Information technology — Biometric data interchange formats — Part 10: Hand geometry silhouette data
1 Scope
This part of ISO/IEC 19794 specifies a data interchange format (a CBEFF biometric data block – BDB) that
can be used for storing, recording and transmitting the information obtained from a hand silhouette.
This part of ISO/IEC 19794 defines the content, format and units of measurement for the exchange of hand
silhouette data in a BDB.
Information formatted in accordance with this…
Information technology — Biometric data interchange format — Part 15: Palm crease image data
1 Scope
This document specifies an image interchange format for biometric person identification or verification technologies that utilize human palm crease biometric images and can be used for the exchange and comparison of palm crease image data. It specifies a data record interchange format for storing, recording, and transmitting palm crease biometric information from palm crease imaging. It…
IT security techniques — Competence requirements for information security testers and evaluators — P...
1 Scope
This document defines terms and establishes an organized set of concepts and relationships to understand the competency requirements for information security assurance conformance-testing and evaluation specialists, thereby establishing a basis for shared understanding of the concepts and principles central to the ISO/IEC 19896 series across its user communities. It provides fundamental…
Information technology — Automatic identification and datacapture techniques — Part 1: Security serv...
1 Scope
This part of ISO/IEC 29167 defines the architecture for security services for the ISO/IEC 18000 air
interfaces standards for radio frequency identification (RFID) devices. Its purpose is to provide a
common technical specification for optional security services for RFID devices that may be used by ISO
committees developing RFID application standards.
This part of ISO/IEC 29167…
capture techniques — Part 11: Crypto suite PRESENT-80 security services for air interface communicat...
1 Scope
This part of ISO/IEC 29167 defines the crypto suite for PRESENT-80 for the ISO/IEC 18000 air interfaces
standards for radio frequency identification (RFID) devices. Its purpose is to provide a common crypto
suite for security for RFID devices that can be referred by ISO committees for air interface standards
and application standards. PRESENT-80 is a symmetric block cipher that can…
Information technology — Automatic identification and data capture techniques — Part 15: Crypto suit...
1 Scope
This document defines a coding suite based on an exclusive or (XOR) operation for the ISO/IEC 18000 air interfaces standards for radio frequency identification (RFID) systems. In particular, it specifies the use of XOR as a basic way to hide plain data in the identity authentication and secure communication procedures. The coding suite is defined in alignment with existing air interfaces…
Information technology — Telecommunications and information exchange between systems — Local and met...
1.1 Scope
This standard defines an extensible IEEE 802® media access independent services framework (i.e.,
function and protocol) that enables the optimization of services including handover service when performed
between heterogeneous IEEE 802 networks. It also facilitates these services when networking between
IEEE 802 networks and cellular networks.
Information technology — ASN.1 encoding rules: Specification of Octet Encoding Rules (OER)
1 Scope
This Recommendation | International Standard specifies a set of Basic Octet Encoding Rules (BASIC-OER) that may be
used to derive a transfer syntax for values of the types defined in Rec. ITU-T X.680 | ISO/IEC 8824-1, Rec. ITU-T X.681
| ISO/IEC 8824-2, Rec. ITU-T X.682 | ISO/IEC 8824-3, Rec. ITU-T X.683 | ISO/IEC 8824-4. This Recommendation |
International Standard also specifies a…
IT Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniqu...
1 Scope
This document specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. A digital signature is used to verify the identity of an entity.
Ten mechanisms are specified in this document. The first five mechanisms do not involve an on-line trusted third party and the last five make use of on-line trusted third parties. In both of these two…
Information technology — Home electronic system (HES) architecture — Part 5-12: Intelligent grouping...
1 Scope
This part of ISO/IEC 14543
– specifies the test and verification methods for an IGRS remote access (RA) user or device,
– defines the structure of a user and device testing system for IGRS remote access,
– describes and specifies the exchange process between a user or device-under-test with a
standard IGRS RA service platform (IRSP), and
– describes and specifies the rules to have…