Information technology — Biometric recognition of subjects in motion in access-related systems
This document establishes requirements for the development of biometric solutions for verification and identification processes for secure access without physical contact with any device at any time. The solutions acquire biometric characteristics that are captured while the data subjects are in motion to verify or identify the individuals requiring access, thus controlling access using…
Health informatics — Terminological resources — Part 3: Terminology implementation maturity model (T...
The document defines the progression of implementation of terminology capability in information systems.
This document does not specify requirements for any specific terminological resource. It is intended to provide a basis for conformance criteria for terminological resources capabilities in specific use cases. This document does not cover in detail the software being used, though the…
Information technology — Biometrics — Multimodal and other multibiometric fusion
This document provides descriptions and analyses of current practices on multimodal and other multibiometric fusion, including (as appropriate) references to more detailed descriptions.
This document contains descriptions and explanations of high-level multibiometric concepts to aid in the explanation of multibiometric fusion approaches including: multi-characteristic-type, multi-instance, multi-…
Railway applications - Compatibility between rolling stock and train detection systems
IEC 62427:2024 describes a process to demonstrate compatibility between rolling stock (RST) and train detection systems (TDS). It describes the characterization of train detection systems, rolling stock and traction power supply systems.
It is worth noting that the demonstration of technical compatibility between the rolling stock and infrastructure with respect to physical dimensions is not…
Dependability of new products containing reused parts and life-extended products
IEC 62309:2024 introduces the concept to check the reliability and functionality of reused parts and their usage within new products. It also provides information and criteria about the assurance [for example, testing and analysis, required for products containing reused parts, which are declared "qualified-as-good-as-new" (QAGAN)] relative to the designed life of the product.
This…
Sûreté de fonctionnement des produits neufs contenant des composants réutilisés et des produits à du...
La CEI 62309:2024 introduit le concept de vérification de la fiabilité et de la fonctionnalité des pièces réutilisées et de leur utilisation dans de nouveaux produits. Elle fournit également des informations et des critères sur l'assurance [par exemple, essais et analyses, requis pour les produits contenant des pièces réutilisées, qui sont déclarés « qualifiés comme étant bons à l'état…
Information technology - Cloud computing - Overview of platform capabilities type and platform as a ...
Within the context of digital technology platforms as defined in ISO/IEC TS 5928, this document provides:
— a description of the concepts of the platform capabilities type as it appears in various cloud service categories;
— a description of the specific cloud service category of platform as a service (PaaS);
— descriptions of common technology platform architectures, development…
Information technology — Cloud computing — Overview of platform capabilities type and platform as a ...
Within the context of digital technology platforms as defined in ISO/IEC TS 5928, this document provides:
— a description of the concepts of the platform capabilities type as it appears in various cloud service categories;
— a description of the specific cloud service category of platform as a service (PaaS);
— descriptions of common technology platform architectures, development…
Health informatics — Information models — Biomedical Research Integrated Domain Group (BRIDG) Model
This document is complementary to the Biomedical Research Integrated Domain Group (BRIDG) model. It is a high-level overview of BRIDG in general and BRIDG version 5.3.1 in specific. This document also provides necessary links to artifacts that detail the changes between BRIDG v3.2 and BRIDG v5.3.1[5] and to the BRIDG Release Download page.
Information security — Anonymous digital signatures — Part 3: Mechanisms using multiple public keys
This document specifies anonymous digital signature mechanisms in which a verifier uses multiple public keys to verify a digital signature.
This document provides:
— a general description of an anonymous digital signature mechanism using multiple public keys;
— a variety of mechanisms that provide such anonymous digital signatures.
For each mechanism, this document specifies the process…