ISO IEC 7816-8-2021 pdf Identification cards — Integrated circuit cards — Part 8: Commands and mechanisms for security operations
For example, the security object reference as well as the cryptographic mechanism reference shall be either implicitly known or specified in a CRT in a manage security environment command. NOTE A security object reference is a reference of a secret key, a reference of a public key, a reference data, a reference for computing a session key or a reference of a private key. See ISO/IEC 7816-4. Such a command can be performed only if the security status satisfies the security attributes for the operation. The successful execution of the command may be subject to successful completion of prior commands (e.g. verify before the computation of a digital signature). If present (e.g. implicitly known by the card or because it is part of the command data field), a header list or an extended header list defines the order and the data items that form the input for the security operation. For this command, when a verification related operation is considered, SW1-SW2 set to ‘6300’ or ’63CX’ indicates that a verification failed, ‘X’ ≥ ‘0’ encodes the number of further allowed retries.
The compute digital signature operation, which shall be as specified in Table 11 , initiates the computation of a digital signature. The algorithm may be either a digital signature algorithm or a combination of a hash algorithm and a digital signature algorithm. Annex A provides examples of digital signature operations.
The verify certificate operation, which shall be as specified in Table 15 , verifies a certificate. For the verification of a certificate, the digital signature of a certificate to be verified is delivered as a data object in the command data field. Annex B provides relevant examples of how to implement this operation, which may help to better understand this subclause. The public key of the certification authority to be used in the verification process is either implicitly selected or may be referenced in a DST using the manage security environment command. The algorithm to apply is implicitly known or may be referenced in a DST. If other data objects are to be used in the verification process (e.g. hash-code), then these data objects shall be present in the card or shall be transmitted using the command chaining process.
- ISO IEC 27050-4-2021 pdf Information technology — Electronic discovery — Part 4: Technical readiness
- ISO IEC 27036-1-2021 pdf Cybersecurity — Supplier relationships — Part 1: Overview and concepts
- ISO IEC 27013-2021 pdf Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
- ISO IEC 26580-2021 pdf Software and systems engineering — Methods and tools for the feature- based approach to software and systems product line engineering
- ISO IEC 24735-2021 pdf Information technology — Office equipment — Method for measuring digital copying productivity
- ISO IEC 24711-2021 pdf Information technology — Office equipment — Method for the determination of ink cartridge yield for colour inkjet printers and multi- function devices that contain printer components
- ISO IEC 23544-2021 pdf Information Technology — Data centres — Application Platform Energy Effectiveness (APEE)
- ISO IEC 23510-2021 pdf Information technology — 3D printing and scanning — Framework for an Additive Manufacturing Service Platform (AMSP)
- ISO IEC 23127-1-2021 pdf Information technology — Learning, education, and training — Metadata for facilitators of online learning — Part 1: Framework
- ISO IEC 23126-2021 pdf Information technology for learning, education and training — Ubiquitous learning resource organization and description framework
- IEC 62826-2014 pdf Surface cleaning appliances – Floor treatment machines with or without traction drive, for commercial use – Methods of measuring the performance
- IEC TR 63226-2021 pdf Managing fire risk related to photovoltaic (PV) systems on buildings
- IEC 60836-2015 pdf Specifications for unused silicone insulating liquids for electrotechnical purposes
- IEC 60092-2007 pdf ELECTRICAL INSTALL ATIONS IN SHIPS – OPERATION OF EL ECTRICAL INSTALLATIONS
- IEC 60034-5-2006 pdf Rotating electrical machines – Part 5: Degrees of protection provided by the integral design of rotating electrical machines (IP code) – . Classification
- BS ISO IEC 15420-2009 pdf Information technology一 Automatic identification and data capture techniques EAN/UPC bar code symbology specification
- BS IEC 60860-2014 pdf Radiation protection instrumentation一 Warning equipment for criticality accidents
- BS ISO IEC 19762.5-2008 pdf Information technology一 Automatic identification and data capture (AIDC) techniques – Harmonized vocabulary Part 5: Locating systems
- ISO IEC 24735-2021 pdf Information technology — Office equipment — Method for measuring digital copying productivity
- ISO IEC 24711-2021 pdf Information technology — Office equipment — Method for the determination of ink cartridge yield for colour inkjet printers and multi- function devices that contain printer components