{"id":423520,"date":"2024-10-20T06:46:54","date_gmt":"2024-10-20T06:46:54","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-29167-162022\/"},"modified":"2024-10-26T12:43:49","modified_gmt":"2024-10-26T12:43:49","slug":"bs-iso-iec-29167-162022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-29167-162022\/","title":{"rendered":"BS ISO\/IEC 29167-16:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 3 Terms and definitions 4 Symbols and abbreviated terms 4.1 Symbols 4.2 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5 Conformance 5.1 Claiming conformance <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.2 Interrogator conformance and obligations 5.3 Tag conformance and obligations 6 Cipher introduction 7 Parameter definitions 7.1 Parameter definitions <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 7.2 Certiticate format 8 State diagram 9 Initialization and resetting <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 10 Authentication 10.1 General 10.2 Authenticate message 10.2.1 Message in Authenticate command and reply <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 10.2.2 Authenticate(MAM1.1 Message) <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 10.2.3 MAM1.1 Response <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 10.2.4 Authenticate(MAM1.2 Message) 10.2.5 MAM1.2 Response <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 10.3 Authentication procedure 10.3.1 Protocol requirements 10.3.2 Procedure <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 11 Communication 11.1 Authenticate communication 11.2 Secure communication <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Annex A (normative) State transition table <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Annex B (normative) Error codes and error handling <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Annex C (normative) Cipher description <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Annex D (informative) Test vectors <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Annex E (normative) Protocol specific operation <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Annex F (normative) Protocol message\u2019s fragmentation and defragmentation <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Annex G (informative) Examples of ECC parameters <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Annex H (normative) TTP involving <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Automatic identification and data capture techniques – Crypto suite ECDSA-ECDH security services for air interface communications<\/b><\/p>\n |