><A HREF="iso7816_4.html#ss6_11_5">6.11.5 Status conditions</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss6_12">6.12 VERIFY command</A><UL><LI><A HREF="iso7816_4.html#ss6_12_1">6.12.1 Definition and scope</A></LI><LI><A HREF="iso7816_4.html#ss6_12_2">6.12.2 Conditional usage and security</A></LI><LI><A HREF="iso7816_4.html#ss6_12_3">6.12.3 Command message</A></LI><LI><A HREF="iso7816_4.html#ss6_12_4">6.12.4 Response message (nominal case)</A></LI><LI><A HREF="iso7816_4.html#ss6_12_5">6.12.5 Status conditions</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss6_13">6.13 INTERNAL AUTHENTICATE command</A><UL><LI><A HREF="iso7816_4.html#ss6_13_1">6.13.1 Definition and scope</A></LI><LI><A HREF="iso7816_4.html#ss6_13_2">6.13.2 Conditional usage and security</A></LI><LI><A HREF="iso7816_4.html#ss6_13_3">6.13.3 Command message</A></LI><LI><A HREF="iso7816_4.html#ss6_13_4">6.13.4 Response message (nominal case)</A></LI><LI><A HREF="iso7816_4.html#ss6_13_5">6.13.5 Status conditions</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss6_14">6.14 EXTERNAL AUTHENTICATE command</A><UL><LI><A HREF="iso7816_4.html#ss6_14_1">6.14.1 Definition and scope</A></LI><LI><A HREF="iso7816_4.html#ss6_14_2">6.14.2 Conditional usage and security</A></LI><LI><A HREF="iso7816_4.html#ss6_14_3">6.14.3 Command message</A></LI><LI><A HREF="iso7816_4.html#ss6_14_4">6.14.4 Response message (nominal case)</A></LI><LI><A HREF="iso7816_4.html#ss6_14_5">6.14.5 Status conditions</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss6_15">6.15 GET CHALLENGE command</A><UL><LI><A HREF="iso7816_4.html#ss6_15_1">6.15.1 Definition and scope</A></LI><LI><A HREF="iso7816_4.html#ss6_15_2">6.15.2 Conditional usage and security</A></LI><LI><A HREF="iso7816_4.html#ss6_15_3">6.15.3 Command message</A></LI><LI><A HREF="iso7816_4.html#ss6_15_4">6.15.4 Response message (nominal case)</A></LI><LI><A HREF="iso7816_4.html#ss6_15_5">6.15.5 Status conditions</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss6_16">6.16 MANAGE CHANNEL command</A><UL><LI><A HREF="iso7816_4.html#ss6_16_1">6.16.1 Definition and scope</A></LI><LI><A HREF="iso7816_4.html#ss6_16_2">6.16.2 Conditional usage and security</A></LI><LI><A HREF="iso7816_4.html#ss6_16_3">6.16.3 Command message</A></LI><LI><A HREF="iso7816_4.html#ss6_16_4">6.16.4 Response message (nominal case)</A></LI><LI><A HREF="iso7816_4.html#ss6_16_5">6.16.5 Status conditions</A></LI></UL></LI></UL><P><H2><A HREF="iso7816_4.html#ss7">7 Transmission-oriented interindustry commands</A></H2><P><UL><LI><A HREF="iso7816_4.html#ss7_1">7.1 GET RESPONSE command</A><UL><LI><A HREF="iso7816_4.html#ss7_1_1">7.1.1 Definition and scope</A></LI><LI><A HREF="iso7816_4.html#ss7_1_2">7.1.2 Conditional usage and security</A></LI><LI><A HREF="iso7816_4.html#ss7_1_3">7.1.3 Command message</A></LI><LI><A HREF="iso7816_4.html#ss7_1_4">7.1.4 Reponse message (nominal case)</A></LI><LI><A HREF="iso7816_4.html#ss7_1_4">7.1.5 Status conditions</A></LI></UL></LI><LI><A HREF="iso7816_4.html#ss7_2">7.2 ENVELOPE command</A><UL><LI><A HREF="iso7816_4.html#ss7_2_1">7.2.1 Definition and scope</A></LI><LI><A HREF="iso7816_4.html#ss7_2_2">7.2.2 Conditional usage and security</A></LI><LI><A HREF="iso7816_4.html#ss7_2_3">7.2.3 Command message</A></LI><LI><A HREF="iso7816_4.html#ss7_2_4">7.2.4 Reponse message (nominal case)</A></LI><LI><A HREF="iso7816_4.html#ss7_2_4">7.2.5 Status conditions</A></LI></UL></LI></UL></LI><P><H2><A HREF="iso7816_4.html#ss8">8 Historical bytes</A></H2>
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -