Identification card systems - European Citizen Card - Part 3: European Citizen Card Interoperability using an application interface

ECC part 3 will provide an Interoperability Model, which will enable an eService compliant with technical requirements, to interoperate with different implementations of the European Citizen Card.
This Interoperability model will be developed as follows:
-   starting from the ECC part 2, part 3 of the ECC series will provide additional technical specifications for a middleware architecture based on ISO/IEC 24727. This middleware will provide an API to an eService as per ISO/IEC 24727-3;
-   a set of additional API provide the middleware stack with means to facilitate ECC services;
-   a standard mechanism for the validation of the e-ID credential stored in the ECC and retrieved by the service.
In order to support the ECC services over an ISO/IEC 24727 middelware configuration, this part of the standard specifies the following:
-   a set of mandatory requests to be supported by the middleware implementation based on ISO/IEC 24727;
-   data set content for interoperability to be personalized in the ECC;
-   two middleware architecture solutions: one based on a stack of combined ISO/IEC 24727 configurations and the other based on Web Service configuration;
-   a Global Profile featuring the guidelines for card-applications to fit in ISO/IEC 24727 framework.

Identifikationskartensysteme - Europäische Bürgerkarte - Teil 3: Anwendungsschnittstelle für die Interoperabilität von Europäischen Bürgerkarten

Systèmes d'Identification par Carte - Carte Européenne de Citoyen - Partie 3: Interoperabilité de la Carte européenne de Citoyen par interface applicative

Sistemi z identifikacijskimi karticami - Kartica evropskih državljanov - 3. del: Medobratovalnost kartice evropskih državljanov z uporabo aplikacijskega vmesnika

3. del ECC bo zagotovil medobratovalni model, ki bo omogočal eStoritve v skladu s tehničnimi zahtevami, za medobratovanje z različnimi implementacijami kartice evropskih državljanov. Ta medobratovalni model bo razvit:
- začne se z 2. delom ECC, pri čemer bo 3. del serij ECC zagotovil dodatne tehnične specifikacije za arhitekturo vmesne programske opreme, ki temelji na ISO/IEC 24727. Ta vmesna programska oprema bo zagotovila API za eStoritve, skladno z ISO/IEC 24727-3;
- iz sklopa dodatnih API, ki zagotavlja sklad vmesne programske opreme z možnostjo pospeševanja storitev ECC;
- iz standardnega mehanizma za validacijo poverilnice e-ID, shranjene v ECC, dostopnega s storitvijo. V podporo storitvam ECC pred konfiguracijo vmesne programske opreme ISO/IEC 24727, ta del standarda določa naslednje:
- sklop obveznih zahtev, ki jih bo podpirala implementacija vmesne programske opreme, temelječa na ISO/IEC 24727;
- vsebino sklopa podatkov za medobratovalnost, ki bo v ECC prilagojena;,
- dve arhitekturni rešitvi vmesne programske opreme; od tega ena temelji na skladu združenih konfiguracij ISO/IEC 24727, druga pa na konfiguraciji spletne storitve;
- globalni profil s smernicami za aplikacije kartic, da ustrezajo okviru ISO/IEC 24727.

General Information

Status
Withdrawn
Publication Date
07-Dec-2010
Withdrawal Date
01-Apr-2014
Current Stage
9960 - Withdrawal effective - Withdrawal
Start Date
02-Apr-2014
Completion Date
02-Apr-2014

Relations

Effective Date
13-Feb-2013
Effective Date
28-Jan-2026
Effective Date
28-Jan-2026
Effective Date
28-Jan-2026
Effective Date
28-Jan-2026
Effective Date
28-Jan-2026
Effective Date
28-Jan-2026
Effective Date
28-Jan-2026
Effective Date
28-Jan-2026
Technical specification

TS CEN/TS 15480-3:2011

English language
301 pages
Preview
Preview
e-Library read for
1 day

Get Certified

Connect with accredited certification bodies for this standard

BSI Group

BSI (British Standards Institution) is the business standards company that helps organizations make excellence a habit.

UKAS United Kingdom Verified

Sponsored listings

Frequently Asked Questions

CEN/TS 15480-3:2010 is a technical specification published by the European Committee for Standardization (CEN). Its full title is "Identification card systems - European Citizen Card - Part 3: European Citizen Card Interoperability using an application interface". This standard covers: ECC part 3 will provide an Interoperability Model, which will enable an eService compliant with technical requirements, to interoperate with different implementations of the European Citizen Card. This Interoperability model will be developed as follows: - starting from the ECC part 2, part 3 of the ECC series will provide additional technical specifications for a middleware architecture based on ISO/IEC 24727. This middleware will provide an API to an eService as per ISO/IEC 24727-3; - a set of additional API provide the middleware stack with means to facilitate ECC services; - a standard mechanism for the validation of the e-ID credential stored in the ECC and retrieved by the service. In order to support the ECC services over an ISO/IEC 24727 middelware configuration, this part of the standard specifies the following: - a set of mandatory requests to be supported by the middleware implementation based on ISO/IEC 24727; - data set content for interoperability to be personalized in the ECC; - two middleware architecture solutions: one based on a stack of combined ISO/IEC 24727 configurations and the other based on Web Service configuration; - a Global Profile featuring the guidelines for card-applications to fit in ISO/IEC 24727 framework.

ECC part 3 will provide an Interoperability Model, which will enable an eService compliant with technical requirements, to interoperate with different implementations of the European Citizen Card. This Interoperability model will be developed as follows: - starting from the ECC part 2, part 3 of the ECC series will provide additional technical specifications for a middleware architecture based on ISO/IEC 24727. This middleware will provide an API to an eService as per ISO/IEC 24727-3; - a set of additional API provide the middleware stack with means to facilitate ECC services; - a standard mechanism for the validation of the e-ID credential stored in the ECC and retrieved by the service. In order to support the ECC services over an ISO/IEC 24727 middelware configuration, this part of the standard specifies the following: - a set of mandatory requests to be supported by the middleware implementation based on ISO/IEC 24727; - data set content for interoperability to be personalized in the ECC; - two middleware architecture solutions: one based on a stack of combined ISO/IEC 24727 configurations and the other based on Web Service configuration; - a Global Profile featuring the guidelines for card-applications to fit in ISO/IEC 24727 framework.

CEN/TS 15480-3:2010 is classified under the following ICS (International Classification for Standards) categories: 35.240.15 - Identification cards. Chip cards. Biometrics. The ICS classification helps identify the subject area and facilitates finding related standards.

CEN/TS 15480-3:2010 has the following relationships with other standards: It is inter standard links to CEN/TS 15480-3:2014, EN 14890-1:2008, EN 1605:2013, EN 4160:2011, EN ISO 5178:2011, EN 12392:2016, EN 1606:2013, EN 15502-2-2:2014, CEN/TS 15480-4:2012. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.

CEN/TS 15480-3:2010 is available in PDF format for immediate download after purchase. The document can be added to your cart and obtained through the secure checkout process. Digital delivery ensures instant access to the complete standard document.

Standards Content (Sample)


SLOVENSKI STANDARD
01-februar-2011
Sistemi z identifikacijskimi karticami - Kartica evropskih državljanov - 3. del:
Medobratovalnost kartice evropskih državljanov z uporabo aplikacijskega
vmesnika
Identification card systems - European Citizen Card - Part 3: European Citizen Card
Interoperability using an application interface
Identifikationskartensysteme - Europäische Bürgerkarte - Teil 3:
Anwendungsschnittstelle für die Interoperabilität von Europäischen
Systèmes d'Identification par Carte - Carte Européenne de Citoyen - Partie 3:
Interoperabilité de la Carte européenne de Citoyen par interface applicative
Ta slovenski standard je istoveten z: CEN/TS 15480-3:2010
ICS:
35.240.15 Identifikacijske kartice in Identification cards and
sorodne naprave related devices
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

TECHNICAL SPECIFICATION
CEN/TS 15480-3
SPÉCIFICATION TECHNIQUE
TECHNISCHE SPEZIFIKATION
December 2010
ICS 35.240.15
English Version
Identification card systems - European Citizen Card - Part 3:
European Citizen Card Interoperability using an application
interface
Systèmes d'Identification par Carte - Carte Européenne de Identifikationskartensysteme - Europäische Bürgerkarte -
Citoyen - Partie 3: Interoperabilité de la Carte européenne Teil 3: Anwendungsschnittstelle für die Interoperabilität von
de Citoyen par interface applicative Europäischen Bürgerkarten
This Technical Specification (CEN/TS) was approved by CEN on 12 July 2010 for provisional application.

The period of validity of this CEN/TS is limited initially to three years. After two years the members of CEN will be requested to submit their
comments, particularly on the question whether the CEN/TS can be converted into a European Standard.

CEN members are required to announce the existence of this CEN/TS in the same way as for an EN and to make the CEN/TS available
promptly at national level in an appropriate form. It is permissible to keep conflicting national standards in force (in parallel to the CEN/TS)
until the final decision about the possible conversion of the CEN/TS into an EN is reached.

CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia,
Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland,
Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland and United Kingdom.

EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION

EUROPÄISCHES KOMITEE FÜR NORMUNG

Management Centre: Avenue Marnix 17, B-1000 Brussels
© 2010 CEN All rights of exploitation in any form and by any means reserved Ref. No. CEN/TS 15480-3:2010: E
worldwide for CEN national Members.

Contents Page
Foreword .6
1 Scope .7
2 Normative references .7
3 Terms and definitions .8
4 Symbols and abbreviations .8
4.1 Abbreviations .8
5 ECC fitting in ISO/IEC 24727 model . 11
5.1 ISO/IEC 24727 main features . 11
5.2 General security issues – Applicable 24727-4 Stack Configurations for the ECC
environment . 13
5.3 ECC-3 Middleware Architecture . 16
5.3.1 Service Access Layer (SAL) . 17
5.3.2 Generic Card Access Layer (GCAL) . 17
5.3.3 Interface Device Layer and API (IFD API) . 17
5.3.4 ECC-3 Stack Distribution and Connection Handling . 17
5.3.5 A Web Service based architecture for ECC-3 framework . 21
5.3.6 XML-based SAL interface . 26
5.3.7 Smart card profile fitting with ECC-3 stack . 26
6 Card Discovery Mechanisms . 27
6.1 Discovery decision tree . 28
6.2 Migration path towards ECC and provision for legacy cards . 29
6.2.1 Interoperable access to the Repository . 30
6.3 Set of data for interoperability . 32
6.4 Application and Card Capability Descriptors . 32
6.5 ISO/IEC 7816-15 implementation . 34
6.5.1 Profile designation within EF.DIR . 35
6.5.2 ISO/IEC 24727-3 data structures mapping . 35
6.5.3 SAL-API Action mapping onto ISO/IEC 7816-15 attributes . 51
6.5.4 ISO/IEC 24727-3 data structures storage onto the card . 53
6.5.5 General discovery mechanism . 55
6.6 Other data descriptor . 57
7 Authentication protocols . 57
7.1 Authentication Mechanisms based on ISO/IEC 24727 SAL-API . 57
7.2 Asymmetric internal authentication. 58
7.3 Asymmetric external authentication . 58
7.4 Symmetric internal authentication . 58
7.5 Symmetric external authentication . 59
7.6 Mutual authentication with key establishment . 59
7.7 Device authentication with non traceability . 59
7.8 Key transport protocol based on RSA . 59
7.9 Terminal Authentication . 60
8 IFD-API Web Service Binding . 60
8.1 Specification of ISOCommon.XSD . 60
8.2 Specification of ISOIFD.XSD . 61
8.3 Specification of CENIFD.WSDL . 74
8.4 Specification of CENIFDCallback.XSD . 83
8.5 Definition of CENCallback.WSDL . 84
9 Card-Info Structure . 85
9.1 Introduction . 85
9.2 Overview . 86
9.3 CardType . 87
9.4 CardIdentification . 88
9.5 CardCapabilities . 94
9.6 ApplicationCapabilities . 103
9.7 Signature . 109
9.8 Complete XML-Schema Definition . 109
10 XML-based Service Access Layer Interface . 112
10.1 XML-Schema definitions for Service Access Layer functions . 112
10.2 WSDL definitions for Service Access Layer functions . 137
Annex A (informative) Interface Device Layer Architecture and Management . 161
A.1 Scope . 161
A.2 IFD-Layer Architecture . 161
A.3 Resource Manager . 162
A.3.1 IFD-Handlers . 162
A.3.2 Card transactions . 162
A.3.3 Application threads . 162
A.4 Administrative functions . 162
A.4.1 IFD-Handler related functions . 162
A.4.2 Interface Device related functions . 163
A.5 IFD-Handler-API . 163
Annex B (informative) Interface Device API . 164
B.1 Card terminal related functions . 164
B.1.1 EstablishContext . 164
B.1.2 ReleaseContext . 165
B.1.3 ListIFDs. 165
B.1.4 GetIFDCapabilities . 166
B.1.5 GetStatus . 168
B.1.6 Wait . 170
B.1.7 Cancel . 171
B.1.8 ControlIFD . 172
B.2 Card related functions . 172
B.2.1 Connect . 173
B.2.2 Disconnect . 174
B.2.3 BeginTransaction . 174
B.2.4 EndTransaction . 175
B.2.5 Transmit. 175
B.3 User related functions . 176
B.3.1 VerifyUser . 177
B.3.2 ModifyVerificationData . 179
B.3.3 Output . 181
Annex C (informative) IFD-API – C Language Binding . 183
Annex D (informative) Examples of Cryptographic Information Application for Card-Application
Service Description . 189
D.1 Fetching a certificate for internal asymmetric authentication . 189
D.2 Creating a new service . 190
D.2.1 Features of eVoting Service . 190
Annex E (informative)  SAL-API Post-issuance personalization requests . 204
E.1 Post-issuance personalization requests . 204
E.2 Canonical protocol . 204
E.2.1 DataSetCreate . 205
E.2.2 DSICreate. 213
E.2.3 DIDCreate . 214
E.2.4 DIDUpdate . 216
E.2.5 CardApplicationServiceCreate . 216
Annex F (informative) Additional features versus ISO/IEC 24727 . 219
F.1 Discovery Mechanism . 219
F.2 General Procedures (SAL) . 220
F.3 Architecture . 221
F.4 eURI support (through ControlIFD() call) . 222
F.5 Differences between IFD-API in ISO/IEC 24727-4 and ECC-3 . 222
F.5.1 More generale SlotCapabilityType . 222
F.5.2 Transmit with support for batch processing . 222
F.5.3 Additional error code for Signalevent . 222
F.6 Miscellaneous corrections . 222
Annex G (informative) C-Language Binding for ExecuteSAL function . 223
Annex H (informative) Java-Language Binding for ExecuteSAL function . 224
Annex I (informative) XML-Binding for Authentication Protocols . 225
I.1 PIN Compare . 225
I.1.1 Marker . 225
I.1.2 DIDCreate . 232
I.2 Mutual authentication . 234
I.2.1 Marker . 235
I.3 RSA Authentication . 240
I.3.1 Marker . 241
I.3.2 DIDCreate . 244
I.3.3 DIDUpdate . 244
I.3.4 DIDGet . 244
I.3.5 CardApplicationStartSession . 244
I.3.6 DIDAuthenticate . 245
I.4 Generic cryptography . 248
I.4.1 Marker . 249
I.4.2 DIDCreate . 254
I.4.3 DIDUpdate . 254
I.4.4 DIDGet . 254
I.4.5 Encipher . 254
I.4.6 Decipher . 254
I.4.7 GetRandom . 254
I.4.8 Hash . 254
I.4.9 Sign . 254
I.4.10 VerifySignature . 254
I.4.11 VerifyCertificate . 254
I.4.12 DIDAuthenticate . 255
Annex J (informative) API for ISO/IEC 7816-15 data structures handling . 257
J.1 C-language Binding for the ECC3-API . 259
J.1.1 ECC3RESULT . 259
J.1.2 ECC3CONTEXT . 259
J.1.3 ECC3INFO . 259
J.1.4 ECC3VERSION . 260
J.1.5 CioChoice . 260
J.1.6 CommonObjectFlags . 260
J.1.7 SecurityEnvironmentInfo . 260
J.1.8 AlgorithmInfo . 261
J.1.9 PasswordType . 261
J.1.10 Validity . 261
J.1.11 ObjectValueType . 261
J.1.12 FileType . 262
J.1.13 FileState . 262
J.1.14 IdType . 262
J.1.15 AccessModes . 263
J.1.16 Operations . 263
J.1.17 ContextTag . 263
J.1.18 SecurityConditionType . 264
J.1.19 DataSetNameType . 264
J.1.20 DSINameType . 264
J.2 Interface functions . 265
J.2.1 General Purposes Functions. 265
J.2.2 Reader and Card management Functions . 265
J.3 Objects. 266
J.3.1 Basic objects . 266
J.3.2 File Objects . 275
J.3.3 Data Objects . 283
J.4 Macros . 292
J.4.1 _HB: HexaBlob convertions . 292
J.4.2 AsString . 293
J.5 Example of use (C++ Language) . 293
Annex K (informative) Global Profile 4: card requirements to access/offer services in ISO/IEC
24727 framework . 295
K.1 Global Profile 4: Card requirements . 295
K.1.1 OID . 295
K.1.2 General . 295
K.1.3 interfaces / transport protocols . 295
K.1.4 Data elements and data structures . 296
K.1.5 Command set . 298
K.1.6 Data structure of Card Applications . 299
Bibliography . 300

Foreword
This document (CEN/TS 15480-3:2010) has been prepared by Technical Committee CEN/TC 224 “Personal
identification, electronic signature and cards and their related systems and operations”, the secretariat of
which is held by AFNOR.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. CEN [and/or CENELEC] shall not be held responsible for identifying any or all such patent rights.
According to the CEN/CENELEC Internal Regulations, the national standards organizations of the following
countries are bound to announce this Technical Specification: Austria, Belgium, Bulgaria, Croatia, Cyprus,
Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,
Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia,
Spain, Sweden, Switzerland and the United Kingdom.
1 Scope
ECC part 3 will provide an Interoperability Model, which will enable an eService compliant with technical
requirements, to interoperate with different implementations of the European Citizen Card.
This Interoperability model will be developed as follows:
 starting from the ECC part 2, part 3 of the ECC series will provide additional technical specifications for a
middleware architecture based on ISO/IEC 24727. This middleware will provide an API to an eService as
per ISO/IEC 24727-3;
 a set of additional API provide the middleware stack with means to facilitate ECC services;
 a standard mechanism for the validation of the e-ID credential stored in the ECC and retrieved by the
service.
In order to support the ECC services over an ISO/IEC 24727 middelware configuration, this part of the
standard specifies the following:
 a set of mandatory requests to be supported by the middleware implementation based on ISO/IEC 24727;
 data set content for interoperability to be personalized in the ECC;
 two middleware architecture solutions: one based on a stack of combined ISO/IEC 24727 configurations
and the other based on Web Service configuration;
 a Global Profile featuring the guidelines for card-applications to fit in ISO/IEC 24727 framework.
2 Normative references
The following referenced documents are indispensable for the application of this document. For dated
references, only the edition cited applies. For undated references, the latest edition of the referenced
document (including any amendments) applies.
EN 14890-1:2008, Application Interface for smart cards used as Secure Signature Creation Devices — Part 1:
Basic services
ISO/IEC 7816-3:2008, Identification cards — Integrated circuit cards — Part 3: Cards with contacts —
Electrical interface and transmission protocols
ISO/IEC 7816-4:2005 Identification cards — Integrated circuit cards — Part 4:Organization, security and
commands for interchange
ISO/IEC 7816-8:2004, Identification cards — Integrated circuit cards — Part 8: Commands for security
operations
ISO/IEC 7816-9, Identification cards — Integrated circuit cards — Part 9: Commands for card management
ISO/IEC 7816-15:2004, Identification cards — Integrated circuit cards with contacts — Part 15: Cryptographic
information application
ISO/IEC 7816-15:2004/Amd 2:2008, Identification cards — Integrated circuit cards — Part 15: Cryptographic
information application, Error corrections and extensions for multi-application environments
ISO/IEC 9796-2:2002, Information technology — Security techniques — Digital signature schemes giving
message recovery — Part 2: Integer factorization based mechanisms
ISO/IEC 24727-1:2007, Identification cards — Integrated circuit card programming interfaces — Part 1:
Architecture
ISO/IEC 24727-2:2008 Identification Cards — Integrated circuit card programming interfaces —
Part 2: Generic card interface
ISO/IEC 24727-3:2008 Identification Cards — Integrated circuit card programming interfaces —
Part 3: Application Interface
ISO/IEC 24727-4:2008, Identification cards — Integrated circuit card programming interface — Part 4:
Application programming interface (API) Administration
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1
descriptive elements
the Application Capability Descriptor (ACD) and the Card Capability Descriptor (CCD) comprehend
information nested in data objects and intended for the discovery mechanism. These descriptive elements are
encapsulated along with procedural elements in the ACD and CCD. EF.DIR is part of the descriptive elements
3.2
procedural elements
translation code to process any request at the Generic Card Interface (GCI) and every relevant card
response. The translation has one entry point, theTranslationCode() function as per ISO/IEC 24727-2
3.3
middleware
set of abstraction layers that serves as the intermediate between a client-application and an application
resident in the ECC. The actual pieces of software running behind these abstraction layers are
implementation-specific and out of the scope of this document
3.4
service
an eService is an application based locally on the client PC or based somewhere in the internet (e.g.
government eService, eBuisness eService…) which offers in combination with the ECC smart card the
execution of a task
4 Symbols and abbreviations
4.1 Abbreviations
ADF Application Dedicated File
AID Application Identifier
AJAX Asynchronous JavaScript and XML
AMB Access Mode Byte
AT Authentication Template
ATR Answer to Reset
ATS Answer to Select
BER Basic Encoding Rules
BHT Biometric Header Template
BIT Biometric Information Template
CA Certification Authority
CAPICOM Cryptographic API COM Object (http://msdn.microsoft.com)
CAR Certification Authority Reference
CBC Cipher Block Chaining
CCT Cryptographic Checksum Template
CED Certificate Effective Date
CHA Certificate Holder Authorisation
CHR Certificate Holder Reference
CIA Cryptographic Information Application
CPI Certificate Profile Identifier
CRT Control Reference Template
CryptoAPI Cryptographic Application Programming Interface (http://msdn.microsoft.com)
CSP Crytographic Service Provider
CT Confidentiality Template
CV Card Verifiable
CXD Certificate Expiration Date
DES Data Encryption Standard
DF Dedicated File
DH Diffie Hellman
DOCP Data Object Control Parameters
DST Digital Signature Template
ECDH Elliptic Curve DH
ELC Elliptic Curve Cryptosystem
ECDSA Elliptic Curve Digital Signature Algorithm
EF Elementary File
FCI File Control Information
FCP File Control Parameters
GCAL Generic Card Access Layer
HT Hash Template
ICC Integrated Circuit Card
DID Differential Identity acc. ISO/IEC 24727-3
IFD Interface Device
IFDH Interface Device Handler
JSON Java Script Object Notation (http://www.json.org)
KAT Control reference template for key agreement
LSB Least Significant Byte
MAC Message Authentication Code
MF Master File
M.U.S.C.L.E Movement for the Use of Smart Card in Linux Environment
MSE Manage Security Environment
OID Object Identifier
PAN Primary Account Number
PIN Personal Identification Number
PUK unblocking password
PK – DH Public key – Diffie Hellman (asymmetric key base algorithm)
PSO Perform Security Operation
RFU Reserved for Future Use
RSA Rivest Shamir Adleman
SAL Service Access Layer
SDO Security Data Object
SCB Security Condition Byte
SE Security Environment
SEID Security Environment IDentifier byte
SM Secure Messaging
SSD Security Service Descriptor
TLV Tag Length Value
UQB Usage Qualifier Byte
5 ECC fitting in ISO/IEC 24727 model
5.1 ISO/IEC 24727 main features
This standardization initiative (ISO/JTC1/SC17 WG4/TF9) aims to design a new framework for interoperability
based on a discovery mechanism of which the following paradigm:
The low level implementation features of the smart card, including proprietary specific features and
characteristics based on ISO standards (i.e. ISO/IEC 7816-4) are hidden to the client-application through a
high-level description provided to the terminal and processed by the middleware stack.
The middleware stack is defined by abstraction layers ensuring the interoperability. These layers are
sustained by applicative components of which the implementation is up to the integrator and may vary
according to the environment. For instance, the use of CAPICOM, CryptoAPI, CSP, proprietary API or DLL,
ActiveX objects, Applets, PKCS#11 interface, JCE, M.U.S.C.L.E PC/SC emulation on Linux environment etc.,
are all possible solutions upon which the ISO/IEC 24727abstraction layers may run.
The middleware abstraction layers are of two kinds:
 the Service Access Layer (SAL) is in charge of interpreting the requests addressed by the client-
application to the card via a high-level API (the SAL-API). The SAL translates the requests in terms of
sequences of APDU that are sent out to the underlying abstraction layer (the GCAL). This translation is
performed according to the rules defined by a set of interoperability data reflecting the rules governing the
card-applications. The SAL shall generate on the fly these interoperability data out of the
ISO/IEC 7816-15 information available in the card. This ISO/IEC 7816-15 information is either provided
within the CardApplicationServiceDescription data, or within the DF.CIA files, or both. Upon request from
the eService, the SAL may surface the interoperability data to the eService.The SAL is specified in
ISO/IEC 24727-3;
 the Generic Card Access Layer (GCAL) is in charge of translating the APDU handed on by the SAL in
terms of APDU understandable to the smart card. This translation is applied according to the rules
defined in the ACD (Application Capabilities Descriptor) and/or in the CCD (Card Capabilities Descriptor)
templates. These templates are read out of the card by the GCAL. The GCAL performs a bootstrap
mechanism upon card detection in order to retrieve the ACD and CCD containers from the card. The
bootstrap operation is the first step of the discovery mechanism. The GCAL functionality is specified in
ISO/IEC 24727-2.
Figure 1 — CEN/TS 15480 compliant smart card in ISO/IEC 24727 framework
The smart card hosts a set of interoperability data that are DER-TLV encoded according to an ASN.1
definition. This ASN.1 specification provided in ISO/IEC 24727-2 describes all the information items required
by a terminal to access the services offered by the card (resources, actions) and to allow as well the end-user
to access services running on terminal side. This ASN.1 specification is built upon the computational model
specified in ISO/IEC 24727-3. Therefore, the ASN.1 definition encompasses the descriptors of the services
hosted on-card per application, the card application list, the access control rules applying to each on-card
action or resource, and the description of each modular authentication item (called Differential-Identity or DID).
This latter item (Figure 2 — Differential-Identity structure according to ISO/IEC 24727-3) is the modular
descriptor of each authentication procedure. DID is comprised of five fields among which an optional element,
the dIDQualifier, that conveys further information to clear ambiguities whenever required by cryptographic
requests.
Figure 2 — Differential-Identity structure acc. ISO/IEC 24727-3
The relationship between the elements constituting a DID is such as a Marker applied in a given Scope feeds
the algorithm of a given Authentication Protocol that is applied to authenticate a given named DID.
The rules controlling the access to a card resource or authorizing a card action are expressed has a Boolean
combination of Differential-Identities. If the Boolean expression evaluates to "TRUE", the requested card
resources are made available or the card action is executed, otherwise the request is rejected.
The DifferentialIdentityQualifier may serve to convey to the SAL the OID related to a cryptographic operation
or authentication protocol. The DIDQualifier type depends on the Authentication Protocol to which it applies.
Details of DIDQualifiers are given in ISO/IEC 24727-3:2008, Annex A.
5.2 General security issues – Applicable 24727-4 Stack Configurations for the ECC
environment
The abstraction layers defined by ISO/IEC 24727 are intended to hide seamlessly the implementation
differences that may occur between smart cards from different vendors even when their respective
implementation is based on the same standard or specification (i.e. CEN/TS 15480-2)
A high level description (according to ISO/IEC 24727) of the security rules governing the services hosted by
the card allows and extension of the information provided by ISO/IEC 7816-15 implementation, ensuring
thereby a more comprehensive interoperability protocol based on ISO/IEC
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...