スマートカード・ハンドブック(第3版)<br>Smart Card Handbook (3TH)

  • ポイントキャンペーン

スマートカード・ハンドブック(第3版)
Smart Card Handbook (3TH)

  • ただいまウェブストアではご注文を受け付けておりません。 ⇒古書を探す
  • 製本 Hardcover:ハードカバー版/ページ数 1016 p.
  • 言語 ENG,ENG
  • 商品コード 9780470856680
  • DDC分類 006

基本説明

Extensive glossary of over 600 smart card terms. A completely revised chapter on smart cards in the telecomms industry, covering GSM, UMTS and the (U) SIM Application toolkit. New coverage of smart card security.

Table of Contents

Preface to the Third Edition                       xiii
Symbols and Notation xv
Program Code Conventions xvii
Abbreviations xix
1 Introduction 1 (14)
1.1 The History of Smart Cards 2 (3)
1.2 Application Areas 5 (4)
1.2.1 Memory cards 6 (1)
1.2.2 Microprocessor cards 6 (2)
1.2.3 Contactless cards 8 (1)
1.3 Standardization 9 (6)
2 Types of Cards 15 (12)
2.1 Embossed Cards 15 (1)
2.2 Magnetic-stripe Cards 16 (2)
2.3 Smart Cards 18 (5)
2.3.1 Memory cards 19 (1)
2.3.2 Microprocessor cards 20 (1)
2.3.3 Contactless smart cards 21 (2)
2.4 Optical Memory Cards 23 (4)
3 Physical and Electrical Properties 27 (128)
3.1 Physical Properties 27 (11)
3.1.1 Card formats 28 (3)
3.1.2 Card components and security 31 (7)
features
3.2 The Card Body 38 (14)
3.2.1 Card materials 40 (2)
3.2.2 Chip modules 42 (10)
3.3 Electrical Properties 52 (10)
3.3.1 Electrical connections 53 (2)
3.3.2 Supply voltage 55 (3)
3.3.3 Supply current 58 (2)
3.3.4 External clock 60 (1)
3.3.5 Data transmission 60 (1)
3.3.6 Activation and deactivation 61 (1)
sequences
3.4 Smart Card Microcontrollers 62 (29)
3.4.1 Processor types 66 (4)
3.4.2 Memory types 70 (10)
3.4.3 Supplementary hardware 80 (11)
3.5 Contact-type Cards 91 (2)
3.6 Contactless Cards 93 (62)
3.6.1 Close-coupling cards: ISO/IEC 10536 101 (6)
3.6.2 Remote-coupling cards 107 (1)
3.6.3 Proximity integrated circuit(s) 108 (45)
cards: ISO/TEC 14 443
3.6.4 Vicinity integrated circuits cards 153 (1)
(ISO/IEC 15 693)
3.6.5 Test methods for contactless smart 153 (2)
cards
4 Informatic Foundations 155 (78)
4.1 Structuring Data 156 (5)
4.2 Coding Alphanumeric Data 161 (3)
4.2.1 7-bit code 161 (1)
4.2.2 8-bit code 161 (2)
4.2.3 16-bit code (Unicode) 163 (1)
4.2.4 32-bit code (UCS) 163 (1)
4.3 SDL Notation 164 (1)
4.4 State Machines 165 (4)
4.4.1 Basic theory of state machines 166 (1)
4.4.2 Practical applications 166 (3)
4.5 Error Detection and Correction Codes 169 (7)
4.5.1 XOR checksums 171 (1)
4.5.2 CRC checksums 172 (2)
4.5.3 Reed-Solomon codes 174 (1)
4.5.4 Error correction 174 (2)
4.6 Data Compression 176 (1)
4.7 Cryptology 177 (25)
4.7.1 Symmetric cryptographic algorithms 182 (7)
4.7.2 Asymmetric cryptographic algorithms 189 (10)
4.7.3 Padding 199 (2)
4.7.4 Message authentication code and 201 (1)
cryptographic checksum
4.8 Key Management 202 (6)
4.8.1 Derived keys 202 (1)
4.8.2 Key diversification 203 (1)
4.8.3 Key versions 203 (1)
4.8.4 Dynamic keys 203 (1)
4.8.5 Key parameters 204 (2)
4.8.6 Key management example 206 (2)
4.9 Hash Functions 208 (2)
4.10 Random Numbers 210 (6)
4.10.1 Generating random numbers 211 (2)
4.10.2 Testing random numbers 213 (3)
4.11 Authentication 216 (9)
4.11.1 Symmetric unilateral authentication 218 (1)
4.11.2 Symmetric mutual authentication 219 (3)
4.11.3 Static asymmetric authentication 222 (1)
4.11.4 Dynamic asymmetric authentication 223 (2)
4.12 Digital Signatures 225 (4)
4.13 Certificates 229 (4)
5 Smart Card Operating Systems 233 (138)
5.1 Historical Evolution of Smart Card 234 (3)
Operating Systems
5.2 Fundamentals 237 (75)
5.3 Design and Implementation Principles 312
5.4 Completion 245 (4)
5.5 Memory Organization 249 (3)
5.6 Smart Card Files 252 (19)
5.6.1 Filetypes 254 (3)
5.6.2 File names 257 (4)
5.6.3 File selection 261 (2)
5.6.4 EF tile structures 263 (4)
5.6.5 File access conditions 267 (3)
5.6.6 File attributes 270 (1)
5.7 File Management 271 (8)
5.8 Sequential Control 279 (1)
5.9 Access to Resources in Accordance with 280 (8)
ISO/IEC 7816-9
5.10 Atomic Operations 288 (2)
5.11 Open Platform 290 (3)
5.12 Downloadable Program Code 293 (3)
5.13 Executable Native Code 296 (6)
5.14 Open Platforms 302 (24)
5.14.1 Java Card 303 (19)
5.14.2 Multos 322 (1)
5.14.3 Basic Card 323 (1)
5.14.4 Windows for Smart Cards 323 (1)
5.14.5 Linux 324 (2)
5.15 The Small-OS Smart Card Operating 326 (45)
System
6 Smart Card Data Transmission 371 (64)
6.1 The Physical Transmission layer 373 (4)
6.2 Answer to Reset (ATR) 377 (15)
6.2.1 ATR characters 379 (10)
6.2.2 Practical examples of ATRs 389 (3)
6.3 Protocol Parameter Selection (PPS) 392 (4)
6.4 Data Transmission Protocols 396 (25)
6.4.1 Synchronous data transmission 397 (6)
6.4.2 The T = 0 transmission protocol 403 (6)
6.4.3 The T = 1 transmission protocol 409 (10)
6.4.4 The T = 14 transmission protocol 419 (1)
(Germany)
6.4.5 The USB transmission protocol 420 (1)
6.4.6 Comparison of asynchronous 421 (1)
transmission protocols
6.5 Message Structure: APDUs 421 (4)
6.5.1 Structure of the command APDU 422 (2)
6.5.2 Structure of the response APDU 424 (1)
6.6 Securing Data Transmissions 425 (9)
6.6.1 The authentic mode procedure 429 (1)
6.6.2 The combined mode procedure 430 (2)
6.6.3 Send sequence counter 432 (2)
6.7 Logical Channels 434 (1)
7 Smart Card Commands 435 (56)
7.1 File Selection Commands 439 (3)
7.2 Read and Write Commands 442 (8)
7.3 Search Commands 450 (2)
7.4 File Manipulation Commands 452 (1)
7.5 Identification Commands 453 (4)
7.6 Authentication Commands 457 (5)
7.7 Commands for Cryptographic Algorithms 462 (6)
7.8 File Management Commands 468 (6)
7.9 Commands for Managing Applets 474 (1)
7.10 Commands for Completing the Operating 474 (3)
System
7.11 Commands for Hardware Testing 477 (4)
7.12 Commands for Data Transmission 481 (1)
Protocols
7.13 Database Commands: SCAL 482 (4)
7.14 Commands for Electronic Purses 486 (3)
7.15 Commands for Credit and Debit Cards 489 (1)
7.16 Application-Specific Commands 490 (1)
8 Security Techniques 491 (74)
8.1 User Identification 491 (19)
8.1.1 Testing a secret number 493 (5)
8.1.2 Biometric methods 498 (12)
8.2 Smart Card Security 510 (55)
8.2.1 A classification of attacks and 511 (6)
attackers
8.2.2 Attacks and defensive measures 517 (3)
during development
8.2.3 Attacks and defensive measures 520 (1)
during production
8.2.4 Attacks and defense measures while 521 (44)
the card is in use
9 Quality Assurance and Testing 565 (32)
9.1 Card Body Tests 566 (7)
9.2 Microcontroller Hardware Tests 573 (1)
9.3 Evaluating and Testing Software 574 (24)
9.3.1 Evaluation 575 (6)
9.3.2 Test methods for software 581 (8)
9.3.3 Dynamic testing of operating 589 (8)
systems and applications
10 The Smart Card Life Cycle 597 (58)
10.1 The Five Phases of the Smart Card Life 598 (2)
Cycle
10.2 Phase 1 of the Life Cycle in Detail 600 (30)
10.2.1 Generating the operating system 600 (12)
and producing the chip
10.2.2 Producing card bodies without 612 (9)
integrated coils
10.2.3 Producing card bodies containing 621 (7)
integrated coils
10.2.4 Combining the card body and the 628 (2)
chip
10.3 Phase 2 of the Life Cycle in Detail 630 (8)
10.4 Phase 3 of the Life Cycle in Detail 638 (12)
10.5 Phase 4 of the Life Cycle in Detail 650 (2)
10.6 Phase 5 of the Life Cycle in Detail 652 (3)
11 Smart Card Terminals 655 (18)
11.1 Mechanical Properties 660 (3)
11.2 Electrical Properties 663 (2)
11.3 Security Technology 665 (2)
11.4 Connecting Terminals to Higher-Level 667 (7)
Systems
11.4.1 PC/SC 667 (4)
11.4.2 OCF 671 (1)
11.4.3 MKT 672 (1)
11.4.4 MUSCLE 672 (1)
12 Smart Cards in Payment Systems 673 (50)
12.1 Payment Transactions using Cards 674 (10)
12.1.1 Electronic payments with smart 674 (5)
cards
12.1.2 Electronic money 679 (2)
12.1.3 Basic system architecture options 681 (3)
12.2 Prepaid Memory Cards 684 (1)
12.3 Electronic Purses 685 (23)
12.3.1 The CEN EN 1546 standard 685 (16)
12.3.2 Common Electronic Purse 701 (1)
Specifications (CEPS)
12.3.3 Proton 702 (1)
12.3.4 The Mondex system 703 (5)
12.4 The EMV Application 708 (6)
12.5 The Eurocheque System in Germany 714 (9)
13 Smart Cards in Telecommunications 723 (88)
13.1 Survey of Mobile Telecommunication 727 (8)
Systems
13.1.1 Multiple-access methods 727 (3)
13.1.2 Cellular technology 730 (2)
13.1.3 Cell types 732 (1)
13.1.4 Bearer services 733 (2)
13.2 The GSM System 735 (54)
13.2.1 Specifications 737 (3)
13.2.2 System architecture and components 740 (1)
13.2.3 Important data elements 741 (4)
13.2.4 The subscriber identity module 745 (41)
(SIM)
13.2.5 General Packet Radio System (GPRS) 786 (1)
13.2.6 Future developments 787 (2)
13.3 The UMTS System 789 (5)
13.4 Microbrowsers 794 (8)
13.5 The Wireless Identification Module 802 (2)
(WIM)
13.6 Public Card Phones in Germany 804 (7)
14 Sample Applications 811 (32)
14.1 Contactless Memory Cards for Air Travel 811 (3)
14.2 Health Insurance Cards 814 (5)
14.3 Electronic Toll Systems 819 (3)
14.4 Digital Signatures 822 (11)
14.5 The PKCS #15 Signature Application 833 (7)
14.6 The FINELD Personal Identification Card 840 (1)
14.7 Tachosmart 840 (3)
15 Application Design 843 (54)
15.1 General Information and Characteristic 843 (7)
Data
15.1.1 Microcontrollers 843 (3)
15.1.2 Applications 846 (2)
15.1.3 System considerations 848 (2)
15.1.4 Compliance with standards 850 (1)
15.2 Formulas for Estimating Processing 850 (8)
Times
15.3 Timing Formulas for Typical Smart Card 858 (2)
Commands
15.4 Typical Command Processing Times 860 (4)
15.5 Application Development Tools 864 (4)
15.6 Analyzing an Unknown Smart Card 868 (2)
15.7 Life-Cycle Models and Process Maturity 870 (15)
15.7.1 Life-cycle models 874 (8)
15.7.2 Process maturity 882 (3)
15.8 The Course of a Smart Card Project 885 (1)
15.9 Design Examples for Smart Card 886 (11)
Applications
15.9.1 An electronic purse system for 888 (2)
arcade games
15.9.2 Access control system 890 (4)
15.9.3 Testing the genuineness of a 894 (3)
terminal
16 Appendix 897 (170)
16.1 Glossary 897 (88)
16.2 Related Reading 985 (1)
16.3 Literature 985 (9)
16.4 Annotated Directory of Standards and 994 (36)
Specifications
16.5 Coding of Data Objects 1030(2)
16.5.1 Data objects compliant with 1030(1)
ISO/IEC 7816-4
16.5.2 Data objects compliant with 1031(1)
ISO/IEC 7816-6
16.5.3 Data objects for chip 1032(1)
manufacturers as specified by ISO/IEC
7816-6
16.6 Registration Authorities for RIDS 1032(1)
16.7 Selected RIDs 1032(1)
16.8 Trade Fairs, Conferences and 1033(1)
Conventions
16.9 World Wide Web Addresses 1034(10)
16.10 Characteristic Data and Tables 1044(23)
16.10.1 ATR interval 1044(1)
16.10.2 ATR parameter conversion tables 1044(2)
16.10.3 Determining the data transmission 1046(1)
rate
16.10.4 Sampling times for serial data 1046(1)
16.10.5 The most important smart card 1047(4)
commands
16.10.6 Summary of utilized instruction 1051(2)
bytes
16.10.7 Smart card command coding 1053(3)
16.10.8 Smart card return codes 1056(2)
16.10.9 Selected chips for memory cards 1058(2)
16.10.10 Selected microcontrollers for 1060(7)
smart cards
Index 1067