NIST SP 800-73 DRIVER DETAILS:
|File Size:||40.4 MB|
|Supported systems:||Windows 7/8/10, Windows XP 64-bit, Mac OS X 10.X|
|Price:||Free* (*Free Registration Required)|
NIST SP 800-73 DRIVER
Contact Us. Date Published: April September 29, Superseded By: None selected. Appendices SP Vol.
|ASEMspa TANK G43||Reader Interactions|
|ATI 3DP Celestica Radeon 9600XT||Navigation menu|
|HP Pavilion s7620 LITE-ON DVDRW SHM-165H6S||More Information|
Appendices FAQ doi: NIST SP 800-73 Part 1 Rev. Recommendation for Key Management, Part 1: Comments and resolutions for SP Part 1, Rev. Recommendation for Key Management, Part 2: Recommendation for Key Management, Part 3: Comments received on Draft Aug. Word version of SP A Rev. Word version of SP Rev. Managing Information Security Risk: SP A Addendum.
Search Search. Journal Articles Conference Papers Books. Technologies Sectors.
This document, SPcontains the technical specifications to interface with the smart card to This card application is the default selected card application. The software NIST SP 800-73 the ICC applies these security policy representations to all card commands thereby ensuring that the prescribed data policies for the card applications are enforced. The access mode is an operation that can be performed on a data object.
NIST Computer Security Publications - NIST Special Publications (SPs)
A security condition is NIST SP 800-73 Boolean expression using variables called security statuses that are defined below. According to an access control rule, the action described by the access mode can be performed on the data object if and only if the security condition evaluates to TRUE for the current values of the security statuses.
If there is no access control rule NIST SP 800-73 an access mode describing a particular action, then that action shall never be performed on the data object. Each security status indicator, in turn, is associated with a credential that can be used to authenticate the entity. The security status indicator of an authenticatable entity shall be TRUE if the credentials associated with the security status indicator of the authenticatable entity have been authenticated and FALSE otherwise. A successful execution of an authentication protocol shall set the security status indicator associated with the credential used in the protocol to TRUE. An aborted or failed execution of an authentication protocol shall set the security status indicator associated with the credential used in the protocol to FALSE.
As an example, the credentials associated with two security status indicators of the cardholder might be: PIN and fingerprint.
Demonstration of knowledge NIST SP 800-73 the PIN is the authentication protocol for the first security status indicator wherein the PIN is the credential. Comparison of the fingerprint template on the card with a fingerprint acquired from the cardholder is the authentication protocol for the second security status indicator wherein the fingerprint is the credential. A security status indicator shall be said to be a global security status indicator if it is not changed when the currently selected application changes from one application to another. In essence, when changing from one application to another, the global security status indicators shall remain unchanged.
A security status indicator is said to be an application security status indicator if it is set to FALSE when the currently selected application changes from one application to another. Every security status indicator is either a global security status indicator or an application security status indicator. The term NIST SP 800-73 security status refers to the set of all global security status indicators. The term application security status refers to the set of all application security status indicators for a specific application.
Table 1. The platform shall support the selection of Currently a card application using the full application selected Yes identifier or by providing the right- PIV Platform NIST SP 800-73 truncated version and there shall always be a currently selected application.
NIST Special Publication The IT Law Wiki FANDOM powered by Wikia
Table 2. Supersedes: SP (September ). Author(s).
Ramaswamy Chandramouli (NIST), David Cooper (NIST), James Dray (NIST), Hildegard Ferraiolo. David Cooper (NIST), Hildegard Ferraiolo (NIST), Ketan Mehta (NIST), This document, SPcontains the technical specifications to interface with NIST SP 800-73.