NORMSERVIS s.r.o.

ISO/IEC 20248-ed.2.0

Information technology - Automatic identification and data capture techniques - Digital signature data structure schema

STANDARD published on 10.6.2022

English -
electronic design (pdf) (333.30 USD)

English -
Print design (333.30 USD)

English -
CD-ROM (335.10 USD)

The information about the standard:

Designation standards: ISO/IEC 20248-ed.2.0
Publication date standards: 10.6.2022
The number of pages: 106
Approximate weight : 349 g (0.77 lbs)
Country: International technical standard
Category: Technical standards ISO

Annotation of standard text ISO/IEC 20248-ed.2.0 :

This document is an ISO/IEC 9594-8 [public key infrastructure (PKI) digital signatures and certificates] application specification for automated identification services. It specifies a method whereby data stored within a barcode and/or RFID tag are structured, encoded and digitally signed. ISO/IEC 9594-8 is used to provide a standard method for key and data description management and distribution. The data capacity and/or data transfer capacity of automated identification data carriers are restricted. This restricts the normal use of a digital signature as specified in ISO/IEC 9594-8 within automated identification services. The purpose of this document is to provide an open and interoperable method, between automated identification services and data carriers, to read data, verify data originality and data integrity in an offline use case. This document specifies — the meta data structure, the DigSig, which contains the digital signature and encoded structured data, — the public key certificate parameter and extension use, the DigSig certificate, which contains the certified associated public key, the structured data description, the read methods, and private containers, — the method to specify, read, describe, sign, verify, encode, and decode the structured data, the DigSig Data Description, — the DigSig EncoderGenerator which generates the relevant asymmetric key pairs, keeps the private key secret, and generates the DigSigs, and — the DigSig DecoderVerifier which, by using to the DigSig certificate, reads the DigSig from the set of data carriers, verifies the DigSig and extracts the structured data from the DigSig. This document does not specify — cryptographic methods, or — key management methods.