Informationsteknik, kontorsutrustning

Kommittébeteckning: SIS/TK 269 (Information för byggande och förvaltning)
Källa: CEN
Svarsdatum: den 7 apr 2020
Se merSe mindre
 

This document provides a methodology and process to create data templates for construction products that are covered by harmonised technical specifications (harmonised product standards (hEN) and European Assessment Documents (EAD)), under Regulation (EU) No 305/2011 - the Construction Products Regulation (CPR).

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: ISO
Svarsdatum: den 8 apr 2020
Se merSe mindre
 

This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k bits. A total of seven different block ciphers are defined. They are categorized in 98H96H96H96HTable 1.

 

 

 

 

 

 

 

Kommittébeteckning: SIS/TK 302 (Multimedia, kodning och representation)
Källa: ISO
Svarsdatum: den 15 apr 2020
Se merSe mindre
 

Rec. ITU-T T.800 | ISO/IEC 15444-11 defines a set of lossless and lossy compression methods for coding continuous-tone, bi-level, greyscale or colour digital still images. This Recommendation | International Standard provides three independently created software reference implementations of Rec. ITU-T T.800 | ISO/IEC 15444-1, in order to assist implementers of Rec. ITU-T T.800 | ISO/IEC 15444-1 in testing and understanding its content. The packages are JASPER, JJ2000 and OPENJPEG.

The reference software packages are informative only. This Recommendation | International Standard does not define any additional part of the JPEG 2000 image coding system.

Each version of the reference software contains source code, which may be compiled to provide the following functionality:

– transcoding from selected, widely available image formats into a JPEG 2000 codestream;

– transcoding from selected, widely available image formats into the JP2 file format;

– selection of a wide range of JPEG 2000 encoding options (as documented in each reference software);

– decoding from a JPEG 2000 codestream to a range of selected widely available image formats;

– Processing of a JP2 file to extract a JPEG 2000 codestream for decoding and conversion to a range of selected widely available image formats.

– The ability to extract metadata from a JP2 file, including the contents of the Image Header box and the colour space.

– The decoding of JP2 files that use the Three-Component Matrix-Based form of the Restricted ICC method for the specification of colour space and the conversion of the decoded image data to the sRGB colour space for display, including limited upsampling of all decoded components to the same resolution.

– The decoding of JP2 files that use the Monochrome form of the Restricted ICC method for the specification of colour space and the conversion of the decoded image data to the sRGB based greyscale space as defined within the JP2 file format.

– The decoding of JP2 files that use the sYCC colour space and the conversion of the decoded image data to the sRGB colour space for display, including upsampling of all decoded components to the same resolution.

– some additional tools to help with evaluation and testing.

The reference software is intended for use as a testing and validation tool for other implementations of JPEG 2000, and to help in the understanding of Rec. ITU-T T.800 | ISO/IEC 15444-1. Although components of the reference software may find application in software intended for product development, this was not an objective of the development of this software, and prospective implementers are cautioned against making any estimations of performance or resource usage based on the reference software.

Kommittébeteckning: SIS/TK 448 (Teknik och stödsystem för personlig identifiering)
Källa: ISO
Svarsdatum: den 20 apr 2020
Se merSe mindre
 

The purpose of this document is to standardize interface specifications for the implementation of a driving licence in association with a mobile device (mDL). This document standardizes the interface between the mDL and mDL Reader, and the interface between the mDL Reader and the issuing authority infrastructure. The standard also allow parties other than the issuing authority (e.g. other issuing authorities, or mDL Verifiers in other countries) to:

a) use a machine to obtain the mDL data,

b) tie the mDL to the mDL Holder,

c) authenticate the origin of the mDL data, and

d) verify the integrity of the mDL data.

The following items are out of scope for this document:

a) how user consent to share data is obtained

b) requirements on storage of mDL data and mdL private keys

Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: CEN
Svarsdatum: den 21 apr 2020
Se merSe mindre
 

This International Standard provides a privacy framework which

specifies a common privacy terminology;

defines the actors and their roles in processing personally identifiable information (PII);

describes privacy safeguarding considerations; and

provides references to known privacy principles for information technology.

This International Standard is applicable to natural persons and organizations involved in specifying, procuring, architecting, designing, developing, testing, maintaining, administering, and operating information and communication technology systems or services where privacy controls are required for the processing of PII.

Kommittébeteckning: SIS/TK 380 (Ergonomi)
Källa: ISO
Svarsdatum: den 21 apr 2020
Se merSe mindre
 

This document provides ergonomic guidance focused on ensuring the accessibility of tactile/haptic interactions with ICT systems. This includes both general and specific guidance for the design of accessible tactile/haptic interactions. This document deals with modality shifting and accessibility guidance for haptic/tactile modalities such as gestures, vibration, and force feedback.

This standard provides guidance for tactile/haptic interactions that is applicable to a variety of ICT systems, including assistive technologies (AT).

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: ISO
Svarsdatum: den 27 apr 2020
Se merSe mindre
 

ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. ISO/IEC 11770-4:2017 is not applicable to the following aspects of key management:
-      life-cycle management of weak secrets, strong secrets, and established secret keys;
-      mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.

 

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: ISO
Svarsdatum: den 2 maj 2020
Se merSe mindre
 

This document specifies mechanisms to establish shared symmetric keys between groups of entities. It defines symmetric key-based key establishment mechanisms for multiple entities with a key distribution centre (KDC), and defines symmetric key establishment mechanisms based on a general tree-based logical key structure with both individual rekeying and batched rekeying. It also defines key establishment mechanisms based on a key chain with group forward secrecy, group backward secrecy, or both group forward and backward secrecy.

This document also describes the required content of messages which carry keying material or are necessary to set up the conditions under which the keying material can be established. However, this document does not specify information that has no relation with key establishment mechanisms, nor does it specify other messages such as error messages. The explicit format of messages is not within the scope of this document.

This document does not specify the means to be used to establish the initial secret keys required to be shared between each entity and the KDC, nor key lifecycle management. This document also does not explicitly address the issue of interdomain key management.

Annex A lists the object identifiers assigned to the mechanisms specified in this document. For information purposes, a load balancing mechanism for a general tree structure is described in Annex B.

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: ISO
Svarsdatum: den 11 maj 2020
Se merSe mindre
 

This document provides a framework and establishes requirements for attribute-based unlinkable entity authentication.