Identifieringskort och tillhörande läsarenheter

Kommittébeteckning: SIS/TK 448 (Personlig identifiering)
Källa: ISO
Svarsdatum: den 5 apr 2023
Se merSe mindre
 

This document is intended to be used in any sector of activity. It specifies:
— contents of command-response pairs exchanged at the interface,
— means of retrieval of data elements and data objects in the card,
— structures and contents of historical bytes to describe operating characteristics of the card,
— structures for applications and data in the card, as seen at the interface when processing commands,
— access methods to files and data in the card,
— a security architecture defining access rights to files and data in the card,
— means and mechanisms for identifying and addressing applications in the card,
— methods for secure messaging,
— access methods to the algorithms processed by the card. It does not describe these algorithms.
It does not cover the internal implementation within the card or the outside world.
This document is independent from the physical interface technology. It applies to cards accessed by one or more of the following methods: contacts, close coupling and radio frequency. If the card supports simultaneous use of more than one physical interface, the relationship between what happens on different physical interfaces is out of the scope of this document.
 

Kommittébeteckning: SIS/TK 448 (Personlig identifiering)
Källa: ISO
Svarsdatum: den 8 maj 2023
Se merSe mindre
 

This document describes the test methods used for conformity testing, that is methods for determining whether a driving licence can be considered to comply with the requirements of the ISO/IEC 18013 series for:
— machine readable technologies (ISO/IEC 18013-2), and
— access control, authentication and integrity validation (ISO/IEC 18013-3).
The test methods described in this document are based on specifications defined in ISO/IEC 18013-2 and ISO/IEC 18013-3 and underlying normative specifications.
This document deals with test methods specific to IDL requirements. Test methods applicable to (smart) cards in general (e.g. those specified in the ISO/IEC 10373 series) are outside the scope of this document.
Hence the purpose of this document is to:
— provide IDL implementers with requirements for conformity evaluation,
— provide IDL issuing authorities with requirements for quality assurance, and
— provide test laboratories and test tool providers with test suite requirements.

Kommittébeteckning: SIS/TK 448 (Personlig identifiering)
Källa: ISO
Svarsdatum: den 17 maj 2023
Se merSe mindre
 

This document describes the history of biometrics and what biometrics does, the various biometric technologies in general use today (for example, fingerprint recognition, face recognition and iris recognition) and the architecture of the systems and the system processes that allow automated
recognition using those technologies. It also provides information about the application of biometrics in various business domains such as border management, law enforcement and driver licensing. And it provides information on the societal and jurisdiction considerations that are typically taken into account in biometric systems.
Additionally, this document identifies and provides guidance on the use of the international standards that underpin the use of biometric recognition systems.

Kommittébeteckning: SIS/TK 448 (Personlig identifiering)
Källa: ISO
Svarsdatum: den 31 maj 2023
Se merSe mindre
 

This standard is a profile that specifies requirements for testing biometric presentation attack detection (PAD) mechanisms on mobile devices with local biometric recognition and on biometric modules integrated into mobile devices
The profile lists requirements from ISO/IEC 30107-3 specific to mobile devices. It also establishes requirements that are not present in ISO/IEC 30107-3. For each requirement, the profile defines an Approach in PAD Tests for Mobile Devices. For some requirements, numerical values or ranges are
provided in the form of best practices.
This profile is applicable to mobile devices that operate as closed systems with no access to internal results, including mobile devices with local biometric recognition as well as biometric modules for mobile devices.
Out of the scope are the following:
— mobile devices solely with remote biometric recognition
The attacks considered in this document take place at the capture device during the presentation and collection of biometric characteristics. Any other attacks are outside the scope of this document.