{"id":431015,"date":"2024-10-20T07:25:54","date_gmt":"2024-10-20T07:25:54","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-18013-32017a22023\/"},"modified":"2024-10-26T14:07:39","modified_gmt":"2024-10-26T14:07:39","slug":"bs-iso-iec-18013-32017a22023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-18013-32017a22023\/","title":{"rendered":"BS ISO\/IEC 18013-3:2017+A2:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5 Conformance 6 Functional requirements 6.1 Access control 6.2 Document authentication 6.3 Data integrity validation <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7 Mapping of mechanisms to requirements and technologies <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 8 Mechanisms 8.1 Passive authentication 8.1.1 Purpose 8.1.2 Applicability 8.1.3 Description <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 8.1.4 Hash function <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 8.1.5 Signing method <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 8.2 Active authentication 8.2.1 Purpose 8.2.2 Applicability 8.2.3 Description 8.2.4 Mechanism <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 8.3 Scanning area identifier 8.3.1 Applicability 8.3.2 Description <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 8.4 Non-match alert 8.4.1 Purpose 8.4.2 Applicability 8.4.3 Description <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 8.4.4 Mechanism <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 8.5 Basic access protection 8.5.1 Purpose 8.5.2 Applicability 8.5.3 Description <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 8.5.4 Mechanism <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 8.6 Extended Access Control v1 8.6.1 Purpose 8.6.2 Applicability 8.6.3 Description and mechanism <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 8.7 PACE 8.7.1 Purpose 8.7.2 Applicability 8.7.3 Description and mechanism 8.7.4 PACE relative to BAP <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 9 Security mechanism indicator <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 10 SIC LDS 10.1 General <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 10.2 EF.SOD \u2013 Document security object (short EF identifier = \u20181D\u2019, Tag = \u201877\u2019) 10.3 EF.DG12 Non-match alert (short EF identifier= \u20180C\u2019, Tag = \u201871\u2019) 10.4 EF.DG13 Active authentication (short EF identifier = \u20180D\u2019, Tag = \u20186F\u2019) <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 10.5 EF.DG14 EACv1 (short EF identifier = \u20180E\u2019, Tag = \u20186E\u2019) 10.6 EF.CardAccess if PACE is supported (short EF identifier = \u20181C\u2019) <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | Annex A (informative) Public key infrastructure (PKI) <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | Annex B (normative) Basic access protection <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | Annex C (normative) PACE <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | Annex D (normative) Extended Access Control v1 <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | Annex E (normative) SIC command set <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | Annex F (normative) List of tags used <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | Blank Page <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Personal identification. ISO-compliant driving licence – Access control, authentication and integrity validation<\/b><\/p>\n |