{"id":425029,"date":"2024-10-20T06:54:38","date_gmt":"2024-10-20T06:54:38","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-23220-12023\/"},"modified":"2024-10-26T13:01:02","modified_gmt":"2024-10-26T13:01:02","slug":"bs-iso-iec-23220-12023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-23220-12023\/","title":{"rendered":"BS ISO\/IEC 23220-1:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5 Design and privacy principles of mobile document systems 5.1 Design principles <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.2 Privacy and security principles 5.2.1 General 5.2.2 Data minimization 5.2.3 Consent and choice: 5.2.4 Accuracy and quality <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.2.5 Information security 6 General life-cycle phases and components of mobile document systems 6.1 Life-cycle phases of mobile document systems <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.2 Components of a mobile document system 6.2.1 Operational modes of components <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.2.2 Components of mobile document systems <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 7 Generic system architectures of mobile document systems in installation phase <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 8 Generic system architectures of mobile document systems in issuing phase 8.1 Source of user attributes 8.2 Generic sub-phases of issuing phase <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 8.3 System architectures in sub-phases user identification and mID-discovery <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 8.4 Architectures in sub-phase issuance <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 8.5 Monitoring service in issuing phase <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 9 On-site identification system architecture in operational phase 9.1 General sub-phases of on-site identification system architecture 9.2 On-site identification system architecture with local attribute storage <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 9.3 On-site identification system architecture with remote attribute storage <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 10 Remote identification system architecture in operational phase 10.1 General 10.2 Remote identification system architecture with local attribute storage <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 10.3 Remote identification system architecture with remote attribute storage <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Annex A (informative) Examples of deployment options for issuers in issuing phase <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | Annex B (informative) Examples of deployment options in installation phase <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | Annex C (informative) Examples of holder enrolment <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | Annex D (informative) Examples of additional physical factor(s) of authentication <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Cards and security devices for personal identification. Building blocks for identity management via mobile devices – Generic system architectures of mobile eID systems<\/b><\/p>\n |