{"id":402655,"date":"2024-10-20T05:02:15","date_gmt":"2024-10-20T05:02:15","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-22-30436762-dc-2022\/"},"modified":"2024-10-26T08:58:06","modified_gmt":"2024-10-26T08:58:06","slug":"bsi-22-30436762-dc-2022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-22-30436762-dc-2022\/","title":{"rendered":"BSI 22\/30436762 DC 2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Use of security compliance checklists 4.1 General <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4.2 Informal evaluation 4.3 Semi-formal evaluation 4.4 Strict semi-formal evaluation 4.5 Formal evaluation <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | Annex\u00a0A (normative) Physical, logical, and device management characteristics common to all secure cryptographic devices <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Annex\u00a0B (normative) Devices with PIN entry functionality <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Annex\u00a0C (normative) Devices with PIN management functionality <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Annex\u00a0D (normative) Devices with message authentication functionality <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Annex\u00a0E (normative) Devices with key generation functionality <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Annex\u00a0F (normative) Devices with key transfer and loading functionality <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | Annex\u00a0G (normative) Devices with digital signature functionality <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Annex\u00a0H (normative) Categorization of environments <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO 13491-2. Financial services. Secure cryptographic devices (retail) – Part 2. Security compliance checklists for devices used in financial transactions<\/b><\/p>\n |