• UNI CEI ISO/IEC 18013-3 : 2011

    Withdrawn A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

    INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION

    Available format(s): 

    Withdrawn date:  24-07-2022

    Language(s): 

    Published date:  31-12-2010

    Publisher:  Ente Nazionale Italiano di Unificazione (UNI)

    Sorry this product is not available in your region.

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Conformance
    3 Normative references
    4 Terms and definitions
    5 Abbreviated terms
    6 Functional requirements
    7 Mapping of mechanisms to requirements and technologies
    8 Mechanisms
    9 Security mechanism indicator
    10 SIC LDS
    Annex A (informative) - Public key infrastructure (PKI)
    Annex B (normative) - Basic access protection
    Annex C (normative) - Extended access protection
    Annex D (normative) - SIC command set
    Annex E (normative) - List of tags used
    Annex F (normative) - Brainpool curves
    Bibliography

    Abstract - (Show below) - (Hide below)

    Provides guidelines for the design format and data content of an ISO-compliant driving licence (IDL) with regard to human-readable features (ISO/IEC 18013-1), machine-readable technologies (ISO/IEC 18013-2), and access control, authentication and integrity validation (ISO/IEC 18013-3). Also generates a common basis for international use and mutual recognition of the IDL without impeding individual countries/states to apply their privacy rules and national/ community/regional motor vehicle authorities in taking care of their specific needs.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher Ente Nazionale Italiano di Unificazione (UNI)
    Status Withdrawn

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 8859-1:1998 Information technology 8-bit single-byte coded graphic character sets Part 1: Latin alphabet No. 1
    ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
    ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
    ISO/IEC 7816-8:2016 Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations
    ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
    ISO/IEC 18013-2:2008 Information technology Personal identification ISO-compliant driving licence Part 2: Machine-readable technologies
    ISO/IEC 18013-1:2005 Information technology Personal identification ISO-compliant driving licence Part 1: Physical characteristics and basic data set
    ISO/IEC 7816-4:2013 Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange
    ISO 1831:1980 Printing specifications for optical character recognition
    ISO/IEC 2382-8:1998 Information technology Vocabulary Part 8: Security
    ISO/IEC 7501-1:2008 Identification cards Machine readable travel documents Part 1: Machine readable passport
    FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
    ICAO 9303P1-2 : 2006 MACHINE READABLE TRAVEL DOCUMENTS - PART 1: MACHINE READABLE PASSPORTS - VOLUME 2: SPECIFICATIONS FOR ELECTRONICALLY ENABLED PASSPORTS - WITH BIOMETRIC IDENTIFICATION CAPABILITY
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective