Machine Authentication of MRTDs for Public Sector Applications
|
|
- Thomas Hunt
- 6 years ago
- Views:
Transcription
1 Technical Guideline BSI TR Machine Authentication of MRTDs for Public Sector Applications Part 2: Application profiles for official document inspection systems BSI TR Version 2.1.0
2 Federal Office for Information Security with the Federal Criminal Police Office and the Federal Police Post Box D Bonn Phone: Internet: Federal Office for Information Security 2016
3 TR Part 2 Table of Contents Table of Contents 1 Introduction Terminology Technical terms Operational scenarios Stationary operations Self Service operations Partially mobile operations Fully mobile operations Requirements from TR Requirements on the document checking system Requirements on document checks General requirements for all scenarios Requirements for Stationary operations Requirements for Self Service operations Requirements for Partially Mobile operations Requirements for Fully Mobile operations Requirements on operational monitoring Basic logging profile Standard logging profile Standard logging profile with optical evaluation extensions Standard logging profile with electronic evaluation extensions Full logging profile Requirements on data transmission Conformity Reference Documentation Keywords and Abbreviations Tables Table 1.1: Interpretation of keywords... 5 Table 3.1: Requirements for Stationary operations... 8 Table 3.2: Requirements for Self Service operations... 9 Table 3.3: Requirements for Partially Mobile operations...10 Table 3.4: Requirements for Fully Mobile operations...11 Table 3.5: Set of extended data nodes for different check types...12 Federal Office for Information Security 3
4 Table of Contents 4 Bundesamt für Sicherheit in der Informationstechnik
5 TR Part 2 Introduction 1 1 Introduction This profiling document is part of Technical Guideline TR Machine Authentication of MRTDs for Public Sector Applications. The Technical Guideline specifies and describes necessary requirements for machine assisted document checks on MRTDs in Public Sector Applications. The technical description of the checks referenced in this document are specified in Part 1 of TR-03135, see [TR ]. Regarding official German inspection systems, the profiles specified herein are REQUIRED. 1.1 Terminology The key words MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, SHOULD NOT, RECOMMENDED, MAY, NORMATIVE, and OPTIONAL in this document are to be interpreted as described in RFC 2119: Keywords MUST, SHALL, REQUIRED, NORMATIVE MUST NOT, SHALL NOT RECOMMENDED, NOT RECOMMENDED, SHOULD, SHOULD NOT MAY, OPTIONAL Table 1.1: Interpretation of keywords Interpretation of keywords The implementation is an absolute requirement of the specification and must be used/included. A so called requirement is an absolute prohibition of the specification. The requirements are recommendations, this means that there may exist valid reasons in particular circumstances to ignore a particular item or requirement, but the full implications must be understood and carefully weighed before choosing a different course. The requirements are not binding. One operator or vendor may choose to include it, another may omit it. 1.2 Technical terms For clarity, terms were shortened to make this Technical Guideline more readable. Abbreviations can be found in [TR ]. Federal Office for Information Security 5
6 2 Operational scenarios TR Part 2 2 Operational scenarios This profiling refers to operational emrtd inspection scenarios in German Public Sector Applications. In this respect, the operational scenarios are defined in the following chapters. 2.1 Stationary operations Stationary systems are systems which are permanently installed at border crossings, at police stations or at other localities with raised focus concerning security issues (e.a. government buildings, ministries, embassies or official meeting locations) as well as temporary systems in accordingly prepared sites (e.g. for major events such as sports or music events). 2.2 Self Service operations Self Service systems are systems with which automated or semi-automated document and identity checks are performed (e. g. so-called egates/abc systems, automated border control systems/gates). 2.3 Partially mobile operations Partially mobile operations usually takes place at checkpoints, in patrol cars or vessels, but also in rail, air and shipping traffic. This includes, for example portable PC stations, which are the size of a notebook, or a tablet PC. These systems are often equipped with a swipe reader or full-page reader in order to be able to read the MRZ, but also with a RFID reading module in order to read the chip. 2.4 Fully mobile operations Fully mobile operations will be performed in rail, air and shipping traffic as well as during general patrol duty. The systems are carried by the officer, some of them are fixed or strapped on the officers uniform. The devices used have the similar size and design as smartphones or tablet PCs. 6 Federal Office for Information Security
7 3 Requirements from TR TR Part 2 Requirements from TR This chapter details the requirements from [TR ] which are relevant for these application profiles. 3.1 Requirements on the document checking system The generic requirements of a document checking system SHALL fit the requirements regarding chapters 2 and 3 of [TR ]. 3.2 Requirements on document checks General requirements for all scenarios If a specific check is implemented it SHALL be performed regarding optical checks as specified in [TR ] chapter 4.4 electronic checks as specified in [TR ] chapter 4.5 combined checks as specified in [TR ] chapter 4.6 handling of defects as specified in [TR ] chapter Requirements for Stationary operations Optical Checks Ref. [TR ] Obligation (m/o/e) Notes m For all further checking steps the model shall be identified. Depending on the model identification, document model specific spectrally selective checks SHALL be performed, if defined m MRZ consistency check shall always be possible, regardless of the used technology m/e Spectrally selective checks SHOULD be performed if applicable for the given document model. At least the checks (IR, AB, MR) and (UV, BR, FU) SHALL be performed. Electronic Checks If chip authenticity is guaranteed by the electronic check, the mode of spectrally selective checks CAN be changed to evaluatory m Background Public Key Infrastructures m Defect- and Masterlists m Supported Protocols. Federal Office for Information Security 7
8 3 Requirements from TR TR Part 2 Ref. [TR ] Obligation (m/o/e) Notes m Chip Access Protocols m Checking the chip contents. Combined Checks m Checking the validity of the documents m Comparison of the optical with the electronic biographic data o Checks across document pages o Cross checks across several documents and linking of multiple document checks in a transaction o Comparison of personalization contents is recommended for all documents that are present in a check database. Table 3.1: Requirements for Stationary operations Requirements for Self Service operations Optical Checks Ref. [TR ] Obligation (m/o/e) Notes m For all further checking steps the model shall be identified. Depending on the model identification, document model specific spectrally selective checks SHALL be performed, if defined m MRZ consistency check shall always be possible, regardless of the used technology m/e If applicable, selective checks SHOULD be performed on a given document model. At least the checks (IR, AB, MR) and (UV, BR, FU) SHALL be performed. Electronic Checks If chip authenticity is guaranteed by the electronic check, the mode of certain spectrally selective checks (which are neither REQUIRED nor RECOMMENDED) CAN be changed to evaluatory. At least one check each (IR, TR, ZZ) and (UV, LU, ZZ) SHOULD be performed m Background Public Key Infrastructures m Defect- and Masterlists m Supported Protocols. 8 Federal Office for Information Security
9 TR Part 2 Requirements from TR Ref. [TR ] Obligation (m/o/e) Notes m Chip Access Protocols m Checking the chip contents. Combined Checks m Checking the validity of the documents m Comparison of the optical with the electronic biographic data o Checks across document pages o Cross checks across several documents and linking of multiple document checks in a transaction o Comparison of personalization contents is recommended for all documents that are present in a check database. Table 3.2: Requirements for Self Service operations Federal Office for Information Security 9
10 3 Requirements from TR TR Part Requirements for Partially Mobile operations Optical Checks Ref. [TR ] Obligation (m/o/e) Notes o Depending on the optical reader it may be impossible to determine the model, for example if it is a Swipe-Reader m MRZ consistency check shall always be possible, regardless of the used technology o If the model could not be identified (e.g. because of a Swipe-Reader) the application of spectrally selective check routines is not possible. Electronic Checks m Background Public Key Infrastructures m Defect- and Masterlists m Supported Protocols m Chip Access Protocols m Checking the chip contents. Combined Checks m Checking the validity of the documents m Comparison of the optical with the electronic biographic data o Cross check and linking of multiple document checks in a transaction o Checks across several pages o Comparison of personalization contents is recommended for all documents that are present in a check database. Table 3.3: Requirements for Partially Mobile operations 10 Federal Office for Information Security
11 TR Part 2 Requirements from TR Requirements for Fully Mobile operations Optical Checks Ref. [TR ] Obligation (m/o/e) Notes o Depending on the optical reader it may be impossible to determine the model, for example if it is a Swipe-Reader m MRZ consistency check shall always be possible, regardless of the used technology o If the model could not be identified (e.g. because of a Swipe-Reader) the application of spectrally selective check routines is not possible. Electronic Checks m Background Public Key Infrastructures m Defect- and Masterlists m Supported Protocols m Chip Access Protocols m Checking the chip contents. Combined Checks m Checking the validity of the documents m Comparison of the optical with the electronic biographic data o Checks across document pages o Cross checks across several documents and linking of multiple document checks in a transaction o Comparison of personalization contents is recommended for all documents that are present in a check database Table 3.4: Requirements for Fully Mobile operations 3.3 Requirements on operational monitoring The document check system SHALL implement the logging schema according to [TR ], chapter 5. This document defines the following levels of logging configurations: 1. Basic logging profile 2. Standard logging profile 3. Standard logging profile with optical evaluation extensions Federal Office for Information Security 11
12 3 Requirements from TR TR Part 2 4. Standard logging profile with electronic evaluation extensions 5. Full logging profile The set of extended data nodes is defined for the corresponding checks in table 3.5. Type of failed check Optical Check Electronic Check Combined Check Biometric Check Extended data nodes (XPath expression) //dco:basiccheckresult/dco:scannedarea //dco:scannedimages //dc:documentdetails //dce:chipfiles //dce:trace //dcc:mismatch/* //dc:image Table 3.5: Set of extended data nodes for different check types The document check system SHALL implement all defined logging configurations. Setting the actual logging configuration SHALL be configurable by the application Basic logging profile Basic logging SHALL contain all non-person related data from a check, including all check results. All data items from the XML schema SHALL be filled, with the exception of the set of extended data nodes Standard logging profile Standard logging SHALL contain all available information from Basic logging profile and SHALL provide additional information on the specific failed and undetermined check(s). Depending on the type of error, the relevant sets of extended data nodes detailling the error SHALL be present in the log. Note that extended data nodes are not present if the corresponding check was aborted Standard logging profile with optical evaluation extensions Standard logging with optical evaluation extensions SHALL contain all information from Standard logging and SHALL contain all extended data nodes for the optical check regardless of the optical check result Standard logging profile with electronic evaluation extensions Standard logging with optical evaluation extensions SHALL contain all information from Standard logging and SHALL contain all extended data nodes for the electronic check check regardless of the electronic check result Full logging profile Full logging SHALL contain all available information including all extended nodes, regardless of the check results. 12 Federal Office for Information Security
13 TR Part 2 Requirements from TR Requirements on data transmission The document check system SHALL implement the transmission and log specification according to [TR ], chapter 6. This requirement is REQUIRED for Stationary and Self Service operations and RECOMMENDED for Partially Mobile and Fully Mobile operations. Federal Office for Information Security 13
14 4 Conformity TR Part 2 4 Conformity In order to conform to this Technical Guideline, an Inspection System and Inspection Application SHALL completely implement and meet all requirements from chapters 3 for the used scenario. 14 Federal Office for Information Security
15 TR Part 2 Reference Documentation Reference Documentation [TR ] Bundesamt für Sicherheit in der Informationstechnik (BSI): Technische Richtlinie TR-03135, Machine Authentication of MRTDs for Public Sector Applications Part 1: Overview and Functional Requirements, 2016, Version Federal Office for Information Security 15
16 Keywords and Abbreviations TR Part 2 Keywords and Abbreviations For Keywords and Abbreviations see [TR ]. 16 Federal Office for Information Security
MACHINE READABLE TRAVEL DOCUMENTS
MACHINE READABLE TRAVEL DOCUMENTS ADVANCED SECURITY MECHANISMS FOR MACHINE READABLE TRAVEL DOCUMENTS EXTENDED ACCESS CONTROL (EACv1) COMPLEMENTARY TO TEST METHODS FOR MRTDs USING STATIC BINDING Version
More informationThe EAC for MRTD. 26 January 2010
The EAC for MRTD Rafik Chaabouni Serge Vaudenay 26 January 2010 Outline MRTD? Standards - RFID - ICAO and BAC - EAC Solutions? 2 MRTD? Machine Readable Travel Document 3 Standards RFID ICAO and BAC EAC
More informationAssurance Continuity Maintenance Report
IFX_CCI_000003h, IFX_CCI_000005h, IFX_CCI_000008h, IFX_CCI_00000Ch, IFX_CCI_000013h, IFX_CCI_000014h, IFX_CCI_000015h, IFX_CCI_00001Ch and IFX_CCI_00001Dh design step H13 including optional software libraries
More informationKey Lifecycle Security Requirements. Version 1.0.2
Key Lifecycle Security Requirements Version 1.0.2 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0 E-Mail: eid@bsi.bund.de Internet: https://www.bsi.bund.de
More informationLegal Regulations and Vulnerability Analysis
Legal Regulations and Vulnerability Analysis Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security) Germany Introduction of the BSI National Authority for Information
More informationAdvanced Security Mechanisms for Machine Readable Travel Documents and eidas Token
Technical Guideline TR-03110-1 Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Part 1 emrtds with BAC/PACEv2 and EACv1 Version 2.20 26. February 2015 History Version
More informationTest plan for eid and esign compliant smart card readers with integrated EACv2
Technical Guideline BSI TR-03105 Part 5.2 Test plan for eid and esign compliant smart card readers with integrated EACv2 Version: 2.0 Date: 2015-05-22 Bundesamt für Sicherheit in der Informationstechnik
More informationWhitepaper: GlobalTester Prove IS
Whitepaper: GlobalTester Prove IS Testing of EAC inspection systems By HJP Consulting GmbH Introduction There have been a lot of activities in standardization to define conformity tests for e-passports.
More information2 Electronic Passports and Identity Cards
2 Picture source: www.bundesdruckerei.de Paper based Passport Radio Frequency (RF) Chip Electronic Passport (E Pass) Biographic data Human readable Partially machine readable (optically) Conventional
More informationTechnical Guideline TR eid-server Part 3: eidas-middleware-service for eidas-token
Technical Guideline TR-03130-3 eid-server Part 3: eidas-middleware-service for eidas-token Version 1.0 5. May 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899
More informationBSI-CC-PP for
for Common Criteria PP Configuration Machine Readable Electronic Documents - Optionales Nachladen (Optional Post-Emission Updates) [MR.ED-ON-PP] developed by Federal Office for Information Security Federal
More informationTR-374 YANG modules for management of G.hn systems in FTTdp architectures
TECHNICAL REPORT TR-374 YANG modules for management of G.hn systems in FTTdp architectures Issue: 1 Issue Date: June 2018 The Broadband Forum. All rights reserved. Notice The Broadband Forum is a non-profit
More informationIntroduction of the Seventh Edition of Doc 9303
Introduction of the Seventh Edition of Doc 9303 Sjef Broekhaar Advisor ICAO TRIP IRAN SEMINAR Kish Island 17/05/2016 Footer 1 July 2015: ICAO publishes the 7th edition of Doc 9303 Part 1 Part 2 Part 3
More informationThe New Seventh Edition of Doc Barry J. Kefauver Nairobi, Kenya November 2015
The New Seventh Edition of Doc 9303 Barry J. Kefauver Nairobi, Kenya November 2015 July 2015 ICAO published the 7 th edition of Doc 9303 Part 1 Part 2 Part 3 Part 4 Part 5 Part 6 Part 7 Part 8 Part 9
More informationConformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek
Conformity and Interoperability Key Prerequisites for Security of eid documents Holger Funke, 27 th April 2017, ID4Africa Windhoek Agenda 1. About secunet Security Networks AG 2. Timeline of interoperability
More informationBSI-CC-PP for. Java Card Protection Profile - Open Configuration, Version December developed by. Oracle Corporation
BSI-CC-PP-0099-2017 for Java Card Protection Profile - Open Configuration, Version 3.0.5 December 2017 developed by Oracle Corporation Federal Office for Information Security (BSI), Postfach 20 03 63,
More informationConformance Test Specification for BSI-TR Biometrics for Public Sector Applications
Technical Guideline TR-03122-1 Conformance Test Specification for BSI-TR 03121 Biometrics for Public Sector Applications Part 1: Framework Version 4.4 Federal Office for Information Security P.O. Box 20
More informationBSI TR Part 1.1 A framework for Official Electronic ID Document conformity tests
BSI TR-03105 Part 1.1 A framework for Official Electronic ID Document conformity tests Version 1.04.1 14.11.2008 CONTENTS 1 INTRODUCTION... 4 2 DEFINITIONS AND REFERENCES... 4 2.1 Definitions... 4 2.2
More informationWorking with the EU Directive High common level of network and information security. Martin Apel, SANS ICS Summit, Munich und
Working with the EU Directive High common level of network and information security Martin Apel, SANS ICS Summit, Munich und 18.06.2018 Outline 1. Overview over NIS-Directive 2. Who is an operator of essential
More informationBSI-CC-PP for. FIDO Universal Second Factor (U2F) Authenticator, Version 1.0. developed by. Federal Office for Information Security
for FIDO Universal Second Factor (U2F) Authenticator, Version 1.0 developed by Federal Office for Information Security Federal Office for Information Security (BSI), Postfach 20 03 63, 53133 Bonn, Germany
More informationCommon Criteria Protection Profile
Common Criteria Protection Profile Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use [MR.ED-PP] BSI-CC-PP-0087 Document history Version 1.01, May 20th, 2015 Federal Office for
More informationRoadmap for Implementation of New Specifications for MRTDs
for MRTDs For Publication on the ICAO Website Roadmap for Implementation of New Specifications for MRTDs DISCLAIMER: All reasonable precautions have been taken by the International Civil Aviation Organization
More informationThis document is a preview generated by EVS
TECHNICAL REPORT RAPPORT TECHNIQUE TECHNISCHER BERICHT CEN/TR 15449-5 April 2015 ICS 07.040; 35.240.70 English Version Geographic information - Spatial data infrastructures - Part 5: Validation and testing
More informationTechnical Guideline BSI TR Secure Element API (SE API)
Technical Guideline BSI TR-03151 Secure Element API (SE API) Version 1.0.0 6. June 2018 Post Box 20 03 63 D-53133 Bonn E-Mail: registrierkassen@bsi.bund.de Internet: https://www.bsi.bund.de 2018 Table
More informationTechnical Guideline TR eid-server. Part 2: Security Framework for eid-server operations
Technical Guideline TR-03130 eid-server Part 2: Security Framework for eid-server operations Version 2.1.2 October 25, 2017 Document history Version Date Description 0.4 Draft August 20, 2013 Initial External
More informationGovernment of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard
Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Version # : 1.6 Status: Approved Prepared under the delegated authority of the Management Board of Cabinet Queen's
More informationBSI-CC-PP-0088-V for
BSI-CC-PP-0088-V2-2017 for Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12 and DBMS PP Extended Package - Access History (DBMS PP_EP_AH) Version 1.02 developed by DBMS Working
More informationGovernment of Ontario IT Standard (GO ITS)
Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Version # : 1.5 Status: Approved Prepared under the delegated authority of the Management Board of Cabinet Queen's
More informationI n s t r u c t i o n S h e e t on the Handling of Information Classified VS - NUR FÜR DEN DIENSTGEBRAUCH (VS-NfD) (RESTRICTED) in Industry
I n s t r u c t i o n S h e e t on the Handling of Information Classified VS - NUR FÜR DEN DIENSTGEBRAUCH (VS-NfD) (RESTRICTED) in Industry (VS-NfD-Merkblatt) This Instruction Sheet determines the handling
More informationENGINEERING COMMITTEE Digital Video Subcommittee SCTE Digital Program Insertion Advertising Systems Interfaces.
ENGINEERING COMMITTEE Digital Video Subcommittee SCTE 130-10 2013 Digital Program Insertion Advertising Systems Interfaces Part 10 Stream Restriction Data Model (SRDM) NOTICE The Society of Cable Telecommunications
More informationThe epassport: What s Next?
The epassport: What s Next? Justin Ikura LDS2 Policy Sub-Group Co-chair Tom Kinneging Convenor of ISO/IEC JTC1 SC17 WG3 International Organization for Standardization (ISO) Strengthening Aviation Security
More informationConformance Requirements Guideline Version 0.1
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Editors: Conformance Requirements Guideline Version 0.1 Aug 22, 2001 Lynne Rosenthal (lynne.rosenthal@nist.gov)
More informationTECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD)
International Civil Aviation Organization WORKING PAPER TAG/MRTD/22-WP/8 16/04/14 English Only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD) TWENTY-SECOND MEETING Montréal, 21
More informationCommon Criteria Protection Profile. Machine Readable Travel Document with ICAO Application, Extended Access Control BSI-CC-PP-0056
Common Criteria Protection Profile Machine Readable Travel Document with ICAO Application, Extended Access Control BSI-CC-PP-0056 Foreword This Protection Profile Machine Readable Travel Document with
More informationGovernment of Ontario IT Standard (GO-ITS) Number 30.2 OPS Middleware Software for Java Platform
Government of Ontario IT Standard (GO-ITS) Number 30.2 OPS Middleware Software for Java Platform Version #: 1.0 Status: Approved Prepared for the Information Technology Standards Council (ITSC) under the
More informationENGINEERING COMMITTEE Digital Video Subcommittee SCTE Digital Program Insertion Advertising Systems Interfaces. Part 4
ENGINEERING COMMITTEE Digital Video Subcommittee SCTE 130-4 2009 Digital Program Insertion Advertising Systems Interfaces Part 4 Content Information Service (CIS) NOTICE The Society of Cable Telecommunications
More informationMachine Assisted Document Security Verification
Machine Assisted Document Security Verification Dr. Uwe Seidel Germany New Technologies Working Group (NTWG) TAG/MRTD 20 20 th Meeting of the Technical Advisory Group on Machine Readable Travel Documents
More informationBiometric Enrolment for the European Visa Informationsystem (VIS)
Biometric Enrolment for the European Visa Informationsystem (VIS) German Experiences 1 EU Visa Information System (VIS) Federal Foreign Office Visa Application EU VIS Border Police Border Control Territory
More informationCertification Report. EAL 4+ (ALC_DVS.2) Evaluation of TÜBİTAK BİLGEM UEKAE. AKİS v1.4i PASAPORT
Certification Report EAL 4+ (ALC_DVS.2) Evaluation of TÜBİTAK BİLGEM UEKAE AKİS v1.4i PASAPORT issued by Turkish Standards Institution Common Criteria Certification Scheme SOFTWARE TEST and CERTIFICATION
More informationCommon Criteria Protection Profile
Common Criteria Protection Profile Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use [MR.ED-PP] BSI-CC-PP-0087-V2 Version 2.0.2 Document history Version 2.0.2, April 4th, 2016
More informationNational Cyber Security Strategy 2016
National Cyber Security Strategy 2016 26th of April 2017, Athens Samuel Rothenpieler, International Relations Advisor, Federal Office for Information Security (BSI) Mission Statement of the German Federal
More informationFuture Expansion for emrtd PKI Mark Joynes, Entrust
Future Expansion for emrtd PKI Mark Joynes, Entrust 2013 MRTD Symposium 1 What are we trying to achieve Prevent: Production of credible false documents Tampering with legitimate documents Breach of sovereignty
More informationANSI/SCTE
Digital Video Subcommittee AMERICAN NATIONAL STANDARD ANSI/SCTE 243-3 2017 Next Generation Audio Carriage Constraints for Cable Systems: Part 3 MPEG-H Audio Carriage Constraints NOTICE The Society of Cable
More informationBSI-CC-PP for
for Protection Profile for the Security Module of a Smart Meter Mini-HSM (Mini-HSM Security Module PP) - Schutzprofil für das Sicherheitsmodul des Smart Meter Mini-HSM, V1.0 developed by Federal Office
More informationMicrosoft XML Namespaces Standards Support Document
[MS-XMLNS]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,
More informationWAP Provisioning Architecture Overview
WAP Provisioning Architecture Overview WAP-182-PROVARCH Proposed Version 19-February-2000 Wireless Application Protocol WAP Provisioning Architecture Overview Wireless Application Protocol Forum Ltd.2000.
More information[MS-XHTML]: Internet Explorer Extensible HyperText Markup Language (XHTML) Standards Support Document
[MS-XHTML]: Internet Explorer Extensible HyperText Markup Language (XHTML) Standards Support Document Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation.
More informationENGINEERING COMMITTEE Digital Video Subcommittee
ENGINEERING COMMITTEE Digital Video Subcommittee SCTE 164 2010 Emergency Alert Metadata Descriptor NOTICE The Society of Cable Telecommunications Engineers (SCTE) Standards are intended to serve the public
More informationEU Passport Specification
Biometrics Deployment of EU-Passports EU Passport Specification (EN) 28/06/2006 (As the United Kingdom and Ireland have not taken part in the adoption of this measure, an authentic English version of the
More informationTechnical Guideline TR eid-client Part 2: Conformance Test Specification. Version 1.3
Technical Guideline TR-03124-2 e-client Part 2: Conformance Test Specification Version 1.3 12. June 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0 E-Mail:
More informationQC1 VSC. Rapid Travel Document Authentication. foster+freeman. all passports & ID cards. alterations & counterfeits. covert security features
foster+freeman VSC Video Spectral Comparator QC1 Rapid Travel Document Authentication examine all passports & ID cards DeteCt alterations & counterfeits Reveal covert security features foster+freeman QC1
More informationBSI C5 Status Quo. Dr. Clemens Doubrava, BSI,
BSI C5 Status Quo Dr. Clemens Doubrava, BSI, 11.12.2017 Expectations Cloud Service Provider Customers, more customers, An Everything-is-secure -Certification Preferably including data protection (GDPR)
More informationNOTICE. (Formulated under the cognizance of the CTA R7 Home Networks Committee.)
CTA Standard Task Model Description (CE TASK 1.0) CTA-2018 R2016 (Formerly ANSI/) March 2008 NOTICE Consumer Technology Association (CTA) Standards, Bulletins and other technical publications are designed
More informationPrivacy and Security in Smart Grids
Faculty of Computer Science, Institute of Systems Architecture, Chair for Privacy and Data Security Privacy and Security in Smart Grids The German Approach Sebastian Clauß, Stefan Köpsell Dresden, 19.10.2012
More informationAMERICAN NATIONAL STANDARD
ENGINEERING COMMITTEE Digital Video Subcommittee AMERICAN NATIONAL STANDARD ANSI/SCTE 130-8 2010 Digital Program Insertion Advertising Systems Interfaces Part 8 General Information Service (GIS) NOTICE
More informationLightweight Machine to Machine Architecture
Lightweight Machine to Machine Architecture Approved Version 1.0 08 Feb 2017 Open Mobile Alliance OMA-AD-LightweightM2M-V1_0-20170208-A OMA-AD-LightweightM2M-V1_0-20170208-A Page 2 (12) Use of this document
More informationGerman eid based on Extended Access Control v2
German eid based on Extended Access Control v2 Overview of the German eid system Version 1.2 21. August 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0
More informationTR-355 YANG Modules for FTTdp Management
TECHNICAL REPORT TR-355 YANG Modules for FTTdp Management Issue: 1 Issue Date: July 2016 The Broadband Forum. All rights reserved. Notice The Broadband Forum is a non-profit corporation organized to create
More informationANSI/SCTE
ENGINEERING COMMITTEE Digital Video Subcommittee AMERICAN NATIONAL STANDARD ANSI/SCTE 130-8 2011 Digital Program Insertion Advertising Systems Interfaces Part 8 General Information Service (GIS) NOTICE
More informationVerifying emrtd Security Controls
Blackhat Europe 2010 Verifying emrtd Security Controls Raoul D Costa 1 3M 2010. All Rights Reserved. Agenda Overview of ICAO / EU Specifications emrtds decomposed emrtd Infrastructure (PKI) Inspecting
More informationjosef A Java-Based Open-Source Smart Meter Gateway Experimentation Framework
Kommunikationsnetze josef A Java-Based Open-Source Smart Meter Gateway Experimentation Framework Michael Höfling, Florian Heimgärtner, Daniel Fuchs, Michael Menth http://kn.inf.uni-tuebingen.de Background
More informationIMPLEMENTATION GUIDE
1 PAN EUROPEAN VERIFICATION FUNCTION 2018-04-11 VERSION 01 RELEASE 00 2 Copyright notice: 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Copyright ENTSO-E. All Rights Reserved. This document and its whole translations
More informationCONFORMITY TESTING OF EAC INSPECTION SYSTEMS
CONFORMITY TESTING OF EAC INSPECTION SYSTEMS By Dr. Michael Jahnich, Technical Director, HJP Consulting GmbH Testing the conformance of inspection systems for epassports is an ongoing and open issue. One
More informationRequest for Comments: 1552 Category: Standards Track December The PPP Internetwork Packet Exchange Control Protocol (IPXCP)
Network Working Group W. Simpson Request for Comments: 1552 Daydreamer Category: Standards Track December 1993 The PPP Internetwork Packet Exchange Control Protocol (IPXCP) Status of this Memo This document
More informationMicrosoft XML Namespaces Standards Support Document
[MS-XMLNS]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Mobile item identification and management Mobile AIDC application programming interface
INTERNATIONAL STANDARD ISO/IEC 29179 First edition 2012-02-01 Information technology Mobile item identification and management Mobile AIDC application programming interface Technologies de l'information
More informationSmart Gas Metering in Germany.
Smart Gas Metering in Germany. New OMS Standard for Germany. New security standard. 10 th October 2012, Metering Billing/CRM Europe 2012, Amsterdam Andreas Bolder, Deutsche Telekom Technischer Service
More informationNetwork Working Group Request for Comments: February 2006
Network Working Group Request for Comments: 4361 Updates: 2131, 2132, 3315 Category: Standards Track T. Lemon Nominum B. Sommerfield Sun Microsystems February 2006 Node-specific Client Identifiers for
More informationGuidelines. AZT Automotive GmbH * Allianz Center for Technology. Requirements for virtual vehicle keys
Guidelines AZT Automotive GmbH * Allianz Center for Technology Requirements for virtual vehicle keys Technical guidelines for implementing networked and securitycritical functions from the insurance company
More informationTR-403 PON Abstraction Interface Specifications
TECHNICAL REPORT TR-403 PON Abstraction Interface Specifications Issue: 1.0 Issue Date: December 2018 The Broadband Forum. All rights reserved. Notice The Broadband Forum is a non-profit corporation organized
More informationBSI-PP for. Protection Profile Waste Bin Identification Systems (WBIS-PP) Version developed by. Deutscher Städte- und Gemeindenbund
Bundesamt für Sicherheit in der Informationstechnik BSI-PP-0010-2004 for Protection Profile Waste Bin Identification Systems (WBIS-PP) Version 1.04 developed by Deutscher Städte- und Gemeindenbund - Bundesamt
More informationQ&A Genuine-ID. Answers. Questions
Q&A Genuine-ID Questions Answers 1. What is Genuine-ID? Genuine-ID is a software package for the automated authentication of ID documents (IDs). It automatically extracts any kind of relevant data from
More informationepass ICAO essential configuration BAC and EAC RSA or configuration BAC and EAC ECC, Version 1.0 running on SLE77CLFX2400P & SLE77CLFX2407P
122 CERTIFICATION REPORT No. CRP286 running on SLE77CLFX2400P & SLE77CLFX2407P Issue 1.0 September 2015 Crown Copyright 2015 All Rights Reserved Reproduction is authorised, provided that this report is
More informationThis document is a preview generated by EVS
TECHNICAL REPORT RAPPORT TECHNIQUE TECHNISCHER BERICHT CLC/TR 50600-99-3 August 2018 ICS 35.020; 35.110; 35.160 English Version Information technology - Data centre facilities and infrastructures - Part
More informationADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads)
ADMINISTRATIVE POLICY NO. 13-01 ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads) I. POLICY ISSUANCE This policy provides uniform guidelines and policies on the issuance and return of
More informationTechnical Guideline TR eid-client Part 1: Specifications
Technical Guideline TR-03124-1 eid-client Part 1: Specifications Version 1.3 12. June 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0 E-Mail: eid@bsi.bund.de
More informationFor example, under Presentation Node Type, one would not say:
Published on OASIS (https://www.oasis-open.org) Keyword Guidelines for OASIS Specifications and Standards Description: Describing best practices in using RFC2119 or ISO keywords when writing specifications
More informationISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données
INTERNATIONAL STANDARD ISO 15764 First edition 2004-08-15 Road vehicles Extended data link security Véhicules routiers Sécurité étendue de liaison de données Reference number ISO 15764:2004(E) ISO 2004
More informationIndustrial Security - Protecting productivity IEC INDA
Industrial Security - Protecting productivity IEC 62443 - INDA siemens.com/industrialsecurity Industrial Security IEC 62443 Page 2 07.10.2015 IACS, automation solution, control system Industrial Automation
More informationA National Public Key Directory
A National Public Key Directory Version 1.0 definite Date 21 July 2015 Author Jeen de Swart Judicial Information services Ministry of Security and Justice, Netherlands ABSTRACT This white paper is about
More informationGuidelines for development of ISO conformant devices
Guidelines for development of ISO 28560-3 conformant devices Author : Tommy Schomacker, contact TS@dbc.dk Identifier: http://biblstandard.dk/rfid/docs/conformance_28560-3.pdf Status : For information Published
More information[MS-FILESYNC]: File Synchronization Protocol. Intellectual Property Rights Notice for Open Specifications Documentation
[MS-FILESYNC]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,
More informationIntegration Broker Standard
Architecture, Standards and Planning Branch Document Version 1.0 Replaces CIO Directive: "Use of webmethods as " Security Classification: Public Document Control: Date Author Version Change Reference TBD,
More informationIntroduction of Toshiba Face Recognition Software Toshiba Corporation 1
Introduction of Toshiba Face Recognition Software 2016 Toshiba Corporation 1 Why choose Toshiba s FRS? * Performance ** - NIST-Proven World Top Class Accuracy & Speed - 150 patents Experience - Over 1000
More informationETSI TS V1.2.1 ( ) Technical Specification
TS 102 778-3 V1.2.1 (2010-07) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 3: PAdES Enhanced - PAdES-BES and PAdES-EPES Profiles
More informationECMAScript Test Suite
ECMA TR/104 2 nd Edition / December 2016 ECMAScript Test Suite Reference number ECMA-123:2009 Ecma International 2009 COPYRIGHT PROTECTED DOCUMENT Ecma International 2016 Contents Page 1 Scope... 1 2 References...
More informationBPMN Working Draft. 1. Introduction
1. Introduction The Business Process Management Initiative (BPMI) has developed a standard Business Process Modeling Notation (BPMN). The primary goal of BPMN is to provide a notation that is readily understandable
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 18013-3 Second edition 2017-04 Information technology Personal identification ISO-compliant driving licence Part 3: Access control, authentication and integrity validation
More informationANSI/SCTE
ENGINEERING COMMITTEE Digital Video Subcommittee AMERICAN NATIONAL STANDARD ANSI/SCTE 194-2 2013 DTS-HD AUDIO SYSTEM Part 2: Constraints for Carriage over MPEG-2 Transport NOTICE The Society of Cable Telecommunications
More informationPart 9: Deployment of Biometric Identification and Electronic Storage of Data in MRTDs
Doc 9303 Machine Readable Travel Documents Seventh Edition, 2015 Part 9: Deployment of Biometric Identification and Electronic Storage of Data in MRTDs Approved by and published under the authority of
More informationLightweight Machine to Machine Architecture
Lightweight Machine to Machine Architecture Candidate Version 1.0 10 Dec 2013 Open Mobile Alliance OMA-AD-LightweightM2M-V1_0-20131210-C OMA-AD-LightweightM2M-V1_0-20131210-C Page 2 (12) Use of this document
More informationGovernment of Ontario IT Standard (GO-ITS) GO-ITS Number 30.7 OPS Backup & Restore Software Suite. Version #: 1.0 Status: Approved
Government of Ontario IT Standard (GO-ITS) GO-ITS Number 30.7 OPS Backup & Restore Software Suite Version #: 1.0 Status: Approved Prepared for the Information Technology Standards Council (ITSC) under
More informationAmbiguous Shoulds - Language Clarification Policy Proposals. Andrea Cima Registration Services Manager RIPE NCC
Ambiguous Shoulds - Language Clarification Policy Proposals Andrea Cima Registration Services Manager RIPE NCC RIPE 69 London - United Kingdom 5 November 2014 What Happened at RIPE 67 in Athens 2 Jan Žorž
More informationTECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD)
International Civil Aviation Organization WORKING PAPER TAG/MRTD/22-WP/4 16/04/14 English Only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD) TWENTY-SECOND MEETING Montréal, 21
More informationCryptographic Mechanisms: Recommendations and Key Lengths
Technical Guideline TR-02102-4 Cryptographic Mechanisms: Recommendations and Key Lengths Part 4 Use of Secure Shell (SSH) (Version 2018-01) Federal Office for Information Security P.O.B. 20 03 63 D-53133
More informationJoint Interpretation Library. Certification of "open" smart card products
Joint Interpretation Library Certification of "open" smart card products Version 1.1 (for trial use) 4 February 2013 Certification of "open" smart card products Joint Interpretation Library Acknowledgments:
More informationAMERICAN NATIONAL STANDARD
Digital Video Subcommittee AMERICAN NATIONAL STANDARD Methods for Isochronous Data Services Transport NOTICE The Society of Cable Telecommunications Engineers (SCTE) / International Society of Broadband
More informationData Center Bridging Consortium
Data Center Bridging Consortium 802.1Qaz Enhanced Transmission Selection Test Suite Version 1.2 Technical Document Last Updated: April 10th, 2012 Data Center Bridging Consortium HTTP://WWW.IOL.UNH.EDU/CONSORTIUMS/DCB
More informationEmployee Security Awareness Training Program
Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,
More informationTECHNICAL SPECIFICATION
TECHNICAL SPECIFICATION IEC/TS 62351-8 Edition 1.0 2011-09 colour inside Power systems management and associated information exchange Data and communications security Part 8: Role-based access control
More information