{"id":350080,"date":"2024-10-20T00:40:18","date_gmt":"2024-10-20T00:40:18","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-419212-12017\/"},"modified":"2024-10-26T00:24:53","modified_gmt":"2024-10-26T00:24:53","slug":"bs-en-419212-12017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-419212-12017\/","title":{"rendered":"BS EN 419212-1:2017"},"content":{"rendered":"
This part is an informative introduction into the following parts. It gives guidance to the following parts in order to allow an efficient usage of the provided information. Therefore Part 1 provides history, application context, market perspective and a tutorial about the basic understanding of electronic signatures. – Clause 3 provides “Terms and definitions” covering all parts of this standards. The specific parts will contain a similar section which refers to the clause of this Part 1. – Clause 4 provides “Symbols and abbreviations” covering all parts of this standards. The specific parts will contain a similar section which refers to the clause of this Part 1. – Clause 5 provides a Management Summary that describes the market context in which electronic signatures are typically – Annex A provides the algorithm identifies for all parts of the standard. – Annex B provides the algorithm identifies for all parts of the standard. – Annex C provides the build scheme for object identifiers for all parts of the standard. – Annex D “Tutorial on Signature Technology” provides a tutorial which helps the first reader to get familiar with signature technology and its relation to the society that it serves. – Annex E “Guide to the EN 419212” explains the historical and technical evolution of the ESIGN activities which did finally lead to this version of the signature standard.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 4 Symbols and abbreviations <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5 Management Summary 5.1 Motivation <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5.2 What is in behind? <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 5.3 Use Cases <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.4 Privacy and Security 5.5 Overview – EU Directive and Regulation <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.6 Facts and Figures <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Annex\u00a0A (normative)Algorithm Identifiers \u2014 Coding and specification <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Annex\u00a0B (informative) OID values B.1 OIDs for certificate signatures B.2 OIDs for key transport protocol <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | B.3 OIDs for device authentication with privacy <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | B.4 OIDs for password based mechanisms B.5 OIDs for mEAC protocol B.5.1 OIDs for Chip Device Authentication <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | B.5.2 OIDs for Terminal Device Authentication <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | B.6 OIDs for privacy protocols B.6.1 OIDs for Restricted Identification B.6.2 OIDs for Restricted Identification B.7 OIDs for mEAC based eServices – OIDs for Terminal Device Authentication in mEAC-based eServices <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | B.8 OIDs for the PCA mechanism <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | Annex\u00a0C (informative) Build scheme for object identifiers defined by EN\u00a0419212 <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | Annex\u00a0D (informative) Tutorial on Signature Technology D.1 General <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | D.2 Signatures and keys <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | D.3 Signing documents <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | D.4 About certificates <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | D.5 The \u201cchain of trust\u201d D.6 Multi step signature generation D.6.1 General D.6.2 Device authentication protocols <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | D.6.3 Secure Messaging D.6.4 Password based device authentication D.6.5 PIN entry <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | D.7 Signing the document <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | Annex\u00a0E (informative)Guide to the EN\u00a0419212 E.1 From EN\u00a014890 to EN\u00a0419212 <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | E.2 The EU Regulation 910\/2014 and the Directive 1999\/93\/EU E.3 Secure Elements (SE) <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | E.4 Specific protection required for contactless integrated circuits E.4.1 General E.4.2 Eavesdropping attacks E.4.3 Skimming attack E.4.4 Relay attack E.4.5 Denial of Service (DoS) attack <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | E.4.6 Countermeasures E.5 The Human-Machine Interface E.6 Communications with the ICC and with the user <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | E.7 Information that should be initally communicated by the ICC to the IFD E.8 User agreement using PINs <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | E.9 PIN unlocking E.10 PIN change E.11 User agreement using biometric information E.12 User control using a local display and a local keyboard <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | E.13 Card applications E.13.1 General E.13.2 eSign card application E.13.3 Device authentication mechanisms E.13.4 Document Decryption mechanisms E.14 Signature-\/Seal functions E.14.1 General <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | E.14.2 Digital signature\/seal creation E.14.3 Digital signature verification E.14.4 Identification and authentication service <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services – Introduction and common definitions<\/b><\/p>\n |