Skip to product information
1 of 12

PayPal, credit cards. Download editable-PDF & invoice in 1 second!

JR/T 0025.16-2013 English PDF (JRT0025.16-2013)

JR/T 0025.16-2013 English PDF (JRT0025.16-2013)

Regular price $180.00 USD
Regular price Sale price $180.00 USD
Sale Sold out
Shipping calculated at checkout.
Quotation: 24-hr self-service. Click JR/T 0025.16-2013
See Chinese contents: JR/T 0025.16-2013

JR/T 0025.16-2013: China financial integrated circuit card specifications. Part 16: IC card internet terminal specification

This Part describes the requirements and regulations for IC card internet terminals in terms of hardware requirements, interface protocols, command sets, personalization and security systems.
JR/T 0025.16-2013
JR
FINANCIAL INDUSTRY STANDARD
OF THE PEOPLE REPUBLIC OF CHINA
ICS 35.240.40
A 11
Filing No..
China financial integrated circuit card specifications -
Part 16. IC card internet terminal specification
ISSUED ON. FEBRUARY 5, 2013
IMPLEMENTED ON. FEBRUARY 5, 2013
Issued by. The PEOPLE Bank of China
3. No action is required - Full-copy of this standard will be automatically and immediately delivered to your EMAIL address in 0~60 minutes.
Table of Contents
Foreword ... 3
1 Scope ... 5
2 Normative references ... 5
3 Terms and definitions ... 6
4 Symbols and abbreviated terms ... 10
5 Terminal hardware requirements ... 11
6 General terminal requirements ... 13
7 Terminal personalization ... 14
8 Security system ... 17
9 Terminal transaction process ... 21
10 Terminal interface protocol ... 23
Annex A (Normative) Terminal command set ... 24
Annex B (Normative) Calculation method of Message Authentication Code
(MAC) ... 61
Annex C (Informative) Example of secure channel setup process ... 65
Annex D (Normative) Requirements for terminal supporting dual process
center ... 68
Foreword
JR/T 0025 China financial integrated circuit card specifications is divided into the following parts.
?€? Part 1. Electronic purse / electronic deposit application card specification (abolished);
?€? Part 2. Electronic purse / electronic deposit application specification (abolished);
?€? Part 3. Specification on application independent ICC to terminal interface requirements;
?€? Part 4. Debit / Credit application overview;
?€? Part 5. Debit / Credit application card specification;
?€? Part 6. Debit / Credit application terminal specification;
?€? Part 7. Debit / Credit application security specification;
?€? Part 8. Contactless specification independent of application;
?€? Part 9. Electronic purse extended application guide;
?€? Part 10. Debit / Credit card personalization guide;
?€? Part 11. Contactless integrated circuit card communication specification; ?€? Part 12. Contactless integrated circuit card payment specification;
?€? Part 13. Low-value payment specifications based on debit / credit
application;
?€? Part 14. Comprehensive application specification based on contactless low-value payment application;
?€? Part 15. Electronic cash dual-currency payment specification;
?€? Part 16. IC card internet terminal specification;
?€? Part 17. Enhanced debit / credit application security specification.
This Part is Part 16 of JR/T 0025.
This Part was drafted in accordance with the provisions given in GB/T 1.1-2009. China financial integrated circuit card specifications -
Part 16. IC card internet terminal specification
1 Scope
This Part describes the requirements and regulations for IC card internet terminals in terms of hardware requirements, interface protocols, command sets, personalization and security systems.
This Part is applicable to the financial IC card internet terminal equipment defined conforming to the JR/T 0025 specification. Such equipment is mainly used in the departments (authorities) related to the application design, manufacturing, management and acceptance as well as the development,
integration and maintenance of the application systems associated with the IC card internet terminal applications.
All the terminals mentioned in this Part, unless otherwise specified, refer to the IC card internet terminals.
This Part describes the rules of using IC card internet terminals on personal computers. For the rules of use in other application environments (such as smart phones, tablets, etc.), REFER to the provisions of this Part.
2 Normative references
The following documents are essential to the application of this document. For dated references, only the editions with the dates indicated are applicable to this document. For undated references, only the latest editions (including all the amendments) are applicable to this document.
JR/T 0025.3 China financial integrated circuit card specifications - Part 3. Specification on application independent ICC to terminal interface
requirements
JR/T 0025.6 China financial integrated circuit card specifications - Part 6. Debit / Credit application terminal specification
JR/T 0025.7 China financial integrated circuit card specifications - Part 7. Debit / Credit application security specification
JR/T 0025.8 China financial integrated circuit card specifications - Part 8. Contactless specification independent of application
JR/T 0025.17 China financial integrated circuit card specifications - Part 17. Enhanced debit / credit application security specification
ISO/IEC 8859-1 ~ ISO/IEC 8859-10 Information technology - 8-bit single- byte coded graphic character sets
ISO/IEC 9797-1 Information technology - Security techniques - Message
Authentication Codes (MACs) - Part 1. Mechanisms using a block cipher
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply. 3.1 Application
Application protocols and related data sets between cards and terminals. 3.2 Asymmetric cryptographic technique
Cryptographic technique that uses two related transformations, a public transformation (defined by the public key) and a private transformation (defined by the private key). The two transformations have the property that, given the public transformation, it is computationally infeasible to derive the private transformation.
3.3 Authentication
Measures for conforming the identity claimed by an entity.
3.4 Certificate
Unforgeable data formed by the certification authority issuing the certificate using its private key to sign the entity?€?s public key, identity information and other related information.
3.5 Certification authority
A trusted third party that certifies that the public key and other related information are associated with their owners, which is hereinafter referred to as CA certification center or CA center.
3.6 Certification authority root certificate
Unforgeable public key information of an entity signed by the certification authority.
3.26 Load
The process of increasing the EC balance in the card.
3.27 Record Protocol
It is based on a reliable transmission protocol for providing the application layer protocol with the support for basic functions such as data encapsulation, compression, encryption, etc.
3.28 Response
The message returned to the terminal after the IC card processes the received command message.
3.29 Secure channel
A secure communication channel established between the IC card internet terminal and the process center.
3.30 Script
Commands or command sequences sent by the issuer to the terminal, for
continuous command input into the IC card.
3.31 Secure channel command
The command for the terminal to performing the operations such as
establishing secure channel between the terminal and the process center, managing the digital certificates, etc.
3.32 Symmetric cryptographic technique
Cryptographic technique using the same secret key for both the sender?€?s and the recipient?€?s data transformation. In the absence of a secret key, it is impossible to derive the data transformation of the sender or the recipient. 3.33 Terminal certificate
A unique digital certificate conforming to the X.509 format and used for identifying the terminal devices, which is written into each terminal device during pre-personalization.
3.34 Transaction command
The terminal?€?s secure storage space shall at least meet the secure storage requirements for certificates and keys required for the transactions involved in this Part.
5.2 Requirements for trusted platform module
The terminal shall adopt the trusted platform module with the capability of key generation and digital signature operation, so as to ensure that sensitive operations are carried out within the trusted platform module, without revealing sensitive information or affecting security functions.
The trusted platform module shall have a separate unreadable area, used for storing the terminal private key, terminal key and other important information representative of the unique terminal. There shall be no mechanism for
outputting plaintext private keys, plaintext keys or plaintext PINs. In addition, the keys or PINs shall not be encrypted using a key that might already be compromised.
The random numbers involved in the key operation shall be generated by the trusted platform module. Its random index shall conform to the general
international standard for hardware random number generation.
5.3 Hardware composition
5.3.1 IC card reader module
The terminal shall be equipped with ...

View full details