{"id":425104,"date":"2024-10-20T06:55:03","date_gmt":"2024-10-20T06:55:03","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-23465-12023\/"},"modified":"2024-10-26T13:01:56","modified_gmt":"2024-10-26T13:01:56","slug":"bs-iso-iec-23465-12023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-23465-12023\/","title":{"rendered":"BS ISO\/IEC 23465-1:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Symbols and abbreviated terms <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5 System overview 5.1 Conditions of use <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.2 Simple system configuration 5.3 Complex system configuration <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.4 Generic examples using the different configurations 5.4.1 SoC \u2014 Example of simple system configuration 5.4.2 ID-systems <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.4.3 Mobile devices with multiple security devices <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.4.4 Mobile devices with a single security device <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.4.5 Use cases 6 Architecture model 6.1 Components 6.1.1 Client application 6.1.2 Proxy 6.1.3 Security device 6.2 System using the API <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.3 Data model of client application <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.4 Data management <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.5 Security architecture <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 7 API 7.1 General 7.2 Requirements for a programming interface 7.3 API Implementation 8 Proxy 8.1 General <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 8.2 Proxy characteristics 9 Evolution of security device types <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Annex A (informative) Design rules <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Annex B (informative) Use cases <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Annex C (informative) Variants of security device interfaces <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Annex D (informative) Usage and co-existence of additional APIs <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Card and security devices for personal identification. Programming interface for security devices – Introduction and architecture description<\/b><\/p>\n |