UNI CEI ISO/IEC 18013-3 : 2011
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION
07-25-2022
01-01-2011
Foreword
Introduction
1 Scope
2 Conformance
3 Normative references
4 Terms and definitions
5 Abbreviated terms
6 Functional requirements
7 Mapping of mechanisms to requirements and technologies
8 Mechanisms
9 Security mechanism indicator
10 SIC LDS
Annex A (informative) - Public key infrastructure (PKI)
Annex B (normative) - Basic access protection
Annex C (normative) - Extended access protection
Annex D (normative) - SIC command set
Annex E (normative) - List of tags used
Annex F (normative) - Brainpool curves
Bibliography
Provides guidelines for the design format and data content of an ISO-compliant driving licence (IDL) with regard to human-readable features (ISO/IEC 18013-1), machine-readable technologies (ISO/IEC 18013-2), and access control, authentication and integrity validation (ISO/IEC 18013-3). Also generates a common basis for international use and mutual recognition of the IDL without impeding individual countries/states to apply their privacy rules and national/ community/regional motor vehicle authorities in taking care of their specific needs.
DocumentType |
Standard
|
PublisherName |
Ente Nazionale Italiano di Unificazione (UNI)
|
Status |
Withdrawn
|
Standards | Relationship |
CEI UNI ISO/IEC 18013-3 : 2011 | Identical |
ISO/IEC 18013-3:2017 | Identical |
ISO/IEC 8859-1:1998 | Information technology 8-bit single-byte coded graphic character sets Part 1: Latin alphabet No. 1 |
ISO/IEC 8825-1:2015 | Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1: |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
ISO/IEC 7816-8:2016 | Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 18013-2:2008 | Information technology Personal identification ISO-compliant driving licence Part 2: Machine-readable technologies |
ISO/IEC 18013-1:2005 | Information technology Personal identification ISO-compliant driving licence Part 1: Physical characteristics and basic data set |
ISO/IEC 7816-4:2013 | Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange |
ISO 1831:1980 | Printing specifications for optical character recognition |
ISO/IEC 2382-8:1998 | Information technology Vocabulary Part 8: Security |
ISO/IEC 7501-1:2008 | Identification cards — Machine readable travel documents — Part 1: Machine readable passport |
FIPS PUB 186 : 0 | DIGITAL SIGNATURE STANDARD (DSS) |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ICAO 9303P1-2 : 2006 | MACHINE READABLE TRAVEL DOCUMENTS - PART 1: MACHINE READABLE PASSPORTS - VOLUME 2: SPECIFICATIONS FOR ELECTRONICALLY ENABLED PASSPORTS - WITH BIOMETRIC IDENTIFICATION CAPABILITY |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.