Date Published: March 2006
Supersedes:
SP 800-73 (09/29/2005)
Author(s)
James Dray (NIST), Scott Guthery (Mobile-Mind), Teresa Schwarzhoff (NIST)
This document specifies the PIV data model, Application Programming Interface (API), and card interface requirements necessary to comply with the mandated use cases, as defined in Section 6 of FIPS 201 and further elaborated in Section 1.7 below, for interoperability across deployments or agencies. Interoperability is defined as the use of PIV identity credentials such that client-application programs, compliant card applications and compliant integrated circuit cards (ICC) can be used interchangeably by all information processing systems across Federal agencies. The specification defines PIV data element identifiers, structure, and format. This specification also describes the client-application programming interface and the card command interface for use of the PIV Card. This document does not address the back-end processes that must be performed to attain full identity assertion.
This document specifies the PIV data model, Application Programming Interface (API), and card interface requirements necessary to comply with the mandated use cases, as defined in Section 6 of FIPS 201 and further elaborated in Section 1.7 below, for interoperability across deployments or agencies....
See full abstract
This document specifies the PIV data model, Application Programming Interface (API), and card interface requirements necessary to comply with the mandated use cases, as defined in Section 6 of FIPS 201 and further elaborated in Section 1.7 below, for interoperability across deployments or agencies. Interoperability is defined as the use of PIV identity credentials such that client-application programs, compliant card applications and compliant integrated circuit cards (ICC) can be used interchangeably by all information processing systems across Federal agencies. The specification defines PIV data element identifiers, structure, and format. This specification also describes the client-application programming interface and the card command interface for use of the PIV Card. This document does not address the back-end processes that must be performed to attain full identity assertion.
Hide full abstract
Keywords
authentication; computer security; personal identity verification; smart card
Control Families
None selected