Biocombustibles solides — Dosage de la teneur en humidité — Méthode de séchage à l’étuve — Partie 2 ...
1 Domaine d’application
Le présent document décrit la méthode de détermination de la teneur en humidité totale d’un échantillon
pour essai de biocombustibles solides par séchage à l’étuve. Cette méthode est utilisée lorsque la fidélité
maximale n’est pas nécessaire, par exemple, pour un contrôle de routine de la production in situ. La
méthode décrite dans l’ISO 18134 (toutes les parties) est…
1 Scope
This document describes the characteristics for identification cards and the use of such cards for international interchange.
This document specifies the physical characteristics of identification cards including card materials, construction, characteristics and dimensions for four sizes of cards.
ISO/IEC 10373-1 and ISO/IEC 24789-2 specify the test procedures used to check cards…
Identification cards — Integrated circuit cards — Part 4: Organization, security and commands for in...
1 Scope
This document is intended to be used in any sector of activity. It specifies:
— contents of command-response pairs exchanged at the interface,
— means of retrieval of data elements and data objects in the card,
— structures and contents of historical bytes to describe operating characteristics of the card,
— structures for applications and data in the card, as seen at the interface…
Cards and security devices for personal identification — Test methods — Part 6: Contactless proximit...
1 Scope
The ISO/IEC 10373 series defines test methods for characteristics of identification cards according to the definition given in ISO/IEC 7810. Each test method is cross-referenced to one or more base standards, which can be ISO/IEC 7810 or one or more of the supplementary standards that define the information storage technologies employed in identification card applications.
NOTE 1…
Information security — Non-repudiation — Part 1: General
1 Scope
This document serves as a general model for subsequent parts specifying non-repudiation mechanisms using cryptographic techniques.
The ISO/IEC 13888 series provides non-repudiation mechanisms for the following phases of non-repudiation:
— evidence generation;
— evidence transfer, storage and retrieval; and
— evidence verification.
Dispute arbitration is outside the scope of the ISO/…
Information security — Non-repudiation — Part 3: Mechanisms using asymmetric techniques
1 Scope
This document specifies mechanisms for the provision of specific, communication-related, non-repudiation services using asymmetric cryptographic techniques.
Cards and security devices for personal identification — Contactless proximity objects — Part 2: Rad...
1 Scope
This document specifies the characteristics of the fields to be provided for power and bi-directional
communication between proximity coupling devices (PCDs) and proximity cards or objects (PICCs).
This document does not specify the means of generating coupling fields, nor the means of compliance
with electromagnetic radiation and human exposure regulations, which can vary depending…
Information technology — Automatic identification and data capture techniques — Unique identificatio...
1 Scope
This part of ISO/IEC 15459 specifies a unique string of characters for the identification of individual transport units. The character string is intended to be represented in a bar code label or other AIDC media attached to the entity to meet management needs. To address management needs, different types of entities are recognized in the various parts of ISO/IEC 15459, which allows…
Information technology — Automatic identification and data capture techniques — Unique identificatio...
1 Scope
This part of ISO/IEC 15459 specifies the common rules applicable for unique identification that are required to ensure full compatibility across different identities.
Information technology — Multimedia content description interface — Part 6: Reference software
1 Scope
The ISO/IEC 15938 series operates on and generates conformant bitstreams. This document provides a specific implementation that behaves in a conformant manner.
NOTE 1 Other implementations that conform to the ISO/IEC 15938 series are possible, which do not necessarily use the algorithms or the programming techniques of the reference software.
The software contained in this document is…