throbber

`
`'
`
`I;
`
`In re Application of
`
`Romain PALMADE
`Serial No. 10/471,883
`
`4‘
`
`A
`
`4
`
`/
`
`.
`I
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`I
`
`Dim/(o
`PATENT
`
`5
`
`.
`
`: Atty. Docket: OO-RO~379
`
`: Group Art Unit: 2876
`: Confirmation No. 9579
`
`:Examiner: Daniel A. Hess
`Filed: September 12, 2003
`For: CONTACTLESS IC CARD WITH OPERATING SYSTEM USED IN CONTACT TYPE CARDS AND
`READER FOR SUCH CONTACTLESS CARDS
`.
`
`INFORMATION DISCLOSURE STATEMENT
`
`'Mail Stop Amendment
`Commissioner for Patents
`
`PO. Box 1450
`
`Alexandria, VA 22313—1450
`
`SIR:
`
`COURTESY COPY of ms with 4 non-US references i
`previously sent along with Petition to Withdraw from‘I
`Issue and RCE faxed to MS 313(c) on May 3, 20
`
`
`M
`
`
`
`Mariah Moorhead
`
`The attached Form PTO-1449 provides a listing of information which may be relevant to the subject
`
`application. This IDS is not intended as a representation that better art is not available, nor that other art than
`
`that identified exists; nor that the information provided is prior art; nor that a search has been made.
`
`This IDS is submitted under:
`
`__)_(_X__ 37 CFR1.97(b)- No Fee.
`_____ 37 CFR 1.97(c)_- No Fee, with Certification.
`__ 37 CFR 1.97(c) — Fee.
`____ 37 CFR 1.97(d) — Fee, Certification & Petition.
`
`The Commissioner is authorized to charge any required fees under 37 CFR 1.17(p) and (i) (1) to
`
`Deposit Account No. 50-1556.
`
`'
`
`Date:
`
`I ; Xéjflé
`
`FLEIT, KAIN, GIBBONS. GUTMAN, BONGINI & BIANCO P.L.
`551 NW 77th Street, Suite 111
`BocaRaton, Florida 33487
`Telephone: (561) 989-9811
`Facsimile : (561)989-9812
`
`
`
`Apple Ex. 1029, p. 1
`Apple Ex. 1029, p. 1
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`
`
`
`
`US. Dept. of Commerce
`Patent & Trademark Office
`
`Atty. Docket: 00420-379
`Serial No. 10/471383
`
`.
`Applicant: Romain PALMADE
`Group: 2876
`Filing Date: September 12, 2003
`
`
`' f Documents
`
`
`
`'
`
`Sub-
`class
`
`Transl'n Yes/No
`
`
`
`
`
`
`
`
`
`
`
`
`OTHER DOCUMENTS (Including Author, Title. Date, Pertinent Pages. Etc.)
`
`‘
`
`Rankl, W., et aI., "Handbuch der Chipkarten," 3, vollig tiberarb. und erw. Aufl., Mtinchen. Wien, Hanser. 1999,
`httQ://www.hanser.de, ISBN 3-446—21115—2
`
`“Information technology -— Identification cards -— Integrated circuit(s) cards with contacts, Part 4: Interindustry commands
`for interchange,‘ International Standard. ISO/IEC 7816-4, First edition 199502), pp. 1-46
`
`“information technology -. Identification cards -— Integrated circuit(s) cards with contacts, Part 3: Electronic signals and
`transmission protocols." International Standard. ISO/IEC 7816-3, Second edition 1997(E), pp. 1-27
`
`Include copy of this form with next communication to applicant.
`
`“Identification cards ~ Contactless integrated circuitis) cards — Proximity cards. Part 4: Transmission protocol,” Draft
`ISO/IEC FCD 14443-4, 2000-03-10, pp 1-33
`
`
`Examiner:
`
`Date Considered:
`
`Initial if reference considered, whether or not citation is in conformance with MPEP 609; Draw line through citation if not in
`EXAMINER:
`conformance and not considered.
`
`I
`
`I
`
`Apple Ex. 1029, p. 2
`Apple Ex. 1029, p. 2
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`
`}t
`
`BEST AVAILABLE COPY
`
`- @
`
`INTERNATIONAL
`STANDARD ,
`
`Iso/IEC
`7816-4
`
`.
`
`First cation
`199509-01
`
`m
`
`Information technology — Identification
`cards — Integrated circuifls) cards with
`contacts —
`
`Part 4:
`-
`Interindustry commands for interchange
`
`Technologies c‘e l'in/ormazion — Canes d'idenrificarion —— Carts: é
`circa-:13; ime'grea's; a :anrac:s —-
`
`Fame 4: Commandes inrersectorielles pour les e'changes
`
`
`
`
`
`.
`
`‘ -'.--~——.
`‘
`
`Reierence number
`_ ISOflEC 78164:199515)
`.'
`pl.
`('5
`.
`.
`.A.
`.
`-'~'«:.;C~\.'esrr::‘!z;;:mgung it. vorl. :SQ—wenmfi-tgung
`
`Apple Ex. 1029, p. 3
`Apple Ex. 1029, p. 3
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`ISO/IEC 7816-4: 1595 (E)
`
`Contents
`
`Foreword . .. .
`
`. ..
`
`Introduction
`
`1 Scope
`
`2 Normazwe references
`
`............................................................
`
`3 Definitzens
`
`
`
`4 Abbrevmions and notation ......................................................
`
`
`5 Basic organizations ....................................................................................
`5.1
`Data strhaures
`
`Securrty grchltecture ol the ca
`5.2
`
`5.3
`APDU message structure
`
`Coding :envennons for command headers.
`5.4
`care fiel:s ar-o response trailers
`.
`,
`Logical cnannels
`
`Secure messaging
`
`5.5
`5.6
`
`3
`3
`5
`7
`
`9
`12
`12
`
`
`
`
`6 Basic interindusrry commands .................................................................. 16
`
`6.1
`READ BlhARY command ................
`.
`.
`16
`Lynn's BlfiAR‘.’ command ..
`6.2
`17
`
`UPDATE EINARY command
`6.3
`17
`ERA-SE 8:'-'ARY command .....
`6.4
`18
`
`
`HEAD REIDRmSl command .
`6.5
`19
`
`WRITE R=ZOHD command .
`6.6
`20
`APFEND scoao command .
`6.7
`21
`
`
`:Poars "CCRD command .
`6.8
`22
`
`EET DA.- command .....
`6.9
`23
`
`PUT DAT: :ommand ..
`6.10
`24
`
`command .
`6.11
`SELECT =".
`25
`..........
`6.12
`.EmFY ::mI-.and
`26
`6.13
`‘NTERNL- AUTHENTICATE command ..
`27
`6.1"
`EXTERM. AUTHENTICATE command
`27
`GET CHAcLENGE command ..........
`6.15
`23
`
`6.16
`MANAGE CHANNEL command ..
`29
`'1 Tl’ansf'flISSth-Oflenled interindustry commands
`
`7.1
`GET RESPONSE command .....
`
`7.2
`ENVELOPE commend
`
`
`
`
`8 Historical bytes .............
` 9 Aoplicatiomindependen‘l card services
`
`Annexes
`
`Transportation of APDU messages by T20
`Transportation of APDU messages by T=1
`fiecoro pointer management
`Use at the basic encoding rules of ASN.1
`Examples of card profiles
`.
`Use of secure messaging
`
`mmonu>
`
`
`
`
`. .
`
`.
`
`
`
`
`
`O lSO/lEC 1395
`
`All rights reserved. Unless otherwise specified. no Pl“ 0? INS Publication may be
`reproduced or utilized in any lorm or by any means. electronic or mechanical, lndudino
`photocopying and microfilm, without permission in writing lrorn the publisher.
`ISO/IEC Copyright Office 0 Case Post-Io 56 0 04-12! l Geneva 20 0 Switzerland
`Printed in Switzerland
`
`Apple Ex. 1029, p. 4
`Apple Ex. 1029, p. 4
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`
`
`
`
`O ISO/IEC
`
`ISO/IEO 7816-4: 1995 (E)
`
`Foreword
`
`ISO (the International Organization Ior Standardization) and IEC (the
`International Electrotechnical Commission) form the specialized system Ior
`worldwide standardization. National bodies that we members of ISO or IEC
`participate in the development or‘ International Starcards tnrough technical
`committees established by the respective organizatio- to Goa; with particular
`fields oI technical activity. ISO and IEC technical committees collaborate in
`Iields of mutual interest. Other international organizatons. governmental and
`non-governmental, in liaison with ISO and lEC. also tare part in the work.
`
`ISO and IEC have established a joint
`In the field of information technology.
`technieal committee. ISOIIEC JTC 1. Draft International Standards adopted by
`the joint technical committee are circulated to- national bodies for voting.
`Publication as an International Standard requires approval by at least 75 96 of
`the national bodies casting a vote.
`
`International Standard ISO/IEC 7816-4 was prepared by Joint Technical
`Committee ISO/IEC JTC 1. Information technology.
`
`ISO/lEC 7816 consists of the lollowing. parts. under the general title Informa-
`tion technology — Identification cards —- Integrated circuirlsl cards with
`contacts.
`
`—Pan 1: Physical characteristics.
`-- Part 2: Dimensions and location of the contacts.
`—- Part 3: Electronic Signals and transmission protocols.
`-— Pan 4 .'
`lnterindustry commands for interchange,
`— Part 5 .' Numbering system and registration procedure for application
`identifiers.
`-
`'
`‘-
`— Part 5:
`
`lnterindustry data elements.
`
`Annexes A and 8 form an integral part of this pait oi ISO/IEC 7816. Annexes C,
`D. E and F are for information only.
`
`Apple Ex. 1029, p. 5
`Apple Ex. 1029, p. 5
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`ISO/IE6 7816-4: 1995 (E)
`
`O [SO/IEC
`
`‘
`
`.
`
`
`
`Introduction
`
`,
`
`This pa't of ISO/IEC 7816 is one of a series 01 standards describing the
`pa'ameters for integrated circuitlsl cards with contacts and the use of such
`ca'ds 1:" international intetchange.
`'
`
`These cards are identification cards intended for iniormation exchange nego-
`tiated between the outside and the integrated circuit in the card. As a result of
`an information exchange. the card delivers information (computation results.
`st: :ed zeta). aha/or modifies its content (data storage. event memorization).
`
`
`
`Apple Ex. 1029, p. 6
`Apple Ex. 1029, p. 6
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`
`
`
`
`use/rec 7818-4: 1995 (El
`‘ulrr'enmnomtt STANDARD 0 Isonsc
`
`
`identification cards
`Information technology —
`._ Integrated circuitis) cards with contacts —-
`
`Part 4:
`lnterindustry commands for interchange
`
`
`
`1 Scope
`
`_ > This part of ISO/IEC 7816 specifies
`--the content at the messages. commands and res-
`ponses, transmitted by the interface devrce to the
`card and conversely.
`—the structure and content of the historical bytes
`sent by the card during the answer to reset.
`—the structure of files and data. as seen at the
`intertace when processing interindustry commands
`for interchange,
`-- access methods to files and data in the card.
`
`--—a security architecture defining access rights to
`tiles and data in the card.
`—methods for secure messaging.
`—acoess methods to the algorithms processed by
`the card. It does not describe these algorithms.
`
`It does not cover the internal implementation within the
`card and/or the outside world.
`
`It allows further standardization of Idd'ttionai interindustry
`commands and security architectures.
`
`2 Normative references
`
`The fol10wing standards contain provisions which,
`through reierehce in this text. constitute provisions of this
`part of lSO/lEC 7816. At the time of publication.
`the
`editions indicated were valid, All standards are subject to
`revision. and parties to agreements based on this part ct
`lSOIlEc 7815 are encouraged to investigate the possibility
`of applying the most recent editions of the standards
`indicated below. Members of
`IEC and lSO maintain
`registers of currently valid lntemational Standards.
`
`lSD 3166:1993. Codes for the representation of names
`of countries.
`
`rsonec 7512.1 : 1993. identification cards — Identification
`of issuers — Part 1 : Numbering system.
`
`ISO/IEC 7816-3: 1989. Identification cords —- Integrated
`cr'rcur‘rls) cards with contacts — Pan 3‘: Electronic signals
`and transmission protocols.
`
`Amendment 1: 1992 to ISO/IEC 7816—3: 1989 Protocol
`type Tel, asynchronous half duplex block transmission
`protocol
`
`Apple Ex. 1029, p. 7
`Apple Ex. 1029, p. 7
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`
`
`
`
`. lSOIlEC 7816-4: 1995 (El
`
`to lSOIlEC
`
`-
`
`
`
`Amendment 2 : 1994 to ISOIIEC 7816-3 : 1989. Revision
`of protocol typo selection.
`.
`
`lSO/IEC 7816-5: 1994. Identification cards -— Integrated
`circuit(sl cards with contacts — Part5 : Numbering sys-
`tem and registration procedure for application identrfiers.
`
`lSOfIEC 7816-6:-—~1). Identification cards — Integrated
`circuitlsl cards with contacts -—— Part 6: lnterindustry data
`elements.
`‘
`
`In this part of ISO/IEC 7816. data objects are
`element).
`referred to as BER-11v, COMPACT-TLV and SIMPLEJLV data
`objects.
`
`infor—
`dedicated filo: File containing file control
`3.6
`motion and. optionally. memory available for allocation. It
`may be the parent of EFs and/or DFs.
`
`DF nor-no: String of bytes which uniquely identifies
`3.7
`a dedimted file in the card.
`
`lSO/IEC 8825: 1990 2), Information technology — Open
`Systems Interconnection —- Specification of Basic Encod-
`ing Rules for Abstract Syntax Notation One (ASN.1).
`ISOIIEC 9796: 1991. Information technology -- Security
`techniques —- Digital signature scheme giving message
`recovery.
`
`lSO/IEC 9797: 1994. Information technology —- Seourity
`techniques — Data integrity mechanism using a crypto-
`graphic checlr
`function employing a block cipher
`algorithm.
`
`lSO/lEC 9979:1991. Data cryptographic techniques —
`Procedures for the registration of cryptographic algo-
`rithms.
`
`Information technology - Modes of
`!SO."EC 101161991.
`opera tron lor'an n~'oi.' DIOCk cipher algorithm.
`technology —-
`lSOIlEC 10118-1: 1994,
`Information
`7; General.
`Security techniques —— Hash'functions —— Parr
`
`-
`
`Information technology .—
`lSO/IEC 10118-2: 1994,
`Securiry techniques —— Hash-functions —.— Pan 2: Hash-
`lunctions using an n-oit block cipher algorithm.
`
`3 Definitions
`
`For the purposes of this pan of ISOIIEC 7816, the follow-
`ing definitions apply.
`'
`
`3.1 Answer-to-Reset file: Elementary file which
`indicates operating characteristics of the card.
`
`command-response pair: Set of two messages:
`3.2
`a command followed by a response.
`
`data unit: The smallest set of bits which can be
`3.3
`unambiguously referenced.
`
`directory filo: Elementary file defined in part 5 of
`3.8
`lSO/lEC 7816.
`
`elementary filo: Set of data units or records
`3.9
`which share the same file identifier.
`ll cannot be the
`parent of another file.
`
`3.10 lil- control paramotors: Logical. structural and
`security attributes of a tile.
`
`3.11 filo identifier: A 2-bytes binary value used to
`address a file.
`
`3.12 file management date: 'Any information about a
`file except the file control parameters (6 5.. expiration
`date. application labell.
`
`3.13 internal elementary file: Elem‘s'tary file for
`storing data interpreted by the care
`
`3.14 master file: The mandator. unioue dedicated file
`representing the root of the file stru:ture.
`
`3.15 mossonoztString of bytes transmitted by the
`interface device to the card or vice-verse. excluding
`transmission-oriented characters as defined in part 3 of
`ISO/IEC 7815.
`
`3.16 parent file: The dedicated file immediately pre—
`ceding a given file within the hierarcny.
`
`3.17 password: Data which may be required by the
`application to be presented to the card by its user.
`
`tie identifiers without
`3.18 oath: Concatenation of
`delimitation.
`ll the path starts With the identifier of the
`master tile_ it is an absolute path.
`
`3.19 provider: Authority who has or who obtained the
`right to create a dedicated file in the card.
`
`3.20 record: String of bytes which can be handled as a
`whole by the card and referenced by a record number or
`by a record identifier.
`
`‘“
`
`dot- clement: Item of information seen at the
`3.4
`interface for which are defined a name. a description of
`logical content. a format and a coding.
`
`3.21 record Identifier: Value associated with a record
`that can be used to referencethat record. Several records
`may have the same identifier within an elementary file.
`
`information seen at the Interface
`dot- obioct:
`3.5
`which consists 0! a tag, a length and a value (i.e.. a data
`
`
`3.22 record number: Sequential number assigned to
`each record which uniquely identities the record within its
`elementary file.
`
`1’ To be published.
`2’ Currently under rewsion.
`
`3.23 working elementary filo : Elementary file for
`storing data not interpreted by the card.
`
`Apple Ex. 1029, p. 8
`Apple Ex. 1029, p. 8
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

` .
`
`‘o’rs‘onsc
`
`ISOIlEC 7816-4: 1995 IE)
`
`
`
`4 warts and notation
`
`pay the purposes of this part of lSO/lEC 7816. the follow-
`ing abbreviations applv.
`APDU
`Application protocol data unit
`ATR
`Answer to reset
`
`.
`
`~ BER
`CLA
`DIR
`DF
`EF-
`FCt
`PCP
`FMD
`INS
`MF
`P1-P2
`PTS
`RFU
`SM
`SWt-SNZ
`TLV
`TFDU
`
`Basic encoding rules of ASN.1 (see annex D]
`Class byte
`Directory
`Dedicated file
`Elementary file
`Fiie control information
`File control parameter
`File management data
`Instruction byte
`Master file
`Parameter bytes
`Protocol type selection
`Reserved (or future use
`Secure messaging
`Status bytes
`Tag, length, value
`Transmission protocol data unit
`
`'
`
`For the purposes of this part of ISO/15C 7816, the follow-
`ing notation applies._
`'0' to '5‘ and 'A' to ‘F' The sixteen hexadecimal digits
`(81,
`Value 07 byte 3]
`8-, ll 8;
`Concatenation of bytes 81 (the most significant
`byte) and 82 (the least significant byte)
`(8, ll 5;) Value of the concatenation of bytes B1 and 82
`fr
`Number
`
`5 Basic organizations
`
`5.1 Data structures
`
`This clause contains information on the logical structure
`of data as seen at
`the interface, when processing
`interindustry commands for
`interchange. The actual
`storage location of data and structural
`information
`beyond what is described in this clause are outside the
`scope of lSO/IEC 7816.
`
`. 5.1.1
`
`Filo organization
`
`""13 Dir! of ISO/16C 7816 supports the following two cute-
`gories of files.
`'
`— Dedicated file (DP).
`
`5— Elementary file (EFL
`
`The logical organization of data in a card consists of the
`following structural hierarchy of dedicated files.
`
`-The OP at the root is called the master file (MP).
`The MF is mandatory.
`'
`— The otherDFs are optional.
`
`The following two types of EFs are defined.
`-- Internal EF-Those EFs are intended for storing
`data interpreted by the card. i.e.. data analyzed and
`used by the card for management and control
`purposes.
`.

`
`'— Working EF —Those EFs are intended for storing
`data not interpreted by the mrd. i.e., data to be used
`by the outside world exclusively.
`
`Figure 1 illustrates an example of the logical file organiza-
`tion in a card.
`
`
`
`Figure 'l — Loglcal filo organization (example)
`
`5.1.2
`
`File rotor-racing methods
`
`When a file cannot be implicitly selected, it shall be possi-
`ble to select it by at least one of the following methods.
`
`~Referencing by file identifier— Any file may be ref-
`erenced by a tile identifier coded on 2 bytes. If the MP is
`referenced by a file identifier.
`‘3FOO' shall be used
`(reserved value). The value 'FFFF'
`is reserved for future
`use. The value '3FFF'
`is reserved (see referencing by
`path).
`In order to select unambiguously any file by its
`identifier. all EFs and DFs immediately under a given DF—
`shall have different file identifiers.
`
`—- Referencing by path — Any file may be referenced by
`a path (concatenation of file identifiers). The path begins
`with the identifier of the MF or of the current DF and ends
`with the identifier of the tile itsell. Between those two
`identifiers.
`the path consists of the identifiers of the,_
`successive parent DFs if any. The order of the file
`identifiers is always in the direction parent to child. If the
`identifier of the current CF is not known. the value ‘3FFF'
`(reserved value) can be used at the beginning of the path.
`The path allows an unambiguous selection of any file
`from the MF or from the current DF.
`
`—- Referencing, by short EF identifiar— Any EF may be
`referenced by a short EF identifier coded on 5 bits valued
`in the range from 1 to 30. The value 0 used as a short EF
`identifier references the Currently selected EF. Short EF
`identifiers cannot be used in a path or as a file identifier
`(e.9., in a SELECT FILE command).
`
`Apple Ex. 1029, p. 9
`Apple Ex. 1029, p. 9
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`
`
`
`
`ISO/IEC 78164: 1995 (E)
`
`O iSO/IEC
`
`__ Referencing by DF name — Any DF may be refer-
`enced by a DP name coded on t
`to 16 bytes. In order to
`select unambiguously by DF name (e.g.. when selecting
`by means of application identifiers as defined in part 5 of
`ISO/IEC 7816). each DF name shall be 'unique within a
`given card.
`
`5.1.3 Elementary filo structures
`
`The following structures of EFs are defined.
`
`— Transparent structure -— The _EF is seen at the
`inte'face as a sequence of data units.
`-- Facord structure—The EF is seen at the interface
`as a secuence of individually identifiable records.
`
`The following attributes are defined for EFs structured in
`records
`- Eze of the records : either fixed or variable.
`
`— Crganization of the records: either as a sequence
`. (linear structure) or as a ring lcvclrc structural.
`'
`
`The car: shall support at least one of the following four
`mathocs for structuring EFs.
`- ‘ransoarent EF.
`- _ near EF with records of fixed size.
`-- - wear file‘with records of variable size.
`— :lCiiC EF with records of fixed size.
`
`Figure 2 shows those four EF structures.
`Transarent
`Linear fixed
`Linear variable
`
`
`
`
`
`Cyclic fixed
`
`
`DE§©
`
`
`Figure 2 ~- EF structures
`NOTE —The arrow on the figure references the most recently
`written 'ecord.
`
`5.11 Data referencing methods
`
`Data r'av be referenced as records. as data units or as
`data ocects. Data is considered to be stored in a single
`continuous sequence of records (within an EF of record
`structu'el or of data units (within an SF of transparent
`structure). Reference to a record or to a data unit outside
`an EF is an error.
`
`Data referencing method. record numbering method and
`data unit size are EF—dependent features. The card can
`provide indications in the ATE. in the ATE file and _in any
`. file control information. When the card provides indica-
`tions in several places, the indication valid for a given EF
`is the dosest one to that EF within the path from-the MP
`to that EF.
`-
`v
`
`
`
`5.1.4.1
`
`Record referencing
`
`Within each EF of record structure. each record can be
`referenced by a record identifier and/or by a record
`number. Record identifiers and record numbers are
`unsigned 8-bit integers with values in the range from 'O‘l'
`to 'FE'. The value '00‘ is reserved for special purposes.
`The value 'FF' is RFU.
`
`induce the man—
`Referencing by record identifier shall
`agement of a record pointer. A reset of the card,.a
`SELECT FlLE and any command carrying a valid short EF
`identifier can affect the record pointer. Referencing by
`record number shall not affect the record pointer.
`‘
`
`-Referencing by record identifier— Each record iden-
`tifier is provided by an application. If a record is a SIMPLE-
`TLV data object in the data field of a message (see 5.4.4).
`then the record identifier is the first byte of the data
`object. Within an EF of record structure, records may
`have the same record identifier,
`in which case data
`contained in the records may be used for discriminating
`between them.
`
`Each time a reference is made witr a record identifier. an
`indication shall soecrfy the logica aosrtior of the target
`record. the “'5'. or last occur'e'ics the her: or previous
`occmrence relative to the record pointer.
`
`~Vlrithin each EF of linear stru:ture, the logical posi-
`tions shall be sequentially ass gned V"'-‘_’f\ writing or
`appending. i.e.. in the order of creation. Therefore the
`first created record is in the firs: logical position.
`
`——\Mthin each EF of cyclic structure. the logical posi-
`tions shall be sequentially assigned in the opposite
`order. i.e.. the most recently created record is in the
`first logical position.
`
`The following additional rules are defined for linear struc-
`tures and for cyclic structures.
`
`—The first occurrence shall be the record with the
`specified identifier and in the first logical position; the
`last occurrence shall be the re:ord W": the specified
`identifier and in the last logical position.
`
`—When there is no current record, the next occur-
`rence shall be equivalent to the first occurrence: the
`prevrous occurrence shat: be equivalent to the last
`occurrence.
`
`-—When there is a current record. the next occur-
`rence shall be the closest record with the specified
`identifier but in a- greater logical position than the cur-
`rent record: the previous occurrence shall be the
`closest record with the‘ specified identifier but in a
`smaller logical position than the current record.
`
`--The value '00' shall refer to the first. last, next or
`previous record in the numbering sequence. indepen—
`dently from the record identifier.
`
`Apple Ex. 1029, p. 10
`Apple Ex. 1029, p. 10
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`
`
`' 0 ISO/IEC
`
`ISO/IEC 7816-4: 1995 (El
`
`-- Referencing by record number— Within each SF of
`record structure, the record numbers are uniQue and
`sequential.
`
`— tMlhin each SF of linear structure. the record num-
`bers shall be sequentially assigned when writing or
`appending. i.e.. in the order of creation. Therefore the
`first record (record number one. i 1)
`is the first
`created record.
`
`—thin each SF of cyclic structure. the record num»
`bers shall be sequentially assigned in the opposite
`order, i.e.. the first record (record number one, e t) is
`the most recently created record.
`
`Thefollowing additional rule is defined for linear struc-
`tures and for cyclic structures.
`
`— The value ‘00' shall refer to the current record. i.e.,
`that record fixed by the record pointer.
`
`S.‘l.l.2 Date unit referencing
`
`Vlfithin east. EF of transparent structure, each data unit
`can be 're-‘erence: by an olfsez leg. in READ BINAET
`command. see 6.1!.
`It
`is an unsigned integer, limited to
`either 8 or 15 bits according to an option in the respective
`command. Valued to O for the first data unit of the EF, the
`offset is in:remented by 1 lat every subsectuen: data unit,
`
`if the card gives no indication. the size of
`By default. i.e..
`the‘datarunrt is one byte.
`
`mores
`
`An EF of record structure may supportdata unit referencing
`1
`and. in case It does. data units may contain structural informa-
`tion along w-tn data. e.g.. record numbers in a linear structure.
`
`2 Within an SF of record structure. data unit referencing may
`not provide the intended result because the storage order of
`the records ._-. the EF 15 not known, cg. storage order in a cyclic
`structure.
`
`5.1.‘3' Date object referencing
`
`Each data object (as defined in 5.4 4) is headed by a tag
`Which references it. Tags are specified in this part and
`other parts of lSO/lEC 7816.
`
`6.1.5
`
`File control Information
`
`The file control information (FCll is the string of data bytes
`available in response to a sneer ms command. The file
`control Information may be present for any file.
`
`Table 1 introduces 3 templates intended for conveying file
`control information when coded as BER-TLV data objects.
`—The FCP template is intended for conveying file -
`control parameters (FCP),
`i.e.. any BER-TLV data;
`objects defined in table 2.
`
`—~The FMD template is intended for conveying file
`management data (FMDl.
`i.e.. sen-1w data objects
`specified in other clauses of this part or in other parts
`of lSO/lEC 7816 «2.9.. application label as defined in
`can: and application expiration date as defined in
`Daft
`).
`
`-—The F0 template is intended for conveying file
`control parameters and file management data.
`
`Table 1 — Templates relevant to PC!
`
`9 control Informat-c" “73' mm: 229'
`
`"E
`'P temperel
`e ~a<egement oat: -‘- CD ternsstel
`
`The 3 temp-ates may be retrieveslaccordmg to seiectron
`options of the SELECT m5 comma-Id (see table 591.
`If the
`PC? or FMD option is set.
`then the use of the corre.
`sponding template is mandatory. if the FCl option is set.
`then the use of the FCI template is optional.
`
`Part of the file control information may additionally be
`present in a working EF under control of an application
`and referenced under tag '87'. The use of the PC? or FCl
`template is mandatory for the coding of
`file control
`information in such an EF.
`
`File control information not coded according to this part
`of ISO/IEC 7816 may be introouced as follows.
`
`— ‘00‘ or any value higher than '9F' —-The coding of
`the subsequent string of bytes is proprietary.
`— Tag = '53' —The value field of
`the data obiect
`consist: of discretionary data not coded in TLV.
`—Tag = '73'—The value field of
`the data object
`1..
`consists ol discretionary EEfi-YLV data objects.
`
`
`
`Apple Ex. 1029, p. 11
`Apple Ex. 1029, p. 11
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`
`
`ISO/[EC 7816-}: 1995 (E)
`
`c Ispnec
`
`Transpaten
`t EFs
`
`Table 2 -- Filo control parameters
`
`
`Number of data bytes
`in the file. excluding
`
`
`
`strucnnl inlormation
`
`
`Number oi data bytes
`
`
`in the file, induding'
`
`structural information if any
`
`
`
`
`File descriptor byte
`Any file
`
`lsee table 3|
`
`
`Any file
`File descriptor byte tollowcd
`
`
`
`
`by data coding byte
`lsec table 86l
`
`
`
`
`File descriptor byte followed
`EFs with
`
`
`
`
`by data coding byte and
`record
`
`
`maximum record length
`structure
`Any r...
`
`_m
`Proprietary inlormation
`Security attributes 4
`(coding outside the scope
`of this part of ISO/15C 7816)
`loentiiue' (:5 an EF containing
`an evens-on-ol the ‘Cl
`
`Any file
`
`Any file
`
`.
`
`RFU
`
`
`
`Table 3 -— Filo descriptor byte
`
`
`
`
`
`W\I
`
`to nx(
`
`8
`
`mwwmm
`File accessibility
`— Not shareable file
`—- Shareable file
`
`‘-l“EM-IE!
`
`0000000"!0OO’HJODUI‘IOOOO
`
`
`
`File type
`
`
`— Working EF .
`— internal EF
`
`— Fieserved
`
`
`lor
`proprietary
`types
`
`
`01 EFs
`.o.
`u-I
`—- DF
`
`I
`I
`I
`o
`EF structure
`
`
`— No information given
`
`
`—- Transparent
`— Linear fixed. no further into
`-— Linear fixed, SlMPLE-TLV
`
`
`— Linear variable. no further inlo
`
`
`- Linear variable, SIMPLE -TLv
`
`
`~ Cyclic. no further info
`— Cyclic. SIMPLE ~TLV
`
`
`
`
`
`‘-‘(30011X
`
`IlIlorIl
`
`4‘004-‘00K
`
`IirIiIcl
`
`liIIIIII
`
`d-O—I-IOOOOX
`
`—‘-'OO-‘-‘OOX
`
`'Snaroable' means that the tile supports at least concurrent
`access on diflerent logical channels.
`
`’
`
`
`
`5.2 Security ardtitocture of the card‘
`
`This clause describes the following features:
`-— security status.
`
`— security attributes.
`— security mechanisms.
`
`Security attributes are compared with the security statu
`to execute commands and/or to access files.
`*
`
`5.2.1
`
`Security stltus
`
`Security status represents the current state possibly
`achieved alter completion of
`‘
`—answer to reset lATRl and possible protocol type
`selection (PTS) and/or
`
`-—a single command or a sequence of commands,
`possibly performing authentication procedures.
`
`The scourity status may also result from the completion
`of a security procedure related to the identification of the
`involved entities ii any, 2.9.,
`,
`
`——by provmg the knowledge of a password le.g..
`using a VEREFY command),
`--by provmg the knowledge 5: a key 5.9., using a
`GET CHALL ENGE
`commanc
`followed
`by
`an
`EXTERNAL A'JTHENTICATE command).
`
`—~by secure messaging (e.g., message authenti-
`cation).
`
`Three security statuses are considered.
`
`—-— Global security status —— It may be modified by the
`completion ol an MF—related authenticat-on procedure
`le.g.. entity authentication by a password or by a key
`attached to the MF).
`
`— Filespecific security status — it may be modified
`by the completion of a DF-relazed authenticaticr. pro-
`cedure le.g., entity authenticauon by a password or
`by a key attached to the specific DF) ; it may be main-
`tained, recovered or lost by file selection (see 6.10.2):
`this modification may be relevant only for the applica-
`tion to which the authentication procedum belongs.
`
`w Command-specific security status —- It only exists
`during the execution ol 8 command involving authen~
`ticatlon using secure messaging (see 5.6): such a
`command may leave the other security status
`unchanged.
`
`\.
`
`It the concept oi logical channels is applied. the file specific
`security status may depend on the logical channel (see
`5.5.1).
`
`Apple Ex. 1029, p. 12
`Apple Ex. 1029, p. 12
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`
`
`'0 ISO/IEC
`
`ISOIIEC 7815-4: 1995 (El
`
`5.2.!
`
`Security attributes
`
`5.3 APDU message structure
`
`A step in an application protocol consists of sending a .
`command. processing it
`in the receiving entity and
`sending back the response. Therefore a specific response
`corresponds to a specific command. relerred to as a
`command-response pair.
`
`An application protocol data unit (APDU) contains either a
`command message or a response message. sent trom
`the rnteriace device to the card or converse .
`-
`
`in e command-response pair. the command message and
`the response message may contain data. thus inducing
`four cases which are summarized by table 4.
`
`Table 4 — Date within a commend-response pair
`
`-—-m
`
`5.3.1 Command APDU
`
`the command
`Illustrated b. figure 2 (see as: table 6
`APDU defined In this part of ESO’ EC 7816 :onsists of
`-— a mandatory header at 4 bytes lCLI- INS P1 P2).
`
`—- a concztional body 01 varraae length
`' gi—z‘;¢.
`I .
`v.4.
`.’é:1,,‘n(;‘\-7ridl’.44 1;'rt_-
`<1 I
`.1 _
`1‘
`Jr l4),
`. t .3.
`Header
`,
`Bod
`lL.lieldi
`CLA INs Pl P2
`ILe field]
`[Data field]
`Figure 3 — Commend APDU structure
`
`.
`
`The number of bytes present in the data field of the
`command APDU is denoted by LC.
`
`The maximum number oi bytes expected in the data field
`of the response APDU is denoted by L. (length 01 ex-
`pected data). When the Le field contains only zeroes. the
`maximum number of available data bytes is requested.
`
`Figure 4 shows the 4 structures of command APDUs
`. according tothe 4 cases defined in table 6.
`
`Case 1
`
`
`
`The security attributes, when they exist, define the
`allowed actions and the procedures to be parlormad to
`complete such actions.
`
`Security attributes may be associated with each tile and
`for the security conditions that shall be satisfied to allow
`operations on the tile. The security attributes of a tile
`depend on
`
`—- its category (DF or EFl.
`
`-- optiona

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket