Using ISO/IEC 24727 for Mobile Devices
نویسندگان
چکیده
The forthcoming ISO/IEC 24727 series of standards [ISO24727] defines architectures and application programming interfaces for electronic identity cards (eID). As there are already many initiatives around the globe (e.g. in the USA, Australia and Europe) which are about to use this standard in major eIDprojects, it may be expected, that this standard will provide a major contribution for global eID interoperability and will become widely adopted in near future. On the other hand there is an ever increasing trend for mobility and the ubiquitous use of portable devices as well as first national eID-projects, which support mobile devices. Therefore it is natural to investigate how ISO/IEC 24727 may be used with mobile devices. The present contribution provides a brief overview of this standard and discusses different options for using this standard in a mobile environment.
منابع مشابه
How to Use ISO/IEC 24727-3 with Arbitrary Smart Cards
The forthcoming ISO/IEC 24727 series of standards defines application programming interfaces for smart cards and is expected to provide a major contribution to the global interoperability of smart cards and card-applications. However it assumes in part 2 [8] that certain information concerning the capabilities of the card and its (cryptographic) applications is stored on the card itself. As alr...
متن کاملUniform query formalization in mobile visual search: From standards to practice
Mobile visual search is the task of finding information (visual or not) given an input picture or video usually taken by a hand-held device. Interest around this topic is being boosted by the increasing amount of digitally stored images and the widespread proliferation of camera enabled mobile devices, such as mobile phones, PDAs or tablets. This fact is increasing the urgency of novel solution...
متن کاملStandards for Query Formalization in Mobile Visual Search
The research around visual search is gaining relevance due to the evolution in the generation and usage of digital images. A significant push comes from the mobile visual search topic, due to the widespread proliferation of camera enabled mobile devices. The new scenarios are increasing the urgency of novel solutions for challenging problems such as the efficient coding of compact visual descri...
متن کاملSecure Authentication through a near Field Communication in Asymmetric Cryptography
This paper presents the design and implementation of a complete near-field communication (NFC) tag system that supports highsecurity features. The tag design contains all hardware modules required for a practical realization, which are: an analog 13.56-MHz radio-frequency identification (RFID) front-end, a digital part that includes a tiny (programmable) 8-b microcontroller, a framing logic for...
متن کاملA Cryptographic Analysis of OPACITY
We take a closer look at the Open Protocol for Access Control, Identification, and Ticketing with privacY (OPACITY). This Diffie–Hellman-based protocol is supposed to provide a secure and privacy-friendly key establishment for contactless environments. It is promoted by the US Department of Defense and meanwhile available in several standards such as ISO/IEC 24727-6 and ANSI 504-1. To the best ...
متن کامل