BS EN 1546-2:2000
Current
The latest, up-to-date edition.
Identification card systems. Inter-sector electronic purse Security architecture
Hardcopy , PDF
English
15-01-2000
Foreword
1 Scope
2 Normative References
3 Definitions, Symbols and Abbreviations
3.1 Definitions
3.1.1 Terms defined in prEN 1546-1
3.1.2 Terms specific to this part of EN 1546
3.2 Symbols
3.3 Abbreviations
3.4 Special Notation
4 Security Architecture
4.1 Security requirements and characteristics
4.2 Error handling
4.3 Security relevant data elements
4.4 Security procedures
4.4.1 General notes
4.4.2 Load (optional)
4.4.3 Purchase
4.4.4 Purchase Cancellation/IEP Balance
Recovery (optional)
Annex A (informative) Additional Security Procedures
A.1 - IEP transactions
A.1.1 - Currency Exchange
A.1.2 - IEP Monitoring
A.1.3 - Update IEP parameter
A.2 - SAM transactions
A.2.1 - Collection
A.2.2 - SAM Monitoring
A.2.3 - Update SAM parameter
A.2.4 - Open SAM
A.2.5 - Close SAM
Annex B (informative) Security Requirements and Security
Mechanisms
Annex C (informative) Key Management
C.1 - General
C.2 - Key Management for symmetric algorithms
C.2.1 - IEP/PSAM communication
C.2.2 - Partitioned master keys for the Purchase
transaction
C.2.3 - IEP/PPSAM communication
C.2.4 - PSAM/PPSAM communication
C.2.5 - LSAM/PPSAM communication
C.2.6 - Key separation
C.2.7 - Key modification
C.3 - Key Management for asymmetric algorithms
C.3.1 - General requirements for key certification
C.3.2 - Key Management requirements
C.3.3 - Topology of the IEP System
C.3.4 - The operational requirements
C.3.5 - The pre-operational requirements
C.3.6 - The operational phase key modification
requirements
C.3.7 - Specification of PKCs
C.3.8 - Key Management requirements for
interactive Signatures
Annex D (informative) High-level overview of the Purchase
transaction
Annex E (informative) Security protocols using DES
E.1 - Specific notes for DES
E.1.1 - Encipherment/Decipherment using DES
E.1.2 - Authentication using DES
E.1.3 - Implementation notes for DES
E.2 - Data elements specific for DES
E.3 - Security protocols
E.3.1 - Load
E.3.2 - Purchase
E.3.3 - Collection
Annex F (informative) Security protocols using RSA/DSS
F.1 - Specific notes for RSA
F.1.1 - Authentication using RSA
F.1.2 - Public key certification using RSA
F.2 - Specific notes for DSS
F.2.1 - Authentication using DSS
F.2.2 - Public key certification using DSS
F.3 - Use of public key certificates in IEP Systems
F.4 - Data elements specific for RSA/DSS
F.5 - Implementation notes for RSA/DSS
F.6 - Security protocols
F.6.1 - Load
F.6.2 - Purchase
F.6.3 - Collection
Annex G (informative) Purchase transaction using 3-step
interactive Signatures
G.1 - Data elements
G.2 - Changes to subclause 4.4.3
G.3 - Specific notes for interactive Signatures
G.4 - Data elements specific to interactive Signatures
G.5 - Security protocols
G.5.1 - Purchase
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.