throbber
Case 6:21-cv-00916-ADA Document 43-5 Filed 04/19/22 Page 1 of 13
`Case 6:21-cv-00916-ADA Document 43-5 Filed 04/19/22 Page 1 of 13
`
`EXHIBIT 5
`EXHIBIT 5
`
`

`

`Case 6:21-cv-00916-ADA Document 43-5 Filed 04/19/22 Page 2 of 13
`
`Wolfgang Rankl Wolfgang Effing
`
`Smart
`Card
`
`Hand
`
`ti
`
`Third Edition
`
`*WI LEY
`
`GOOG-1011
`GOOGLE LLC v. RFCYBER CORP. / Page 1 of 1123
`
`APL-RFC0916-PA-00005003
`
`

`

`Case 6:21-cv-00916-ADA Document 43-5 Filed 04/19/22 Page 3 of 13
`
`Smart Card
`Handbook
`Third Edition
`
`Wolfgang Rankl and Wolfgang Effing
`Giesecke & Devrient GmbH, Munich, Germany
`
`Translated by
`Kenneth Cox
`Kenneth Cox Technical Translations, Wassenaar, The Netherlands
`
`John Wiley & Sons, Ltd
`
`GOOG-1011
`GOOGLE LLC v. RFCYBER CORP. / Page 2 of 1123
`
`APL-RFC0916-PA-00005004
`
`

`

`Case 6:21-cv-00916-ADA Document 43-5 Filed 04/19/22 Page 4 of 13
`
`GOOG-1011
`GOOGLE LLC v. RFCYBER CORP. / Page 3 of 1123
`
`APL-RFC0916-PA-00005005
`
`

`

`Case 6:21-cv-00916-ADA Document 43-5 Filed 04/19/22 Page 5 of 13
`
`Smart Card
`Handbook
`
`Third Edition
`
`GOOG-1011
`GOOGLE LLC v. RFCYBER CORP. / Page 4 of 1123
`
`APL-RFC0916-PA-00005006
`
`

`

`Case 6:21-cv-00916-ADA Document 43-5 Filed 04/19/22 Page 6 of 13
`
`GOOG-1011
`GOOGLE LLC v. RFCYBER CORP. / Page 5 of 1123
`
`APL-RFC0916-PA-00005007
`
`

`

`Case 6:21-cv-00916-ADA Document 43-5 Filed 04/19/22 Page 7 of 13
`
`Smart Card
`Handbook
`Third Edition
`
`Wolfgang Rankl and Wolfgang Effing
`Giesecke & Devrient GmbH, Munich, Germany
`
`Translated by
`Kenneth Cox
`Kenneth Cox Technical Translations, Wassenaar, The Netherlands
`
`John Wiley & Sons, Ltd
`
`GOOG-1011
`GOOGLE LLC v. RFCYBER CORP. / Page 6 of 1123
`
`APL-RFC0916-PA-00005008
`
`

`

`Case 6:21-cv-00916-ADA Document 43-5 Filed 04/19/22 Page 8 of 13
`
`First published under the title Handbuch der Chipkanen by Carl Hanser Verlag
`© Carl Hansel. Verlag, Munich/FRG, 2002
`All rights reserved.
`Authorized translation from the 4th edition in the original German language
`published by Carl Hanser Verlag, Munich/FRG.
`
`Copyright © 2003 John Wiley & Sons Ltd, Baffins Lane, Chichester
`West Sussex, PO19 IUD, England
`
`National 01243 779777
`International (+44) 1243 779777
`
`Email (for orders and customer service enquiries): cs-books@wiley.co.uk
`Visit our Home Page on www.wileyeurope.com or www.wiley.com
`
`All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any
`means, electronic, mechanical, photocopying, recording. scanning or otherwise, except under the terms of the Copyright, Designs
`and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road.
`London W IT 4LP, UK, without the permission in writing of the Publisher. Requests to the Publisher should be addressed to the
`Permissions Department.
`John Wiley & Sons Ltd, The Atrium, Southern Gate. Chichester, West Sussex PO19 8SQ, England, or emai led to
`permreq@wiley.co.uk. or faxed to (+44) 1243 770571.
`
`This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the
`understanding that the Publisher is not engaged in rendering professional services. If professional advice or other expert assistance is
`required. the services of a competent professional should be sought.
`
`Other Wiley Editorial Offices
`
`John Wiley & Sons Inc., 111 River Street, Hoboken, NJ 07030, USA
`
`Jossey-Bass, 989 Market Street. San Francisco, CA 94103-1741, USA
`
`Wiley-VCH Verlag GmbH, Boschstr. 12, D-69469 Weinheim, Germany
`
`John Wiley & Sons Australia Ltd, 33 Park Road. Milton, Queensland 4064, Australia
`
`John Wiley & Sons (Asia) Pte Ltd. 2 Clementi Loop #02-01, J in Xing Distripark, Singapore 129809
`
`John Wiley & Sons Canada Ltd, 22 Worcester Road, Etobicoke. Ontario. Canada M9W ILI
`
`Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic
`hooks.
`
`Library of Congress Cataloging-in-Publication Data
`Rankl, W. (Wolfgang)
`(Handbuch der Chipkarten. English)
`Smart card handbook / Wolfgang Rankl and Wolfgang Effing. — 3rd ed.
`p.
`cm.
`Includes bibliographical references and index.
`ISBN 0-470-85668-8 (alk. paper)
`1. Smart cards—Handbooks, manuals, etc. I. Effing, W. (Wolfgang) II. Title.
`TK7895.S62R3613 2003
`006 - dc22
`
`2003062750
`
`British Library Cataloguing in Publication Data
`
`A catalogue record for this book is available from the British Library
`
`ISBN 0.470-85668-8
`
`Typeset in 10/12pt Times by TechBooks. New Delhi, India
`Printed and bound in Great Britain by Antony Rowe Ltd. Chippenham Wiltshire
`This book is printed on acid-free paper responsibly manufactured from sustainable forestry
`in which at least two trees are planted for each one used for paper production.
`
`GOOG-1011
`GOOGLE LLC v. RFCYBER CORP. / Page 7 of 1123
`
`APL-RFC0916-PA-00005009
`
`

`

`Case 6:21-cv-00916-ADA Document 43-5 Filed 04/19/22 Page 9 of 13
`
`Contents
`
`Preface to the Third Edition
`Symbols and Notation
`Program Code Conventions
`Abbreviations
`
`1 Introduction
`1.1 The History of Smart Cards
`1.2 Application Areas
`1.2.1 Memory cards
`1.2.2 Microprocessor cards
`1.2.3 Contactless cards
`1.3 Standardization
`
`2 Types of Cards
`2.1 Embossed Cards
`2.2 Magnetic-stripe Cards
`2.3 Smart Cards
`2.3.1 Memory cards
`2.3.2 Microprocessor cards
`2.3.3 Contactless smart cards
`2.4 Optical Memory Cards
`
`3 Physical and Electrical Properties
`3.1 Physical Properties
`3.1.1 Card formats
`3.1.2 Card components and security features
`3.2 The Card Body
`3.2.1 Card materials
`3.2.2 Chip modules
`3.3 Electrical Properties
`3.3.1 Electrical connections
`3.3.2 Supply voltage
`
`xiii
`xv
`xvii
`xix
`
`1
`2
`5
`6
`6
`8
`9
`
`15
`15
`16
`18
`19
`20
`21
`23
`
`27
`27
`28
`31
`38
`40
`42
`52
`53
`55
`
`GOOG-1011
`GOOGLE LLC v. RFCYBER CORP. / Page 8 of 1123
`
`APL-RFC0916-PA-00005010
`
`

`

`Case 6:21-cv-00916-ADA Document 43-5 Filed 04/19/22 Page 10 of 13
`
`688
`
`Smart Cards in Payment Systems
`
`or services that are accepted by the user and paid using an electronic purse. The `acquirer' is
`responsible for establishing and managing the data links between the purse issuer and the ser-
`vice providers. He may also consolidate the individual transactions arriving from the payment
`facilities, so that the purse provider only receives collective certificates. The `load agent' is the
`counterpart of the service provider, since he can reload the electronic purse in exchange for a
`payment.
`These five parties need not all be real persons or firms; they may also be virtual. However,
`real technical components are allocated to each of them, classified according to their level
`of security. Components that are regarded as secure prevent any external manipulation of the
`data that are processed or stored within them. With components regarded as non-secure, such
`manipulation is at least theoretically possible. However, the system as a whole is designed
`such that the manipulation of any of the components identified as non-secure in Figure 12.8
`will not affect the overall security of the system.
`Here the abbreviation `IEP' stands for `inter-sector electronic purse' and refers to an in-
`tersector electronic purse application in a smart card. A purchase device is used to pay for
`received goods or services. It is a terminal with keypad and display, and it must also have a
`security module. The term `secure application module' (SAM) is used in the standard to refer
`to all types of security modules. A SAM contains all secret keys necessary for transactions
`between the IEP and the central computer of the purse provider. Naturally, the keys never leave
`
`central computer
`of the purse provider
`
`PPSAM
`
`LSAM
`
`load agent
`
`central computer
`of the acquirer
`
`multi-sector
`electronic purse
`
`purchase device
`
`PSAM
`
`Figure 12.8 Components and connections of electronic purse systems according to EN 1546. The
`components with a single outline are not secure, while those with a double outline are secure
`
`GOOG-1011
`GOOGLE LLC v. RFCYBER CORP. / Page 723 of 1123
`
`APL-RFC0916-PA-00005725
`
`

`

`Case 6:21-cv-00916-ADA Document 43-5 Filed 04/19/22 Page 11 of 13
`
`16
`Appendix
`
`16.1 GLOSSARY
`
`The following pages contain a list of terms typically used in the smart card world. Precise,
`comprehensive definitions of terms can also be found in the ISO/IEC 7816 family of standards.
`The equivalent standard in the area of electronic purses with regard to terminology is EN 1546,
`which comprehensively and concisely defines and explains all of the associated technical terms.
`The keywords in this glossary are listed as abbreviations or in full according to customary
`usage. An arrow symbol (—>) in front of a term refers to another entry in the glossary in which
`the term (set in italics) is explained.
`Larger collections of general terms used in informatics can be found in the DIN 44 300
`standard and numerous lexicons devoted to EDP terminology, such as [Pfaffenberger 97,
`Dictionary of Computing 91].
`
`AP card
`
`An alternate designation for —> microprocessor card.
`
`0-PIN
`
`A common, known PIN used for all newly issued -+ smart cards, which does not allow access
`to the actual user functions. It is thus a type of —> trivial PIN. The first time the card is used, the
`0-PIN must be changed to a user-selected PIN using the usual mechanisms (usually CHANGE
`CHV), with the value of the 0-PIN not being an allowed value for the new PIN. The purpose of
`a 0-PIN is to allow the user to unambiguously determine whether the card is still in its original
`issued state when he or she receives it or has been illicitly used while underway. The term
``0-PIN' comes from the fact that the value "0000" is often used for this type of PIN.
`
`Smart Card Handbook, Third Edition. W. Rank! and W. Effing
`O 2004 John Wiley & Sons, Ltd ISBN: 0-470-85668-8
`
`GOOG-1011
`GOOGLE LLC v. RFCYBER CORP. / Page 932 of 1123
`
`APL-RFC0916-PA-00005934
`
`

`

`Case 6:21-cv-00916-ADA Document 43-5 Filed 04/19/22 Page 12 of 13
`
`924
`
`Appendix
`
`EDC (error detection code)
`
`A data checksum. An EDC can be used to allow errors in the data to be detected with a certain
`probability. Typical examples of EDCs are the XOR and CRC checksums used in various data
`transmission protocols.
`
`EDGE (Enhanced Data Rates for GSM and TDMA Evolution)
`
`EDGE is intended to be the final evolutionary step for GSM networks. The EDGE specification
`allows a GSM mobile telephone to connect to a base station with a data rate of up to 384 kbit/s
`by using a different modulation scheme, without altering the existing network infrastructure.
`
`EEPROM (electrically erasable programmable read-only memory)
`
`A type of non-volatile memory, which is used in —> smart cards. An EEPROM is divided
`into `pages' of memory, with the page size being called its —> granularity. The content of a
`memory page can only be altered or erased as an entity, and there is a physically determined
`upper limit to the number of write or erase cycles.16 Data storage in an EEPROM cell is based
`on the Fowler—Nordheim effect, rather than hot electron injection as with —> Flash EEPROM.
`The typical write time for EEPROM is 3 ms per memory page.
`
`EF (elementary file)
`
`The actual data storage element in a smart card file tree. An EF has either the attribute `working'
`(for use by the terminal) or `internal' (for use by the smart card operating system), and an
`internal structure (transparent, linear fixed, linear variable, cyclic, etc.).'7
`
`Electronic check
`
`An —> electronic purse variant using fixed, non-divisible monetary amounts. This type of
`payment is often referred to as `pay before'.I8
`
`Electronic purse (e-purse)
`
`A card with a chip that must be loaded with an amount of money before it can be used for
`making payments. This type of payment is often called `pay before'. Some typical examples are
`the German Geldkarte, the Austrian Quick purse, Visa Cash, Proton and Mondex. Electronic
`purses may also support —> purse-to-purse transactions.19
`
`16 See also Section 3.4.2, `Memory types'
`11 See also Section 5.6.4, `EF file structures'
`18 See also Section 12.1.2, `Electronic money'
`18 See also Section 12.1.2. 'Electronic money'
`
`GOOG-1011
`GOOGLE LLC v. RFCYBER CORP. / Page 959 of 1123
`
`APL-RFC0916-PA-00005961
`
`

`

`Case 6:21-cv-00916-ADA Document 43-5 Filed 04/19/22 Page 13 of 13
`Case 6:21-cv-00916-ADA Document 43-5 Filed 04/19/22 Page 13 of 13
`
`
`
`16.1 Glossary 965
`
`the various stages of the > life cycle of a smart card. In the simplest case different security
`environments would be defined for the personalization and subsequent use of the card, so that
`different file —~ access conditions would be specified for the different stages of the smart card
`life cycle. Write access would be allowed to all files for personalization, but for normal use
`the access conditions would be specified according to the actual — application.
`
`Security module
`
`A componentthat is secured both mechanically and computationally and is used to store secret
`data and execute cryptographic algorithms. It is also known as a secure application module
`(SAM), hardware security module (HSM) or host security module (HSM).
`
`Security target
`
`In the context of an —> evaluation, security targets describe the mechanismsto be tested for the
`— target of evaluation. They thus represent a sort of requirements catalog for the evaluation.
`The security targets for specific types of targets of evaluation and specific application areas
`for targets of evaluation can be described using — protection profiles.
`
`Seed number(seed)
`
`A random number used as the initial value for a pseudorandom number generator.
`
`Sequence control
`
`A methodfor specifying a compulsory sequenceof activities. For example, the correct sequence
`of — commands for mutual authentication of a > smart card and a background system can
`be enforced using sequence control in the smart card. This is done by specifying the states
`and state transitions of a state machine in the — smart card operating system that defines the
`command sequence that must be followed.*’
`
`Serial data transmission
`
`A type of data transmission in which individual data bits are sent sequentially along a data
`line. (— parallel data transmission}
`
`Service provider
`
`In a smart card system, an entity offering services that are used and paid for by auser. In the
`case of an electronic purse system, a service provideris an entity that receives money fromthe
`electronic purse of a purse holder in exchange for goodsor services.
`
`47 See also Section 5.8, ‘Sequence Control’
`
`GOOG-1011
`GOOGLE LLC v. RFCYBER CORP. / Page 1000 of 1123
`
`APL-RFCO0916-PA-00006002
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket