• Shopping Cart
    There are no items in your cart

INCITS/ISO/IEC 19286:2018[2020]

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

Identification Cards - Integrated Circuit Cards - Privacy-Enhancing Protocols And Services

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

17-11-2020

Superseded date

06-06-2025

€320.47
Excluding VAT

This document aims to normalize privacy-enhancing protocols and services by — using the mechanisms from parts of ISO/IEC 7816 and parts of ISO/IEC 18328 that contribute to security and privacy, — providing discoverability means of privacy-enabling attributes, — defining requirements for attribute-based credential handling, and — identifying data objects and commands for ICCs.

Committee
ISO/IEC JTC 1
DocumentType
Standard
Pages
0
ProductNote
THIS STNADARD ALSO REFERS TO TR-03110-3, TR-03110-2, ITU-T X.509
PublisherName
Information Technology Industry Council
Status
Superseded
SupersededBy

Standards Relationship
ISO/IEC 19286:2018 Identical

ISO/IEC 18013-3:2017 Information technology — Personal identification — ISO-compliant driving licence — Part 3: Access control, authentication and integrity validation
ISO/IEC 24760-1:2011 Information technology — Security techniques — A framework for identity management — Part 1: Terminology and concepts
ISO/IEC 14443-3:2018 Cards and security devices for personal identification — Contactless proximity objects — Part 3: Initialization and anticollision
ISO/IEC 7501-1:2008 Identification cards — Machine readable travel documents — Part 1: Machine readable passport
EN 419212-2:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services
EN 419212-1:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions
ISO/IEC 11770-3:2015 Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques

Access your standards online with a subscription

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

€320.47
Excluding VAT