xmlns:atom="http://www.w3.org/2005/Atom" xmlns:atom="http://www.w3.org/2005/Atom"

ANNEX I CU.K.Requirements for construction, testing, installation, and inspection

Appendix 2

TACHOGRAPH CARDS SPECIFICATION U.K.

3.HARDWARE AND COMMUNICATIONU.K.
3.5. Command descriptions U.K.
3.5.3 UPDATE BINARY U.K.
3.5.3.1 Command with offset in P1-P2 U.K.

This command enables the IFD to write data into the EF currently selected, without the card verifying the integrity of data received.

Note: This command without secure messaging can only be used to update a file that supports the ALW security condition for the Update access mode.U.K.

TCS_56 Command Message U.K.
ByteLengthValueDescription
CLA1‘00h’
INS1‘D6h’Update Binary
P11‘XXh’Offset in bytes from the beginning of the file: Most Significant Byte
P21‘XXh’Offset in bytes from the beginning of the file: Least Significant Byte
Lc1‘NNh’Lc Length of data to Update. Number of bytes to be written.
#6-#(5+NN)NN‘XX..XXh’Data to be written

Note: bit 8 of P1 must be set to 0.U.K.

TCS_57 Response Message U.K.
ByteLengthValueDescription
SW2‘XXXXh’Status Words (SW1,SW2)
3.5.3.1.1 Command with secure messaging (examples) U.K.

This command enables the IFD to write data into the EF currently selected, with the card verifying the integrity of data received. As no confidentiality is required, the data are not encrypted.

TCS_58 Command Message U.K.
ByteLengthValueDescription
CLA1‘0Ch’Secure Messaging asked
INS1‘D6h’Update Binary
P11‘XXh’

Offset in bytes from the beginning of the file:

Most Significant Byte

P21‘XXh’

Offset in bytes from the beginning of the file:

Least Significant Byte

Lc1‘XXh’Length of the secured data field
#61‘81h’TPV: Tag for plain value data
#7L

‘NNh’ or

‘81 NNh’

LPV: length of transmitted data.

L is 2 bytes if LPV > 127 bytes.

#(7+L)-#(6+L+NN)NN‘XX..XXh’Plain Data value (Data to be written)
#(7+L+NN)1‘8Eh’TCC: Tag for cryptographic checksum
#(8+L+NN)1‘XXh’

LCC: Length of following cryptographic checksum‘04h’ for Generation 1 secure messaging (see Appendix 11 Part A)

‘08h’, ‘0Ch’ or ‘10h’ depending on AES key length for Generation 2 secure messaging (see Appendix 11 Part B)

#(9+L+NN)-#(8+M+L+NN)M‘XX..XXh’Cryptographic checksum
Le1‘00h’As specified in ISO/IEC 7816-4
TCS_59 Response message if correct Secure Messaging input format U.K.
ByteLengthValueDescription
#11‘99h’TSW: Tag for Status Words (to be protected by CC)
#21‘02h’LSW: length of returned Status Words
#3-#42‘XXXXh’Processing Status of the unprotected response APDU
#51‘8Eh’TCC: Tag for cryptographic checksum
#61‘XXh’

LCC: Length of following cryptographic checksum

  • ‘04h’ for Generation 1 secure messaging (see Appendix 11 Part A)

  • ‘08h’, ‘0Ch’ or ‘10h’ depending on AES key length for Generation 2 secure messaging (see Appendix 11 Part B)

#7-#(6+L)L‘XX..XXh’Cryptographic checksum
SW2‘XXXXh’Status Words (SW1,SW2)

The ‘regular’ processing states, described for the UPDATE BINARY command with no secure messaging (see §3.5.3.1), can be returned using the response message structure described above.

Additionally, some errors specifically related to secure messaging can happen. In that case, the processing state is simply returned, with no secure messaging structure involved:

TCS_60 Response Message if error in secure messaging U.K.
ByteLengthValueDescription
SW2‘XXXXh’Status Words (SW1,SW2)