Machine Authentication of MRTDs for Public Sector Applications

Size: px
Start display at page:

Download "Machine Authentication of MRTDs for Public Sector Applications"

Transcription

1 Technical Guideline BSI TR Machine Authentication of MRTDs for Public Sector Applications Part 2: Application profiles for official document inspection systems BSI TR Version 2.1.0

2 Federal Office for Information Security with the Federal Criminal Police Office and the Federal Police Post Box D Bonn Phone: Internet: Federal Office for Information Security 2016

3 TR Part 2 Table of Contents Table of Contents 1 Introduction Terminology Technical terms Operational scenarios Stationary operations Self Service operations Partially mobile operations Fully mobile operations Requirements from TR Requirements on the document checking system Requirements on document checks General requirements for all scenarios Requirements for Stationary operations Requirements for Self Service operations Requirements for Partially Mobile operations Requirements for Fully Mobile operations Requirements on operational monitoring Basic logging profile Standard logging profile Standard logging profile with optical evaluation extensions Standard logging profile with electronic evaluation extensions Full logging profile Requirements on data transmission Conformity Reference Documentation Keywords and Abbreviations Tables Table 1.1: Interpretation of keywords... 5 Table 3.1: Requirements for Stationary operations... 8 Table 3.2: Requirements for Self Service operations... 9 Table 3.3: Requirements for Partially Mobile operations...10 Table 3.4: Requirements for Fully Mobile operations...11 Table 3.5: Set of extended data nodes for different check types...12 Federal Office for Information Security 3

4 Table of Contents 4 Bundesamt für Sicherheit in der Informationstechnik

5 TR Part 2 Introduction 1 1 Introduction This profiling document is part of Technical Guideline TR Machine Authentication of MRTDs for Public Sector Applications. The Technical Guideline specifies and describes necessary requirements for machine assisted document checks on MRTDs in Public Sector Applications. The technical description of the checks referenced in this document are specified in Part 1 of TR-03135, see [TR ]. Regarding official German inspection systems, the profiles specified herein are REQUIRED. 1.1 Terminology The key words MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, SHOULD NOT, RECOMMENDED, MAY, NORMATIVE, and OPTIONAL in this document are to be interpreted as described in RFC 2119: Keywords MUST, SHALL, REQUIRED, NORMATIVE MUST NOT, SHALL NOT RECOMMENDED, NOT RECOMMENDED, SHOULD, SHOULD NOT MAY, OPTIONAL Table 1.1: Interpretation of keywords Interpretation of keywords The implementation is an absolute requirement of the specification and must be used/included. A so called requirement is an absolute prohibition of the specification. The requirements are recommendations, this means that there may exist valid reasons in particular circumstances to ignore a particular item or requirement, but the full implications must be understood and carefully weighed before choosing a different course. The requirements are not binding. One operator or vendor may choose to include it, another may omit it. 1.2 Technical terms For clarity, terms were shortened to make this Technical Guideline more readable. Abbreviations can be found in [TR ]. Federal Office for Information Security 5

6 2 Operational scenarios TR Part 2 2 Operational scenarios This profiling refers to operational emrtd inspection scenarios in German Public Sector Applications. In this respect, the operational scenarios are defined in the following chapters. 2.1 Stationary operations Stationary systems are systems which are permanently installed at border crossings, at police stations or at other localities with raised focus concerning security issues (e.a. government buildings, ministries, embassies or official meeting locations) as well as temporary systems in accordingly prepared sites (e.g. for major events such as sports or music events). 2.2 Self Service operations Self Service systems are systems with which automated or semi-automated document and identity checks are performed (e. g. so-called egates/abc systems, automated border control systems/gates). 2.3 Partially mobile operations Partially mobile operations usually takes place at checkpoints, in patrol cars or vessels, but also in rail, air and shipping traffic. This includes, for example portable PC stations, which are the size of a notebook, or a tablet PC. These systems are often equipped with a swipe reader or full-page reader in order to be able to read the MRZ, but also with a RFID reading module in order to read the chip. 2.4 Fully mobile operations Fully mobile operations will be performed in rail, air and shipping traffic as well as during general patrol duty. The systems are carried by the officer, some of them are fixed or strapped on the officers uniform. The devices used have the similar size and design as smartphones or tablet PCs. 6 Federal Office for Information Security

7 3 Requirements from TR TR Part 2 Requirements from TR This chapter details the requirements from [TR ] which are relevant for these application profiles. 3.1 Requirements on the document checking system The generic requirements of a document checking system SHALL fit the requirements regarding chapters 2 and 3 of [TR ]. 3.2 Requirements on document checks General requirements for all scenarios If a specific check is implemented it SHALL be performed regarding optical checks as specified in [TR ] chapter 4.4 electronic checks as specified in [TR ] chapter 4.5 combined checks as specified in [TR ] chapter 4.6 handling of defects as specified in [TR ] chapter Requirements for Stationary operations Optical Checks Ref. [TR ] Obligation (m/o/e) Notes m For all further checking steps the model shall be identified. Depending on the model identification, document model specific spectrally selective checks SHALL be performed, if defined m MRZ consistency check shall always be possible, regardless of the used technology m/e Spectrally selective checks SHOULD be performed if applicable for the given document model. At least the checks (IR, AB, MR) and (UV, BR, FU) SHALL be performed. Electronic Checks If chip authenticity is guaranteed by the electronic check, the mode of spectrally selective checks CAN be changed to evaluatory m Background Public Key Infrastructures m Defect- and Masterlists m Supported Protocols. Federal Office for Information Security 7

8 3 Requirements from TR TR Part 2 Ref. [TR ] Obligation (m/o/e) Notes m Chip Access Protocols m Checking the chip contents. Combined Checks m Checking the validity of the documents m Comparison of the optical with the electronic biographic data o Checks across document pages o Cross checks across several documents and linking of multiple document checks in a transaction o Comparison of personalization contents is recommended for all documents that are present in a check database. Table 3.1: Requirements for Stationary operations Requirements for Self Service operations Optical Checks Ref. [TR ] Obligation (m/o/e) Notes m For all further checking steps the model shall be identified. Depending on the model identification, document model specific spectrally selective checks SHALL be performed, if defined m MRZ consistency check shall always be possible, regardless of the used technology m/e If applicable, selective checks SHOULD be performed on a given document model. At least the checks (IR, AB, MR) and (UV, BR, FU) SHALL be performed. Electronic Checks If chip authenticity is guaranteed by the electronic check, the mode of certain spectrally selective checks (which are neither REQUIRED nor RECOMMENDED) CAN be changed to evaluatory. At least one check each (IR, TR, ZZ) and (UV, LU, ZZ) SHOULD be performed m Background Public Key Infrastructures m Defect- and Masterlists m Supported Protocols. 8 Federal Office for Information Security

9 TR Part 2 Requirements from TR Ref. [TR ] Obligation (m/o/e) Notes m Chip Access Protocols m Checking the chip contents. Combined Checks m Checking the validity of the documents m Comparison of the optical with the electronic biographic data o Checks across document pages o Cross checks across several documents and linking of multiple document checks in a transaction o Comparison of personalization contents is recommended for all documents that are present in a check database. Table 3.2: Requirements for Self Service operations Federal Office for Information Security 9

10 3 Requirements from TR TR Part Requirements for Partially Mobile operations Optical Checks Ref. [TR ] Obligation (m/o/e) Notes o Depending on the optical reader it may be impossible to determine the model, for example if it is a Swipe-Reader m MRZ consistency check shall always be possible, regardless of the used technology o If the model could not be identified (e.g. because of a Swipe-Reader) the application of spectrally selective check routines is not possible. Electronic Checks m Background Public Key Infrastructures m Defect- and Masterlists m Supported Protocols m Chip Access Protocols m Checking the chip contents. Combined Checks m Checking the validity of the documents m Comparison of the optical with the electronic biographic data o Cross check and linking of multiple document checks in a transaction o Checks across several pages o Comparison of personalization contents is recommended for all documents that are present in a check database. Table 3.3: Requirements for Partially Mobile operations 10 Federal Office for Information Security

11 TR Part 2 Requirements from TR Requirements for Fully Mobile operations Optical Checks Ref. [TR ] Obligation (m/o/e) Notes o Depending on the optical reader it may be impossible to determine the model, for example if it is a Swipe-Reader m MRZ consistency check shall always be possible, regardless of the used technology o If the model could not be identified (e.g. because of a Swipe-Reader) the application of spectrally selective check routines is not possible. Electronic Checks m Background Public Key Infrastructures m Defect- and Masterlists m Supported Protocols m Chip Access Protocols m Checking the chip contents. Combined Checks m Checking the validity of the documents m Comparison of the optical with the electronic biographic data o Checks across document pages o Cross checks across several documents and linking of multiple document checks in a transaction o Comparison of personalization contents is recommended for all documents that are present in a check database Table 3.4: Requirements for Fully Mobile operations 3.3 Requirements on operational monitoring The document check system SHALL implement the logging schema according to [TR ], chapter 5. This document defines the following levels of logging configurations: 1. Basic logging profile 2. Standard logging profile 3. Standard logging profile with optical evaluation extensions Federal Office for Information Security 11

12 3 Requirements from TR TR Part 2 4. Standard logging profile with electronic evaluation extensions 5. Full logging profile The set of extended data nodes is defined for the corresponding checks in table 3.5. Type of failed check Optical Check Electronic Check Combined Check Biometric Check Extended data nodes (XPath expression) //dco:basiccheckresult/dco:scannedarea //dco:scannedimages //dc:documentdetails //dce:chipfiles //dce:trace //dcc:mismatch/* //dc:image Table 3.5: Set of extended data nodes for different check types The document check system SHALL implement all defined logging configurations. Setting the actual logging configuration SHALL be configurable by the application Basic logging profile Basic logging SHALL contain all non-person related data from a check, including all check results. All data items from the XML schema SHALL be filled, with the exception of the set of extended data nodes Standard logging profile Standard logging SHALL contain all available information from Basic logging profile and SHALL provide additional information on the specific failed and undetermined check(s). Depending on the type of error, the relevant sets of extended data nodes detailling the error SHALL be present in the log. Note that extended data nodes are not present if the corresponding check was aborted Standard logging profile with optical evaluation extensions Standard logging with optical evaluation extensions SHALL contain all information from Standard logging and SHALL contain all extended data nodes for the optical check regardless of the optical check result Standard logging profile with electronic evaluation extensions Standard logging with optical evaluation extensions SHALL contain all information from Standard logging and SHALL contain all extended data nodes for the electronic check check regardless of the electronic check result Full logging profile Full logging SHALL contain all available information including all extended nodes, regardless of the check results. 12 Federal Office for Information Security

13 TR Part 2 Requirements from TR Requirements on data transmission The document check system SHALL implement the transmission and log specification according to [TR ], chapter 6. This requirement is REQUIRED for Stationary and Self Service operations and RECOMMENDED for Partially Mobile and Fully Mobile operations. Federal Office for Information Security 13

14 4 Conformity TR Part 2 4 Conformity In order to conform to this Technical Guideline, an Inspection System and Inspection Application SHALL completely implement and meet all requirements from chapters 3 for the used scenario. 14 Federal Office for Information Security

15 TR Part 2 Reference Documentation Reference Documentation [TR ] Bundesamt für Sicherheit in der Informationstechnik (BSI): Technische Richtlinie TR-03135, Machine Authentication of MRTDs for Public Sector Applications Part 1: Overview and Functional Requirements, 2016, Version Federal Office for Information Security 15

16 Keywords and Abbreviations TR Part 2 Keywords and Abbreviations For Keywords and Abbreviations see [TR ]. 16 Federal Office for Information Security

MACHINE READABLE TRAVEL DOCUMENTS

MACHINE READABLE TRAVEL DOCUMENTS MACHINE READABLE TRAVEL DOCUMENTS ADVANCED SECURITY MECHANISMS FOR MACHINE READABLE TRAVEL DOCUMENTS EXTENDED ACCESS CONTROL (EACv1) COMPLEMENTARY TO TEST METHODS FOR MRTDs USING STATIC BINDING Version

More information

The EAC for MRTD. 26 January 2010

The EAC for MRTD. 26 January 2010 The EAC for MRTD Rafik Chaabouni Serge Vaudenay 26 January 2010 Outline MRTD? Standards - RFID - ICAO and BAC - EAC Solutions? 2 MRTD? Machine Readable Travel Document 3 Standards RFID ICAO and BAC EAC

More information

Assurance Continuity Maintenance Report

Assurance Continuity Maintenance Report IFX_CCI_000003h, IFX_CCI_000005h, IFX_CCI_000008h, IFX_CCI_00000Ch, IFX_CCI_000013h, IFX_CCI_000014h, IFX_CCI_000015h, IFX_CCI_00001Ch and IFX_CCI_00001Dh design step H13 including optional software libraries

More information

Key Lifecycle Security Requirements. Version 1.0.2

Key Lifecycle Security Requirements. Version 1.0.2 Key Lifecycle Security Requirements Version 1.0.2 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0 E-Mail: eid@bsi.bund.de Internet: https://www.bsi.bund.de

More information

Legal Regulations and Vulnerability Analysis

Legal Regulations and Vulnerability Analysis Legal Regulations and Vulnerability Analysis Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security) Germany Introduction of the BSI National Authority for Information

More information

Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token

Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Technical Guideline TR-03110-1 Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Part 1 emrtds with BAC/PACEv2 and EACv1 Version 2.20 26. February 2015 History Version

More information

Test plan for eid and esign compliant smart card readers with integrated EACv2

Test plan for eid and esign compliant smart card readers with integrated EACv2 Technical Guideline BSI TR-03105 Part 5.2 Test plan for eid and esign compliant smart card readers with integrated EACv2 Version: 2.0 Date: 2015-05-22 Bundesamt für Sicherheit in der Informationstechnik

More information

Whitepaper: GlobalTester Prove IS

Whitepaper: GlobalTester Prove IS Whitepaper: GlobalTester Prove IS Testing of EAC inspection systems By HJP Consulting GmbH Introduction There have been a lot of activities in standardization to define conformity tests for e-passports.

More information

2 Electronic Passports and Identity Cards

2 Electronic Passports and Identity Cards 2 Picture source: www.bundesdruckerei.de Paper based Passport Radio Frequency (RF) Chip Electronic Passport (E Pass) Biographic data Human readable Partially machine readable (optically) Conventional

More information

Technical Guideline TR eid-server Part 3: eidas-middleware-service for eidas-token

Technical Guideline TR eid-server Part 3: eidas-middleware-service for eidas-token Technical Guideline TR-03130-3 eid-server Part 3: eidas-middleware-service for eidas-token Version 1.0 5. May 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899

More information

BSI-CC-PP for

BSI-CC-PP for for Common Criteria PP Configuration Machine Readable Electronic Documents - Optionales Nachladen (Optional Post-Emission Updates) [MR.ED-ON-PP] developed by Federal Office for Information Security Federal

More information

TR-374 YANG modules for management of G.hn systems in FTTdp architectures

TR-374 YANG modules for management of G.hn systems in FTTdp architectures TECHNICAL REPORT TR-374 YANG modules for management of G.hn systems in FTTdp architectures Issue: 1 Issue Date: June 2018 The Broadband Forum. All rights reserved. Notice The Broadband Forum is a non-profit

More information

Introduction of the Seventh Edition of Doc 9303

Introduction of the Seventh Edition of Doc 9303 Introduction of the Seventh Edition of Doc 9303 Sjef Broekhaar Advisor ICAO TRIP IRAN SEMINAR Kish Island 17/05/2016 Footer 1 July 2015: ICAO publishes the 7th edition of Doc 9303 Part 1 Part 2 Part 3

More information

The New Seventh Edition of Doc Barry J. Kefauver Nairobi, Kenya November 2015

The New Seventh Edition of Doc Barry J. Kefauver Nairobi, Kenya November 2015 The New Seventh Edition of Doc 9303 Barry J. Kefauver Nairobi, Kenya November 2015 July 2015 ICAO published the 7 th edition of Doc 9303 Part 1 Part 2 Part 3 Part 4 Part 5 Part 6 Part 7 Part 8 Part 9

More information

Conformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek

Conformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek Conformity and Interoperability Key Prerequisites for Security of eid documents Holger Funke, 27 th April 2017, ID4Africa Windhoek Agenda 1. About secunet Security Networks AG 2. Timeline of interoperability

More information

BSI-CC-PP for. Java Card Protection Profile - Open Configuration, Version December developed by. Oracle Corporation

BSI-CC-PP for. Java Card Protection Profile - Open Configuration, Version December developed by. Oracle Corporation BSI-CC-PP-0099-2017 for Java Card Protection Profile - Open Configuration, Version 3.0.5 December 2017 developed by Oracle Corporation Federal Office for Information Security (BSI), Postfach 20 03 63,

More information

Conformance Test Specification for BSI-TR Biometrics for Public Sector Applications

Conformance Test Specification for BSI-TR Biometrics for Public Sector Applications Technical Guideline TR-03122-1 Conformance Test Specification for BSI-TR 03121 Biometrics for Public Sector Applications Part 1: Framework Version 4.4 Federal Office for Information Security P.O. Box 20

More information

BSI TR Part 1.1 A framework for Official Electronic ID Document conformity tests

BSI TR Part 1.1 A framework for Official Electronic ID Document conformity tests BSI TR-03105 Part 1.1 A framework for Official Electronic ID Document conformity tests Version 1.04.1 14.11.2008 CONTENTS 1 INTRODUCTION... 4 2 DEFINITIONS AND REFERENCES... 4 2.1 Definitions... 4 2.2

More information

Working with the EU Directive High common level of network and information security. Martin Apel, SANS ICS Summit, Munich und

Working with the EU Directive High common level of network and information security. Martin Apel, SANS ICS Summit, Munich und Working with the EU Directive High common level of network and information security Martin Apel, SANS ICS Summit, Munich und 18.06.2018 Outline 1. Overview over NIS-Directive 2. Who is an operator of essential

More information

BSI-CC-PP for. FIDO Universal Second Factor (U2F) Authenticator, Version 1.0. developed by. Federal Office for Information Security

BSI-CC-PP for. FIDO Universal Second Factor (U2F) Authenticator, Version 1.0. developed by. Federal Office for Information Security for FIDO Universal Second Factor (U2F) Authenticator, Version 1.0 developed by Federal Office for Information Security Federal Office for Information Security (BSI), Postfach 20 03 63, 53133 Bonn, Germany

More information

Common Criteria Protection Profile

Common Criteria Protection Profile Common Criteria Protection Profile Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use [MR.ED-PP] BSI-CC-PP-0087 Document history Version 1.01, May 20th, 2015 Federal Office for

More information

Roadmap for Implementation of New Specifications for MRTDs

Roadmap for Implementation of New Specifications for MRTDs for MRTDs For Publication on the ICAO Website Roadmap for Implementation of New Specifications for MRTDs DISCLAIMER: All reasonable precautions have been taken by the International Civil Aviation Organization

More information

This document is a preview generated by EVS

This document is a preview generated by EVS TECHNICAL REPORT RAPPORT TECHNIQUE TECHNISCHER BERICHT CEN/TR 15449-5 April 2015 ICS 07.040; 35.240.70 English Version Geographic information - Spatial data infrastructures - Part 5: Validation and testing

More information

Technical Guideline BSI TR Secure Element API (SE API)

Technical Guideline BSI TR Secure Element API (SE API) Technical Guideline BSI TR-03151 Secure Element API (SE API) Version 1.0.0 6. June 2018 Post Box 20 03 63 D-53133 Bonn E-Mail: registrierkassen@bsi.bund.de Internet: https://www.bsi.bund.de 2018 Table

More information

Technical Guideline TR eid-server. Part 2: Security Framework for eid-server operations

Technical Guideline TR eid-server. Part 2: Security Framework for eid-server operations Technical Guideline TR-03130 eid-server Part 2: Security Framework for eid-server operations Version 2.1.2 October 25, 2017 Document history Version Date Description 0.4 Draft August 20, 2013 Initial External

More information

Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard

Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Version # : 1.6 Status: Approved Prepared under the delegated authority of the Management Board of Cabinet Queen's

More information

BSI-CC-PP-0088-V for

BSI-CC-PP-0088-V for BSI-CC-PP-0088-V2-2017 for Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12 and DBMS PP Extended Package - Access History (DBMS PP_EP_AH) Version 1.02 developed by DBMS Working

More information

Government of Ontario IT Standard (GO ITS)

Government of Ontario IT Standard (GO ITS) Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Version # : 1.5 Status: Approved Prepared under the delegated authority of the Management Board of Cabinet Queen's

More information

I n s t r u c t i o n S h e e t on the Handling of Information Classified VS - NUR FÜR DEN DIENSTGEBRAUCH (VS-NfD) (RESTRICTED) in Industry

I n s t r u c t i o n S h e e t on the Handling of Information Classified VS - NUR FÜR DEN DIENSTGEBRAUCH (VS-NfD) (RESTRICTED) in Industry I n s t r u c t i o n S h e e t on the Handling of Information Classified VS - NUR FÜR DEN DIENSTGEBRAUCH (VS-NfD) (RESTRICTED) in Industry (VS-NfD-Merkblatt) This Instruction Sheet determines the handling

More information

ENGINEERING COMMITTEE Digital Video Subcommittee SCTE Digital Program Insertion Advertising Systems Interfaces.

ENGINEERING COMMITTEE Digital Video Subcommittee SCTE Digital Program Insertion Advertising Systems Interfaces. ENGINEERING COMMITTEE Digital Video Subcommittee SCTE 130-10 2013 Digital Program Insertion Advertising Systems Interfaces Part 10 Stream Restriction Data Model (SRDM) NOTICE The Society of Cable Telecommunications

More information

The epassport: What s Next?

The epassport: What s Next? The epassport: What s Next? Justin Ikura LDS2 Policy Sub-Group Co-chair Tom Kinneging Convenor of ISO/IEC JTC1 SC17 WG3 International Organization for Standardization (ISO) Strengthening Aviation Security

More information

Conformance Requirements Guideline Version 0.1

Conformance Requirements Guideline Version 0.1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Editors: Conformance Requirements Guideline Version 0.1 Aug 22, 2001 Lynne Rosenthal (lynne.rosenthal@nist.gov)

More information

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD)

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD) International Civil Aviation Organization WORKING PAPER TAG/MRTD/22-WP/8 16/04/14 English Only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD) TWENTY-SECOND MEETING Montréal, 21

More information

Common Criteria Protection Profile. Machine Readable Travel Document with ICAO Application, Extended Access Control BSI-CC-PP-0056

Common Criteria Protection Profile. Machine Readable Travel Document with ICAO Application, Extended Access Control BSI-CC-PP-0056 Common Criteria Protection Profile Machine Readable Travel Document with ICAO Application, Extended Access Control BSI-CC-PP-0056 Foreword This Protection Profile Machine Readable Travel Document with

More information

Government of Ontario IT Standard (GO-ITS) Number 30.2 OPS Middleware Software for Java Platform

Government of Ontario IT Standard (GO-ITS) Number 30.2 OPS Middleware Software for Java Platform Government of Ontario IT Standard (GO-ITS) Number 30.2 OPS Middleware Software for Java Platform Version #: 1.0 Status: Approved Prepared for the Information Technology Standards Council (ITSC) under the

More information

ENGINEERING COMMITTEE Digital Video Subcommittee SCTE Digital Program Insertion Advertising Systems Interfaces. Part 4

ENGINEERING COMMITTEE Digital Video Subcommittee SCTE Digital Program Insertion Advertising Systems Interfaces. Part 4 ENGINEERING COMMITTEE Digital Video Subcommittee SCTE 130-4 2009 Digital Program Insertion Advertising Systems Interfaces Part 4 Content Information Service (CIS) NOTICE The Society of Cable Telecommunications

More information

Machine Assisted Document Security Verification

Machine Assisted Document Security Verification Machine Assisted Document Security Verification Dr. Uwe Seidel Germany New Technologies Working Group (NTWG) TAG/MRTD 20 20 th Meeting of the Technical Advisory Group on Machine Readable Travel Documents

More information

Biometric Enrolment for the European Visa Informationsystem (VIS)

Biometric Enrolment for the European Visa Informationsystem (VIS) Biometric Enrolment for the European Visa Informationsystem (VIS) German Experiences 1 EU Visa Information System (VIS) Federal Foreign Office Visa Application EU VIS Border Police Border Control Territory

More information

Certification Report. EAL 4+ (ALC_DVS.2) Evaluation of TÜBİTAK BİLGEM UEKAE. AKİS v1.4i PASAPORT

Certification Report. EAL 4+ (ALC_DVS.2) Evaluation of TÜBİTAK BİLGEM UEKAE. AKİS v1.4i PASAPORT Certification Report EAL 4+ (ALC_DVS.2) Evaluation of TÜBİTAK BİLGEM UEKAE AKİS v1.4i PASAPORT issued by Turkish Standards Institution Common Criteria Certification Scheme SOFTWARE TEST and CERTIFICATION

More information

Common Criteria Protection Profile

Common Criteria Protection Profile Common Criteria Protection Profile Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use [MR.ED-PP] BSI-CC-PP-0087-V2 Version 2.0.2 Document history Version 2.0.2, April 4th, 2016

More information

National Cyber Security Strategy 2016

National Cyber Security Strategy 2016 National Cyber Security Strategy 2016 26th of April 2017, Athens Samuel Rothenpieler, International Relations Advisor, Federal Office for Information Security (BSI) Mission Statement of the German Federal

More information

Future Expansion for emrtd PKI Mark Joynes, Entrust

Future Expansion for emrtd PKI Mark Joynes, Entrust Future Expansion for emrtd PKI Mark Joynes, Entrust 2013 MRTD Symposium 1 What are we trying to achieve Prevent: Production of credible false documents Tampering with legitimate documents Breach of sovereignty

More information

ANSI/SCTE

ANSI/SCTE Digital Video Subcommittee AMERICAN NATIONAL STANDARD ANSI/SCTE 243-3 2017 Next Generation Audio Carriage Constraints for Cable Systems: Part 3 MPEG-H Audio Carriage Constraints NOTICE The Society of Cable

More information

BSI-CC-PP for

BSI-CC-PP for for Protection Profile for the Security Module of a Smart Meter Mini-HSM (Mini-HSM Security Module PP) - Schutzprofil für das Sicherheitsmodul des Smart Meter Mini-HSM, V1.0 developed by Federal Office

More information

Microsoft XML Namespaces Standards Support Document

Microsoft XML Namespaces Standards Support Document [MS-XMLNS]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,

More information

WAP Provisioning Architecture Overview

WAP Provisioning Architecture Overview WAP Provisioning Architecture Overview WAP-182-PROVARCH Proposed Version 19-February-2000 Wireless Application Protocol WAP Provisioning Architecture Overview Wireless Application Protocol Forum Ltd.2000.

More information

[MS-XHTML]: Internet Explorer Extensible HyperText Markup Language (XHTML) Standards Support Document

[MS-XHTML]: Internet Explorer Extensible HyperText Markup Language (XHTML) Standards Support Document [MS-XHTML]: Internet Explorer Extensible HyperText Markup Language (XHTML) Standards Support Document Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation.

More information

ENGINEERING COMMITTEE Digital Video Subcommittee

ENGINEERING COMMITTEE Digital Video Subcommittee ENGINEERING COMMITTEE Digital Video Subcommittee SCTE 164 2010 Emergency Alert Metadata Descriptor NOTICE The Society of Cable Telecommunications Engineers (SCTE) Standards are intended to serve the public

More information

EU Passport Specification

EU Passport Specification Biometrics Deployment of EU-Passports EU Passport Specification (EN) 28/06/2006 (As the United Kingdom and Ireland have not taken part in the adoption of this measure, an authentic English version of the

More information

Technical Guideline TR eid-client Part 2: Conformance Test Specification. Version 1.3

Technical Guideline TR eid-client Part 2: Conformance Test Specification. Version 1.3 Technical Guideline TR-03124-2 e-client Part 2: Conformance Test Specification Version 1.3 12. June 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0 E-Mail:

More information

QC1 VSC. Rapid Travel Document Authentication. foster+freeman. all passports & ID cards. alterations & counterfeits. covert security features

QC1 VSC. Rapid Travel Document Authentication. foster+freeman. all passports & ID cards. alterations & counterfeits. covert security features foster+freeman VSC Video Spectral Comparator QC1 Rapid Travel Document Authentication examine all passports & ID cards DeteCt alterations & counterfeits Reveal covert security features foster+freeman QC1

More information

BSI C5 Status Quo. Dr. Clemens Doubrava, BSI,

BSI C5 Status Quo. Dr. Clemens Doubrava, BSI, BSI C5 Status Quo Dr. Clemens Doubrava, BSI, 11.12.2017 Expectations Cloud Service Provider Customers, more customers, An Everything-is-secure -Certification Preferably including data protection (GDPR)

More information

NOTICE. (Formulated under the cognizance of the CTA R7 Home Networks Committee.)

NOTICE. (Formulated under the cognizance of the CTA R7 Home Networks Committee.) CTA Standard Task Model Description (CE TASK 1.0) CTA-2018 R2016 (Formerly ANSI/) March 2008 NOTICE Consumer Technology Association (CTA) Standards, Bulletins and other technical publications are designed

More information

Privacy and Security in Smart Grids

Privacy and Security in Smart Grids Faculty of Computer Science, Institute of Systems Architecture, Chair for Privacy and Data Security Privacy and Security in Smart Grids The German Approach Sebastian Clauß, Stefan Köpsell Dresden, 19.10.2012

More information

AMERICAN NATIONAL STANDARD

AMERICAN NATIONAL STANDARD ENGINEERING COMMITTEE Digital Video Subcommittee AMERICAN NATIONAL STANDARD ANSI/SCTE 130-8 2010 Digital Program Insertion Advertising Systems Interfaces Part 8 General Information Service (GIS) NOTICE

More information

Lightweight Machine to Machine Architecture

Lightweight Machine to Machine Architecture Lightweight Machine to Machine Architecture Approved Version 1.0 08 Feb 2017 Open Mobile Alliance OMA-AD-LightweightM2M-V1_0-20170208-A OMA-AD-LightweightM2M-V1_0-20170208-A Page 2 (12) Use of this document

More information

German eid based on Extended Access Control v2

German eid based on Extended Access Control v2 German eid based on Extended Access Control v2 Overview of the German eid system Version 1.2 21. August 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0

More information

TR-355 YANG Modules for FTTdp Management

TR-355 YANG Modules for FTTdp Management TECHNICAL REPORT TR-355 YANG Modules for FTTdp Management Issue: 1 Issue Date: July 2016 The Broadband Forum. All rights reserved. Notice The Broadband Forum is a non-profit corporation organized to create

More information

ANSI/SCTE

ANSI/SCTE ENGINEERING COMMITTEE Digital Video Subcommittee AMERICAN NATIONAL STANDARD ANSI/SCTE 130-8 2011 Digital Program Insertion Advertising Systems Interfaces Part 8 General Information Service (GIS) NOTICE

More information

Verifying emrtd Security Controls

Verifying emrtd Security Controls Blackhat Europe 2010 Verifying emrtd Security Controls Raoul D Costa 1 3M 2010. All Rights Reserved. Agenda Overview of ICAO / EU Specifications emrtds decomposed emrtd Infrastructure (PKI) Inspecting

More information

josef A Java-Based Open-Source Smart Meter Gateway Experimentation Framework

josef A Java-Based Open-Source Smart Meter Gateway Experimentation Framework Kommunikationsnetze josef A Java-Based Open-Source Smart Meter Gateway Experimentation Framework Michael Höfling, Florian Heimgärtner, Daniel Fuchs, Michael Menth http://kn.inf.uni-tuebingen.de Background

More information

IMPLEMENTATION GUIDE

IMPLEMENTATION GUIDE 1 PAN EUROPEAN VERIFICATION FUNCTION 2018-04-11 VERSION 01 RELEASE 00 2 Copyright notice: 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Copyright ENTSO-E. All Rights Reserved. This document and its whole translations

More information

CONFORMITY TESTING OF EAC INSPECTION SYSTEMS

CONFORMITY TESTING OF EAC INSPECTION SYSTEMS CONFORMITY TESTING OF EAC INSPECTION SYSTEMS By Dr. Michael Jahnich, Technical Director, HJP Consulting GmbH Testing the conformance of inspection systems for epassports is an ongoing and open issue. One

More information

Request for Comments: 1552 Category: Standards Track December The PPP Internetwork Packet Exchange Control Protocol (IPXCP)

Request for Comments: 1552 Category: Standards Track December The PPP Internetwork Packet Exchange Control Protocol (IPXCP) Network Working Group W. Simpson Request for Comments: 1552 Daydreamer Category: Standards Track December 1993 The PPP Internetwork Packet Exchange Control Protocol (IPXCP) Status of this Memo This document

More information

Microsoft XML Namespaces Standards Support Document

Microsoft XML Namespaces Standards Support Document [MS-XMLNS]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Mobile item identification and management Mobile AIDC application programming interface

ISO/IEC INTERNATIONAL STANDARD. Information technology Mobile item identification and management Mobile AIDC application programming interface INTERNATIONAL STANDARD ISO/IEC 29179 First edition 2012-02-01 Information technology Mobile item identification and management Mobile AIDC application programming interface Technologies de l'information

More information

Smart Gas Metering in Germany.

Smart Gas Metering in Germany. Smart Gas Metering in Germany. New OMS Standard for Germany. New security standard. 10 th October 2012, Metering Billing/CRM Europe 2012, Amsterdam Andreas Bolder, Deutsche Telekom Technischer Service

More information

Network Working Group Request for Comments: February 2006

Network Working Group Request for Comments: February 2006 Network Working Group Request for Comments: 4361 Updates: 2131, 2132, 3315 Category: Standards Track T. Lemon Nominum B. Sommerfield Sun Microsystems February 2006 Node-specific Client Identifiers for

More information

Guidelines. AZT Automotive GmbH * Allianz Center for Technology. Requirements for virtual vehicle keys

Guidelines. AZT Automotive GmbH * Allianz Center for Technology. Requirements for virtual vehicle keys Guidelines AZT Automotive GmbH * Allianz Center for Technology Requirements for virtual vehicle keys Technical guidelines for implementing networked and securitycritical functions from the insurance company

More information

TR-403 PON Abstraction Interface Specifications

TR-403 PON Abstraction Interface Specifications TECHNICAL REPORT TR-403 PON Abstraction Interface Specifications Issue: 1.0 Issue Date: December 2018 The Broadband Forum. All rights reserved. Notice The Broadband Forum is a non-profit corporation organized

More information

BSI-PP for. Protection Profile Waste Bin Identification Systems (WBIS-PP) Version developed by. Deutscher Städte- und Gemeindenbund

BSI-PP for. Protection Profile Waste Bin Identification Systems (WBIS-PP) Version developed by. Deutscher Städte- und Gemeindenbund Bundesamt für Sicherheit in der Informationstechnik BSI-PP-0010-2004 for Protection Profile Waste Bin Identification Systems (WBIS-PP) Version 1.04 developed by Deutscher Städte- und Gemeindenbund - Bundesamt

More information

Q&A Genuine-ID. Answers. Questions

Q&A Genuine-ID. Answers. Questions Q&A Genuine-ID Questions Answers 1. What is Genuine-ID? Genuine-ID is a software package for the automated authentication of ID documents (IDs). It automatically extracts any kind of relevant data from

More information

epass ICAO essential configuration BAC and EAC RSA or configuration BAC and EAC ECC, Version 1.0 running on SLE77CLFX2400P & SLE77CLFX2407P

epass ICAO essential configuration BAC and EAC RSA or configuration BAC and EAC ECC, Version 1.0 running on SLE77CLFX2400P & SLE77CLFX2407P 122 CERTIFICATION REPORT No. CRP286 running on SLE77CLFX2400P & SLE77CLFX2407P Issue 1.0 September 2015 Crown Copyright 2015 All Rights Reserved Reproduction is authorised, provided that this report is

More information

This document is a preview generated by EVS

This document is a preview generated by EVS TECHNICAL REPORT RAPPORT TECHNIQUE TECHNISCHER BERICHT CLC/TR 50600-99-3 August 2018 ICS 35.020; 35.110; 35.160 English Version Information technology - Data centre facilities and infrastructures - Part

More information

ADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads)

ADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads) ADMINISTRATIVE POLICY NO. 13-01 ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads) I. POLICY ISSUANCE This policy provides uniform guidelines and policies on the issuance and return of

More information

Technical Guideline TR eid-client Part 1: Specifications

Technical Guideline TR eid-client Part 1: Specifications Technical Guideline TR-03124-1 eid-client Part 1: Specifications Version 1.3 12. June 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0 E-Mail: eid@bsi.bund.de

More information

For example, under Presentation Node Type, one would not say:

For example, under Presentation Node Type, one would not say: Published on OASIS (https://www.oasis-open.org) Keyword Guidelines for OASIS Specifications and Standards Description: Describing best practices in using RFC2119 or ISO keywords when writing specifications

More information

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données INTERNATIONAL STANDARD ISO 15764 First edition 2004-08-15 Road vehicles Extended data link security Véhicules routiers Sécurité étendue de liaison de données Reference number ISO 15764:2004(E) ISO 2004

More information

Industrial Security - Protecting productivity IEC INDA

Industrial Security - Protecting productivity IEC INDA Industrial Security - Protecting productivity IEC 62443 - INDA siemens.com/industrialsecurity Industrial Security IEC 62443 Page 2 07.10.2015 IACS, automation solution, control system Industrial Automation

More information

A National Public Key Directory

A National Public Key Directory A National Public Key Directory Version 1.0 definite Date 21 July 2015 Author Jeen de Swart Judicial Information services Ministry of Security and Justice, Netherlands ABSTRACT This white paper is about

More information

Guidelines for development of ISO conformant devices

Guidelines for development of ISO conformant devices Guidelines for development of ISO 28560-3 conformant devices Author : Tommy Schomacker, contact TS@dbc.dk Identifier: http://biblstandard.dk/rfid/docs/conformance_28560-3.pdf Status : For information Published

More information

[MS-FILESYNC]: File Synchronization Protocol. Intellectual Property Rights Notice for Open Specifications Documentation

[MS-FILESYNC]: File Synchronization Protocol. Intellectual Property Rights Notice for Open Specifications Documentation [MS-FILESYNC]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,

More information

Integration Broker Standard

Integration Broker Standard Architecture, Standards and Planning Branch Document Version 1.0 Replaces CIO Directive: "Use of webmethods as " Security Classification: Public Document Control: Date Author Version Change Reference TBD,

More information

Introduction of Toshiba Face Recognition Software Toshiba Corporation 1

Introduction of Toshiba Face Recognition Software Toshiba Corporation 1 Introduction of Toshiba Face Recognition Software 2016 Toshiba Corporation 1 Why choose Toshiba s FRS? * Performance ** - NIST-Proven World Top Class Accuracy & Speed - 150 patents Experience - Over 1000

More information

ETSI TS V1.2.1 ( ) Technical Specification

ETSI TS V1.2.1 ( ) Technical Specification TS 102 778-3 V1.2.1 (2010-07) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 3: PAdES Enhanced - PAdES-BES and PAdES-EPES Profiles

More information

ECMAScript Test Suite

ECMAScript Test Suite ECMA TR/104 2 nd Edition / December 2016 ECMAScript Test Suite Reference number ECMA-123:2009 Ecma International 2009 COPYRIGHT PROTECTED DOCUMENT Ecma International 2016 Contents Page 1 Scope... 1 2 References...

More information

BPMN Working Draft. 1. Introduction

BPMN Working Draft. 1. Introduction 1. Introduction The Business Process Management Initiative (BPMI) has developed a standard Business Process Modeling Notation (BPMN). The primary goal of BPMN is to provide a notation that is readily understandable

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 18013-3 Second edition 2017-04 Information technology Personal identification ISO-compliant driving licence Part 3: Access control, authentication and integrity validation

More information

ANSI/SCTE

ANSI/SCTE ENGINEERING COMMITTEE Digital Video Subcommittee AMERICAN NATIONAL STANDARD ANSI/SCTE 194-2 2013 DTS-HD AUDIO SYSTEM Part 2: Constraints for Carriage over MPEG-2 Transport NOTICE The Society of Cable Telecommunications

More information

Part 9: Deployment of Biometric Identification and Electronic Storage of Data in MRTDs

Part 9: Deployment of Biometric Identification and Electronic Storage of Data in MRTDs Doc 9303 Machine Readable Travel Documents Seventh Edition, 2015 Part 9: Deployment of Biometric Identification and Electronic Storage of Data in MRTDs Approved by and published under the authority of

More information

Lightweight Machine to Machine Architecture

Lightweight Machine to Machine Architecture Lightweight Machine to Machine Architecture Candidate Version 1.0 10 Dec 2013 Open Mobile Alliance OMA-AD-LightweightM2M-V1_0-20131210-C OMA-AD-LightweightM2M-V1_0-20131210-C Page 2 (12) Use of this document

More information

Government of Ontario IT Standard (GO-ITS) GO-ITS Number 30.7 OPS Backup & Restore Software Suite. Version #: 1.0 Status: Approved

Government of Ontario IT Standard (GO-ITS) GO-ITS Number 30.7 OPS Backup & Restore Software Suite. Version #: 1.0 Status: Approved Government of Ontario IT Standard (GO-ITS) GO-ITS Number 30.7 OPS Backup & Restore Software Suite Version #: 1.0 Status: Approved Prepared for the Information Technology Standards Council (ITSC) under

More information

Ambiguous Shoulds - Language Clarification Policy Proposals. Andrea Cima Registration Services Manager RIPE NCC

Ambiguous Shoulds - Language Clarification Policy Proposals. Andrea Cima Registration Services Manager RIPE NCC Ambiguous Shoulds - Language Clarification Policy Proposals Andrea Cima Registration Services Manager RIPE NCC RIPE 69 London - United Kingdom 5 November 2014 What Happened at RIPE 67 in Athens 2 Jan Žorž

More information

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD)

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD) International Civil Aviation Organization WORKING PAPER TAG/MRTD/22-WP/4 16/04/14 English Only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD) TWENTY-SECOND MEETING Montréal, 21

More information

Cryptographic Mechanisms: Recommendations and Key Lengths

Cryptographic Mechanisms: Recommendations and Key Lengths Technical Guideline TR-02102-4 Cryptographic Mechanisms: Recommendations and Key Lengths Part 4 Use of Secure Shell (SSH) (Version 2018-01) Federal Office for Information Security P.O.B. 20 03 63 D-53133

More information

Joint Interpretation Library. Certification of "open" smart card products

Joint Interpretation Library. Certification of open smart card products Joint Interpretation Library Certification of "open" smart card products Version 1.1 (for trial use) 4 February 2013 Certification of "open" smart card products Joint Interpretation Library Acknowledgments:

More information

AMERICAN NATIONAL STANDARD

AMERICAN NATIONAL STANDARD Digital Video Subcommittee AMERICAN NATIONAL STANDARD Methods for Isochronous Data Services Transport NOTICE The Society of Cable Telecommunications Engineers (SCTE) / International Society of Broadband

More information

Data Center Bridging Consortium

Data Center Bridging Consortium Data Center Bridging Consortium 802.1Qaz Enhanced Transmission Selection Test Suite Version 1.2 Technical Document Last Updated: April 10th, 2012 Data Center Bridging Consortium HTTP://WWW.IOL.UNH.EDU/CONSORTIUMS/DCB

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

TECHNICAL SPECIFICATION

TECHNICAL SPECIFICATION TECHNICAL SPECIFICATION IEC/TS 62351-8 Edition 1.0 2011-09 colour inside Power systems management and associated information exchange Data and communications security Part 8: Role-based access control

More information