• 0
    • ارسال درخواست
    • حذف همه
    • Industrial Standards
    • Defence Standards
  • درباره ما
  • درخواست موردی
  • فهرست استانداردها
    • Industrial Standards
    • Defence Standards
  • راهنما
  • Login
  • لیست خرید شما 0
    • ارسال درخواست
    • حذف همه
View Item 
  •   YSE
  • Industrial Standards
  • ANSI - American National Standards Institute
  • View Item
  •   YSE
  • Industrial Standards
  • ANSI - American National Standards Institute
  • View Item
  • All Fields
  • Title(or Doc Num)
  • Organization
  • Year
  • Subject
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Archive

ANSI INCITS 504-1

Information Technology - Generic Identity Command Set - Part 1: Card Application Command Set

Organization:
ANSI - American National Standards Institute
Year: 2013

Abstract: This part of the multi-part GICS standard defines a command set for base functionality addressing:
• Identity credential storage (Namespace standardization)
• Authentication protocols
• Biometric verification1
• Confidentiality protocols
• Digital signatures
In the context of the GICS, this part is based on ISO/IEC 24727-2 and National Institute of Standards and Technology (NIST) Special Publication (SP) 800-73-3. Any additional commands are drawn from ISO/IEC 7816-4, -8, and -9.
The GICS standard defines a command set and a base functionality that offers the possibility to create, personalize, and use a compliant PIV and PIV-I card-application according NIST SP 800-73-3.
The standard defines a set of extensions to the SP 800-73-3 so that card-application issuers may have added flexibility in extending their data model while allowing relying parties to interoperably use the cards from different issuers. These extensions would favor the penetration of GICS standard at three levels. Manufactures will be able to minimize design and implementation costs; card issuers will manage a simple platform based on a successful and largely adopted schema; middleware and operating system providers will be able to adapt to different identity applications that are based on a single GICS standard. The following set of extensions to SP 800-73-3 is addressed in this document:
• Data model extension –The GICS standard allows formulation of different data elements and objects. Various data types are defined allowing card applications to store data according to their needs. The data size, data identifiers, and data access control rules are flexible to meet client-application needs.
• Authentication protocols –The PIV application currently supports Personal Identification Number (PIN) authentication (card authenticating card holder), Internal Authentication (reader authenticating card), External Authentication (card authenticating issuer), Signing, and Encryption. This standard adds Mutual Authentication, Key Agreement, and Secure Messaging protocols.
• GICS and ISO/IEC 24727: GICS standard allows interoperation with middleware compliant with ISO/IEC 24727. At a minimum, the discoverability mechanism (boot strap) based on the Card Capability Description (CCD) and / or Application Capability Description (ACD), as defined in ISO/IEC 24727, is supported by this standard.
• FIPS 140-2 certifications – The GICS standard is designed to allow card-applications constructed on this standard to minimize impact on FIPS 140-2 certification.
Purpose
The purpose of this part of the GICS standard is to define a set of data structures and commands for the general-purpose use of multiple identity credentials resident on a single platform.
1 Note that the document does not completely specify biometric verification but only includes tags for biometric data for future use.
URI: http://yse.yabesh.ir/std;jsein/handle/yse/141975
Collections :
  • ANSI - American National Standards Institute
  • Download PDF : (1.290Mb)
  • Show Full MetaData Hide Full MetaData
  • Statistics

    ANSI INCITS 504-1

Show full item record

contributor authorANSI - American National Standards Institute
date accessioned2017-09-04T17:18:41Z
date available2017-09-04T17:18:41Z
date copyright2013.04.24
date issued2013
identifier otherZLLBDFAAAAAAAAAA.pdf
identifier urihttp://yse.yabesh.ir/std;jsein/handle/yse/141975
description abstractThis part of the multi-part GICS standard defines a command set for base functionality addressing:
• Identity credential storage (Namespace standardization)
• Authentication protocols
• Biometric verification1
• Confidentiality protocols
• Digital signatures
In the context of the GICS, this part is based on ISO/IEC 24727-2 and National Institute of Standards and Technology (NIST) Special Publication (SP) 800-73-3. Any additional commands are drawn from ISO/IEC 7816-4, -8, and -9.
The GICS standard defines a command set and a base functionality that offers the possibility to create, personalize, and use a compliant PIV and PIV-I card-application according NIST SP 800-73-3.
The standard defines a set of extensions to the SP 800-73-3 so that card-application issuers may have added flexibility in extending their data model while allowing relying parties to interoperably use the cards from different issuers. These extensions would favor the penetration of GICS standard at three levels. Manufactures will be able to minimize design and implementation costs; card issuers will manage a simple platform based on a successful and largely adopted schema; middleware and operating system providers will be able to adapt to different identity applications that are based on a single GICS standard. The following set of extensions to SP 800-73-3 is addressed in this document:
• Data model extension –The GICS standard allows formulation of different data elements and objects. Various data types are defined allowing card applications to store data according to their needs. The data size, data identifiers, and data access control rules are flexible to meet client-application needs.
• Authentication protocols –The PIV application currently supports Personal Identification Number (PIN) authentication (card authenticating card holder), Internal Authentication (reader authenticating card), External Authentication (card authenticating issuer), Signing, and Encryption. This standard adds Mutual Authentication, Key Agreement, and Secure Messaging protocols.
• GICS and ISO/IEC 24727: GICS standard allows interoperation with middleware compliant with ISO/IEC 24727. At a minimum, the discoverability mechanism (boot strap) based on the Card Capability Description (CCD) and / or Application Capability Description (ACD), as defined in ISO/IEC 24727, is supported by this standard.
• FIPS 140-2 certifications – The GICS standard is designed to allow card-applications constructed on this standard to minimize impact on FIPS 140-2 certification.
Purpose
The purpose of this part of the GICS standard is to define a set of data structures and commands for the general-purpose use of multiple identity credentials resident on a single platform.
1 Note that the document does not completely specify biometric verification but only includes tags for biometric data for future use.
languageEnglish
titleANSI INCITS 504-1num
titleInformation Technology - Generic Identity Command Set - Part 1: Card Application Command Seten
typestandard
page118
statusActive
treeANSI - American National Standards Institute:;2013
contenttypefulltext
DSpace software copyright © 2017-2020  DuraSpace
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
yabeshDSpacePersian
 
DSpace software copyright © 2017-2020  DuraSpace
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
yabeshDSpacePersian