HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GB/T 29271.3-2014 English PDF

US$2459.00 ยท In stock
Delivery: <= 10 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 29271.3-2014: Identification cards -- Integrated circuit card programming interfaces -- Part 3: Application interface
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 29271.3-2014English2459 Add to Cart 10 days [Need to translate] Identification cards -- Integrated circuit card programming interfaces -- Part 3: Application interface Valid GB/T 29271.3-2014

PDF similar to GB/T 29271.3-2014


Standard similar to GB/T 29271.3-2014

GB/T 38668   GB/T 38670   GB/T 37720   GB/T 29271.6   GB/T 29271.4   GB/T 29271.2   

Basic data

Standard ID GB/T 29271.3-2014 (GB/T29271.3-2014)
Description (Translated English) Identification cards -- Integrated circuit card programming interfaces -- Part 3: Application interface
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L64
Classification of International Standard 35.240
Word Count Estimation 129,131
Date of Issue 9/3/2014
Date of Implementation 2/1/2015
Quoted Standard GB/T 9387.1-1998; GB/T 29271.1-2012; GB/T 29271.2-2012; ISO/IEC 7816-11; IETF RFC 2141
Adopted Standard ISO/IEC 24727-3-2008, MOD
Regulation (derived from) People's Republic of China Announcement of Newly Approved National Standards No. 21 of 2014
Issuing agency(ies) General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China
Summary This Standard specifies the client application service interface support services that operate in response to the operation request and a way to express. Independent of the programming language way of describing these services. This section is in the appl

GB/T 29271.3-2014: Identification cards -- Integrated circuit card programming interfaces -- Part 3: Application interface


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Identification cards -- Integrated circuit card programming interfaces -- Part 3: Application interface ICS 35:240:15 L64 National Standards of People's Republic of China identification card integrated circuit card programming interface Part 3: Application Interface (ISO /IEC 24727-3:2008, MOD) Published on:2014-09-03 2015-02-01 Implementation General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China Released by the Standardization Administration of China directory Preface III Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 3 5 Organizations for Interoperability3 5:1 Summary 3 5:2 Computational Model 3 5:3 Entity Relationships on Application Interfaces 4 5:4 Security Model 8 6 Card-side application service access 11 6:1 Overview 11 6:2 Initialize 11 6:3 Terminate 12 6:4 CardApplicationPath 13 7 Connecting Services 13 7:1 Overview 13 7:2 CardApplicationConnect 13 7:3 CardApplication Disconnect 14 7:4 CardApplicationStartSession 15 7:5 CardApplicationEndSession 16 8 Card-side application service 17 8:1 Overview 17 8:2 CardApplicationList 17 8:3 CardApplicationCreate 18 8:4 CardApplicationDelete 18 8:5 CardApplicationServiceList 19 8:6 CardApplicationServiceCreate 20 8:7 CardApplicationServiceLoad 21 8:8 CardApplicationServiceDelete 21 8:9 CardApplicationServiceDescribe 22 8:10 ExecuteAction 23 9 Naming Data Services 24 9:1 Overview 24 9:2 DataSetList 24 9:3 DataSetCreate 25 9:4 DataSetSelect 25 9:5 DataSetDelete 26 9:6 DSIList 27 9:7 DSICreate 28 9:8 DSIDelete 28 9:9 DSIWrite 29 9:10 DSIRead 30 10 Cryptographic Services 31 10:1 Overview 31 10:2 Encipher 31 10:3 Decipher 32 10:4 GetRandom 33 10:5 Hash 34 10:6 Sign 34 10:7 VerifySignature 35 10:8 VerifyCertificate 36 11 Differential Feature Services 37 11:1 Overview 37 11:2 DIDList 37 11:3 DIDCreate 38 11:4 DIDGet 39 11:5 DIDUpdate 40 11:6 DIDDelete 41 11:7 DIDAuthenticate 42 12 Certification Services 43 12:1 Overview 43 12:2 ACLList 43 12:3 ACLModify 44 Appendix A (Normative Appendix) Authentication Protocol 45 References 120 identification card integrated circuit card programming interface Part 3: Application Interface

1 Scope

This part of GB/T 29271 defines the services supported by the client application service interface: These services respond to operation requests and operations way to express: Describe these services in a programming language-independent manner: This part is the application interface of the Open System Interconnection Reference Model defined in GB/T 9387:1-1998: it provides for customers The high-level interface of the client application, the client application uses the information storage and processing operations of the card end application as the general card interface: This section is not authorized to define concrete implementations of this interface:

2 Normative references

The following documents are essential for the application of this document: For dated references, only the dated version applies to this article pieces: For undated references, the latest edition (including all amendments) applies to this document: GB/T 9387:1-1998 Information Technology Open System Interconnection Basic Reference Model Part 1: Basic Model (idt ISO /IEC 7498-1:1994) GB/T 29271:1-2012 Identification Card Integrated Circuit Card Programming Interface Part 1: Architecture (ISO /IEC 24727-1: 2007, IDT) GB/T 29271:2-2012 Identification Card Integrated Circuit Card Programming Interface Part 2: Universal Card Interface (ISO /IEC 24727-2: 2008, IDT) ISO /IEC 7816-11 Identification cards - Integrated circuit cards - Part 11: Authentication by biometric methods cards-Integratedcircuitcards-Part 11:Personalverificationthroughbiometricmethods) IETFRFC2141 URN Syntax May:1997

3 Terms and Definitions

The terms and definitions defined in GB/T 29271:1-2012, GB/T 29271:2-2012 and the following apply to this document: 3:1 access control list accesscontrollist A collection of access rules: 3:2 access permission accesspermission The ability to grant permission to perform an operation: 3:3 access rule accessrule The connection between the in-context operation of the card-side application and the security condition: 3:4 Action action The operation of the card-side application required by the client application in the GB/T 29271:3 application interface: 3:5 alphacard-application Management card-side application, specific to GB/T 29271, is responsible for discovering cards and applications and providing management services: 3:6 card-application-path An ordered set of protocol endpoints that connect client applications to card-side applications in the network: 3:7 Card application service card-application-service A collection of operations: 3:8 channel A physical channel for transferring bit information between client applications and card-side applications: 3:9 client-application client-application A software component that runs on a platform that uses data storage and computing services provided by the card-side application: 3:10 connection connection Logical reference channel: 3:11 global differential-identity Differential features identified in all card-side applications managed by the same alpha card-side application: 3:12 local differential-identity Differential features that are recognized only in the card-side application for which they are defined: 3:13 parameter parameter Information that is required to define or affect operation: 3:14 return code returncode Information, including status, is returned as a result of the operation: 3:15 securitycondition Boolean expression for the discriminative state of the difference feature: 3:16 session session Connection when used for a specific security context: 3:17 object target The entity manipulated by the operation of the card-side application service:

4 Abbreviations

The abbreviations given in GB/T 29271:1-2012, GB/T 29271:2-2012 and the following abbreviations apply to this document: ACL: Access Control List (accesscontrollist) AID: application identifier (applicationidentifier) AR: access rule (accessrule) DID: Differential-identity DSI: data structure for interoperability GCAL: generic card access layer (generic card access layer) OID: object identifier (objectidentifier) SAL: service access layer (serviceaccesslayer)

5 Organizations for Interoperability

5:1 Overview The client application and the card-side application consist of two pair-level entities, which interact through well-defined transaction and communication mechanisms: The GB/T 29271:3 application interface shall be the only interface through which the client application interacts with the card-end application: This chapter defines the calculation model and permanent entity on the GB/T 29271:3 application interface, through which the client application and the card-side application communicate: interaction: The security model manages the security mechanism and establishes a trusted interaction through the security mechanism: 5:2 Introduce the conceptual entities provided on the application interface of GB/T 29271:3, and describe their operational behaviors and relationships: 5:3 Describe in detail the entities provided by the GB/T 29271:3 application interface and the relationships between them: 5:4 Describe in detail the security model provided by the GB/T 29271:3 application interface: 5:2 Computational Model 5:2:1 The client application can identify the path to the card-side application: Using the card-side application path, the client application can initiate to the card-side application Connection: The card-side application is the card-side application currently used for connection: 5:2:2 GB/T 29271:3 application interface is a card-side application service provided to client applications: Each card-side application service consists of an operation group The operation can be requested by the client application and confirmed by the SAL return: 5:2:3 If the client application does not know the path of the card-side application, it can request the GB/T 29271:3 application interface to find the requested card The path of the end application: 5:2:4 Card-side applications are uniquely identified by AID: 5:2:5 The Alpha card-side application provides the client application with the basis for the trusted management of the card-side application: 5:2:6 A client application can open multiple connections: The client application can open multiple connections to the same card-side application, and each connection is requested: Refers to a different connection handle: 5:2:7 Using an open connection, the client application can initiate a session with the card-side application: 5:2:8 A client application can open multiple sessions: Only one session can be opened in a connection: 5:2:9 The current state refers to the current state of the connection defined by the current card-side application, the current data set, and the identified difference features: Authentication state and session expressions on the connection: 5:2:10 Card-side application includes one or more card-side application services: 5:2:11 Specific card-side application services, named data services, provide access to zero or more data sets: 5:2:12 The dataset contains zero or more data structures for interoperability (DSI): The dataset provides the names it contains for DSI Scope and access rules: 5:2:13 Each dataset can be accessed from the named data service according to the access rules of the management operation: 5:2:14 The data set selected in the current card application is called the current data set: 5:2:15 A single operation request of GB/T 29271:3 application interface can be converted into multiple general purpose card interfaces of GB/T 29271:2 ask: 5:2:16 The card-side application can support multiple operations, and the client application sends requests to it through the GB/T 29271:3 application interface: 5:2:17 An operation request shall result in an operation confirmation: 5:2:18 An access rule consists of the name of the operation and the security conditions: Security conditions are related to the operation of access rules: 5:2:19 An access control list is a collection of zero or more access rules: Access control lists are associated with each object: 5:2:20 If and only if the security condition related to the operation of the access rule in the object's access control list evaluates to TRUE, including The operation inside the object can be executed successfully: 5:2:21 An authentication protocol is the process by which differential characteristics prove ownership of an identity: 5:2:22 Authentication is the successful completion of the authentication protocol: The distinguishing feature in this case is pass discrimination: 5:2:23 If the difference feature passes the identification, the identification status of the difference feature is a Boolean variable of "TRUE", otherwise it is "FALSE": 5:2:24 The client application can be detected by the card-side application through the discovery program (through various Lists, Get, and Describe operations) to learn about information, status, or services: 5:2:25 Access rules appear in the GB/T 29271:3 application interface: 5:2:26 Generally speaking, the degree of interoperability between the card-side application and the client application depends on the card-side application in GB/T 29271:3 application interface: The discoverable information given: 5:3 Entity Relationships on Application Interfaces 5:3:1 Overview This section describes the accessible entities through the card-side application, namely the alpha card-side application and the card-side applications it manages: more directly involved The entities of the security model are described in 5:4: Figure 1 illustrates a client application example of a card-side application under GB/T 29271: GB/T 29271:3 application interface simplifies connection and session mechanism, as shown in Figure 1: Through the card-side application path, the client application connects to the specified card-side application: Through such a connection, client applications can take advantage of GB/T 29271:3 application interface to access card-side application services: In addition to its inherent security features, sessions add a security context to the connection It is used to protect the data flowing between the client application and the card-side application: Figure 2 illustrates the entities defined in the computational model and the relationships established between these entities: The entity and relationship diagram to describe Individual card-side application services: The object types available for the corresponding operation are displayed in the rounded box associated with each operation: Card-side applications are collections of objects and services: A service is a collection of operations: An action is an action applied to an object: client application via GB/T 29271:3 application interface to access card-side application operations and services: 5:3:2 Alpha Card Application Alpha card-side applications are available in the application interface: It can exist in the IC card or be emulated by a SAL or GCAL implementation: On any occasion, the connection of the client application to the alpha card end application acknowledges the availability of the card application list: 5:3:3 Access card-side application service Client applications use the Initialize and CardApplicationPath entry points on the GB/T 29271:3 application interface to access the card end application service: The client application uses the end entry point to terminate access to the card-side application service: Before accessing the card-side application service, the client application should request the Initialize entry point on the GB/T 29271:3 application interface: exist After Initialize is confirmed, the client application can open the connection and request operations for multiple card-side applications simultaneously or consecutively: when no longer needed To use the card-side application service, the client application should request the end entry point: 5:3:4 Connection service interface The card-side application service provides operations for establishing a connection between the client application and the card-side application: Once the connection is established, the session can The connection function is to strengthen the security of the communication between the client application and the card-side application: Figure 3 illustrates the entity relationship of the connection service: as shown in Table 1: For the generic card interface, differential characteristics can be transmitted as defined by ASN:1: When the difference feature is generated, the DIDName data element shall be specified by the client application that generates the difference feature: Authentication protocol data elements shall be designated as object identifiers (OIDs) and determine which operations the difference feature can be used for: only when When the authentication protocol specified by this OID is defined for use as authentication as defined in Appendix A, for the difference feature, its successful completion sets the difference The discriminant status of the feature is TRUE: DIDName SHOULD be associated with only one authentication protocol: The operation of cryptographic services can be exploited in Information in the Marker data element, as defined in Appendix A: NOTE: The authentication protocol represented by data element 2 is either used for authentication or other encryption services: The Scope data element is implied: The difference features defined in the alpha card-side application are global in scope, so in the alpha It is recognized within all card-side applications managed by the method card-side application: So the other differentiating features for the card-side application in which they are defined are partial: The range of the corresponding identification status shall be consistent with the range of the difference feature: The optional Qualifier data element may provide a description of the use of differential features: For example, it can reference external descriptions by OID: The Marker data element is the information in the card-side application, or its index, which should be used to perform the authentication protocol data specified in the data element authentication protocol: Examples of tags include: ---PIN; --- password; --- symmetric key; --- asymmetric key; --- digital certificates; --- biometric images or templates; --- A pair of symmetric keys, for example, one for encryption and one for message authentication code (MAC) generation: As evidenced by the last entry in the above list, the token may consist of multiple parts, such as multiple keys: This takes into account the complex Authentication protocols, which may require the use of multiple keys in parallel or in series: In card-side applications, Marker can often be implemented as a key, that is to say, the key index defined in ISO /IEC 7816-4 refer to: A differentiating feature and its signature may be associated with multiple key indices in some complex authentication protocols: key index possible is coded as defined in the ISO /IEC 7816-4 security environment: Private key indexes can appear in several differentiating features: Differential features are associated with markers through the association of DIDName to Marker and an authentication protocol: The mapping should be maintained as discovery part of the information: The mapping allows client applications and card-side applications to identify, exchange and share differentially characterized information: 5:4:3 Authentication Protocol The authentication protocol shall be the mechanism used by client applications to set the authentication state for the differentiating characteristics indicated by DIDName: authentication protocol in Enumerated in Table 2 and described in Appendix A: To set the discriminant status of the difference feature to TRUE, either use CardApplicationStartSession or use DIDAu- The thenticate operation, the identification protocol of the difference feature shall be completed successfully: The same operation is performed for successive requests for the same connection handle and named differential characteristics for completion of the authentication protocol defined in Appendix A: consultation may be necessary: These represent a single level in a multilevel authentication protocol: The local difference feature authentication state is valid for the connection handles specified during their authentication, when CardApplicationDisconnect When an operation is requested by this connection handle or another connection handle, the local authentication state shall be set to FALSE, otherwise it shall be invalid: when connected to When an alpha card-side application is used, the established global authentication state shall be available to all card-side applications managed by the alpha card-side application: Connection is valid: The global authentication state remains valid until the connection handle used to establish the global authentication state is no longer connected or becomes invalid: Such as If the difference feature is identified by the requested CardApplicationStartSession operation, the subsequent CardApplicationEndSession operation The request shall set its authentication status to FALSE: When a DIDAuthenticate or CardApplicationStartSession operation is requested, the authentication status of the differential feature shall be This is set to FALSE, and is set to TRUE only when an operational approval is generated for the successful completion of the authentication protocol request: The discriminant status of the difference feature shall be assigned FALSE, which is not recognized when its discriminant status is assigned: 5:4:4 Session keys The protocol may include the generation of encryption keys used during the session: The session key SHOULD be invalid when the CardApplicationDisconnect operation is requested or connected: Additionally, if via The request CardApplicationStartSession operation protocol is completed, when the CardApplicationEndSession operation is requested, The session key should be invalid: 5:4:5 Access Control List An Access Control List (ACL) is a set of access rules (AR) that apply to objects: AR is associated with card-side application services with security conditions operation: Identifying state safety conditions based on difference characteristics is a Boolean expression: Objects are datasets, differential features, or card-side applications: The discriminative difference feature shall have its discriminant status set to TRUE: Otherwise, its authentication status should be FALSE: if safe If the condition evaluates to TRUE, the associated operation is identified: If the security condition is assigned FALSE, the associated operation is not authenticated: If AR is present in the current card-side application that is suitable for association with security conditions (for the current card-side In the ACL of the object of the authentication state, whose value is TRUE), the operation that includes the object shall only be executed: if and only if requested When including the object to which its ACL is associated, AR only applies to its operation request: An ACL is part of the object to which it applies, not a distinct object itself: So when the operation of the authentication service appears in the AR When, AR controls whether an operation can be performed on the ACL in which it exists: The AR that controls access to the ACL exists in the ACL within itself: By including the differential feature in the security condition, the authentication of the differential feature may become Very necessary: If the difference feature is associated with the authentication protocol that generates the session key, its inclusion in the security condition may make it possible to establish Safe perimeter becomes necessary: 6 Card-side application service access 6:1 Overview This chapter defines the entry point on the GB/T 29271:3 application interface, through which the client application can locate the specified card-side application and And establish a communication channel for the card-end application: A client application can connect to more than one card-side application: 6:2 Initialize 6:2:1 Purpose This entry point initializes the GB/T 29271:3 layer, including connectivity to other components of the GB/T 29271 protocol stack: For the client should Only after the entry point is successfully called, the card-side application service is available on the GB/T 29271:3 application interface: The initialization state of GB/T 29271:3 application interface implementation (variables, possible values, resources, support for card-side application services) is not covered in this part: within: 6:2:2 Entry points OUT ReturnCode Initialize( ); 6:2:3 Parameters without: