You are on page 1of 1

ISO/IEC 7816-4:2005(E)

This is a preview - click here to buy the full publication

5.1.2

Instruction byte

INS indicates the command to process. Due to specifications in ISO/IEC 7816-3, the values '6X' and '9X' are invalid. Table 4 lists all the commands specified in ISO/IEC 7816 at the time of publication. Table 4.1, i.e., the left side, lists the command names in the alphabetic order. Table 4.2, i.e., the right side, lists the INS codes in the numeric order. Table 4.1 Commands in the alphabetic order
Command name INS '44' 'E2' CHANGE REFERENCE DATA '24' CREATE FILE 'E0' DEACTIVATE FILE '04' DELETE FILE 'E4' DISABLE VERIFICATION REQUIREMENT '26' ENABLE VERIFICATION REQUIREMENT '28' ENVELOPE 'C2', 'C3' ERASE BINARY '0E', '0F' ERASE RECORD (S) '0C' EXTERNAL (/ MUTUAL) AUTHENTICATE '82' GENERAL AUTHENTICATE '86', '87' GENERATE ASYMMETRIC KEY PAIR '46' GET CHALLENGE '84' GET DATA 'CA', 'CB' GET RESPONSE 'C0' INTERNAL AUTHENTICATE '88' MANAGE CHANNEL '70' MANAGE SECURITY ENVIRONMENT '22' PERFORM SCQL OPERATION '10' PERFORM SECURITY OPERATION '2A' PERFORM TRANSACTION OPERATION '12' PERFORM USER OPERATION '14' PUT DATA 'DA', 'DB' READ BINARY 'B0', 'B1' READ RECORD (S) 'B2', 'B3' RESET RETRY COUNTER '2C' SEARCH BINARY 'A0', 'A1' SEARCH RECORD 'A2' SELECT 'A4' TERMINATE CARD USAGE 'FE' TERMINATE DF 'E6' TERMINATE EF 'E8' UPDATE BINARY 'D6', 'D7' UPDATE RECORD 'DC', 'DD' VERIFY '20', '21' WRITE BINARY 'D0', 'D1' WRITE RECORD 'D2'
ACTIVATE FILE APPEND RECORD

Table 4.2 Commands in the numeric order


INS '04' '0C' '0E', '0F' '10' '12' '14' '20', '21' '22' '24' '26' '28' '2A' '2C' '44' '46' '70' '82' '84' '86', '87' '88' 'A0', 'A1' 'A2' 'A4' 'B0', 'B1' 'B2', 'B3' 'C0' 'C2', 'C3' 'CA', 'CB' 'D0', 'D1' 'D2' 'D6', 'D7' 'DA', 'DB' 'DC', 'DD' 'E0' 'E2' 'E4' 'E6' 'E8' 'FE' Command name
DEACTIVATE FILE ERASE RECORD (S) ERASE BINARY PERFORM SCQL OPERATION PERFORM TRANSACTION OPERATION PERFORM USER OPERATION VERIFY MANAGE SECURITY ENVIRONMENT CHANGE REFERENCE DATA DISABLE VERIFICATION REQUIREMENT ENABLE VERIFICATION REQUIREMENT PERFORM SECURITY OPERATION RESET RETRY COUNTER ACTIVATE FILE GENERATE ASYMMETRIC KEY PAIR MANAGE CHANNEL EXTERNAL (/ MUTUAL) AUTHENTICATE GET CHALLENGE GENERAL AUTHENTICATE INTERNAL AUTHENTICATE SEARCH BINARY SEARCH RECORD SELECT READ BINARY READ RECORD (S) GET RESPONSE ENVELOPE GET DATA WRITE BINARY WRITE RECORD UPDATE BINARY PUT DATA UPDATE RECORD CREATE FILE APPEND RECORD DELETE FILE TERMINATE DF TERMINATE EF TERMINATE CARD USAGE

See Part 9 7.3.7 7.5.7 Part 9 Part 9 Part 9 7.5.9 7.5.8 7.6.2 7.2.7 7.3.8 7.5.4 7.5.5 Part 8 7.5.3 7.4.2 7.6.1 7.5.2 7.1.2 7.5.11 Part 7 Part 8 Part 7 Part 7 7.4.3 7.2.3 7.3.3 7.5.10 7.2.6 7.3.7 7.1.1 Part 9 Part 9 Part 9 7.2.5 7.3.5 7.5.6 7.2.4 7.3.4

See Part 9 7.3.8 7.2.7 Part 7 Part 7 Part 7 7.5.6 7.5.11 7.5.7 7.5.9 7.5.8 Part 8 7.5.10 Part 9 Part 8 7.1.2 7.5.4 7.5.3 7.5.5 7.5.2 7.2.6 7.3.7 7.1.1 7.2.3 7.3.3 7.6.1 7.6.2 7.4.2 7.2.6 7.3.4 7.2.5 7.4.3 7.3.5 Part 9 7.3.6 Part 9 Part 9 Part 9 Part 9
17.

In the interindustry class, any valid INS code not defined in ISO/IEC 7816 is reserved for future use by ISO/IEC JTC 1/SC

ISO/IEC 7816 specifies the use of those commands in the interindustry class. This document (see 7) specifies commands for interchange. ISO/IEC 7816-7[4] specifies commands for structured card query language (SCQL). ISO/IEC 7816-8 [4] specifies commands for security operations. ISO/IEC 7816-9 [4] specifies commands for card management.

10

ISO/IEC 2005 All rights reserved

You might also like