Cards and security devices for personal identification — Test methods — Part 6: Contactless proximit...
1 Scope
The ISO/IEC 10373 series defines test methods for characteristics of identification cards according to the definition given in ISO/IEC 7810. Each test method is cross-referenced to one or more base standards, which can be ISO/IEC 7810 or one or more of the supplementary standards that define the information storage technologies employed in identification card applications.
NOTE 1…
Information technology — Multimedia content description interface — Part 6: Reference software
1 Scope
The ISO/IEC 15938 series operates on and generates conformant bitstreams. This document provides a specific implementation that behaves in a conformant manner.
NOTE 1 Other implementations that conform to the ISO/IEC 15938 series are possible, which do not necessarily use the algorithms or the programming techniques of the reference software.
The software contained in this document is…
Information technology — Radio frequency identification (RFID) for item management — Data protocol: ...
1
Scope
The data protocol used to exchange information in an RFID system for item management is specified in ISO/IEC 15961 and in this International Standard. Both International Standards are required for a complete understanding of the data protocol in its entirety; but each focuses on one particular interface:
?
ISO/IEC 15961 addresses the interface with the application system.
?
This…
Information technology — Open Virtualization Format (OVF) specification
1 Scope
The Open Virtualization Format (OVF) Specification describes an open, secure, efficient and
extensible format for the packaging and distribution of software to be run in virtual systems.
The OVF package enables the authoring of portable virtual systems and the transport of virtual
systems between virtualization platforms. This version of the specification (2.1) is intended to allow…
Information technology — Radio frequency identification device performance test methods — Part 3: Te...
1
Scope
This International Standard defines test methods for performance characteristics of RFID tags for item management, and specifies the general requirements and test requirements for tags which are applicable to the selection of the devices for an application. The summary of the test reports form a unified tag datasheet. It does not apply to testing in relation to regulatory or similar…
Information technology — Telecommunications and information exchange between systems — ASN.1 for Com...
1
Scope
This International Standard specifies application protocol data units (APDUs) for the services described in ISO/IEC 18051, Services, for Computer Supported Telecommunications Applications (CSTA) Phase III.
Clause 5 to Clause 7 inclusive describes the concepts underlying the Remote Operations model, notation and service.
Clause 8 to Clause 27 inclusive contains CSTA-specific message…
Information technology — Common Biometric Exchange Formats Framework — Part 1: Data element specific...
1 Scope
This document defines:
— structures and data elements for biometric information records (BIRs);
— the concept of a domain of use to establish the applicability of a standard or specification that conforms with CBEFF requirements;
— the concept of a CBEFF patron format, which is a published BIR format specification that complies with CBEFF requirements, specified by a CBEFF patron;
—…
Information technology — Electronic discovery — Part 1: Overview and concepts
1 Scope
Electronic discovery is the process of discovering pertinent Electronically Stored Information (ESI) or data by one or more parties involved in an investigation or litigation, or similar proceeding. This document provides an overview of electronic discovery. In addition, it defines related terms and describes the concepts, including, but not limited to, identification, preservation,…
Telecommunications and exchange between information technology systems — Requirements for local and ...
Scope
The scope of this standard is to specify provision of connectionless user data confidentiality, frame data
integrity, and data origin authenticity by media access independent protocols and entities that operate
transparently to MAC Clients.
NOTE—The MAC Clients are as specified in IEEE Std 802®, IEEE Std 802.1Q™, and IEEE Std 802.1X.2
To this end, it
a) Specifies the requirements to…