{"id":425104,"date":"2024-10-20T06:55:03","date_gmt":"2024-10-20T06:55:03","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-23465-12023\/"},"modified":"2024-10-26T13:01:56","modified_gmt":"2024-10-26T13:01:56","slug":"bs-iso-iec-23465-12023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-23465-12023\/","title":{"rendered":"BS ISO\/IEC 23465-1:2023"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
10<\/td>\n4 Symbols and abbreviated terms <\/td>\n<\/tr>\n
11<\/td>\n5 System overview
5.1 Conditions of use <\/td>\n<\/tr>\n
12<\/td>\n5.2 Simple system configuration
5.3 Complex system configuration <\/td>\n<\/tr>\n
13<\/td>\n5.4 Generic examples using the different configurations
5.4.1 SoC \u2014 Example of simple system configuration
5.4.2 ID-systems <\/td>\n<\/tr>\n
14<\/td>\n5.4.3 Mobile devices with multiple security devices <\/td>\n<\/tr>\n
15<\/td>\n5.4.4 Mobile devices with a single security device <\/td>\n<\/tr>\n
16<\/td>\n5.4.5 Use cases
6 Architecture model
6.1 Components
6.1.1 Client application
6.1.2 Proxy
6.1.3 Security device
6.2 System using the API <\/td>\n<\/tr>\n
17<\/td>\n6.3 Data model of client application <\/td>\n<\/tr>\n
18<\/td>\n6.4 Data management <\/td>\n<\/tr>\n
19<\/td>\n6.5 Security architecture <\/td>\n<\/tr>\n
20<\/td>\n7 API
7.1 General
7.2 Requirements for a programming interface
7.3 API Implementation
8 Proxy
8.1 General <\/td>\n<\/tr>\n
21<\/td>\n8.2 Proxy characteristics
9 Evolution of security device types <\/td>\n<\/tr>\n
22<\/td>\nAnnex A (informative) Design rules <\/td>\n<\/tr>\n
23<\/td>\nAnnex B (informative) Use cases <\/td>\n<\/tr>\n
28<\/td>\nAnnex C (informative) Variants of security device interfaces <\/td>\n<\/tr>\n
29<\/td>\nAnnex D (informative) Usage and co-existence of additional APIs <\/td>\n<\/tr>\n
30<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Card and security devices for personal identification. Programming interface for security devices – Introduction and architecture description<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n32<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":425111,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[693,2641],"product_tag":[],"class_list":{"0":"post-425104","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-240-15","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/425104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/425111"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=425104"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=425104"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=425104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}