BS ISO/IEC 23220-1:2023
$198.66
Cards and security devices for personal identification. Building blocks for identity management via mobile devices – Generic system architectures of mobile eID systems
Published By | Publication Date | Number of Pages |
BSI | 2023 | 56 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
6 | Foreword |
7 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
14 | 4 Abbreviated terms |
15 | 5 Design and privacy principles of mobile document systems 5.1 Design principles |
16 | 5.2 Privacy and security principles 5.2.1 General 5.2.2 Data minimization 5.2.3 Consent and choice: 5.2.4 Accuracy and quality |
17 | 5.2.5 Information security 6 General life-cycle phases and components of mobile document systems 6.1 Life-cycle phases of mobile document systems |
18 | 6.2 Components of a mobile document system 6.2.1 Operational modes of components |
19 | 6.2.2 Components of mobile document systems |
20 | 7 Generic system architectures of mobile document systems in installation phase |
22 | 8 Generic system architectures of mobile document systems in issuing phase 8.1 Source of user attributes 8.2 Generic sub-phases of issuing phase |
23 | 8.3 System architectures in sub-phases user identification and mID-discovery |
25 | 8.4 Architectures in sub-phase issuance |
27 | 8.5 Monitoring service in issuing phase |
28 | 9 On-site identification system architecture in operational phase 9.1 General sub-phases of on-site identification system architecture 9.2 On-site identification system architecture with local attribute storage |
29 | 9.3 On-site identification system architecture with remote attribute storage |
30 | 10 Remote identification system architecture in operational phase 10.1 General 10.2 Remote identification system architecture with local attribute storage |
32 | 10.3 Remote identification system architecture with remote attribute storage |
35 | Annex A (informative) Examples of deployment options for issuers in issuing phase |
42 | Annex B (informative) Examples of deployment options in installation phase |
46 | Annex C (informative) Examples of holder enrolment |
50 | Annex D (informative) Examples of additional physical factor(s) of authentication |
54 | Bibliography |