Cards and security devices for personal identification — Test methods — Part 7: Contactless vicinity...
1 Scope
The ISO/IEC 10373 series defines test methods for characteristics of identification cards according to the definition given in ISO/IEC 7810. Each test method is cross-referenced to one or more base standards, which can be ISO/IEC 7810 or one or more of the supplementary standards that define the information storage technologies employed in identification card applications.
NOTE 1…
Information technology — Small computer system interface (SCSI) — Part 224: Fibre Channel Protocol f...
1 Scope
This part of ISO/IEC 14776 defines a fourth version of the SCSI Fibre Channel Protocol (FCP).
This standard is a mapping protocol for applying the SCSI command set to Fibre Channel. This
standard defines how the Fibre Channel services and the defined Information Units (IUs) are
used to perform the services defined by the SCSI Architecture Model - 5 (SAM-5). This fourth
version…
Information technology — JPEG 2000 image coding system — Part 1: Core coding system
1 Scope
This Recommendation | International Standard defines a set of lossless (bit-preserving) and lossy compression methods
for coding bi-level, continuous-tone grey-scale, palletized colour, or continuous-tone colour digital still images.
This Recommendation | International Standard:
– specifies decoding processes for converting compressed image data to reconstructed image data;
–…
Information technology — JPEG 2000 image coding system — Part 16: Encapsulation of JPEG 2000 Images ...
1 Scope
This Recommendation | International Standard specifies the encapsulation of image formats specified in the JPEG 2000 family of Recommendations | International Standards in the framework defined in ISO/IEC 23008-12.
Systems and software engineering — High-level Petri nets — Part 1: Concepts, definitions and graphic...
1 Scope
This document defines a Petri net modeling language or technique, called high-level Petri nets, including
its syntax and semantics. It provides a reference definition that can be used both within and between
organizations, to ensure a common understanding of the technique and of the specifications written
using the technique. This document also facilitates the development and…
Information technology — Data protocol for radio frequency identification (RFID) for item management...
1 Scope
This document specifies the procedural requirements to maintain specific RFID data constructs. The data constructs are associated with managing open and closed applications that utilise RFID systems which conform to the data protocol defined in other parts of ISO/IEC 15961 and ISO/IEC 15962, and the air interface protocols of ISO/IEC 18000.
It also outlines the obligations of the…
Personal identification — ISO-compliant driving licence — Part 4: Test methods
1 Scope
This document describes the test methods used for conformity testing, that is methods for determining whether a driving licence can be considered to comply with the requirements of the ISO/IEC 18013 series for:
— machine readable technologies (ISO/IEC 18013-2), and
— access control, authentication and integrity validation (ISO/IEC 18013-3).
The test methods described in this document…
Information technologies — JPEG systems — Part 5: JPEG universal metadata box format (JUMBF)
1 Scope
This document describes the JPEG universal metadata box format (JUMBF), which provides a universal format to embed any type of metadata in any box-based JPEG file format. This document defines the syntax of the JUMBF box and the mechanism to assign specific content types. In particular, this document specifies XML, JSON, codestream and UUID types. In addition, this document defines the…
Information technology — Conformance test methods for security service crypto suites — Part 21: Cryp...
1 Scope
This document describes methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-21.
This document contains conformance tests for all mandatory functions.
The conformance parameters are the following:
— parameters that apply directly affecting system functionality and inter-operability,
— protocol including commands and replies,
— nominal values and…
Information technology — Conformance test methods for security service crypto suites — Part 22: Cryp...
1 Scope
This document describes methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-22.
This document contains conformance tests for all mandatory functions.
The conformance parameters are the following:
— parameters that apply directly affecting system functionality and inter-operability;
— protocol including commands and replies;
— nominal values and…