{"id":636574,"date":"2024-11-06T00:57:55","date_gmt":"2024-11-06T00:57:55","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/iso-iec-9798-62010\/"},"modified":"2024-11-06T00:57:55","modified_gmt":"2024-11-06T00:57:55","slug":"iso-iec-9798-62010","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/iso\/iso-iec-9798-62010\/","title":{"rendered":"ISO\/IEC 9798-6:2010"},"content":{"rendered":"

ISO\/IEC 9798-6:2010 specifies eight entity authentication mechanisms based on manual data transfer between authenticating devices. Four of these mechanisms are improved versions of mechanisms specified in ISO\/IEC 9798-6:2005 since they use less user input and achieve more security. Such mechanisms can be appropriate in a variety of circumstances where there is no need for an existing public key infrastructure, shared secret keys or passwords. One such application occurs in personal networks, where the owner of two personal devices capable of wireless communications wishes them to perform an entity authentication procedure as part of the process of preparing them for use in the network. These mechanisms can also be used to support key management functions.<\/p>\n

ISO\/IEC 9798-6:2010 specifies mechanisms in which entity authentication is achieved by<\/p>\n