ISO IEC 7816-11:2017 pdf free
ISO IEC 7816-11:2017 pdf free.Identification cards – Integrated circuit cards
The commands to be used for a static verification process (see Annex A) shall be VERIFY command as specified in ISO/IEC 7816-4 or PERFORM BIOMETRIC OPERATION (PBO) command with relevant operations, e.g. comparison of biometric probe as specified in 5.4. When VERIFY command is used and the biometric data is externally captured, the command shall contain the biometric data as biometric probe to be compared in its data field, encoded as defined in 7.1 and 7.2. The biometric algorithm identifier shalll be either
– implicitly known,
– defined in a security environment (SE) within a control eference template for authentication (AT),
– defined in a command data within a biometric information template (see ISO/IEC 24787), or
– defined in a command data within a control reference template for authentication.
The biometric reference qualifier may be either
– defined in a security environment (SE) within control reference template for authentication,
– defined in parameter P2 of VERIFY or PBO command,
– defined in a command data within a biometric information template (see 7.1),
– defined in a command data within a biometric data template (see 7.2), or
– defined in a command data within a control reference template for authentication.
The biometric probe may be encoded as BER-TLV data object (see Table 10). It may be recorded in a biometric information template (see Table 7 and Table 8) or a biometric information template group template (Table 9).
Biometric data captured either in ICC or out of ICC can be compared. In the case of comparing internally-captured biometric probe, feedback mechanism specified in ISO/IEC 17839-3 with the PBO operations in 5.4.6 should be implemented.
To get a challenge to which a user response is required (see Annex A), GET CHALLENGE command defined in ISO/IEC 7816-4 or PBO command defined in 5.4 shall be used.
As specified in ISO/IEC 7816-4, the P1 set to ’00’ means that no information is given, i.e. the biometric algorithm is known before issuing the command. Any other values of the P1 are RFU.
The type of challenge in a biometric verification process, e.g. a phrase for voiceprint or a phrase for keystroke, depends on the biometric algorithm. If the challenge is requested using GET CHALLENGE command, parameter P1 of GET CHALLENGE command shall identify the biometric algorithm. If the challenge is requested using PBO command, the biometric algorithm shall be either
– implicitly known, or
– defined in a security environment (SE) within control reference template for authentication.ISO IEC 7816-11 pdf download.