EN 1038:1995
(Main)Identification card systems - Telecommunication applications - Integrated circuit(s) card payphone
- BACK
- 21-Nov-1995
- 13-Apr-2025
- 35.240.15
- CEN/TC 224
Identification card systems - Telecommunication applications - Integrated circuit(s) card payphone
This European Standard specifies the application dependent, IC card characteristics for a payphone application. This European Standard does not define the application independent characteristics. They are defined and described in EN 726-3 and EN 726-4. This European Standard defines the operating procedures and the minimal cardphone requirements for the card related part of the payphone application.
Identifikationskartensysteme - Telekommunikationsanwendungen - Telefone mit Bezahlfunktion mittels Chipkarten
Systèmes de cartes d'identification - Applications pour les télécommunications - Publiphone à carte à circuit intégré
La présente norme européenne définit les caractéristiques propres à une application publiphone dans une carte à circuit intégré. Elle ne décrit pas les caractéristiques indépendantes des applications. Celles-ci sont définies et décrites dans l'EN 726-3 et l'EN 726-4. La présente norme européenne définit les procédures opératoires et les exigences minimales des publiphones à cartes pour ce qui est de la partie carte de l'application publiphone.
Identification card systems - Telecommunication applications - Integrated circuit(s) card payphone
General Information
Standards Content (Sample)
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.Identification card systems - Telecommunication applications - Integrated circuit(s) card payphoneIdentifikationskartensysteme - Telekommunikationsanwendungen - Telefone mit Bezahlfunktion mittels ChipkartenSystemes de cartes d'identification - Applications pour les télécommunications - Publiphone a carte a circuit intégréIdentification card systems - Telecommunication applications - Integrated circuit(s) card payphone35.240.15Identifikacijske kart
...
This May Also Interest You
1.1 Objective
This document is intended for the use of breeder document issuing authorities both policymakers and technical, for having uniform formats that conform to printed as well as digital requirements of CEN member and associated states (including EU member states).
The objectives are:
a) provision of a common set of formats of breeder documents – printed and digital to be implemented by CEN member and associated states (including EU member states), with the extended objective of their acceptance internationally;
b) the focus is on having common recognizable formats as well as prevention of identity fraud, particularly related to the use of breeder documents to obtain national and international ID documents, such as passports, and residence permits.
1.2 Human dimension of identity management
Each country’s identity management system also provides a framework for observing and protecting many of the human rights embodied in international declarations and conventions. Depending on the provisions in place, the system can ensure that citizens can exercise a wide range of rights, such as rights to property, privacy, freedom of movement and free choice of place of residence, as well as access to social services such as education, healthcare and social security. In states with more advanced technological infrastructure, population registration provides the basis for the establishment of a number of citizen-oriented computerized services, also known as e-services and e-government. Identity management is also central to prevention of discrimination in exercising guaranteed rights.
The identity management infrastructure provides the backbone for a functioning and viable state by securing civil, population and tax registers, as well other systems such as healthcare benefits, voter lists and the issuance of travel and identity documents based on verifiable identities. Such flaws may become visible during elections, where shortcomings in voter lists can affect confidence in the election process. In essence, a secure identity management system can be seen as the foundation, a root level, that is able to then feed into and help numerous other branches of key state services function effectively and accurately (OSCE, 2017, p.13) [27].
1.3 Security dimension of identity management
One of the key elements of a secure environment for cross-border travel is that the travel documents used by visitors meet international standards in terms of security of the document itself and security in that the document reflects the genuine identity of its holder. Similarly, the systems for issuing travel documents need to be linked to identity management systems to streamline decision-making processes, preferably through modernized systems that reflect developments in document security technology. As entries in registers or officially issued identification documents provide access to specific services, criminal networks are constantly looking for possible gaps in identity management systems to obtain genuine documents under fabricated or stolen identities. Documents obtained as result of gaps in identity management have enabled criminals to target business entities and cause significant financial losses through the use of genuine documents issued to non-existent identities (OSCE, 2017, p.14) [27].
Both legal and illegal immigration breeder docs are regularly used to determine an identity if no MRTD or eMRTD is presented. An identity which will be printed on an eRP, Foreigners ppt, Refugees travel doc etc. unless other supportive evidence of identity is provided.
Organized crime has not overlooked this and fraudulently obtained or falsified travel documents are regularly presented to hide the true identity.
Since a significant portion of the world’s population cannot reliably prove their identity, they rely on verbally presented identities and/or supportive breeder documents when registering in another country.
Asylum applicants who...
- Draft69 pagesEnglish languagesale 10% offe-Library read for×1 day
- 19-Aug-2025
- 35.240.15
- CEN/TC 224
This document defines requirements and provides guidance on:
• capturing of facial images to be used for verification or identification purposes in applications based on reference images in identity or similar documents and traveller or visa databases;
• capturing of fingerprint images to be used for verification or identification purposes in applications based on reference images in identity or similar documents and traveller or visa databases;
• data quality maintenance for biometric data captured by/for verification or identification applications;
• data authenticity maintenance for biometric data captured by/for verification or identification ap-plications.
This document addresses the following aspects which are specific for biometric data capturing:
• biometric data quality and interoperability assurance;
• data authenticity assurance;
• morphing and other presentation attacks and biometric data injection attacks;
• accessibility and usability;
• recognition algorithms and their evaluation;
• privacy and data protection;
• optimal process design.
The following aspects are out of scope:
• other aspects of IT security;
• data capturing for ID document enrolment purposes, e.g. passport or ID card enrolment.
- Technical specification30 pagesEnglish languagesale 10% offe-Library read for×1 day
- 29-Apr-2025
- 35.240.15
- CEN/TC 224
This document specifies the abstract data model for breeder document data and the specific encodings of this abstract data model used in the CEN breeder document framework.
The abstract data model is a semantic description of the birth, marriage / partnership, and death certificate data, independently from their specific encoding. This abstract data model is extensible for further standardized and proprietary data of birth, marriage / partnership, and death certificates as well as for other types of breeder documents.
This abstract data model is technology agnostic, i.e. it is applicable for paper-based, server-based, and hardware-based breeder documents as well as further breeder document designs and technologies.
The specific encodings of this abstract data model comprise the encodings to be used for the machine readable technologies specified in part 3 of the framework as well as the encoding of human readable breeder document data. These encodings are used in the birth, marriage / partnership, and death certificate profiles specified in part 4 of the framework.
- Technical specification25 pagesEnglish languagesale 10% offe-Library read for×1 day
- 10-Dec-2024
- 35.240.15
- CEN/TC 224
This document provides an overview on:
- Definitions on Biometric Data Injection Attack,
- Biometric Data Injection Attack use case on main biometric system hardware for enrolment and verification,
- Injection Attack Instruments on systems using one or several biometric modalities.
This document provides guidance on:
- System for the detection of Injection Attack Instruments (defined in 3.12),
- Appropriate mitigation risk of Injection Attack Instruments,
- Creation of test plan for the evaluation of Injection Attack Detection system (defined in 3.9).
If presentation attacks testing is out of scope of this document, note that these two characteristics are in the scope of this document:
- Presentation Attack Detection systems which can be used as injection attack instrument defence mechanism and/or injection attack method defence mechanism. Yet, no presentation attack testing will be performed by the laboratory to be compliant with this document (out of scope).
- Bona Fide Presentation testing in order to test the ability of the Target Of Evaluation to correctly classify legitimate users.
The following aspects are out of scope:
- Presentation Attack testing (as they are covered in ISO/IEC 30107 standards),
- Biometric attacks which are not classified as Type 2 attacks (see Figure 1),
- Evaluation of implementation of cryptographic mechanisms like secure elements,
- Injection Attack Instruments rejected due to quality issues.
- Technical specification37 pagesEnglish languagesale 10% offe-Library read for×1 day
- 26-Nov-2024
- 35.030
- 35.240.15
- CEN/TC 224
This document provides guidance on usage of biometrics in breeder documents, in particular regarding
- encoding of biometric reference data;
- data quality maintenance for biometric reference data;
- data authenticity maintenance for biometric reference data; and
- privacy preservation of biometric reference data.
This document addresses advantages and disadvantages of biometric modes, in particular regarding
- verification performance;
- privacy impact;
- feasibility of biometric acquisition considering the age of the capture subjects;
- limits of validity and need for updating biometric reference data.
The following aspects are out of scope:
- format and structure of breeder documents;
- general security aspects, which are covered in CEN/TS 17489-1 [1].
- Technical report18 pagesEnglish languagesale 10% offe-Library read for×1 day
- 17-Sep-2024
- 35.240.15
- CEN/TC 224
This Technical Report provides an overview of the current deployment of biometric systems within Europe. It addresses the challenges that are being faced, in order to detect the current needs for improving the specifications for the implementation and deployment of biometric systems. This Technical Report considers all kind of deployments, from border control to ad-hoc services. As most of the deployed systems are based on the use of fingerprints or face recognition, this Technical Report will focus on these two biometric modalities, from the system integrator and interoperability points of view.
Identity documents, in terms of production, structure, interoperability, etc., are out of the scope of this TR. The TR is focused on the performance at system level.
The current European legislative initiatives around this topic (e.g., Entry/Exit System, framework for interoperability between EU information systems, etc.) need a robust framework study about the availability of standard technologies to improve interoperability in biometric products around the European Union.
By showing these needs, a set of recommendations for future standardization works is provided.
From a methodological perspective, the report gathers information of different entities with this classification:
- Capture/enrolment of biometrics including the quality assurance and the generation of feature or biometric models from the images.
- Best practices and guidelines to use biometrics in Europe.
- Data Quality environment using biometrics in European networks.
- Technical report33 pagesEnglish languagesale 10% offe-Library read for×1 day
- 19-Dec-2023
- 35.240.15
- 2016/679
- M/487
- CEN/TC 224
This document identifies relevant existing standards and standards work in progress around European Digital Identity Wallets. It also identifies missing work items and overlaps in standards and is supposed to work as a roadmap for future standardization projects in the area.
- Technical report39 pagesEnglish languagesale 10% offe-Library read for×1 day
- 26-Sep-2023
- 35.030
- 35.240.15
- 910/2014
- CEN/TC 224
This document establishes a systematic description of the concepts in the field of biometrics pertaining to recognition of human beings. This document also reconciles variant terms in use in pre-existing International Standards on biometrics against the preferred terms, thereby clarifying the use of terms in this field.
This document does not cover concepts (represented by terms) from information technology, pattern recognition, biology, mathematics, etc. Biometrics uses such fields of knowledge as a basis.
In principle, mode-specific terms are outside of scope of this document.
- Standard42 pagesEnglish languagesale 10% offe-Library read for×1 day
- 19-Sep-2023
- 01.040.35
- 35.020
- 35.240.15
- CEN/TC 224
This document consolidates information relating to successful and high quality biometric enrolment processes of facial and fingerprint systems, while indicating risk factors and providing appropriate mitigations. This information supports decisions regarding procurement, design, deployment and operation of these biometric systems.
This document provides guidance on:
— capturing of facial images to be used as reference images in identity and secure documents;
— capturing of fingerprint images to be used as reference images in identity and secure documents;
— data quality maintenance for biometric reference data;
— data authenticity maintenance for biometric reference data.
The document addresses the following aspects which are specific for biometric reference data capturing:
— biometric data quality and interoperability ensurance;
— data authenticity ensurance;
— morphing and other presentation attack detection as well as other unauthorized changes;
— accessibility and usability;
— privacy and data protection;
— optimal enrolment design.
The following aspects are out of scope:
— IT security;
— data capturing for verification purposes, e.g. in ABC gates;
— capturing biometric data for enrolment in other systems different from data enrolment for integration in secure MRTD, like entry/exit systems.
This document consolidates the role of the enrolment process in a biometric system and differentiates the enrolment from the authentication, while mentioning key factors of the enrolment process that are feature independent.
Interests of the existing stakeholders are broken down and provide an insight on different views of the enrolment. In addition, organisational enrolment approaches are covered.
This document is not concerned with IT requirements or the capturing of biometric data for inspection, identification or verification purposes without the required step of creating an identity document using the captured data.
- Technical specification73 pagesEnglish languagesale 10% offe-Library read for×1 day
- 23-Nov-2021
- 35.240.15
- CEN/TC 224
This document provides guidance on providing access:
— to areas with physical access control, e.g. entertainment facilities, train stations, shops, libraries, banks, or border control,
— for small groups of persons, e.g. families with small children or seniors, or other accompanied persons in need of support,
— by means of biometric authentication technologies, e.g. facial, fingerprint, or vein recognition,
— in the European regulatory context.
The document addresses the following aspects, which are specific for biometric and group access:
— accessibility and usability,
— user guidance including group guidance and interaction control,
— privacy including data set content,
— presentation attack detection,
— applicable biometric technologies,
— storage of reference data,
— biometric process integration,
— specific needs considering biometrics for groups,
— biometric performance and error rates, and
— group internal linkage.
The following aspects which reflect on generic access control issues are out of scope:
— IT security,
— application specific physical security,
— policy definition,
— processes not related to biometric authentication, and
— specific performance requirements of identification (1:N) and verification (1:1) applications.
- Technical specification18 pagesEnglish languagesale 10% offe-Library read for×1 day
- 15-Jun-2021
- 35.240.15
- CEN/TC 224
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.