ImageVerifierCode 换一换
格式:PDF , 页数:97 ,大小:18.31MB ,
资源ID:8645730      下载积分:17 文币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.wenkunet.com/d-8645730.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录   微博登录 

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(建筑行业标准规范CJ-T166-2014建设事业集成电路(IC)卡应用技术条件.pdf)为本站会员(空登山)主动上传,文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知文库网(发送邮件至13560552955@163.com或直接QQ联系客服),我们立即给予删除!

建筑行业标准规范CJ-T166-2014建设事业集成电路(IC)卡应用技术条件.pdf

1、rcs 35.240.60P07GJ+#A R,+f,n tr fiii +HrEig /tl iLf,rritrctlT 166-2014,ft: rrJlT 166-2006EigHtllfrFI EffF(Ic) +trH +t *l+Technology specification for application of integratedcircuit cards in construction cause2014-04-22 fr.fr2014-1 1,01 *ffi:ffiq + R*fntrfiEfnfiI ge?*.fril fr. frwwwwwwwwwwwwwwwwwww

2、cJ/T 166-2014ikEIwwwwwwwwwwwwwwwwwwcJ/T 166-2014+EA&r/E&nR GB/ T 1.1-200e r4,J f!*fl,Iljft H.4+mlEft tr cJ/r 166 2006(r+iASdL+dEF6(rr-)+&ffi fi )+An rE 5 cJ / T I 6 6 -z 0 0 6 .fH bV., lb 1.T fr +4 *j d E! +8,_igin #.t#_F ft#fri) ( . 5. 1 ) ;-Hfin)l-i.#fiii+6 cPU f HtHJ*tr,u s0;-lHiu#*# IC FqHtrlE&f

3、fiffiA X4.t(I- 5.7);-Hln+fi # PSAM +WttEEW.ffi A*4rF ( ,j. 6.2. 1.3) ;t9ln:r. x#fiIfi-FiEq+14E AgrF ( n I 1.7 ) ;-Hnu#fi#Ffi.Hr+ffi.* 64* ( .rl.H 13 H) ;-nfllfiE+lHffi H,rAX*J6&,tc F !fr. H 4 Yfi2 Ftftt*.il8r+T rtt t + xf T 4 I + H! &,H E 4. r nt,t w /,E ?+ B H H! 5 I ffi t +, n i+ H H H! ftE 4 iE f

4、fi T 4 IcB/T 1664e.1 iAfl-F ffiftA,F. Bt+trHE#-F ffi r tsh +tJI4+ltGts/T t664e.2 i,Afl F ffifiA,fi kiftEtHE6-F ffi 2 *Ftl,ftA,F.H0R-ff!,fnEGts/T 1664e.3 iA5lf ffifi*,fiplftFIS6+ ffi 3 *F/1,fi,ffi+ffi/.ffiUlilGB/T 1664e.4 iAflJ+ Hft.F.8!+rIEEf -F ffi 4ilrl,HTt&E!#+q.*.+ffifr+GB/T 1664e.5 .i.An+ ffifi

5、,fi BiHfi HEfi-F 4 s *Ish rflBtf,rlF.tr+tutXffi+t+tilIr.W*TfficJlT 304 igin+ru cpu -F#,ff Art#.*W*cJlT s31 ffiTF aH+UqffiqrE+iEffi&g*CJ/T 332 trfiffi+UqffiEiE FiHAi#HEAE-JR/r oo25 + tr+-M+fi Btr(rc)f*IilErso/rEc t4443-r in,5-F fif,A,fiftFt+,8& F f*iErt+ ffi t *fih wJLE+l*(rdentificationcards-Contact

6、less integrated circuit cards-Proximity cards Part 1 t Physical characteristics)rso/rEc 1444s-2 j.At|J F fifi(,F,ftfrts86-F +*iETtf ffi 2 *+h,htffir)r4ffiHi* s (r-dentification cards-Contactless integrated circuit cards-Proximity cards-Part 2 r Radio frequencypower and signal interface)rso/rEc 1444s

7、-s ix,5|J-F nfiA,fi,#rfiH,ff* t*iErt-F ffi 3*Ih,ilntfrtLffiFfr4*(rdenti-fication cards-Contactless integrated circuit cards-Proximity cards-Part 3 t Initialization and anti-collision)ISO/IEC t4443-4 i.X,ft+ fifiA.F.+fril&-F t*i6rt* ffi 4 *Ftt lffiUin.(Identificationcards C-ontactless integrated circ

8、uit cards-Proximity cards Part 4 3 Transmission protocol)ISO 134e1-2 #.41i!.* qASf-g*E ffi 2 #rl. M*,+rfr.#E?-*&.&*(Banking-Secure cryptographic devices (retail)-Part 2: Security compliance checklists for devices used in finan-cial transactions 2005)3 iFffrEXTrlli#ruE-q.iEffiT+yt+wwwwwwwwwwwwwwwwww3

9、.43.53.63.73.83.9cJlT 166-2043.1fFFIEH+/IC + integrated circuit cardFr*ilf +f *-+fi.*+*fr,H,B6H!f .3.2*ffi terminalhfrfr,ifufrfrfi-n F.?-HfrrJlk& fflTE IC +Htif*.E, tl, 16 f* tr iA 6, tE pI ts ff; H & *F,f+ fil * tr ( Ar 5 * flL iE iR ) .3.3ff+ command%ffi ft1 IC + E ILI fr - RE H,1AE H, E dJ -rlFJ&

10、.ffitr responseIC +4ilEfrfrtltrUffinfr 4ffiFr +BiiEilS#+frffiftUnnfitrttlffi14ffi,H # pull&ffifr.fr.Hfr41It, iH#+HiH3. 10IC +if 5;* reader45 rc +fr.11&ffii.&fr%3.1 .tf Er*ffi charge terminalnI r_r js fs rc -F + flE4|taHfr%ffiit& .3.12Tlhk initialization& lc *ts.11ffi ,frfr.11tJlt6xt:fr11+e*.k,+A-F t

11、r5l,+ k,A,nH n ffiii# 3.13eH tf+ application file& nR - E B! Wffi ffi 7P +.W f,H 6 ADt ftEP.l ffiffi y (+ it,ICfHilDfH-tf+1+6-Ffi!I+t,niA.li|1Xl+,#.8*.i+,JiHf*IH,f.nie7.y+filrtet+2h%ffifr+&v.+-frrJTEIffi , xf tc -Fitffi tED +rrfr 5-F ktilfE ffi E fi frtr, T A rcffi#friJ+f+ W+i5 # .wwwwwwwwwwwwwwwwww

12、3.173.18cJ/T 166-20143.14H+*.8 electronic purse-ffihfrt.+f Aitrf-zj.ffiiH ffifri1fti+W IC +&ffi )t, f+-fiiH ,lfrffi+;D 3.r5HT#+fi electronic deposit- ffi t + + , j8 ffi ?H fr ,Wn +i Dmiq i+ E! E H + , ffi E ( PIN )f* tF B, A tu IC + lil El .3. r6tr + password1-rtfrV,fr1fr-fiftrcfrffi*,|+.t|#uB.j .1F

13、f*fi*I IC +fifiA,F,fi,J+FTl*ftqrtffifie.F.3.19ffitt&3.20;3.21CPU-ff E3.22,H #*18f.+&)th#*thrFfifr.FXxtIc +ii5fft nfrtk3.23tE*1*t# gauge tyPe- +xi m,f ffi Bt uJ .,ift r ilr fl E rA3.24flE*9*ffi service type terminal+Ef+ef . fitr.&-F. E#. HrE+ nfr.*fr1k& 3.25A+EryHr* secure access module-ffiHEWffit*,b

14、WVt*.ttlfiil,uFfi tLrl *xt%ffiFfit*ftgt.ft.wfr? +ryffii 111EWA# fl, F+in ffi tH*, , tf; tc F X* t+BfH4 fn ili F Xq +EWtH . .3.25.1IC +EryHf* IC card secure access moduleDl IC +HttHTt+t# trJ,-ffiA?.Wtftl*,!ry*1*+flft uh rLrlryxiltt*FFfiM#nf 8trJE+&ffi3t IC cardfHit+.Jeffi.ffifi+/riEtiE . +tiE.H jwwww

15、wwwwwwwwwwwwwwcJ/t 166-2014)tir11t*t(.frffirE41uMtH4,lEEtEIx.lrl.tf*ft+ 5lllfiflF.+. FIIH IC #E11rH*Ul4&ffi+rL+qEft,HTxt rc -Fitffi tr/iYffi-1. aitr 3.25.2ffi,H*t+6ryH4 chip secure access moduletll ffi 6 l ffi trJ,ii h ffi rt *f * fl, - fr frA W W ffi Y E Wl Y +. tJL fril u Fh rL rl n-x,1 FI #F Efi#

16、 E q. ft W W X+W.ffi)fr.111F?*rtfrffirE *huB+Ht*, IEE-lEf x1r|.ffif*ft+5fEDflE+. pI fr IC +Hfr+H*f EEtrUffi -.8 ttL?A b.r, H T x IC + j&Tfi ffi. / lH ffi i.D iitr .3.26WJE*t*. physical security1ft & *1 +rJ tE# +tJ +ft:M rfr. & *1 ftU1 .3.27ttin&iE6 secure cryptographic deviceftEW.t*-AFrJf-filnBflVf.

17、 , RH )y.ffiE+,tS ffi WtjY*+,t+.fr69.+tk& 3.28Ilfr attackE * ffi 4n tt nT, i/.,E lb eh E H. *,# 4r.f* ffi H,H. tul - ffi ft trr 3.29iH#t*iliEH* purchase secure access moduleil IC + fr.41 + H *il-1 4 & H + tr +rL +4 ftft A+r pt tl H T xt IC F jS rr flH, tJLlH ffi i D i iE H0 q +itiE+ ,x*.#&-+iHtr# rc

18、 -F4ffitr.3.30#,*t+rtiEH* embedded secure access modulefi IC + H 1l i * ll 4 D H + Ut t6 ft.fi ffi q D H T xf IC + it H tLlH ffi t D iiE Ht ffi Art 33.314 blockWffiHt*WL3.32EIHE EE*Hig+e trusted service managerfr dI ra ffi =n E,ln frt +i,f+ +. fr H H tr rE . D ffi & .ft I#l ffi rq ru fr . ffi E w +

19、EV * .3.33SD + SD cardFJffif qAiEH-turffiX+#f#ffi-li*Ef (EI IC F)4 ffiffiiFfE ffiqT ftl ffi W iE ffi tr+ + )fi ffi aA I + ADF &ffiffiffiIf4(Application Definition File)AEF DHEAI*(Appl;cation Elementary File)AID fi-Htlrni?+( Application Identifier)APDU fi-ffifr.tiy&ffiSzrCnpplication Protocol Data Un

20、it)APP Effi(Application)CA +ffifr.utiTF,L(Certificate Authority)4wwwwwwwwwwwwwwwwwwct/T 166-2014CLA ft+RIE!#rlj+ff(Class Bvte of the Command Message)CPU + r&UE#$(Central Processing Unit)DAP ffiffirritr+Hrt(Data Authentication Pattern)DDF E*Wffi_l+(Directorv Delinition File)DES ffiffinnffiffiI&(Data

21、Encrvption Standard)3DES =frffiffifinffitrfi18(Triple Data Encrvption Standard)DF ffiI+(Dedicated File)DIR El*(Directory)EF EAI+(ElementarY File)ESAM ffiArt?4H&tE4.(Fmbedded Secure Acccss Module)FCI I+frilH.H,(File Control Information)GP +I*+ Arq(GlobalPlatform)IC *fIHE6(Itegrated Circuit)INS ft+8tf

22、i0ffi+fr (lnstruction I3yte of f-ommand Message)iP lEtr?6t4iL(Internet Protocol)ISD k+11t+bi(Issuer Security Domain)JCAPI Java -Feffif* tr (Java Card Application Interface)JCRE Java F6i114ffi, (Java Card Runtime Environment)I-c *ffik,tH!ft+trffitr*tJ6&tr(Exact l.ength of Data Sent by the TAI- in a C

23、ase 3 or 4Command)I-e rfi&ffiffiflftlqffigEfiE(Maximum I-ength of Data Expected by the TAl. in Response to aCase2or4Command)MAC +EI4Efiit69(Message Authentication Code)MF +AI+(Master File)NFC-WI Near Field Communication Wired Interface tS.thtEHHr*t*AOPEN +H+SIE#(The Central on*card Administrator Tha

24、t Owns the GlobalPlatform Reg-istry)Pl *W t(Parameter 1)PZ *W z(Parameter 2)PICC t*iErt+(ProximitY Card)PIN + ffiE(Personal Identification Number)PSAM lHffiX+Fry&i(Purchase Secure Access Module)RAM ffi+/lirlrl6J#(Random Access Memory)RSA lEX,iffirffiHIf ( Riet/Shamir/Adleman asymmetric algorithm)SAM

25、 X+EW)FH4(Secure Access Module)SCP02 E+iEEUJiI O2(Secure Channel Protocol 02)SCP10 ?AE jEril 10(Secure Channel Protocol 10)Str tASn(Secure Element)SFI fgI+tirii.Fffi (Short File ldentifier)SHA1 X.+tfrWH-lX 1(Secure Hash Algorithm 1)SMl qAiH,H,H:l* 1(Secure Message 1)SMz EAiH,eH?* 2(Secure Message 2)

26、SSD ffigifr+fi(Supplementary Security Domain)wwwwwwwwwwwwwwwwwwcJ/T 166-2014SWl fiA+ 1(Status Word )ne)SWz tt*? 2(Status Word Two)r: o WIA+f4 #J * D +/J.:-lffi ylilr: 1 ffi fi*fr4J +*-ynr,fffi filiXTAC f.nWirtMr(Transaction Authorization Cryptogram)TSM q H Enft* trq+ 6 ( Trusted Service Manager) .rf

27、r,f,JF 5.3.2 lFf*fi4rt rc +Fi9fffi#*fEHEEtrlF +* fi tt rc + ffi 5t $fril 4 fril H + l* n fi.tr+ 6 ISO/IEC 44 43-2 + 6t 4 rF 5.3.3 Ef*fi*rt IC tHtilffi.ftfr t li+*lF f* ftA rt IC -F fi0 A ih k ffi Ffr tq * M.f+ A rso/ rEC r 4442-t + H X+)t ffi it. ffi ts + q rF .5.3.4 Ff*fi4rt IC +Ht,ftffiltii!.6il l

28、 tl *t, :F Ftt + fi cPU -F:f Native +fr8! CPU -F ,fiW.*frft#&+ffi)hh,XrJl f .#4 2 f .+4 3 f .#4 4 +.tt . ffi fF ji fE . F-iyfr.#. UriI+ 4 E f* . r : owwwwwwwwwwwwwwwwwwc.l/T 166-20145.4 XFtr IC +5.4.1 -f,q*flExnrpffi IC f Ef +Ettr,hIFJEEAffiA GB/T 166as t*ft4rtt*AfrfiffiA ISO/IEC: 14443 lF+*fi;tt* n

29、 k! IC +5.4.2 Efi*=t#Ei+*6firf m M.f+A s.2 +xt+*frA=t tc +BlfHXqt5.4.s Fr*frq=tFtr1F+*fttttrFmtrff6 5.35.5 lE#ffi+ cPUs.5.1 $68*f, tr H,:,iEt+ fi.! &,ffi ,.H.ifrt1 -+z6i.F, 5.5.2 iw.ffirt&tS:fi=r48.5.5.3 t+Tti%ffi/+tE-4.DffiF *.HTHXWffilffiffir,f+(At+eT+t6,5.5.4 &Htrffitrror iltfittV#tilfiLa) frViWW

30、WffiI+5fib) 6hlR rfr.ffizl4 BtI4-r lt;c) trI.Eif Mffiit#*rfl,xf H)g.w#+q H!irrh) %ffiffi tr *tr, ADF E -+ RE A Hyl+f+ ffiJ H,H. ( FCI ) + gry ffifi *,W dl+ 5.5.s trE E6t,f+- .1 AEF E A - + EX * + IRhh #+ ffiW *nNJ -i,i S . K tr . H ( BER-r I -v ) Wffixt * ltr-efit.+TH-f DH tr XE1h1rrt-l ssa5.5.6 i.f

31、+maGB/T 1664e.4 + fr.ffiT filRa#-a) ,a-+ FCr H!ffiI,f+(DF)(cB/T 1664e.4 +EX)bfi.Eql*, ADF,EliEiiu *irl EF7wwwwwwwwwwwwwwwwwwcJ/T 166-2014fr DF Ef +&tr&H=H! DFffit+f4l+(MF)b) .4-rlie* + tri,44tf4t rnl (Gts/T 1664e.4 +E- )&.Wl*tr AEF,EF ZfrV,tFhit, fl-+TE DF 11+H(J tr,F.e+itr+, DF + fEiS H! EF Htirl,l

32、 E-i&ffl 6!,5.5.7 tr*.#*AIC -Ft+HT MF T&fr.HytJ*fi H *#M H*#+E/.&fryl+E E rtI+(DrR t+)tr*r-btrIi8H0H E *ffiffiI+(DDF)SlHHtptftu E *E *rstaxffirxH&ffitfiiAff reinfilrfrjt-+Dffi,4Dl ArD HlHf N +fit?h DDF EH!,titA- !81fifr1DrR t+E-+ AEF. Btj-f iE,+#t6H! EF, E.k GB/t 1664e.s +Ej(Bt&ffiff*,a) A&rlE +fffi

33、j8ft!-f *+ fr.H+Hffi-(+,n&h 61 ) ;+ffi/fr trfr x.IC F + ffi & ffi E * #tlE trI tr flr, -E 6 pE firJ ffi E . H +, + E + H!.fn E tu +fr fr tr + DF + Ht FCrHt E ,3 sFI ffiffixj*+Eg 5.5.8 n+6i6Jf& flEH+4, A+ trIiEil yl+ EgI sFl fr.l1 d tfiJ a) Ftr6!,fFl ADF 4 DDF E-JiBilE or trEfrJ,ADF 6! DF Axf&H AID,f

34、 DF Ehfr.Hr-F+&EpE-f!;b) sFr HTjEI+ AEF. Xf#t&H+H!11-,I AEF,EIiEif SFr(5,fi,tr,Err6Elyt r-30)4ifi . sFr tul ffiwrlr*B +H rlj E r! ft+ + tfi s, lE - + ta ft.ffi & H + e E,ffi - H!, H sFr H!,fHH dr &ffi*fr .5.5.e +ht+6f4# *r,F.T + H y-t+ea+q, .E tEl r MF (3Foo)sfrlt+(0000)HRE*I+(0001)E,El (ADFI)liffix

35、 (ADFx)Er 1 +hj#+awwwwwwwwwwwwwwwwwwcJ/r 166-2014+ l+x.t+#t6ifi,En mT a) +a+(MF),1) y(+ffiiF.fi+: 3F00 ;2) Yt+&frft :1PAY.SYS.DDFO1 ;3) 86ffifr+ MF tr,-FHEtr.fEr-f H/.J FCll. FC.r +FR JR/T 0025 fi!fE*fi4.b) MFTH!E+44I,f+,1) E+4AI+E-+4iKE,tryI+,ffi 15l i0 H4J sFr bii ivt H:1H.4i-tf,ttfilETDDF, El*fl(

36、J SFI .A# DDF I ff#frH,H+ E *f ffiFj Rcad Ii.ecord ft+ffffii*m . H,* + - + id * trI A IL + tr j&ft , ltr- + x n tfi,ttk6 fi?W M * t it*fl M ;D H *-t+ft:, SFI:01c) DfE t xJEhfrfr# ADF F,+H jEE+HDHt FCIs.6 frifr.+e cPU +5.6.1 ffii6If tk+fi CPU +tj+qfr.f+A Global Platform z.2 tr!*L#-.llliEl2g 2 trtr+e

37、cPU +r+q5.6.2 fiIfi-+iEteffiEHr*+45.6.2.1 -fip*48ffi rt - + iE x + i& ft )+ff + fi cpu + n:t - *$ r|, t fi fi - f iE D ffi u &. fr.*+ 5I +Fl ie ffi H,r, HfruD ffi E n q + nV * trlil 4,F rl I I . 7 fil -fi - + iE E + 4 fr. Il # +E r,1. tl 3 wwwwwwwwwwwwwwwwwwcJ/T 166-2014ldft-+a) hfr.+$#4t*)4b)EH &.H

38、-lMRAM ,H.ilt*. rElffi&5.6.2.2 CA iCA iEflIflTEfrTfiE,IUE SE S,T5.6.2.s E+iliEiRt|Jfigq aii ix5rjfig x IH Ifr E HtDH+e.5.6.2.4 tFEftqtrHHrsE*1 E f* ftA rrlr H rs El * H T ,g fl rI + 6 c PU f -L fit fii - + iE * + Et D H E * tt) *., H L+ * + &XilN.ffifrffiflR.* s.6.2.5 trHEiE&H4ffis-rE,ry-IH1frEEfitf

39、i-FEE+4 + ,+fr.tr+ cJlT 331 6tgrfr frfi-+iEt+HlF*frd&HH4E*4fifi-+EqAET+,i EL4i 4.KB.x+1H Ef+4+lglf , trI tX E * # A .h.& .lst M lt MrM flF. X, -X. ffi10wwwwwwwwwwwwwwwwwwcJ/t 166-20145.7 cPU +EH y.1+#$5.7.1 H #* cPU +&H i.l+#ffi5.7.1.1 &Ht,f+6+48t*fi4.rt.F+*fiefi cPU +DH-FH+tJ .-E +.5.7.1.2 JUffi i+

40、 fiJ #i.H,EntHffiX cPU ffiF+t,f+j+1w,fH,e,r# 1.EfHEt+(0005)ffi-F #+GHt.f+(0016)+r!t4cEfrid*a.f+*fre.+*.ax+*.ff6t.4wwwwwwwwwwwwwwwwwwcJ/T 166-2014t r rH#* cpu Htr+t+i+rfi=,H.s.7.1.3 Mr E+St.f+6JB5.7.1.3.1 KEY t.l+h*lYffi# cPU HF+ MF H! KEY yl+6t ,n*.2* Z H#+ CPU.HF+ MF ET KEY T,f+FJE5.7.1.3.2 E*S*tl+

41、El*B#I+H-*.ie.*3 70 13 61 11 4F 09 A0 00 00 00 0s 86 98 07 0i s0 04 50 42 4F 43,.*F,Hy. rl,frt+y(+(Select File) . H *fH,H.If+ ,n#-3t 14,Ef,*t+*4I*tn;iR?.if +rtrtvMF +HT+E *I,f+3F00iffiE -E *|*t*irM+Ayt+%+fr .t+HtxffiE-t*+i*nE *4+_r+Kil*a,f+000 IErfiffi1litr.eFE4iH.H.r+-trfi|Jr+0005HHra+H.H.t+-F/#,Jr

42、fH.E,_r+- j#ffi|l-r+001 6E*q+H,H.tffi&.afr.ffiy|+E*r,f+100 1iffi,E-E#i4yiffiffi vt+Mffiy-I+HEXiffi,8.-E *i+en/L) tl.$+E+fi+RH+fivt+H+E+b*H+-+i.Ftnt&,FtYt+H1E+*ib,-r.a !8rmid*a,f+1ffi4Xt+001 0HdraHE.+1#.H,r+.i8ftr+0015Er#*+fr.E+lljAiH.H.t+-i8ffiija+00i6Hrt*+.fH.H,q)E|F+n.A.t+A*( ie;frI$0017Et H-rtf,f

43、#.H,+tu)in nilrtflid*t.f+1ffiq,vl+00 18Fr di-,FtuE_#,xD xl+.x1( ic+r+00 19lt dr+fH.8.riffi.nDJEA14yl+lrfrzlvrF001 AH rlrM+AAfrTffifnftEffifEtiiX.#+HlrlHtrx.fri)M+fr|FffiFH+E T.#+HDACK00l*ff ur Tn+i tufi,fflhFh#fr1#+frDAMK00MF T6X#.8 y|+frtg_ffiLNtrwwwwwwwwwwwwwwwwwwt+izliA(SFI)0 x0I*.+x4Kie*r+I*tzj.

44、0050 HYl+#H?*tFli*: H rhfzt,fiKtrH70Var*t4&.ffi*t*.Fr#61VartrIB&4F0 x05-0 x10DDF &tt500 x01 -0 x10trffif,nscJ/T 166-2014t s E *=,Ht+s.7.1.3.3 &+E+tr,Hti+k+#+H.H,t+ ,W* 4t. q &+E*E,e*+I+tni.A(SFl)0 x05r+44-itffilx.f+t4JtulOOlEHv,l+t?H#.fri)i*: EHrt.E : DC:MK *,fr*fF+lr 11ffiffi;rfs&ffitt01- 02fr-Fi-.

45、ftrB2BCD03-04,fift,ftr42HEX05-05HET+IBCD06-06ffiJL,ftE1BCI)07-08frnt.IHEX09- 16&HFr.8HEX17- 18-F#42HEXt9 -22fr.,fi flW(YYYYMMDD)4BCD23-28ktirk&f,aE.6HEX29-30r,f ffihn4BLHEXffi !Lft 6q D * ffi E B ffi ffi I W1k*fi fr X 6! r rlLft 6g &r iA ri. t 5 I3wwwwwwwwwwwwwwwwwwcf/r 166-2014t s ?tftfig+niF.14tt5

46、/i+ftnLt1ffiiliiEffi002at&RiSfJrjg01,strflit4024,b,*.03D0467/Prts.a 1/ts6ffior s f Ifrk#tE08 ,o I f =Pd -l- +z-a-0- II, lI =irI=tIL2G=y- -7 ,nffi eh. =13Jffn dffi m,a774ffiffiw&x IIMt15tLremffi mj=16# ry=#77 A7tt18 =- rlWHT.7 TII19 I-erAr4rB ,lZO tr,tfrirr,r/ l21iltxefu1 J6/22iqI- -.-r -Jf,ntxrxil-2

47、224,t*&,a25,fitH,n26t:ffiffi.*,tr27t#-H H262BH11+fflffi27JJ11$.trtL*ffiF+hH:E+,n#-6wwwwwwwwwwwwwwwwwwcJ/T 166-2014# 6 Etr+HHEiI+FHHE+LNBA00.H,T+ DES.3DESHtr( r.1F,f+ SMl H?*04W rH fr +M +fr 1 - s . rAC + fi +fr 5 InL ffi fiAft- + M ffi h DES H il, AT#ttt sMl H?*# 7 +xxLSt&-f-.*E-F,oomfr-F ooH *+6r*5

48、.7.1.3.4ADFl_A5.7.1.4 ADFI5.7 .1.4.1 AH*,Effi*,M.HEl+(1r+H.edl+&tTI+tariFffir,f*r4.ADFO1 H*&#T+100 IKEY I+ ( ADFL ffiy.+ffi I+)0000OlFFHH+FXA,X|+00020002 x 0008HA+DIfl#E,IH,H.I+0015OOlEHf /EdH.H, t+001 60037HH.e*.hie.*vl+00i70 xA0H4, + +*,8!+ fr,i A W ffi it * X l+00iBOAX 17H#.+e,a*tu*.DnAffi v+00 1

49、0OAX 17H*.+*.1(.tr-1-hEfrmxff001 AOAX 17H15wwwwwwwwwwwwwwwwwwcJ/r 166-20145.7.1.4.2 B7*EtrEH+&ts,&Hts1f;,a) Y+ & &1 : Ao oooooo38698o7o 1 ;b) Effift+tfr, ADF fE,FhjEEl+H&Ht FCI lrT l6F 2E 84 09 A0 00 00 00 03 86 98 07 01 A5 21 9F 0C XX.B XX h6fr.K&.ffi6rd,ffi-+fihlA*fi.ffieAH.H,tl+6i6+=FKH,trr*h*fr.

50、ffi8+H,H,At+6J6,5.7.1.4.3 KBY t.l+6J*(0000)KEYt+6d,n#.s.t g KEY*.1+6*s.7.1.4.4 Art H7*Et+ (0002)H+ffi,Xt+,fl.# 10t ro H+w.*.t+ftE,FJ*l5X ffi+Hfr14t0, fi cos #+P ,lRF.#.+*,.fr+Jffi+fH.H 5.7. 1.4.5 AJTEHE*=.er.f+A*DHEA,fH,H, t+ , tlt tr M+AtrfAMffiItWMffiFtiA*fr*&.e*.friJ#ffiffmM.H+fs+#+ADACK00Ifdffi

本站链接:文库   一言   我酷   合作


客服QQ:2549714901微博号:文库网官方知乎号:文库网

经营许可证编号: 粤ICP备2021046453号世界地图

文库网官网©版权所有2025营业执照举报