{"id":111601,"date":"2024-10-18T16:13:38","date_gmt":"2024-10-18T16:13:38","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-1667-2010\/"},"modified":"2024-10-24T22:02:05","modified_gmt":"2024-10-24T22:02:05","slug":"ieee-1667-2010","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-1667-2010\/","title":{"rendered":"IEEE 1667 2010"},"content":{"rendered":"
Revision Standard – Active. This project defines a standard protocol for secure authentication and creation of trust between a secure host and a directly attached Transient and other Storage Devices, such as a USB flash drive, portable hard drive, or cellular phone. The protocol has only an indirect relationship with data integrity\/security, and does not directly address issues of authorization and enforcement. The protocol also does not address devices that are attached using a network connection. However, a device that uses a point-to-point wireless connection such as WUSB may comply with this protocol.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 1667-2009 Front Cover <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Title Page <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction Notice to users Laws and regulations Copyrights Updating of IEEE documents <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Errata Interpretations Patents <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | Important Notice 1. Overview 1.1 Scope 1.2 Purpose <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 1.3 Conventions 2. Normative references <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 3. Definitions, acronyms, and abbreviations 3.1 Definitions <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 3.2 Acronyms and abbreviations <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 4. Authentication layer 4.1 Stack <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5. Host requirements 5.1 Probe Silo 5.2 Certificate Authentication Silo <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6. Addressable Command Target requirements 6.1 General Addressable Command Target requirements <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.2 Probe Silo requirements 6.3 Certificate Authentication Silo requirements <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7. Status Codes 7.1 Common Status Codes <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 8. Probe Silo 8.1 Process of Probing <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 8.2 Probe Silo Status Codes 8.3 Probe Silo commands <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 9. Certificate Authentication Silo 9.1 Certificate names and types <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 9.2 Certificate chains <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 9.3 Certificate Authentication Silo state machine <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 9.4 Certificate Authentication Silo Status Codes <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 9.5 Certificate Authentication Silo Commands <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 9.6 Certificate Authentication command sequences <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | Annex A (normative) IEEE 1667 over SCSI <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | Annex B (normative) USB transport <\/td>\n<\/tr>\n | ||||||
127<\/td>\n | Annex C (informative) Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Authentication in Host Attachments of Transient Storage Devices<\/b><\/p>\n |