Information technology — Radio frequency identification for item management — Part 4: Parameters for...
This part of ISO/IEC 18000 defines the air interface for radio frequency identification (RFID) devices
operating in the 2,45 GHz Industrial, Scientific, and Medical (ISM) band used in item management
applications. This part of ISO/IEC 18000 provides a common technical specification for RFID devices
that can be used by ISO committees developing RFID application standards. This part of ISO/IEC…
Information technology — Automatic identification and data capture techniques — QR Code bar code sym...
This International Standard defines the requirements for the symbology known as QR Code. It specifies
the QR Code symbology characteristics, data character encoding methods, symbol formats, dimensional
characteristics, error correction rules, reference decoding algorithm, production quality requirements,
and user-selectable application parameters.
Information technology — Security techniques — Encryption algorithms — Part 1: General
This part of ISO/IEC 18033 is general in nature, and provides definitions that apply in subsequent parts
of this International Standard. The nature of encryption is introduced, and certain general aspects of
its use and properties are described. The criteria used to select the algorithms specified in subsequent
parts of this International Standard are defined in Annexes A and B.
Information technology — JPEG 2000 image coding system: Reference software
Rec. ITU-T T.800 | ISO/IEC 15444-11 defines a set of lossless and lossy compression methods for coding continuoustone,
bi-level, greyscale or colour digital still images. This Recommendation | International Standard provides three
independently created software reference implementations of Rec. ITU-T T.800 | ISO/IEC 15444-1, in order to assist
implementers of Rec. ITU-T T.800 | ISO/IEC 15444-1 in…
Information technology — Automatic identification and data capture techniques — Unique identificatio...
This part of ISO/IEC 15459 specifies the procedural requirements to maintain identities and outlines
the obligations of the Registration Authority.
This part of ISO/IEC 15459 excludes those entities where ISO has designated Maintenance Agencies or
Registration Authorities to provide identity and/or identifier schemes. It does not apply to:
— freight containers, because their unique coding is…
Information technology — Business Operational View — Part 2: Registration of scenarios and their com...
This part of ISO/IEC 15944 specifies procedures to be followed in establishing, maintaining, and publishing
registers of unique, unambiguous and permanent identifiers and meanings that are assigned to Open-edi
scenarios and scenario components. In order to accomplish this purpose, part of ISO/IEC 15944 specifies
elements of information that are necessary to provide identification and meaning to…
Information technology — Business Operational View — Part 4: Business transaction scenarios — Accoun...
This part of ISO/IEC 15944 provides a set of UML class diagrams and conceptual explanations that
circumscribe the Open-edi Business Transaction Ontology (OeBTO). It explains the mechanics of a
business transaction state machine, the procedural component of an OeBTO, and the (internal) constraint
component of OeBTO, its repository for business rules.
This part of ISO/IEC 15944 addresses…
Information technology — ASN.1 encoding rules: Mapping W3C XML schema definitions into ASN.1
This Recommendation | International Standard specifies two Versions of a mapping from any XSD Schema into an ASN.1
schema. The ASN.1 schema for both Versions support the same semantics and validate the same set of XML documents.
This Recommendation | International Standard specifies the final XER encoding instructions that are to be applied as part
of the defined mapping to ASN.1 types, but…
Mechanical vibration — Measurement and evaluation of human exposure to hand-transmitted vibration — ...
This part of ISO 5349 specifies general requirements for measuring and reporting hand-transmitted vibration
exposure in three orthogonal axes. It defines a frequency weighting and band-limiting filters to allow uniform
comparison of measurements. The values obtained can be used to predict adverse effects of hand-transmitted
vibration over the frequency range covered by the octave bands from 8…
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric ...
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic
techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities
A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as
the…