{"id":457764,"date":"2024-10-20T09:53:10","date_gmt":"2024-10-20T09:53:10","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-22460-22024\/"},"modified":"2024-10-26T18:22:08","modified_gmt":"2024-10-26T18:22:08","slug":"bs-iso-iec-22460-22024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-22460-22024\/","title":{"rendered":"BS ISO\/IEC 22460-2:2024"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Symbols and abbreviated terms <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5 Overview of a drone security module 5.1 General 5.2 Form-factor of a drone security module 5.3 Use of a drone security module <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 6 Data format of a drone security module 6.1 General 6.2 Drone pilot\/operator license 6.3 Personal identification data for a drone 6.4 Cryptographic key-related data <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6.5 Other data 7 Cryptographic functions of a drone security module 7.1 General <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 7.2 Integrity validation 7.2.1 Purpose and general 7.2.2 Hash function 7.2.3 Digital signature <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 7.3 Authentication 7.3.1 Purpose and general <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7.3.2 Authentication by MAC 7.3.3 Authentication by signature 7.4 Data encryption 7.4.1 Purpose 7.4.2 Procedure <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.5 Transport layer security (TLS) <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7.6 Digital signature <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Annex A (informative) Data examples of a drone security module <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Annex B (informative) Mutual authentication between a drone security module and a counterpart entity <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Annex C (informative) Security applications \u2014 Use cases <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Cards and security devices for personal identification. ISO UAS license and drone\/UAS security module – Drone\/UAS security module<\/b><\/p>\n |