Informationsteknik, kontorsutrustning

Kommittébeteckning: SIS/TK 255 (Vägtrafikinformatik)
Källa: ISO
Svarsdatum: den 6 okt 2020
Se merSe mindre
 

This Technical Specification specifies the TPEG application: Fuel price information and availability

(FPI). The FPI application has been specifically designed to support information of fuel stations, their

location, fuel types offered and fuel pricing and availability information.

The standardized delivery, via TPEG technology, of fuel price information has the following benefits to

end users of a TPEG service:

a) cost savings to driver, through improved ease of access to price information;

b) improved ease of access to price information that may lead to significant cost savings for fleet

operators;

c) environmental benefits from drivers not having to drive around to find the cheapest fuel prices;

d) safety improvements for highways authorities, as drivers are less likely to run out of fuel if they are

well informed of local availability and prices;

e) as availability of new fuels become more common and more vehicles use them (e.g. biofuels,

hydrogen, etc.), drivers will be better informed about availability of fuelling stations.

The TPEG application Fuel price information and availability, as add-on service component next to, for

example, traffic information, is laid out to support large numbers of fuel stations and fuel prices with

only modest bandwidth requirements.

When the objective is to inform electric vehicles on the location of charging stations and the availability

of charging points, the TPEG application TPEG2-EMI (Electro Mobility Information) shall be chosen.

TPEG2-FPI contains rudimentary support for electric charging stations. However, a TISA investigation

revealed that a simple extension/differentiation of TPEG2-FPI would not be sufficient to address the

evolving market needs of the electric vehicle market. Hence, a separate TPEG application was created to

serve the information needs of Electric Vehicles and their operators: TPEG2-EMI.

Kommittébeteckning: SIS/TK 255 (Vägtrafikinformatik)
Källa: ISO
Svarsdatum: den 6 okt 2020
Se merSe mindre
 

This part of ISO 21219 defines the TPEG Weather (WEA) application for reporting weather information

for travellers. It provides general weather-related information to all travellers and is not limited to a

specific mode of transportation.

This application does not provide specific weather-related safety warnings to drivers; these are

provided as Safety Related Messages as part of the TPEG2-TEC application.

The WEA application provides weather-related forecasts and status information over multiple time

periods and for multiple, possibly linked, geographical areas.

NOTE The presentation of the information is dependent of the specific HMI of the receiving device. This part

of ISO 21219, therefore, does not define any prerequisites for the HMI of the device.

Kommittébeteckning: SIS/TK 255 (Vägtrafikinformatik)
Källa: ISO
Svarsdatum: den 6 okt 2020
Se merSe mindre
 

This part of ISO 21219 establishes the method of delivering service and network information within a TPEG service. The TPEG-SNI application is designed to allow the efficient and language independent delivery of information about the availability of the same service on another bearer channel or similar service data from another service provider, directly from service provider to end-users.

NOTE A number of tables of information are described, which provide comprehensive options for describing services, their timing, content, geographical coverage, etc. In all TPEG streams, it is mandatory to deliver to so-called GST. Additionally, it is possible to signal linkage of content between different bearers and services.

Se merSe mindre
 

This International Standard specifies requirements and provides guidance for bodies providing audit and certification of an information security management system (ISMS), in addition to the requirements contained within ISO/IEC 17021-1 and ISO/IEC 27001. It is primarily intended to support the accreditation of certification bodies providing ISMS certification.

The requirements contained in this International Standard need to be demonstrated in terms of competence and reliability by any body providing ISMS certification, and the guidance contained in this International Standard provides additional interpretation of these requirements for any body providing ISMS certification.

NOTE This International Standard can be used as a criteria document for accreditation, peer assessment or other audit processes.

Kommittébeteckning: SIS/TK 302 (Multimedia, kodning och representation)
Källa: ISO
Svarsdatum: den 7 okt 2020
Se merSe mindre
 

This part of ISO/IEC 23008 specifies application level forward error correction (FEC) codes which can

be used with AL-FEC framework of ISO/IEC 23008-1 MPEG Media Transport to provide reliable delivery

in IP network and non IP network environments that are prone to packet losses.

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: ISO
Svarsdatum: den 10 okt 2020
Se merSe mindre
 

This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage). The defined modes only provide protection of data confidentiality. Protection of data integrity is not within the scope of this document. Also, most modes do not protect the confidentiality of message length information.

NOTE 1 Methods for protecting the integrity of data using a block cipher are provided in ISO/IEC 9797-1.

NOTE 2 Methods for simultaneously protecting the confidentiality and integrity of data are provided in ISO/IEC 19772.

This document specifies the modes of operation and gives recommendations for choosing values of parameters (as appropriate).

NOTE 3 The modes of operation specified in this document have been assigned object identifiers in accordance with ISO/IEC 9834. The list of assigned object identifiers is given in Annex A. In applications in which object identifiers are used, the object identifiers specified in Annex A are to be used in preference to any other object identifiers that can exist for the mode concerned.

NOTE 4 Annex B contains comments on the properties of each mode and important security guidance.

Kommittébeteckning: SIS/TK 448 (Teknik och stödsystem för personlig identifiering)
Källa: ISO
Svarsdatum: den 11 okt 2020
Se merSe mindre
 

This part of ISO/IEC 2382 establishes a systematic description of the concepts in the field of biometrics pertaining to recognition of human beings and reconciles variant terms in use in pre-existing biometric standards against the preferred terms, thereby clarifying the use of terms in this field.

Excluded from the scope of this document are concepts (represented by terms) from information technology, pattern recognition, biology, mathematics, etc. Biometrics uses such fields of knowledge as a basis.

In principle, mode specific terms are outside of scope of this part of ISO/IEC 2382.

Words that are bolded are defined in this document. Words that are not bolded are to be understood in their natural language sense. The authority for natural language use of terms in this document is the Concise Oxford English Dictionary, Thumb Index Edition (tenth edition, revised, 2002). Words used in their natural language sense are considered out-of-scope for further definition in this document.

Kommittébeteckning: SIS/TK 302 (Multimedia, kodning och representation)
Källa: ISO
Svarsdatum: den 13 okt 2020
Se merSe mindre
 

This document describes the JPEG universal metadata box format (JUMBF), which provides a universal format to embed any type of metadata in any box-based JPEG file format. This document defines the syntax of the JUMBF box and the mechanism to assign specific content types. In particular, this document specifies XML, JSON, codestream and UUID types. In addition, this document defines the syntax to reference or request the embedded metadata content within or outside the image.

Kommittébeteckning: SIS/TK 448 (Teknik och stödsystem för personlig identifiering)
Källa: ISO
Svarsdatum: den 21 okt 2020
Se merSe mindre
 

This document specifies a full body image data format for biometric recognition applications requiring

exchange of human full body image data:

a) support for human examination of high resolution full body images;

b) support for human biometric verification based on full body images;

c) automated full body biometric verification and identification.

This specification ensures that full human body images and image sequence data generated by video

surveillance and other similar systems are suitable for identification and verification.

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: ISO
Svarsdatum: den 24 okt 2020
Se merSe mindre
 

ISO/IEC 10118-1:2016 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper bounded) length to fixed-length strings of bits, using a specified algorithm. They can be used for - reducing a message to a short imprint for input to a digital signature mechanism, and - committing the user to a given string of bits without revealing this string. NOTE The hash-functions specified in ISO/IEC 10118 (all parts) do not involve the use of secret keys. However, these hash-functions may be used, in conjunction with secret keys, to build message authentication codes. Message Authentication Codes (MACs) provide data origin authentication as well as message integrity. Techniques for computing a MAC using a hash-function are specified in ISO/IEC 9797-2 [1]. ISO/IEC 10118-1:2016 contains definitions, symbols, abbreviations and requirements that are common to all the other parts of ISO/IEC 10118. The criteria used to select the algorithms specified in subsequent parts of ISO/IEC 10118 are defined in Annex B of this document

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: ISO
Svarsdatum: den 27 okt 2020
Se merSe mindre
 

This document specifies mechanisms for cross-domain password-based authenticated key exchange, all of which are Four-party Password-based Authenticated Key Exchange (4PAKE) protocols. Such protocols let two communicating entities establish a shared session key using just the login passwords that they share with their respective domain authentication servers. The authentication servers, assumed to be part of a standard public key infrastructure (PKI), act as ephemeral certification authorities (CAs) that certify key materials that the users can subsequently use to exchange and agree on as a session key.

This document does not specify the means to be used to establish a shared password between an entity and its corresponding domain server. This document also does not define the implementation of a PKI and the means for two distinct domain servers to exchange or verify their respective public key certificates.

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: ISO
Svarsdatum: den 28 okt 2020
Se merSe mindre
 

ISO/IEC 11770-3:2015 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals: a) establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of a data exchange between the two entities A and B. Neither of them should be able to predetermine the value of the shared secret key; b) establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B via key transport. In a secret key transport mechanism, the secret key is chosen by one entity A and is transferred to another entity B, suitably protected by asymmetric techniques; and c) make an entity's public key available to other entities via key transport. In a public key transport mechanism, the public key of entity A shall be transferred to other entities in an authenticated way, but not requiring secrecy. Some of the mechanisms of ISO/IEC 11770-3:2015 are based on the corresponding authentication mechanisms in ISO/IEC 9798-3. ISO/IEC 11770-3:2015 does not cover certain aspects of key management, such as key lifecycle management, mechanisms to generate or validate asymmetric key pairs, and mechanisms to store, archive, delete, destroy, etc. keys. While ISO/IEC 11770-3:2015 does not explicitly cover the distribution of an entity's private key (of an asymmetric key pair) from a trusted third party to a requesting entity, the key transport mechanisms described can be used to achieve this. A private key can in all cases be distributed with these mechanisms where an existing, non-compromised key already exists. However, in practice the distribution of private keys is usually a manual process that relies on technological means such as smart cards, etc. ISO ...

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: ISO
Svarsdatum: den 1 nov 2020
Se merSe mindre
 

Se merSe mindre
 

This Recommendation | International Standard gives guidelines for information security controls applicable to the provision and use of cloud services by providing:

– additional implementation guidance for relevant controls specified in ISO/IEC 27002;

– additional controls with implementation guidance that specifically relate to cloud services.

This Recommendation | International Standard provides controls and implementation guidance for both cloud service providers and cloud service customers.

Kommittébeteckning: SIS/TK 507 (Tekniska produktspecifikationer (TPS))
Källa: ISO
Svarsdatum: den 13 nov 2020
Se merSe mindre
 

This document establishes and defines terms used in technical product documentation relating to technical drawings, product definition and related documentation in all fields of application.

This vocabulary is based on all terms contained within ISO/TC 10 standards and other documents that are relevant to technical product documentation irrespective of disciplines. The terms have been classified into specific fields of application.

New terms required by ISO/TC 10 Subcommittees and Working Groups for new or revised standards will be ratified by the ISO/TC 10 vocabulary maintenance team and included in future amendments of this document.

NOTE 1 Annex A contains a list of terms and definitions which previously appeared in former parts of ISO 10209 and for which there are now new definitions in current ISO/TC 10 standards.

NOTE 2 In addition to terms and definitions used in English and French, two of the three official ISO languages, this document gives the equivalent terms in German; these are published under the responsibility of the member body for Germany (DIN), and are given for information only. Only the terms and definitions given in the official languages can be considered ISO terms and definitions.

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: ISO
Svarsdatum: den 15 nov 2020
Se merSe mindre
 

This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorised manner.

NOTE A general framework for the provision of integrity services is specified in ISO/IEC 10181-6 [5].

Kommittébeteckning: SIS/TK 611 (Informationsteknik)
Källa: ISO
Svarsdatum: den 23 nov 2020
Se merSe mindre
 

This document provides an explanation of considerations involved in defining a process. This document gives requirements and recommendations for the description of processes by identifying elements and rules for their formulation.

This document also describes the use of process views.

This document explains how conformance to a process can be defined, when the process is described in accordance with this document.

This document does not describe how processes are composed or otherwise aggregated into larger frameworks or life cycle models. Nor does the document cover how to assess or evaluate the performance of a process, or the output (products) of a process.

NOTE Two prominent International Standards in process description for software and system engineering are ISO/IEC IEEE 12207 and ISO/IEC IEEE 15288. These two standards have very similar process models. The information items associated with their process definitions are given in ISO/IEC IEEE 15289. Other International Standards provide further characterization of a single life cycle process by elaborating the process elements and levying specific requirements on the execution of the process.

This document is applicable when processes are described for various process definitions in any party, organization or standard relating to systems and software engineering processes.

Kommittébeteckning: SIS/TK 614 (Blockchain)
Källa: ISO
Svarsdatum: den 27 nov 2020
Se merSe mindre
 

This document specifies a reference architecture for distributed ledger technology (DLT) systems including blockchain systems. The reference architecture addresses concepts, cross-cutting aspects, architectural considerations, and architecture views, including functional components, roles, activities, and their relationships for blockchain and DLT.