throbber

`
`|
`
`|
`IN THE UNITED STATES PATENT AND TRADEMARKOFFICE
`oat
`|
`
`el
`|
`PATENT
`
`in re Application of
`Romain PALMADE
`Serial No. 10/471,883
`
`: Atty. Docket: 00-RO-379
`: Group Art Unit: 2876
`: Confirmation No. 9579
`
`.
`
`‘Examiner: Daniel A. Hess
`Filed: September 12, 2003
`For: CONTACTLESS IC CARD WITH OPERATING SYSTEM USED IN CONTACT TYPE CARDS AND
`READER FOR SUCH CONTACTLESS CARDS
`
`INFORMATION DISCLOSURE STATEMENT
`
`“Mail Stop Amendment
`COURTESY COPYof IDS with 4 non-US references;
`Commissionerfor Patents
`previously sent along with Petition to Withdraw from
` ‘
`P.O. Box 1450
`Issue and RCE faxed to MS 313(c) on May3, 20
`Alexandria, VA 22313-1450
`rind
`
`Mariah Moorhead
`/
`
`SIR:
`
`The attached Form PTO-1449 providesa listing of information which maybe relevant to the subject
`application. This IDS is not intended as a representation that better art is not available, nor that other art than
`thatidentified exists; nor that the information providedis prior art; nor that a search has been made.
`
`This IDS is submitted under:
`—XX 37 CFR 1.97(b) - No Fee.
`___... 37 CFR 1.97(c) - No Fee, with Certification.
`____. 37 CFR 1.97(c) - Fee.
`___.. 37 CFR 1.97(d) - Fee, Certification & Petition.
`
`The Commissioner is authorized to charge any required fees under 37 CFR 1.17(p) and (i) (1) to
`
`Deposit Account No. 50-1556.
`
`‘
`
`Date:
`
`: od 00 b
`
`FLEIT, KAIN, GIBBONS, GUTMAN, BONGINI & BIANCO P.L.
`551 NW 77th Street, Suite 1114
`BocaRaton, Florida 33487
`Telephone: (561) 989-981 1
`Facsimile : (561) 989-9812
`
`
`
`Apple Ex. 1029, p. 1
`Apple Ex. 1029, p. 1
` Apple v. Fintiv
`Applev. Fintiv
`IPR2020-00019
` IPR2020-00019
`
`

`

`
` U.S. Dept. of Commerce|Atty. Docket: 00-RO-379
`Serial No. 10/471,883
`
`Patent & Trademark Office
` Applicant: Romain PALMADE
`.
`of Documents
`Group: 2876
`
`
`
`
`Filing Date,if
`
`ist
`
`Filing Date: September 12, 2003
`
`\y
`\
`
`applicable
`Number
`
`Document
`
`
`
`
`Rankl, W., et al., “Handbuch der Chipkarten,” 3, vdllig Uberarb. und erw. Aufl., MGnchen, Wien, Hanser, 1999,
`http:/Awww.hanser.de, ISBN 3-446-21115-2
`
`“Information technology -- Identification cards -- Integrated circuit(s) cards with contacts, Part 4: Interindustry commands
`
`for interchange,” International Standard, ISO/IEC 7816-4, First edition 1995(E), pp. 1-46
`
`
`
`“(nformation technology-- identification cards -- Integrated circuit(s) cards with contacts, Part 3: Electronic signals and
`transmission protocols,” International Standard, ISO/IEC 7816-3, Second edition 1997(E), pp. 1-27
`
`ISOMEC FCD 14443-4, 2000-03-10, pp. 1-33
` “Identification cards ~ Contactless integrated circuit(s) cards ~ Proximity cards, Part 4: Transmission protocol,” Draft
`
`
`
`
`
`Date Considered: Examiner:
`
`
` include copyof this form with next communication to applicant.
` EXAMINER:Initial if reference considered, whether or not citation is in conformance with MPEP 609; Drawline through citation if not in
`conformance and not considered.
`
`
`
`|
`
`i
`Apple Ex. 1029, p. 2
`Apple Ex. 1029, p. 2
` Apple v. Fintiv
`Applev. Fintiv
`IPR2020-00019
` IPR2020-00019
`
`

`

`
`|I
`
`|
`
`BEST AVAILABLE COPY
`INTERNATIONAL
`STANDARD |
`
`(os)
`ISO/IEC
`7816-4
`
`First edition
`1995-09-01
`
`——SSESSESS
`
`Information technology — Identification
`cards — Integrated circuit(s) cards with
`contacts —
`
`Part 4:
`Interindustry commandsfor interchange
`
`Technologies ce l'information — Cartes d'identification — Cares 4
`Cis) INegrais) a toniacz:s —
`Partie 4: Commandes intersectorielles pour les échanges
`
`
`
` Reference number
`
`_
`ot
`~~ wt
`.
`.
`ate
`*
`Trad VecviobStigung It. vark iSc-Geawmnmigung
`
`ISOAEC 7816-4:19951E}
`
`Apple Ex. 1029, p. 3
`Apple Ex. 1029, p. 3
` Apple v. Fintiv
`Applev. Fintiv
`IPR2020-00019
` IPR2020-00019
`
`

`

`ISO/IEC 7816-4: 1995 (E)
`
`Contents
`
`FOPOWOIG o.cceceeccsseeeeeerenseeeecerecesesesseuteranensrenssenaatsenennatmeens
`
`UMUTODUCRION oes eeceeeseceeseeseessecentsssennterecscuseses seesnenescaes eeseearseosesnsanercananacsesenstsee
`
`
`Po
`
`SCOPE ooo c cece rcteteeeeseseceteeneensnes ooneersnepestsenesenesenenenenerantisnersneneaasaventeneesaneeres
`
`QZ Normanve references oo.cpecesnesssnescnnnesesneeutsernserspsesrseeerereessnsseeeies
`
`3. Definit:ans
`
`4 Abbreviations ard Notation 20.0... eceerresteseceremecneaannennaeceees
`3
`BK Basic OFGAMIZIVOMS «.....eenseersesesseesennensenerencsteetenescescenneeacsneesnasentceeaetare testes
`3
`5.1
`Dla SULTLUSES .0.-ceesseresers
`
`6
`5.2
`Securrty erchizecture of the ca
`7
`5.3
`“POU message structure
`seeceee teeeesscteeteessennenseentans
`
`5.4
`fading conventions fer command headers,
`g
`sata fielts ara response wailers ....
`wee
`12
`Logical cnannets |...
`5.5
`
`2
`5.6
`Secure messaging ...
`GB Basic mterindustry COMMAMNAS q........esssesereneeenreneecerereerees receeneeereeaeenansnens 16
`
`atttetsserseesaneeee
`READ BIRARY command .......ccse-
`6.1
`16
`WRITE BsARY command ..
`6.2
`.
`
`UPDATE SINARY command
`6.3
`7
`SRASE BINARY command.....
`6.4
`18
`
`
`READ RELDACIS) command .
`6.5
`2
`
`WRITE RETOND command .
`6.6
`20
`
`
`APPEND SSCGAO command .
`6.7
`a
`
`UPDATE SECCRD command .
`6.8
`22
`
`ET DATS command .....
`6.3
`23
`
`SUT DATS command ..
`6.10
`24
`
`SELECT =LE command .
`6.11
`25
`SERUFY STITANG q... 2... eee reseeetneeennee
`6.12
`26
`6.13
`‘NTERN2. ALTHENTICATE command ..
`2?
`6.14°
`EXTERNS. AUTHENTICATE command...
`27
`GET CHA.LENGE commana...........
`6.15
`28
`
`29
`6.16
`MANAGE CHANNEL command ..
`
`7. Transmussion-onented interindustry commands
`7.4
`GET RESPONSE command.....
`
`ENVELOPE commanda .........-
`7.2
`
`Historical DYTES «2.0... seeeeseersersenreeneerctee sees crseneranenenen taaeansanenedeve cesessornsearsseones
`31
` Application-independent card services ........
`
`
`
`'
`
`'
`i
`
`Annexes
`Transportation of APOU messages by T=0 ...
`Transportation of APDU messages by T=1
`
`Record POINTES MANAGEMENT ........-cnccceserertereersereeee”
`Use of the basic encoding rules of ASN.1 .....-..---.----
`Examples of card profiles .....
`;
`Use of secure messaging ....
`
`amoamp
`
`
`
`
`
`
`© ISONEC 1995
`
`All. rights reserved. Uniess otherwise specified, no part of this publication may be
`reproduced or utilized in any form or by sny means, electronic or mechanical, inctuding
`photocopying and microfilm, without parmission in writing trom the publisher.
`ISOAEC Copyright Otlice * Case Postale 56 © CH-1211 Genéve 20.¢ Switzerland
`Printed in Switzerland
`
`Apple Ex. 1029, p. 4
`Apple Ex. 1029, p. 4
` Apple v. Fintiv
`Applev. Fintiv
`IPR2020-00019
` IPR2020-00019
`
`

`

`
`
`
`
`© ISOAEC
`
`ISO/IEC 7816-4: 1995 (E)
`
`Foreword
`
`tSO (the International Organization for Standardization) and |EC {the
`International Electrotechnical Commission) form the specialzed systemfor
`worldwide standardization. National bodies that 2°e members of ISO or IEC
`participate in the development of International Siansards tnrough technical
`committees established by the respective organizatio~ to dea: with particular
`fields of technical activity. [SO and {EC technical committees collaborate in
`fields of mutual interest. Other internationa! organiza:.ons, governmental and
`non-governmental, in liaison with ISO and IEC, also taxe part in the work.
`
`!SO and !EC have established a joint
`In the field of information technology,
`technical committee, ISOAEC JTC 1. Draft imernational Standards adopted by
`the joint technical commitiee are circulated to. national bodies for voting.
`Publication as an International Standard requires approval by at least 75 % of
`the nationat bodies casting a vote.
`
`International Standard ISO/IEC 7816-4 was prepered by Joint Technical
`Committee ISO/IEC JTC 1. information technology.
`
`(ISO/IEC 7816 consists of the following. parts, under the general title Informa-
`tion technology — Identification cards — Integratec circuit/s) cards with
`contacts.
`
`— Part}: Physical characteristics,
`-~ Part 2: Dimensions and location of the contacts,
`— Part 3: Electronic signals and transmissior pretocols,
`~~ Pant 4:
`interindustry commands for interchange,
`— Part 5: Numbering system and registration procedure for application
`identifiers,
`.-
`_
`— Part G:
`
`Interindustry data elements.
`
`Annexes A and B form anintegral part of this pait of [SO/EC 7816. Annexes C,
`O, E and F are for information only.
`
`Apple Ex. 1029, p. 5
`Apple Ex. 1029, p. 5
` Apple v. Fintiv
`Applev. Fintiv
`IPR2020-00019
` IPR2020-00019
`
`

`

`ISO/IEC 7816-4: 1995 (E}
`
`@ISONEC
`
`
`
`Introduction
`
`.
`
`This pat of ISO/IEC 7816 is one of a series of standards describing the
`pavameters for integrated circuits) cards with contacts and the use of such
`cards fc- international interchange.
`,
`
`These cards are identification cards intended for information exchange nego-
`tiated beiween the outside and the integrated circuit in the card. As a resutt of
`an information exchange, the card delivers information {computation results.
`sicred czia), anz/or modifies its content (data storage, event memorization).
`
`Apple Ex. 1029, p. 6
`Apple Ex. 1029, p. 6
` Apple v. Fintiv
`Applev. Fintiv
`IPR2020-00019
` IPR2020-00019
`
`
`
`

`

`
`
`
`
`ISO/IEC 7816-4: 1995 (E)
`“INTERNATIONAL STANDARD © ISONEC
`
`
`Information technology — Identification cards
`— Integrated circuit(s) cards with contacts —
`
`Part 4:
`‘ Interindustry commands for-interchange
`
`1 Scope
`_g) This part of ISO/IEC 7816 specifies
`— the content of the messages, commands and res-
`ponses, transmitted by the interface device to the
`card and conversely.
`—the structure and content of the historical bytes
`sent by the card during the answerto reset,
`—the structure of files and data, as seen at the
`interlace when processing interindustry commands
`for interchange,
`= access methods to files and data in the card,
`— 8 security architecture defining access rights to
`files and data in the card,
`— methods for secure messaging.
`= access methods to the algorithms processed by
`the card. It does not describe these algorithms.
`
`It does not cover the internal implementation within the
`card and/or the outside world.
`
`tt allows further standardization of additional interindustry
`commands and security architectures.
`
`2 Normative references
`
`The following standards contain provisions which,
`through reference in this text, constitute provisions of this
`part of ISO/IEC 7816. At the time of publication,
`the
`editions indicated were valid. All standards are subject to
`revision, and parues to agreements based on this par of
`ISO/IEC 7816 sre encouraged to investigate the possibility
`of applying the most recent editions of the standards
`indicated below. Members of
`|EC and ISO maintain
`registers of currently valid Internationa! Standards.
`ISO 3166: 1993, Codes for the representation of names:
`of countries.
`
`ISONEC 7812-1 : 1993, Identification cards — Identification
`of issuers — Part 1: Numbering system.
`
`ISONEC 7816-3 : 1989, Identification cards — Integrsted
`circuit(s) cards with contacts — Part 3: Electronic signals
`and trensmission protocols.
`
`Amendment 1:1982 to {SO/IEC 7816-3 : 1989, Protocol
`type T=1, asynchronous half duplex block transmission
`protocol.
`
`Apple Ex. 1029, p. 7
`Apple Ex. 1029, p. 7
` Apple v. Fintiv
`Applev. Fintiv
`IPR2020-00019
` IPR2020-00019
`
`
`
`

`

`
`
`
`
`
`
`. ISO/IEC 7816-4: 1935 {E)
`
`@ISOMEC
`
`Amendment2: 1994 to ISO/IEC 7816-3: 1989, Revision
`of protocol type selection.
`.
`ISO/IEC 7816-5: 1994, identification cards — Integrated
`cireuit(s) cards with contacts —- PartS: Numbering sys-
`tem and registration procedure for application identifiers.
`ISOAEC 7816-6 :—"), Identification cards — Integrated
`circuit(s) cards with contacts — Part G: Interindustry data
`elements.
`,
`
`ISO/IEC 8825: 1990 2), Information technology — Open
`Systems Interconnection — Specification af Basic Encod-
`ing Rules for Abstract Syntax Notation One (ASN.1).
`ISO/IEC 9796: 1991, Information technology -- Security
`techniques — Digital signature scheme giving message
`recovery.
`
`ISO/IEC 9797: 1994, Information technalogy ~~ Security
`techniques — Data integrity mechanism using a crypto-
`graphic check function employing a block cipher
`algorithm.
`
`ISO/IEC 9979: 1991, Dara cryptographic techniques —
`Procedures for the registration of cryptographic algo-
`rithms.
`
`Information technology — Modes of
`ISOAEC 101161981.
`operation foran n-bit o1ock cipher algorithm.
`technology —
`ISO/IEC 10118-1: 1994,
`Information
`7: General.
`Security techniques — Hash-functions —— Part
`
`.
`
`Information technology .—
`ISO/IEC 10118-2: 1994,
`Security techniques — Hash-functions — Pan 2: Hash-
`functions using an r-dit block cipher algorithm.
`
`3 Definitions
`
`For the purposes of this part of ISO/IEC 78136, the follow-
`ing definitions apply.
`,
`
`3.1 Answer-to-Reset file: Elementary file which
`indicates operating characteristics of the card.
`
`command-response pair: Set of two messages:
`3.2
`a commandfollowed by @ response.
`
` dataunit: The smallest set of bits which can be
`3.3
`unambiguously referenced.
`
`tn this pact of ISO/IEC 7816, data objects are
`element).
`referred to as BER-TLV, COMPACT-TLV and SIMPLE-TLV data
`objects.
`
`infor-
`dedicated file: File containing file control
`3.6
`mation and, optionally, memory available for allocation. It
`may be the parent of EFs and/or DFs.
`
`OF name: String of bytes which uniquely identifies
`3.7.
`8 dedicated file in the card.
`
`directory file: Elementary file defined in part 5 of
`3.8
`ISO/IEC 7816.
`
`elementary file: Set of data units or records
`3.9
`which share the same file identifier, t cannot be the
`parent of another file.
`
`3.10 fils control parameters: Logical, structural and
`security attributes of a file.
`
`3.11 file identifier: A 2-bytes binary value used to
`address a file.
`
`3.12 file management data: Any information about 3
`file except the file control pararreters (€
`s., expiration
`date, application tabel).
`
`3.13 internal elementary file: Elemeciary file tor
`storing data interpreted by the cara
`
`3:14 master file: The manda:or. unique dedicated file
`representing the root of the file structure.
`
`3.15 message: Suing of bytes transmitted by the
`interface device to the card or vice-versa, excluding
`transmissior-oriented characters as defined in part 3 of
`ISO/IEC 7816.
`
`3.16 parent file: The dedicated file immediately pre-
`ceding a given file within the hierarcny.
`
`3.17 password: Data which may be required by the
`application 10 be presented to the ced by its user.
`
`3.18 path: Concatenation of fie identifiers without
`dehmitation.
`If the path starts win the :centifier of the
`master fite, it is an absoiute path.
`
`3.39 provider: Authority who has or who obtained the
`right to create a dedicatedfile in the card.
`
`3.20 record: String of bytes which can be handled as a
`whole by the card and referenced by a record number or
`by e record identifier.
`.
`
`data element: item of information seen at the
`3.4
`interface for which are defined 8 name, 8 description of
`togical content, a format and a coding.
`
`3.21 record Identifier: Value associated with a record
`that can be used to reference. that record. Several records
`may have the sameidentifier within an elementary file.
`
`information seen at the interface
`data object:
`3.5.
`which consists of a tag, a length and a value {i.e., @ data
`
`
`3.22 record number: Sequential number assigned to
`each record which uniquely identifies the recard within its
`elementary file.
`
`U To be published.
`2) Currently under revision.
`
`3.23 working elementary file: Elementary file for
`$toring data not interpreted. by the card.
`
`Apple Ex. 1029, p. 8
`Apple Ex. 1029, p. 8
` Apple v. Fintiv
`Applev. Fintiv
`IPR2020-00019
` IPR2020-00019
`
`

`

`
`
`For the purposesof this part of ISO/EC 7816,the follow-
`ing abbreviations apply.
`APDU
`Application protocol data unit
`ATR
`Answer to reset
`The following two types of EFs are defined.
`- BER
`Basie encoding rules of ASN.1 (see annex D)
`~~ Internal EF — Those EFs are intended for storing
`CLA
`Class byte
`data interpreted by the card, i.e., data analyzed and
`;
`used by the card for management and contro!
`BIR
`Directory
`Purposes.
`.
`.
`.
`DF
`Dedicated file
`‘— Working EF — Those EFs are intended for storing
`eF
`Elementary file
`data not interpreted by the card, i.e., data to be used
`FCI
`Fiie control information
`by the outside world exclusively.
`FCP
`File control parameter
`
`FMD Figure1illustrates an example of the logicalfile organiza-File management data
`
`) INS
`Instruction byte
`tion in a card.
`MF
`Masterfile
`P1-P2
`Parameter bytes
`PTS
`Protocol type selection
`REU
`Reserved for future use
`SM
`Secure messaging
`Swi-§.V2
`Status bytes
`TLV
`Tag. length, value
`TFOU
`Transmission protocol data unit
`
`For the purposes of this pam of ISO/IEC 7816, the follow-
`ing notation applies.
`‘O' to ‘S' and ‘A’ to ‘F’ The sixteen hexadecimal digits
`(By)
`Value of byte B,
`B.1B;
`Conceatenation of bytes B, (the most significant
`,
`ignificant
`byte) and B2 {theleast sign! icant byte)
`(B; 1&2) Value of the concatenation of bytes B, and Bz
`Number
`*
`
`5 Basic organizations
`
`5.1 Data structures
`
`This clause contains information on the logical structure
`of data as seen at
`the interface, when processing
`interindustry commands for
`interchange. The actual
`storage location of data and structural
`information
`beyond what is described in this clause are outside the
`scope of ISO/IEC 7816.
`
`. 5.1.1
`
`File organization
`
`This part of ISO/IEC 7816 supports the following two cate-
`gories offiles.
`.
`— Dedicated file (OF).
`
`— Elernemary file (EF).
`
`5.1.2
`
`File referencing methods
`
`Whena file cannot be implicitly selected, nt shall be possi-
`ble to select it by at least one of the following methods.
`.
`.
`.
`;
`— Referencing byfile identifier — Any file may be ref-
`erencedby a file identifier coded on 2 bytes. If the MF is
`referenced by a file identifier,
`‘3FOO' shall be used
`(reserved value}. The value 'FFFF'
`is reserved for future
`use. The value '3FFF’
`is reserved (see referencing by
`path).
`In order to select unambiguously any file by its
`identifier, al! EFs and OFs immediately under a given DF
`shall have different fite identifiers.
`
`— Referencing by path — Anyfile may be referenced by
`@ path {concatenation of file iderz‘fiers). The path begins
`with the identifier of the MF or of the current DF and ends
`with the identifier of the file itself. Between those two
`identifiers,
`the path consists of the identifiers of the_
`successive patent DFs if any. The order of the file
`identifiers is always in the direction parent to child. If the
`identifier of the current OF is not known, the value ‘3FFF'
`(reserved value) can be used at the beginning of the path.
`The path allows an unambiguous selection of any file
`from the MF or from the current DF.
`
`— Referencingby short EF identifier — Any EF may be
`referenced by a short EF identifier coded on 5 bits valued
`in the range from 1 to 30. The value O used as @ short EF
`identifier references the currently selected EF. Short EF
`identifiers cannot be used in a path or as a file identifier
`(e.g., in a SELECT FILE command).
`
`Apple Ex. 1029, p. 9
`Apple Ex. 1029, p. 9
` Apple v. Fintiv
`Applev. Fintiv
`IPR2020-00019
` IPR2020-00019
`
`
`
`© ISONEC
`
`ISO/IEC 7846-4; 1995 (E)
`
`The logical organization of data in a card consists of the
`following structural! hierarchy of dedicated files.
`— The OF at the root is called the master file (MF).
`The MF is mandatory.
`— The other DFs are optional.
`
`,
`
`Figure 1 — Logical file organization (exarnpte)
`
`4 Abbreviations and notstion
`
`,
`
`

`

`
`
`ISO/IEC 7816-4: 1995 (E)
`
`© ISONEC
`
`
`
`~— Referencing by DF name — Any DF may be refer-
`enced by a OF name coded on 1
`to 16 bytes.In order to
`select unambiguously by DF name (e.g., when selecting
`by means of application identifiers as defined in part 5 of
`ISO/IEC 7816}, each DF name shall be unique within a
`given card.
`
`5.1.3 Elementary file structures
`
`The following structures of EFs are defined.
`— Transparent structure — The EF ig seen at the
`intetace as a sequence of data units.
`— Facord structure — The EF is seen at the interface
`as 2 sequence ofindividually identifiable records.
`
`The following attributes are defined for EFs structured in
`records
`—— S2e of the records : eitherfixed or variable.
`— crganization of the records: either as a sequence
`. (linear structure) or as a ring (cyclic structure).
`:
`
`The ca‘2 shall support at least one of the following four
`methocs for structuring EFs.
`-- ~ransparent EF.
`~— . rear EF with records of fixed size.
`— . 7eaF file with records of vanable size.
`w= Zyvclic EF with records of fixed size.
`
`Figure z shows those four EF structures.
`Linear variable
`
`Cycle fixed
`
`6.1.4.1
`
`Record referencing
`
`Within each EF of record structure, each record can be
`referenced by a record identifier and/or by a record
`number. Record identifiers and record numbers are
`unsigned 8-bdit integers with values in the range from ‘01’
`to FE’. The value ‘00° is reserved far special purposes.
`The value ‘FF’ is RFU.
`
`induce the man-
`Referencing by record identifier shall
`agement of a record pointer. A reset of the card, a
`SELECT FLE and any command carrying a valid short EF
`identifier can affect the record pointer. Referencing by
`record number shall not affect the record pointer.
`7
`
`— Referencing by record identifier — Each record iden-
`tifier is provided by an application. If a record is a SimPLEe-
`Tiv data object in the data field of a message (see 5.4.4},
`then the record identifier is the first byte of the data
`object. Within an EF of record structure, records may
`have the same record identifier,
`in which case data
`contained in the records may be used for discriminating
`between them.
`
`Each time a reference is made witr a recors identifier, an
`indication shali specify the togice sositior of the target
`record. the frst or blast occurrences the ner* or previous
`occurrence relaive to the recard pointer.
`
`— Within each EF of linear structure, the logical posi-
`tions shall be sequentially ass gned wen writng or
`appending. 1€.,
`in the order of creation. Therefore the
`first created recard is in the firs: logical position.
`
`-~ Within each EF of cyclic structure, the logical posi-
`tions shall be sequentially assigned in the opposite
`order, i.e.. the most recently created record is in the
`first logical position.
`
`The following additional rules are defined for linear struc-
`tures and for cyclic structures.
`
`Transzarent=Linear fixed
`
`Figure 2 - EF structures
`NOTE — Tne arrow on the figure references the most recently
`written cecord.
`
`5.1.4 Data referencing methods
`
`Data may be referenced as records, as data units of as
`data ot ects. Data is considered to be stored in a single
`continuous sequence of records (within an EF of record
`structuse) or of data units {within an EF of transparent
`structure). Reference to a record or 10 3 data unit outside
`an EF is an error.
`
`Data referencing method, record numbering method and
`data unit size are EF-cependent features. The card can
`provide indications in the ATR, in the ATR file and in any
`_ file control information. When the card provides indica-
`tions in several places, the indication valid for a given EF
`is the closest one to that EF within the path from the MF
`to that EF.
`_
`
`
`
`— The first occurrence shall be the record with the
`specified identifier and in the first logica! position ; the
`last occurrence shall be the resord wr the specified
`identifier and in the tast logica! position.
`
`—~ When there is no current record, the next occur-
`rence shall be equivaient to the first occurrence; the
`previous occurrence shai: be equivalent to the last
`eccurrence.
`
`— Whenthere is a current record, the next occur-
`rence shali be the closest record with the specified
`identifier but in a greater logical position than the cur-
`rent record; the previous occurrence shall be the
`closest record. with the specified identifier but in a
`smaller logica! position than the current record.
`
`— The value ‘00° shall refer to the first, last, next or
`previous record in the numbering sequence, indepen
`dently from the record identifier.
`
`Apple Ex. 1029, p. 10
`Apple Ex. 1029, p. 10
` Apple v. Fintiv
`Applev. Fintiv
`IPR2020-00019
` IPR2020-00019
`
`

`

`
`
`- @ ISOJEC
`
`ISO/IEC 7816-4; 1995 (E)
`
`— Referencing by record number — Within each EF of
`record structure, the record numbers are unique and
`sequential.
`
`— Within each EF of linear structure, the record num-
`bers shall be sequentially assigned when writing or
`appending,i.e., in the order of creation. Therefore the
`first record (record number one, # 1)
`is the first
`created record.
`
`— Within each EF of cyclic structure, the record num-
`bers shall be sequentially assigned in the opposite
`order, i.e., the first record (record number one, # 1) is
`the most recently created record.
`
`The following additional rule is defined for linear struc
`tures and for cyclic structures.
`
`— The value ‘00° shall refer to the current record, i.e.,
`that record fixed by the record pointer.
`
`5.1.4.2 Data unit referencing
`
`Vvithin eacr, EF of transparent structure, each data unit
`can be 're*erences by an offset (e.g..
`in READ BINARY
`command. see 6.1!.
`It
`is an unsigned integer, limited to
`either & of 15 bits accarding to an option in the respective
`command. Valued to O for the first data unit of the EF, the
`offset is inzsemented by 1 for every subsequen: data unit.
`
`if the card gives no indication, the size of
`By default, i.e.,
`the: dataunit is one byte.
`NOTES
`
`An EF of record structure may support data unit referencing
`1
`and, in case it does, dats units may contain structural intorma-
`tion along v.th data, e.g., record numbers in a linear structure.
`
`2 Within an EF of record structure, data uni referencing may
`nat provide the intended result because the storage order of
`the records :- the EF 1s mot known, e€.g.. Storage order in a cyclic
`Structure.
`
`5.1.4.3' Data object referencing
`
`Each data object (es defined in 5.4 4) is headed by a tag
`which references it. Tags are specified in this part and
`other parts of ISO/IEC 7816.
`
`
`
`5.1.5
`
`File contro! information
`
`Thefile control information (FC) is the string of data bytes
`available in response to a SELECT FILE command. Thefile
`control information may be present for any file.
`
`Table 1 introduces 3 templates intended for conveying file
`control information when coded es BER-TLY data objects.
`— The FCP template is intended for conveying file .
`contro! parameters (FCP),
`i.e., any BEAR-TIV data |
`objects defined in table 2.
`
`—~ The FMD temniate is intended for conveying file
`management data (FMO},
`i.e., BER-NV data objects
`specified in other clauses of this part or in other pasts
`of ISO/IEC 7816 (e.9.. application label as defined in
`pan and application expiration date as defined in
`part
`6).
`~— The FCi template is intended for conveying file
`control parameters and file management data.
`
`Table 1 — Templates relevant to FC!
`
`F 2 conrol infermaten ‘Flt resp etet
`
`Fue
`control parameters i
`F ¢ ~anagemen: azze ("4D temz.zte}
`
`The 2 temp'ztes may be Tetraves according te selection
`options of tre SELECT FILE commend (See table 59).
`If the
`FCP or FMD option is set.
`tnen the use of the corre-
`sponding template is mandatory.!f the FCI option is set,
`then the use of the FCi template is optional.
`
`Part of the file control information may additionally be
`Present in @ working EF under control of an application
`and referenced under tag ‘87°. The useof the FCP or FCI
`template is mandatory for the coding of
`file control
`information in such an EF.
`
`File contro! information not coded according to this part
`of ISO/IEC 781€ may be introauced as follows.
`— ‘00° or any value higher than '9F’ — The coding of
`the subsequentstring of bytes is proprietary.
`— Tag = ‘53° — The value field of
`the data object
`consists of discretionary cata not coded in TLV.
`— Tag = ‘73"— The value field of
`the data object
`we
`consists of discretionary 8&A-"Lw data objects.
`
`Apple Ex. 1029, p. 11
`Apple Ex. 1029, p. 11
` Apple v. Fintiv
`Applev.Fintiv
`IPR2020-00019
` IPR2020-00019
`
`

`

`
`
`ISO/IEC 7815-4: 1995 (E)
`
`© IsonEC
`
`Table 2 — File contro! parameters
`
`Transperen
`t EFs
`
`
`
`5.2 Security architecture of the card
`
`This clause describes the following features:
`— security status,
`— secunty attributes,
`— security mechanisms.
`
`Security attributes are compared with the security statu:
`to execule Commands and/or to accessfiles.
`:
`
`5.2.1
`
`Security status
`
`
`Number of date bytes
`
`
`in the file, excluding
`
`
`structural information
` Number of data bytes
`
`
`in the file, including”
`
`
`structural information if any
`
`
`File descriptor byte
`Anyfile
`(see table 3!
`
`
`
`Any file
`File descriptor byte tollowed
`
`by date coding byte
`(see table 86)
`
`
`EFs with
`File descriptor byte followed
`
`
`record
`by data coding byte and
`Security status represents the current state possibly
`
`
`maximum record length
`structure
`
`achieved after completion of
`,
`
`
`aay fe
`
`— answer to reset {ATR} and possible protoco! type
`rorreneO
`selection (PTS) and/or
`Proprietary information
`—a single command or a sequence of commands,
`possibly performing authentication procedures.
`Security attributes |
`
`
`(coding outside the scope
`of this pan of tSOAEC 7816)
`loentiber Gf an EF containing
`ar exie7sion.of the FC!
`
`
`
`
`
`Anyfile
`
`Any file
`
`|
`
`peopeee#a
`
`File accessibility
`— Not shareable file
`~— Shareable file
`
`File type
`— Working EF .
`
`proprieary
`types
`of EFs
`— DF
`
`EF structure
`-— No informauon given
`— Transparent
`— Linear fixed, no further info
`= Linear fixed, SIMPLE-TLY
`— Linear variable. no further info
`-— Linear variable, SIMPLE -TLV
`— Cyclic. no further info
`— Cyciic. SIMPLE-TLV
`
`~~OO--a0x
`
`“OOO
`
`wtet
`
`taeuenee
`
`Cree|
`
`The security status may also resu': from the completion
`of a security procedure related to the ident:‘:cation of the
`Involved entities if any, e.g...
`.
`
`— by proving the knowledge of a pessword te.g.,
`using @ VERIFY Command).
`— by proving the knowledge c‘ a key €.g.,
`GET CHALLENGE
`commanc
`follov.ed
`EXTERNAL AUTHENTICATE Command).
`—by secure messaging (e.g.. message authenti-
`cation).
`
`using a
`by
`an
`
`Three security statuses are considered.
`
`~~ Globa! security status -— it may be modified by the
`completion of an MF-retated authenticaton procedure
`{e.g., entity authentication by 6 password or by a key
`attached to the MF).
`
`— File-specific security status — H may be modified
`by the cormoletion of a DF-retaced authenticatic: pro-
`cedure {e.g., entity authentication by @ password or
`by 8 key attached to the specific DF) ; it may be main-
`tained, recovered or fost by file selection (see 6.10.2):
`this modification may be relevant only for the applica-
`tion to which the authentication procedure belongs.
`
`~~ Command-specific security status — It only exists
`during the execution of a command involving authen-
`tication using secure messaging (see 5.6}; such a
`command may leave the other security status
`unchanged.
`
`{f the concept of logical channels is applied, the file specific
`security status may depend on the logical channel {see
`5.5.1).
`
`Apple Ex. 1029, p. 12
`Apple Ex. 1029, p. 12
` Apple v. Fintiv
`Applev.Fintiv
`IPR2020-00019
` IPR2020-00019
`
`

`

`
`
`‘© ISOAEC
`
`ISO/IEC 7816-4: 1995 (E)
`
`6.2.2
`
`Security attributes
`
`8.3 APDU messagestructure
`
`The security attributes, when they exist, define the
`allowed actions and the procedures to be performed to
`complete such actions.
`
`Security attributes may be associated with each file and
`for the security conditions that shall be satisfied to allow
`operations on the file. The security attributes of a file
`dapend on
`
`— its category (DF or EF),
`
`-~ optional parameters in its file control information
`and/or in that of its parent filets).
`
`A step in an application protocol consists of sending a -
`command, processing it
`in the receiving entity and
`sending back the response. Therefore 6 specific response
`corresponds to eB specific command, referred to as a
`command-tresponse pair.
`
`An application protocol data unit (APDY) contains either a
`command message or a fesponse message, sent from
`the interface device to the card or conversely.
`:
`
`In a command-responsepair, the command message and
`the response message may contain data, thus inducing
`four cases which are summiarizec by table 4.
`
`NOTE — Security attributes may aiso be associated to other
`Table 4 — Data within a command-teszponse palr
`objects ie.g.. keysi.
`
`[Gene|Commanddata|Expectedreeponvegate]
`No data
`No data
`Data
`
`5.2.3 Security mechanisms
`
`Trs pet of ISCIEC 7816 defines the following security
`mechernsms.
`
`Data
`
`— Entity authentication with password — The card
`cimsa°es deta received from the outside world with
`seér7et interne: data. This mechanism may be used for
`porecting 1-2 nghts of the user.
`
`— Entity authentication with key — The entity to be
`accrenticated has to prove the knowledge of
`the
`reevant key in an authentication procedure (e.g.,
`uSs:ng & GET CHALLENGE command followed by an
`E)"ERNAL AUTHENTICATE Command).
`
`— Data authentication — Using internal data. either
`secret or public,
`the card checks redundant data
`r

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket