Listing 1 - 5 of 5 |
Sort by
|
Choose an application
Choose an application
Biometric identification --- Identification cards --- Smart cards --- Specifications.
Choose an application
The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages for the mobile workforce. While these devices provide productivity benefits, they also pose new risks to an organization's security by the information they contain or can access remotely. Enabling adequate user authentication is the first line of defense against unauthorized use of an unattended, lost, or stolen handheld device. Smart cards have long been the choice of authentication mechanism for many organizations; however, few handheld devices easily support readers for standard-size smart cards. This report describes two novel types of smart cards that use standard interfaces supported by handheld devices, avoiding use of the more cumbersome standard-size smart card readers. These solutions are aimed at helping organization apply smart cards for authentication and other security services. Details of the design and implementation are provided.
Smart cards. --- Pocket computers --- Identification cards. --- Authentication. --- Security measures.
Choose an application
SP 800-73 specifies smart card interfaces used to retrieve and use identity credentials. These specifications reflect the design goals of interoperability and PIV Card functions. The goals are addressed by specifying PIV data model, communication interface, and application programming interface (API). Specifications include the PIV data model, API, and card interface requirements necessary to comply with the mandated use cases for interoperability across deployments or agencies. Interoperability is defined as the use of PIV identity credentials such that client APIs, compliant card applications and compliant integrated circuit cards can be used interchangeably by information processing systems across Federal agencies. SP 800-73 does not address the back-end processes that must be performed to attain full identity assertion. The document describes two realizations of the client-application programming and card command interfaces for personal identity verification: the transitional interfaces and the end-point interfaces. Transitional interfaces may be used by agencies with an existing identity card program as an optional step in evolving to the end-point interfaces. End-point interfaces are used by agencies without an existing identity card program and by agencies that elect to evolve to the end-point interface in one step rather than two. SP 800-73 is divided into three parts: Part 1 provides specifications common to both the transitional and end-point interfaces and guidance on strategies for migrating from the transitional interfaces to the end-point interfaces; Part 2 describes the subsets of GSC-ISv2.1 that comprise the transitional interfaces to the PIV data model; and Part 3 describes the PIV data model's end-point interfaces.
Biometric identification --- Identification cards --- Smart cards --- Specifications. --- FIPS 201 --- HSPD-12 --- PACS --- PIV --- PIV authentication mechanisms --- Smart Card
Choose an application
Computer storage devices --- Computer security --- Smart cards --- Data transmission systems --- Ordinateurs --- Sécurité informatique --- Cartes à mémoire --- Données --- Congresses --- Congresses. --- Security measures --- Mémoires --- Congrès --- Sécurité --- Mesures --- Transmissions --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Electrical Engineering --- Information Technology --- Software Engineering --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Data communication systems --- Transmission of data --- Computer science. --- Special purpose computers. --- Computer programming. --- Software engineering. --- Programming languages (Electronic computers). --- Operating systems (Computers). --- Data encryption (Computer science). --- Computer Science. --- Data Encryption. --- Software Engineering. --- Special Purpose and Application-Based Systems. --- Programming Techniques. --- Programming Languages, Compilers, Interpreters. --- Operating Systems. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Electronic data processing --- Languages, Artificial --- Computer software engineering --- Engineering --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Special purpose computers --- Informatics --- Science --- Operating systems --- Programming --- Expansion boards (Microcomputers) --- Near-field communication --- Digital communications --- Electronic systems --- Information theory --- Telecommunication systems --- Cryptology.
Listing 1 - 5 of 5 |
Sort by
|