throbber
PTOISBIOBa (03-09)
`Doc code: IDS
`Approved for use through 0413012009. OMB 0651-0031
`Doc description: Information Disclosure Statement (IDS) Filed
`US. Patent and Trademark Office; US. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number.
`
`
`12376360
`
`Application Number
`
`2009-02-04
`
`INFORMATION DISCLOSURE
`
`STATEMENT BY APPLICANT
`
`(Not for submission under 37 CFR 1.99)
`
`
`Filing Date
`Bruno CHARRAT
`First Named Inventor
`
`Art Unit
`2431
`
`
`
`Examiner Name
`
`Not Yet Assigned
`
`10000—132US (100405US/WO)
`
`Attorney Docket Number
`
`
`
`
`
` U.S.PATENTS Remove
`
`Examiner Cite
`.
`.
`*
`Initial
`No
`
`Patent Number
`
`Kind
`Code1
`
`Issue Date
`
`Name of Patentee or Applicant Pages,Columns,Lines where
`.
`Relevant Passages or Relevant
`of Cited Document
`Figures Appear
`
`
`
`If you wish to add additional US. Patent citation information please click the Add button.
`
`U.S.PATENT APPLICATION PUBLICATIONS
`
`Add
`
`_—
`
`Examiner
`.
`.
`,,
`Initial
`
`Publication Number
`
`Publication
`Kind
`Code1 Date
`
`Name of Patentee or Applicant
`of cited Document
`
`Pages,Columns,Lines where
`Relevant Passages or Relevant
`Figures Appear
`
`If you wish to add additional U.S. Published Application citation information please click the Add button.-
`FOREIGN PATENT DOCUMENTS
`
`
`
`
`Name of Patentee or
`
`Applicant of Cited
`Document
`
`Pages,Columns,Lines
`where Relevant
`
`Passages or Relevant
`Figures Appear
`
`T5
`
`
`
` Examiner Cite
`
`
`
`
`
`
`
`Examiner
`Initial"
`
`Cite Foreign Document
`
`Country
`Code2 i
`
`Kind
`Code4
`
`Publication
`Date
`
`
`
`If you wish to add additional Foreign Patent Document citation information please click the Add button
`NON-PATENT LITERATURE DOCUMENTS
`
`
`
`Include name of the author (in CAPITAL LETTERS), title of the article (when appropriate), title of the item
`(book, magazine, journal, serial, symposium, catalog, etc), date, pages(s), volume-issue number(s),
`publisher, city and/or country where published.
`
`T5
`
`|nitia|s*
`
`No
`
`EFS Web 2.1.12
`
`Apple Ex. 1030, p. 1
`Apple Ex. 1030, p. 1
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`INFORMATION DISCLOSURE
`STATEMENT BY APPLICANT
`(Not for submission under 37 CFR 1.99)
`
`Application Number
`
`12376360
`
`
`
`Filing Date
`2009—02—04
`First Named Inventor
`Bruno CHARRAT
`
`A” Unit
`2431
`
`Examiner Name
`
`
`Attorney Docket Number
`
`
`
`
`
`
`
`Not Yet Assigned
`
`10000-132US (100405US/WO)
`
`
`
`
`
`"Identification cards - Integrated circuit(s) cards with contacts", International Standard ISO/IEC 7816-1, First Edition
`(10/15/1998).
`
`
`1
`
`2
`
`AFNOR, "Identification cards - Integrated circuit(s) cards with contacts", International Standard ISO/IEC 7816-1, First
`Edition (10/15/1998), Amendment 1 (11/15/2003).
`
`AFNOR, "Identification cards — Integrated circuit cards", International Standard ISO/IEC 7816—2, First Edition
`(03/01/1999), Amendment 1 (06/01/2004).
`
`
`3
`
`4
`
`5
`
`AFNOR, "Identification cards - Integrated circuit cards", International Standard ISO/IEC 7816-2, Second Edition
`(10/15/2007).
`
`AFNOR, "Identification cards — Integrated circuit cards", International Standard ISO/IEC 7816—3, Third Edition
`(11/01/2006).
`
`IX
`
`
`"Information technology — Identification cards — Integrated circuit(s) cards with contacts", International Standard ISO/
`IEC 7816—4, First Edition (09/01/1995), Amendment 1 (12/15/1997).
`
`
`6
`
`7
`
`AFNOR, "Identification cards - Integrated circuits cards", International Standard ISO/IEC 7816-4, Second Edition
`(01/15/2005).
`
`"Identification cards — Integrated circuIt(s) cards with contacts", International Standard ISO/IEC 7816—5, First Edition
`(06/15/1994), Amendment 1 (12/15/1996).
`
`
`8
`
`9
`
`AFNOR, "Identification cards — Integrated circuit cards", International Standard ISO/IEC 7816—5, Second Edition
`(12/01/2004).
`
`10
`
`AFNOR, "Identification cards - Integrated circuit cards", International Standard ISO/IEC 7816-6, Second Edition
`(05/15/2004).
`
`11
`
`AFNOR, "Identification cards — Integrated circuit cards", International Standard ISO/IEC 7816—6AC1, (06/15/2006).
`
`
`
`EFS Web 2.1.12
`
`Apple Ex. 1030, p. 2
`Apple Ex. 1030, p. 2
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`INFORMATION DISCLOSURE
`
`STATEMENT BY APPLICANT
`
`(Not for submission under 37 CFR 1.99)
`
`12376360
`Application Number
`
`Filing Date
`Bruno CHARRAT
`First Named Inventor
`
` 2009—02—04
`
` Attorney Docket Number
`
`
`Not Yet Assigned
`10000-132US (100405US/WO)
`
`Examiner Name
`
`Art Unit
`
`2431
`
`
`5 Applicant is to place a check mark here If
`
`
`
`
`
`"Identification cards - Integrated circuit(s) cards with contacts", International Standard ISO/IEC 7816-7, First Edition
`(03/01/1999).
`
`
`12
`
`13
`
`"Identification cards - Integrated circuit(s) cards with contacts", International Standard ISO/IEC, FDIS, 7816-8, Final
`Draft (1998).
`
`AFNOR, "Identification cards — Integrated circuit(s) cards with contacts", International Standard ISO/IEC, FDIS, 7816—9,
`(12/21/1999).
`
`
`14
`
`15
`
`AFNOR, "Identification cards - Integrated circuit cards with contacts", International Standard ISO/IEC 7816-15/AC1,
`(OT/0112004).
`
`16
`
`AFNOR, "Identification cards — Integrated circuit cards with contacts", International Standard ISO/IEC 7816—15, First
`Edition, (01/15/2004).
`
`IX
`
`
`17
`
`"Identification cards — Contactless integrated circuit(s) cards — Proximity cards", International Standard ISO/IEC
`14443—2, First Edition (07/01/2001).
`
`18
`
`DIN, "Identification cards - Contactless Integrated circuit(s) cards - Proximity cards", International Standard ISO/IEC
`WD 14443-2, (01/26/2007).
`
`"Identification cards — Contactless integrated circuit(s) cards — Vicinity cards", International Standard ISO/IEC 15693—3,
`19
`First Edition (04/01/2001 ).
`
`
`
`
`If you wish to add additional non-patent literature document citation information please click the Add button
`EXAMINER SIGNATU RE
`
`
`
`Examiner Signature Date Considered
`
`*EXAMINER: Initial if reference considered, whether or not citation is in conformance with MPEP 609. Draw line through a
`
`citation if not in conformance and not considered. Include copy of this form with next communication to applicant.
`
`2 Enter office that issued the document, by the two-letter code (WIPO
`1 See Kind Codes of USPTO Patent Documents at www.USPTO.GOV or MPEP 901.04.
`Standard ST.3). 3 For Japanese patent documents, the indication of the year of the reign of the Emperor must precede the serial number of the patent document.
`4 Kind ofdocument by the appropriate symbols as Indicated on the document under WIPO Standard ST.16 if possible.
`English language translation is attached.
`
`
`EFS Web 2.1.12
`
`Apple Ex. 1030, p. 3
`Apple Ex. 1030, p. 3
` Apple v. Fintiv
`Apple v. Fintiv
`lPR2020-00019
` IPR2020-00019
`
`

`

`INFORMATION DISCLOSURE
`STATEMENT BY APPLICANT
`(Not for submission under 37 CFR 1.99)
`
`Application Number
`
`12376360
`
`
`
`2009—02—04
`Filing Date
`First Named Inventor
`Bruno CHARRAT
`
`Art Unit
`2431
`Examiner Name
` Not Yet Assigned
`Attorney Docket Number
`10000-132US (100405USIWO)
`
`
`
`
`CERTIFICATION STATEMENT
`
`Please see 37 CFR 1.97 and 1.98 to make the appropriate selection(s):
`
`|:I
`
`That each item of information contained in the information disclosure statement was first cited in any communication
`from a foreign patent office in a counterpart foreign application not more than three months prior to the filing of the
`information disclosure statement. See 37 CFR 1.97(e)(1).
`
`OR
`
`That no item of information contained in the information disclosure statement was cited in a communication from a
`
`foreign patent office in a counterpart foreign application, and, to the knowledge of the person signing the certification
`after making reasonable inquiry, no item of information contained in the information disclosure statement was known to
`any individual designated in 37 CFR 1.56(c) more than three months prior to the filing of the information disclosure
`statement. See 37 CFR 1.97(e)(2).
`
`El
`
`:| See attached certification statement.
`
`:| Fee set forth in 37 CFR 1.17 (p) has been submitted herewith.
`
`
`
`2| None
`
`SIGNATURE
`
`A signature of the applicant or representative is required in accordance with CFR 1.33, 10.18. Please see CFR 1.4(d) for the
`form of the signature.
`
`
`Signature
`
`lJohn D. Simmons/
`
`Date (YYYY-MM-DD)
`
`
`
`
`
`
`
`
`
`
`
` 2009-04-06
`
`
`
`Name/Print 52225 John D. Simmons Registration Number
`
`This collection of information is required by 37 CFR 1.97 and 1.98. The information is required to obtain or retain a benefit by the
`public which is to file (and by the USPTO to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR
`1.14. This collection is estimated to take 1 hour to complete, including gathering, preparing and submitting the completed
`application form to the USPTO. Time will vary depending upon the individual case. Any comments on the amount of time you
`require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, US.
`Patent and Trademark Office, US. Department of Commerce, PO. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND
`FEES OR COMPLETED FORMS TO THIS ADDRESS. SEND TO: Commissioner for Patents, P.O. Box 1450, Alexandria,
`VA 22313-1450.
`
`EFS Web 2.1.12
`
`Apple Ex. 1030, p. 4
`Apple Ex. 1030, p. 4
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`Privacy Act Statement
`
`
`The Privacy Act of 1974 (P.L. 93-579) requires that you be given certain information in connection with your submission of the
`attached form related to a patent application or patent. Accordingly, pursuant to the requirements of the Act, please be advised
`that:
`(1) the general authority for the collection of this information is 35 U.S.C. 2(b)(2); (2) furnishing of the information solicited
`is voluntary; and (3) the principal purpose for which the information is used by the US. Patent and Trademark Office is to
`process and/or examine your submission related to a patent application or patent.
`If you do not furnish the requested
`information, the US. Patent and Trademark Office may not be able to process and/or examine your submission, which may
`result in termination of proceedings or abandonment of the application or expiration of the patent.
`
`The information provided by you in this form will be subject to the following routine uses:
`
`1.
`
`2.
`
`3.
`
`4.
`
`5.
`
`6.
`
`7.
`
`The information on this form will be treated confidentially to the extent allowed under the Freedom of Information Act
`(5 U.S.C. 552) and the Privacy Act (5 U.S.C. 552a). Records from this system of records may be disclosed to the
`Department of Justice to determine whether the Freedom of Information Act requires disclosure of these record 5.
`
`A record from this system of records may be disclosed, as a routine use, in the course of presenting evidence to a
`court, magistrate, or administrative tribunal, including disclosures to opposing counsel in the course of settlement
`negotiations.
`
`A record in this system of records may be disclosed, as a routine use, to a Member of Congress submitting a
`request involving an individual, to whom the record pertains, when the individual has requested assistance from the
`Member with respect to the subject matter of the record.
`
`A record in this system of records may be disclosed, as a routine use, to a contractor of the Agency having need for
`the information in order to perform a contract. Recipients of information shall be required to comply with the
`requirements of the Privacy Act of 1974, as amended, pursuant to 5 U.S.C. 552a(m).
`
`A record related to an International Application filed under the Patent Cooperation Treaty in this system of records
`may be disclosed, as a routine use, to the International Bureau of the World Intellectual Property Organization, pursuant
`to the Patent Cooperation Treaty.
`
`A record in this system of records may be disclosed, as a routine use, to another federal agency for purposes of
`National Security review (35 U.S.C. 181) and for review pursuant to the Atomic Energy Act (42 U.S.C. 218(c)).
`
`A record from this system of records may be disclosed, as a routine use, to the Administrator, General Services, or
`his/her designee, during an inspection of records conducted by GSA as part of that agency's responsibility to
`recommend improvements in records management practices and programs, under authority of 44 U.S.C. 2904 and
`2906. Such disclosure shall be made in accordance with the GSA regulations governing inspection of records for this
`purpose, and any other relevant (i.e., GSA or Commerce) directive. Such disclosure shall not be used to make
`determinations about individuals.
`
`8.
`
`A record from this system of records may be disclosed, as a routine use, to the public after either publication of the
`application pursuant to 35 U.S.C. 122(b) or issuance of a patent pursuant to 35 U.S.C. 151. Further, a record may be
`disclosed, subject to the limitations of 37 CFR 1.14, as a routine use, to the public if the record was filed in an application
`which became abandoned or in which the proceedings were terminated and which application is referenced by either a
`published application, an application open to public inspections or an issued patent.
`
`9.
`
`A record from this system of records may be disclosed, as a routine use, to a Federal, State, or local law
`enforcement agency, if the USPTO becomes aware of a violation or potential violation of law or regulation.
`
`
`
`
`
`
`
`EFS Web 2.1.12
`
`Apple Ex. 1030, p. 5
`Apple Ex. 1030, p. 5
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`STD-ISO ?&ll:-‘-I-EN6L l‘l‘lS - HBSL‘iUB [REBEL—3 WEE -
`
`INTERNATIONAL
`
`ISO/IEC
`
`STANDARD
`
`781 6-4
`
`First edition
`1 995-09-01
`AMENDMENT 1
`1 997-1 2-1 5
`
`
`
`Information technology — Identification
`cards — Integrated circuit(s) cards with
`contacts —
`
`Part 4:
`
`Interindustry commands for interchange
`
`AMENDMENT 1: Impact of secure messaging
`on the structures of APDU messages
`
`Technologies de l'infonnation — Cartes d’identification — Caries a circuit(s)
`integreYs) 52 contacts —
`
`Partie 4: Commandes intersectoriefles pour les échanges
`
`AMENDEMENT 1: Impact de la messagerie de sécurité sur les structures
`des messages APDU
`
`
`
`
`
`Reference number
`ISO/l EC 7816-4: 1 995/Amd.1:199?(E)
`
`COPYRIGHT 2000 International Organization for Standardization
`March 03, 2000
`11:21:01
`
`Information Handling Services,
`
`Apple Ex. 1030, p. 6
`Apple Ex. 1030, p. 6
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`STD-ISO 7filE-H-ENGL 1.955 - HEEL-“”33 {WEBELE 5T“! -
`
`ISO/{EC 7816-4:1995[Amd.1:1997(E)
`
`Contents
`
`Foreword .........................................................................................................
`
`introduction .....................................................................................................
`
`Revision of table 19 .......................................................................................
`
`Revision of table 21 .........................................................................................
`
`5.7
`
`Impact of secure messaging on the structures of APDU messages ......
`
`Annex F (informative) Use of secure messaging .........................................
`
`Page
`
`iii
`
`iv
`
`‘1
`
`'l
`
`2
`
`3
`
`© ISO/1521937
`this publication may be
`All
`rights reserved. Unless otherwise specified, no part of
`reproduced or utilized in any form or by any means, electronic or mechanical,
`including
`photocopying and microfilm, without permission in writing from the publisher
`ISOIIEC Copyright Office - Case postale 55 o CH-lZl 1 Geneva 20 . Switzerland
`Printed in Switzerland
`
`COPYRIGHT 2000 International Organization for Standardization
`March 03, 2000
`11:21:01
`
`Information Handling Services,
`
`Apple Ex. 1030, p. 7
`Apple Ex. 1030, p. 7
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`STD-ISO 7&lb-ll-EN6L 1.335 - ”551.383 D733hlx=| 735 -
`
`© ISO/l EC
`
`ISOIIEC 7816-4:19951Amd.1:1997(E)
`
`Foreword
`
`ISO (the International Organization for Standardization) and EC (the International
`Electrotechnical Commission} form the specialized system for worldwide
`standardization. National bodies that are members of ISO or IEC participate in the
`development
`of
`International Standards
`through
`technical
`committees
`established by the respective organization to deal with particular
`fields of
`technical activity.
`ISO and IEC technical committees collaborate in fields of
`mutual
`interest. Other
`international organizations, governmental and non-
`governmental, in liaison with ISO and lEC, also take part in the work.
`
`ISO and IEC have established a joint
`In the field of information technology,
`technical committee,
`ISOIlEC JTC 1. Draft International Standards adopted by
`the joint
`technical committee are circulated to national bodies for voting.
`Publication as an International Standard requires approval by at least 75 % of the
`national bodies casting a vote
`
`to International Standard ISO/IEC 781641995 was prepared by
`Amendment 1
`Joint Technical Committee ISO/IEC JTC 1,
`information technology. Subcom-
`mittee SC 17, Identification cards and related devices.
`
`COPYRIGHT 2000 International Organization for Standardization
`1:21:01
`March 03, 2000
`
`Information Handling
`
`Serv;ces,
`
`Apple Ex. 1030, p. 8
`Apple Ex. 1030, p. 8
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020—00019
` IPR2020-00019
`
`iii
`
`

`

`STD-ISO ?Ex].b-'-l-EN6L 1';qu - 9551303 D?33!:EB H5? -
`
`ISO/IEC 7816-4:1995IAmd.1:1997(E}
`
`© lSO/lEC
`
`Introduction
`
`The integrated circuifls) cards with contacts are identification cards intended for
`information exchange negotiated between the outside and the integrated circuit
`in the card» As a result of an information exchange, the card delivers information
`{computation results, stored data), andfor modifies its content (data storage,
`event memorization).
`
`Part 4 of lSO/lEC 7816 is one of a series of standards describing the parameters
`{or such cards and the use of such cards for international interchange.
`
`This amendment fixes the impact of secure messaging on the structures of
`APDU messages.
`
`iv
`
`COPYRIGHT 2000 International Organization for Standardization
`March 03, 2000
`11:21:01
`
`Information Handling Services,
`
`Apple Ex. 1030, p. 9
`Apple Ex. 1030, p. 9
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`STD-ISO Tfilb-H-ENGL 1:135 - 19651303 07333321. 3°13 -
`
`© lSO/iEC
`
`ISOIIEC 7816-4?! 995/Amd.1 :1 997(E)
`
`Information technology — Identification cards —
`Integrated circuifls) cards with contacts —
`
`Part 4:
`
`Interindustry commands for interchange
`
`Impact of secure messaging on the
`AMENDMENT 1:
`structures of APDU messages
`
`In table 79, replace the last line by the following two lines.
`
`'97’
`'96“,
`'98‘
`
`—Value of Le in the unsecured command
`—Status information (erg, SW1 SW2)
`
`In table 21, repiace the value 'BA' by the foifowing two vaiues.
`
`‘AC', ’BC‘
`
`COPYRIGHT 2000 International Organization for Standardization
`March 03, 2000
`11:21:01
`
`Information Handling SerVices,
`
`Apple Ex. 1030, p. 10
`Apple Ex. 1030, p. 10
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020—00019
` IPR2020-00019
`
`

`

`STIIMISO 7BLb-i-l-ENGL l‘l‘iS - RSSl‘lUB [1733522 BET -
`
`ISO/IEC 781 6-4:1 995/Amd.1 :1 997(E)
`
`© lSO/IEC
`
`insert the following subclause.
`
`5.7 Impact of secure messaging on the
`structures of APDU messages
`
`The structures of APDU messages are specrfied In 5.3.
`According to 5.3.1.
`the command APDU consists of a
`mandatory command header of four bytes conditionally
`followed by a command body (see figures 3 and 4);
`the
`decoding of the command body lS specified in 5.32 [see
`figure 5 and table 5). According to 5.3.3,
`the response
`APDU consists of a conditional response body followed by
`a mandatory response trailer of two bytes (see figure 6).
`Figure 8 shows the structures of APDU messages.
`
`Command header
`CLA lNS P1 P2
`{four bytes)
`
`Command body
`[Lc field]
`[Data field]
`[Le field]
`(L bytes, denoted as B, to BL)
`
`Res- onse bod
`iData field]
`(L, data bytes}
`
`Response trailer
`SW1 SW2
`(two bytes)
`
`Figure 8 — Structures of APDU messages
`
`Clause 6 specifies APDU commands and responses for
`basic interindustry commands. Clause 7 specifies APDU
`commands
`and
`responses
`for
`transmission—oriented
`interindustry commands. Clauses 6 and 7 do not describe
`the impact of
`secure messaging (see 5.6) on the
`structures
`of APDU messages. Consequently,
`the
`semantic meanings of
`length fields and data fields in
`clauses 6 and 7 may seem in contradiction with their
`syntactic meanings in 5.3.
`'
`
`This subclause specifies the impact of secure messaging
`as specified in 5.6 on the structures of APDU messages
`as specified in 5.3, so as to avoid the aforementioned
`possible misunderstanding.
`
`For securing an APDU command where CLA has an appro—
`priate value according to table 9, namely ‘0X',
`'8X'.
`'9X‘
`or 'AX',
`the bit b4 in CLA shall be set to 1, which is
`indicated as CLA’ in figure 9 and annex F;
`if present, the
`command body shall be decoded according to 5.3.2 and
`encapsulated as follows.
`— if there is a data field. the LL. data bytes shall be
`carried
`neither by a plain value data object
`‘BZ’, ’83'. see table 18),
`I or by a data object for confidentiality (from ‘84' to
`'87', see table 22).
`the value of La shall be
`———lf there is an L9 field.
`carried by 3 Le data object (either
`‘96’ or ‘97‘. see
`table 19); the value field codes an unsigned positive
`integer on one or two bytes; both the null value and
`the empty data object mean the maximum.
`
`('80‘,
`
`'81‘,
`
`Similarly,
`follows.
`
`the response APDU shall be encapsulated as
`
`— if there is a data field, the L, data bytes shall be
`carried
`ceither by a plain value data obiect
`‘BZ’,
`'BS', see table 19},
`0 or by a data obiect for confidentiality (from '84'
`‘87", see table 22).
`-— if needed, the response trailer shall be carried by a
`status information data object {‘99', see table 19); the
`empty data object means SW1 SW2 = '9000'.
`
`('80',
`
`‘8‘l'.
`
`to
`
`9
`Figure
`messages.
`
`shows
`
`the
`
`structures
`
`of
`
`secured APDU
`
`— Every new data field may carry additional SM data
`objects, e.g.. a cryptographic checksum {‘SE‘} at the
`end. Annex F provides illustrative examples.
`—The new Lc field gives the length of the new data
`field of the secured command APDU.
`
`— The new Le field shall be empty when no data field
`is
`expected
`in
`the
`secured
`response APDU;
`otherwise, it shall contain only zeroes.
`«The new response trailer codes the status of the
`receiving entity after processing the secured com-
`mand.
`lt may be encapsulated for protection.
`Command header
`Command bod
`[New Lc field}
`l [New data field] =
`[T Lc Data bytes] lT ‘Ol'or‘OZ‘ Le} l
`[New Le field]
`
`
`
`CLA' lNS P1 P2
`(four bytes)
`
`Response body
`{New data field] =
`{T Lr Data bytes} [T '02' New SW1 SW21
`
`Res - nse trailer
`New SW1 SW2
`(two bytes)
`
`Figure 9 — Structures of secured APDU messages
`
`NOTES
`
`The lengths from 1 to 127 are coded in the same way in BER-TLV
`1
`length fields as in APDU length fields. The codings differ for 128 and
`more.
`
`As stated above, further or other SM data objects may be
`2
`present In the new data fields.
`3 When securing messages, it is not always apparent whether the
`data to be protected have a BER-TLV structure. Then the tags ‘80'. '81',
`‘86“ and '87’ are recommended.
`
`COPYRIGHT 2000 International Organization for Standardization
`March 03, 2000
`11:21:01
`
`Information HandIing Services,
`
`Apple Ex. 1030, p. 11
`Apple Ex. 1030, p. 11
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020—00019
` IPR2020-00019
`
`

`

`STILISO 7&lb-R-ENGL LEWIS - HBSIHBB 3733533 Mal: -
`
`© ISO/IEO
`
`ISOII EC 781 6-4:1 995lAmd.1 :1 997(E}
`
`Replace the existing annex F (two pages} by the following revision (three pages).
`
`Annex F
`
`(informative)
`
`Use of secure messaging
`
`F.1 Abbreviations
`
`— Case 1.a — Status not to be protected
`
`the following abbrevie
`
`For the purposes of this annex,
`tions apply.
`CC cryptographic checksum
`CG cryptogram
`CH command header (CLA INS P1 P2)
`CR control reference
`FR file reference
`KR
`key reference
`L
`length
`LE
`value of Le in the unsecured command (one or two
`bytes coding an unsigned positive integer; the null
`value means the maximum)
`padding bytes (‘80' followed by O to k-1 times ‘00'
`where k is the block length)
`padding indicator byte
`Pl
`plain value
`Pv’
`RD response descriptor
`T
`tag
`ll
`concatenation
`
`PB
`
`F.2 Cryptographic checksum
`According to 5.7,
`the use of cryptographic checksums
`(see 5.6.3.1) is shown for the four cases defined in table
`4 and figure 4.
`in the examples, the value of LCC is four.
`CLA“ indicates the use of secure messaging, Le, the bit
`D4 is equal to ‘l
`in CLA which is equal to ‘0X',
`'8X’, ’9X‘ or
`'AX' according to table 9.
`
`— Case 1 — No data, no data
`
`The unsecured command-response pair is as follows.
`Command header
`Command body
`
`The secured command APDU is as follows.
`Command header
`Command body
`CLA’
`INS P1 P2
`New Lcfield (one byte = '06') ll
`New data field
`(six bytes)
`
`New data field = One data object =
`ch ll Lcc ll CC
`
`Data covered by CC (133:1 in CLA‘) = One block =
`CH ll PB
`
`The secured response APDU is as follows
`Response bod
`
`Res. nee trailer
`New 5m swz
`
`— Case 1.b — Status to be protected
`
`The secured command APDU is as follows.
`Command header
`Command body
`New LC field (one byte =‘06’) ll
`New data field
`{six bytes)
`New Le held
`(one byte : ’00’)
`
`ll
`
`CLA‘ lNS P1 P2
`
`New data field = One data object =
`To: ll LCC ll CC
`
`Data covered by CC (b3=1 in CLA’) = One block =
`CH ll PB
`
`The secured response APDU is as follows.
`Response body
`New data field
`
`Response trailer
`New SW1 SW2
`
`New data field = Two data obiects =
`Tsw (131:1) ll st ll SW (= New SW1 SW2) ll
`ch ll LCC ll CC
`
`Response body
`
`Response trailer
`sww SW2
`
`Data covered by CC = One block =
`Tsw "31:1, ll st ll SW M PB
`
`COPYRIGHT 2000 International Organization for Standardization
`March 03, 2000
`1:21:01
`
`Information Handling Serv1ces,
`
`Apple Ex. 1030, p. 12
`Apple Ex. 1030, p. 12
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020—00019
` IPR2020-00019
`
`

`

`STD-ISO 7BLE-H-EN6L 1:335 - HBSL‘IUB U?33l:E'-l UTE -
`
`ISOI'IEC 781 6-4:1995lAmd.1 :1 997(E)
`
`© lSO/lEC
`
`— Case 2 — No data. data
`
`The secured response APDU is as follows.
`Response body
`Empty
`
`Response trailer
`New SW1 SW2
`
`The unsecured command—response pair is as follows.
`Command header
`Command body
`CLA INS P1 P2
`Lefield
`Response body
`Data field
`
`Res-onse trailer
`SW1 SW2
`
`pl The secured command APDU is as follows.
`
`— Case 3.b — Status to be
`
`retested
`
`The secured command APDU is as follows.
`Command header
`body
`CLA‘
`INS P1 P2
`New Lc field ll New data field ll
`New Le field (one or two bytes — ‘OO'l
`
`New data field : Two data objects :
`TLE (b1=1) ll LLE ll LE ll
`
`ch " Lcc " CC
`Data covered by CC =
`0 One block if [33:0 in CLA* =
`TLE (bl=1l ll LLE ll LE ll PB
`0 Two blocks if b3=1 m CLA* =
`CH ll P8 n
`TLE (131:1) ll LLE |I LE 11 PB
`
`The secured response APDU is as follows.
`
`New data field = Three data obiects =
`Tpv (b1=1) ll va ll PV ll
`%:V‘EI(E:C_J )CHCLSW ll SW (_ New SW1 SW2] H
`Data covered by CC = One or more blocks =
`TPV (bl=l) ll va ll PV ll [TSW (b1=l) ll st ll SW1 ll PB
`
`— Case 3 — Data. no data
`
`The unsecured command-response pair is as follows.
`Command header
`Command body
`CLA INS P1 P2
`l.c field
`ll Data field
`
`Response bodv
`Empty
`
`Response “"3"”
`SW1 SW2
`
`—— Case 3.a — Status not to be protected
`
`The secure‘j command APDU '5 as fo'lows‘
`Command header
`Command body
`cw P1 P2
`
`New data field = Two data objects =
`TW (b1=ll u LW ll Pv ll
`Tee ll Lcc ll CC
`
`4
`_
`Data COVEVEd by CC =
`. One or more b‘OCkS If b3=0 In CLA* =
`TPv lb1=1l II LW ll PV n PB
`. Two or more blocks if b3=1 in CLA“ =
`CH ll PB ll
`Tpvlb1=ll ” Lw H W N PB
`
`Command header
`CLA" INS P1 P2
`
`Command body
`i:
`New LC field
`ll New datafield
`New l.e field (one or two bytes = '00')
`
`New data field = Two data objects =
`TW lb1=1) ll va ll PV ll
`ch ll Lu; ll CC
`
`Data covered by CC =
`. One or more blocks if b3=0 in CLA* =
`TPV (blzl) ll LFV ll PV 1! PB
`* Two or more blocks if b3=l in CLA‘ =
`CH ll PB ll
`TE“, (b1=1) 1| LW 11 PV H FB
`
`The secured response APDU is as follows.
`Response body
`
`Response [raner
`
`.
`.
`New data field = Two data objects =
`Tsw {ma} ll Law II SW (= New SW1 SW2) ll
`ch ll LCC ll CC
`Date covered by CC = One block =
`TSW (131:1; 11 st 11 SW ll PB
`
`-- Case 4 —- Data, data
`
`The unsecured command-response pair is as follows
`Command header
`Command bod
`
`Lc field ll Data field ll Lefield
`CLA lNS P1 P2
`Res . onse body
`Response trailer
`Data field
`SW1 SW2
`
`The secured command APDU is as follows.
`Command header
`Command body
`
`CLA* INS P1 P2
`
`11
`11 New data field
`New Lc field
`New Le field (one or two bytes = '00“)
`
`New data field = Three data objects =
`TPV (b1=1) ll LW |l PV II
`TLE lb1=1> 11
`l.LIE 11 LE 11
`ch ll LCC ll CC
`
`Data covered by CC =
`0 One or more blocks [f [33:0 in CLA“ :
`TPV (131:1) 1| LW ll PV 11 TLE (131:1) 11 LLE 11 LE ll PB
`0 Two or more blocks if b3=1 in CLA* =
`CH ll PB ll
`TPV lb1=1) 1| LW 11 PV u TLE (131:1) ll LE 11 LE 11 PB
`
`4
`
`COPYRIGHT 2000 International Organization for Standardization
`March 03, 2000
`11:21:01
`
`Information Handling Services,
`
`Apple Ex. 1030, p. 13
`Apple Ex. 1030, p. 13
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`STD-ISO ?Blb-H-ENGL 1:195 - ”551903 l]?33|=E'S T33 -
`
`© lSO/lEC
`
`ISO/IEO 7'81 64:1 995]Amd.1 :1 997(E)
`
`The secured response APDU is as follows.
`Re onse bod
`New data field
`
`Re a - rise trailer
`New SW1 SW2
`
`New data field = Three data objects =
`Tpv(b1=1, ll vall PV ll
`l‘rsw ib1=1i u stn sw (= New swx swan n
`ch n LCC ll cc
`
`F.4 Control references
`
`The use of control references (see 5.65.1) is shown,
`
`Command data field =
`TCR ll
`i.CR ll CR
`where CR = TFR ll L5,; ll FR ll Tm ll LKR ll KR
`
`Data covered by CC = One or more blocks =
`Tpv (b1=1) ll Lev ll PV ll [Tsw lb‘l =1) ll st ll SW! ll PB
`
`F.5 Response descriptor
`
`F.3 Cryptograms
`
`The use of cryptograms with and without padding (see
`5.8.4) is shown in data fields (command APDU as well as
`response APDU). Instead of the plain value data objects
`in the previous examples. data objects for confidentiality
`shall be used as follows.
`
`— Case a — Plain data not coded in BER-TLV
`
`Data field =
`Tplce ll LP, CG ii Pl u CG
`
`Data carried by CC: = One or more blocks =
`Non BER-TLV coded data
`and padding bytes according to Pl
`
`— Case b — Plain data coded in BER-TLV
`
`Data field =
`TCG ll LCG u CG
`
`Data carried by CG = String of concealed bytes =
`BER—TLV data objects (padding depending on the
`algorithm and its mode of operation)
`
`The use of response descriptors (see 5.6.5.2) is shown.
`
`Command data field =
`Tao ll Lao ll RD
`where RD = Tpv ll
`
`'00’ ll Tc: ll ’00’
`
`Response data field =
`Tpv ll LPV ll PV ll ch ll Lcc I! CC
`
`F.6 ENVELOPE command
`
`The use of the ENVELOPE command (see 7.2) is shown.
`
`Command data field =
`TP‘ ca ll LPICS ll Pl ll CG
`Data carried by CG =
`Command APDU (starting by CH)
`and padding bytes according to Pl
`
`Response data field =
`Tm 0; ll LPr cc II Pl l3 CG
`Data carried by CG =
`Response APDU
`and padding bytes according to Pl
`
`COPYRIGHT 2000 International Organization for Standardization
`March 03, 2000
`1:21:01
`
`Information Handling SerVices,
`
`Apple Ex. 1030, p. 14
`Apple Ex. 1030, p. 14
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020—00019
` IPR2020-00019
`
`

`

`STD-ISO T’Ellla-H-ENGL l‘I‘iS - ”551303 [1733585 I=|75 -
`
`
`
`ISOIIEC 781 6-4:1 995/Amd.1 :1 997(E)
`
`© ISOIIEC
`
`m I
`
`CS 35.240.15
`Descriptors: data processing.
`Price based on 5 pages
`W
`
`information interchange.
`
`identification cards,
`
`iC cards, messages, security techniques, authentication.
`
`COPYRIGHT 2000 International Organization for Standardization
`March 03, 2000
`11:21:01
`
`Information Handling Services,
`
`Apple Ex. 1030, p. 15
`Apple Ex. 1030, p. 15
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020—00019
` IPR2020-00019
`
`

`

`- HBSL‘HBB Elk-251382 TUB -
`
`INTERNATIONAL
`STANDARD
`
`ISO/IEC
`7816-4
`
`First edition
`19950901
`
`
`
`Information technology — Identification
`cards — Integrated circuifls) cards with
`contacts —
`
`Part 4:
`
`Interindustry commands for interchange
`
`Tee/meiogies de l'information — Canes d’identification — Games a
`Circuifls} intégré(s) a conlacts —
`
`Partfe 4: Commandes Ihtersectoriefles pour {es échanges
`
`
`
`
`
`IEC
`.
`
`Reference number
`ISO/IEC 7816-4:1995(E>
`
`
`COPYRIGHT 2000 International Organization for Standardization
`Information Handling Services,
`11:21:01
`March 03 , 2000
`
`Apple Ex. 1030, p. 16
`Apple Ex. 1030, p. 16
` Apple v. Fintiv
`Apple v. Fintiv
`|PR2020-00019
` IPR2020-00019
`
`

`

`
`
`- HBSL‘IDB BEEBUBB ”Mil -
`
`lSO/IEC 7816-4: 1995 (E)
`
`contents
`
`Page
`
`Foreword ..........................................................................................................
`
`introduction ..........................................................

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket