Каталог стандартов

+7 (495) 223-46-76 +7 (812) 309-78-59
inform@normdocs.ru

ÖNORM EN 1546-2:2000-09

Действует
Identification card systems - Inter-sector electronic purse - Part 2: Security architecture
This part of EN 1546 defines the detailed security architecture for IEP systems as they are described in prEN 1546-
1. It also describes the application protocols, the use of cryptographic algorithms and some underlying assumptions
concerning the key management necessary to implement IEP systems with sufficient security levels.
The general architecture described here allows many types of implementation. It should be noted that the
informative annexes of this standard focus on particular implementations.
As time progresses it is envisaged that other implementations may come into focus.
The security architecture defines the security procedures needed at the application level of the IEP system
transactions described in prEN 1546-1, A.5 and A.6. This architecture relies on the basic assumptions stated in
prEN 1546-1, 1.4.
Manual error recovery is outside the scope of this standard. Audit information needed for performing manual error
recovery procedures is, however, covered by this standard.
The description in this part of the standard is in the form of ordered exchanges of data between distinct conceptual
devices. Operational instructions performed by these devices produce the required ordered exchanges. Examples
of meanings of the required operational instructions are presented as mathematical formulae in informative
annexes. The transactions in this part of the standard are described as functional requirements. They define the
order of cryptographic proofs and verifications and their related data elements necessary to achieve security in an
IEP system.
An IEP system conforming to the security architecture defined in this part of EN 1546 may be implemented in
physical devices using generally practiced programming techniques. Optimization of computations and data
exchanges which preserve the operational requirements of the ordered data exchanges may also be implemented.
The data elements and intercha (...abbreviated)
Dieser Teil von EN 1546 legt die ausführliche Sicherheitsarchitektur für IEP-Systeme nach EN 1546-1 fest. Er beschreibt ebenfalls die Anwendungsprotokolle, die Verwendung von kryptographischen Algorithmen und einige grundlegende Voraussetzungen, die das notwendige Schlüsselmanagement betreffen, um IEP-Systeme mit einem ausreichenden Sicherheitsniveau zu realisieren.
ICS
35.240.15 Identification cards and related devices. Including application of cards for banking, trade, telecommunications, transport, etc. / Идентификационные карточки и связанные с ними устройства. Включая применение карточек в банковском деле, торговле, телекоммуникации, на транспорте и т.д.