ISO/IEC 24643:2020
(Main)Architecture for a distributed real-time access system
Architecture for a distributed real-time access system
This Standard specifies the architecture for a distributed real-time access system. The architecture specifies the function group concept of the system, functionalities of each function group, and interfaces. Communication between function group and functions are not in the scope of this Standard.
Architecture d'un système d'accès temps réel distribué
General Information
- Status
- Published
- Publication Date
- 22-Nov-2020
- Technical Committee
- ISO/IEC JTC 1 - Information technology
- Drafting Committee
- ISO/IEC JTC 1 - Information technology
- Current Stage
- 9020 - International Standard under periodical review
- Start Date
- 15-Oct-2025
- Completion Date
- 15-Oct-2025
Relations
- Effective Date
- 09-Dec-2023
Overview - What ISO/IEC 24643:2020 covers
ISO/IEC 24643:2020 defines the architecture for a distributed real‑time access system. It specifies a functional, modular reference architecture for access control systems that make timely decisions to permit or deny access (for example building entrances, hotel check‑ins, ATMs, e‑voting). The standard focuses on the function group concept, detailing the responsibilities of each function group and the interfaces between them. It does not prescribe communication protocols between functions nor the internal implementation of processing functions.
Key topics and technical requirements
- Functional architecture: A clear division into function groups (Physical, Network/Telecommunication, Service, Platform, Application) with defined roles for each group.
- Core components: Definitions and identifiers for access object, access point, edge/edge node, access ID, access object ID, and transaction.
- Transaction flow: Real‑time transaction lifecycle from access object → access point → processing functions → final judgement → result returned to access point.
- Platform services: Policy function, authentication and access object data management, system data and inter‑application interfaces to manage rules and message flows.
- Interfaces: Specified interactions between function groups (Physical ↔ Network, Network ↔ Service, Service ↔ Application, inter‑application).
- Data and examples: Informative annexes provide example data formats for transaction data, authentication and access object data, and illustrative complex authentication scenarios.
- Constraints / out of scope: Protocols between functions, detailed processing activities of individual process functions, and multi‑layer concerns (security, privacy, governance) are explicitly out of scope.
Practical applications and target users
ISO/IEC 24643 is intended for organizations designing, integrating or operating distributed access control systems that require real‑time decisioning:
- System architects and solution designers creating modular, scalable access control infrastructures.
- Access control vendors and integrators implementing interoperable components (readers, edge nodes, cloud services).
- Security engineers and IT operators managing authentication, policy and transaction flows.
- Facility managers and service operators (hotels, campuses, transportation hubs, banking, e‑voting platforms) seeking guidance for distributed access deployments.
- Cloud and networking teams enabling edge‑aware deployments for low latency, high‑throughput access scenarios.
Related standards
- ECMA‑412 / ISO/IEC 20933 - Framework for distributed real‑time access systems (reference model and common control functions).
- ISO/IEC TR 23188 - referenced for the concept of “edge.”
ISO/IEC 24643:2020 is a practical architecture standard for developers and decision‑makers building scalable, real‑time distributed access systems, emphasizing modular function groups, clear interfaces, and transaction-driven processing. Keywords: ISO/IEC 24643:2020, distributed real-time access system, access control architecture, function group, authentication, edge node, access point, transaction data.
Frequently Asked Questions
ISO/IEC 24643:2020 is a standard published by the International Organization for Standardization (ISO). Its full title is "Architecture for a distributed real-time access system". This standard covers: This Standard specifies the architecture for a distributed real-time access system. The architecture specifies the function group concept of the system, functionalities of each function group, and interfaces. Communication between function group and functions are not in the scope of this Standard.
This Standard specifies the architecture for a distributed real-time access system. The architecture specifies the function group concept of the system, functionalities of each function group, and interfaces. Communication between function group and functions are not in the scope of this Standard.
ISO/IEC 24643:2020 is classified under the following ICS (International Classification for Standards) categories: 35.020 - Information technology (IT) in general. The ICS classification helps identify the subject area and facilitates finding related standards.
ISO/IEC 24643:2020 has the following relationships with other standards: It is inter standard links to ISO 18363-3:2024. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
You can purchase ISO/IEC 24643:2020 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.
Standards Content (Sample)
INTERNATIONAL ISO/IEC
STANDARD 24643
First edition
2020-11
Architecture for a distributed real-
time access system
Architecture d'un système d'accès temps réel distribué
Reference number
©
ISO/IEC 2020
© ISO/IEC 2020
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2020 – All rights reserved
Page
Contents
Foreword . .iv
Introduction . .v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Overview . 1
5 Functional architecture of an access system . 3
Physical function group . 3
5.1
Components . 3
5.1.1
Access object. 4
5.1.2
Access point . 4
5.1.3
Network layer . 5
5.2
5.2.1 Components . 5
5.2.2 Edge . . 5
5.2.3 Telecommunication network . 5
Service function group . 5
5.3
5.3.1
Components . 5
5.3.2
Processing f unctions. 6
5.3.3
Transaction data . 6
5.4 Platform function group . 6
Components . 6
5.4.1
Policy function . 7
5.4.2
Authentication and access object data . 7
5.4.3
System data . 7
5.4.4
Inter applications. 7
5.4.5
6 Interfaces . 8
Physical function group and network function group . 8
6.1
6.2 Network function group and service function group . 8
6.3 Service function group and application function group . 8
6.4 Inter applications . 8
Annex A (informative) Example of the data format. 9
A.1 Transaction data . 9
A.2 Authentication and access object data . 9
A.3 System data . 10
Annex B (informative) Example of complicated authentication . 11
B.1 Enter an important facility . 11
B.2 Electronic voting system for election . 11
B.3 Authentication process . 12
Bibliography . 13
© ISO/IEC 2020 – All rights reserved
iii
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through
technical committees established by the respective organization to deal with particular fields of
technical activity. ISO and IEC technical committees collaborate in fields of mutual interest.
Other international organizations, governmental and non‐governmental, in liaison with ISO and IEC,
also take part in the work.
The procedures used to develop this document and those intended for its further maintenance
are described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria
needed for the different types of document should be noted (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be
in the Introduction and/or on the ISO list of patent declarations received (see www.iso.org/
patents) or the IEC list of patent declarations received (see http://patents.iec.ch).
Any trade name used in this document is information given for the convenience of users and does
not constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT),
see www.iso.org/iso/foreword.html.
This document was prepared by Ecma International (as ECMA-417) and drafted in accordance with its
editorial rules. It was assigned to Joint Technical Committee ISO/IEC JTC 1, Information technology, and
adopted under the "fast-track procedure".
Any feedback or questions on this document should be directed to the user’s national standards body.
A complete listing of these bodies can be found at www.iso.org/members.html.
iv
© ISO/IEC 2020 – All rights reserved
Introduction
Technology for real‐time access control is widely used in many situations such as facility entrance
systems in a building, payments at a hotel, ATM operations or e‐voting in an election, etc. These services
benefit from real‐time access control systems connected via networks and using database information.
Sophisticated cloud, virtualization, database, networking technology and services and the evolution of
authentication technology such as biometrics, NFC, QR codes used in distributed and modular access
control systems enable previously underserved users and operators to innovate around new use cases.
For realizing such real‐time access system, an Ecma standard ECMA‐412 (also published as
International Standard ISO/IEC 20933) “Framework for distributed real‐time access systems” was first
nd
introduced in 2016 with a 2 edition following in 2018. That standard specifies the reference model
and common control functions. It gives direction for ongoing innovation and development of technology
and the system integration of distributed real‐time access control systems.
This Standard specifies the architecture for a distributed real‐time access system taking into account
the many technologies and the framework of ECMA‐412. The architecture specifies the function group
concept of the system, the functionalities of each function group and the interfaces. Protocols between
function group and functions are out of the scope of this Standard.
nd
This 2 edition introduces some clarifications and editorial improvements to the text.
This Ecma Standard was developed by Technical Committee 51 and was adopted by the General
Assembly of June 2019.
© ISO/IEC 2020 – All rights reserved v
INTERNATIONAL STANDARD ISO/IEC 24643:2020(E)
Architecture for a distributed real-time access system
1 Scope
This Standard specifies the architecture for a distributed real‐time access system. The architecture
specifies the function group concept of the system, functionalities of each function group, and interfaces.
Communication between function group and functions are not in the scope of this Standard.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
ECMA‐412, Framework for distributed real-time Access systems
ISO/IEC 20933, Information technology — Distributed application platforms and services (DAPS) —
Framework for distributed real-time access systems
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminological databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https://www.iso.org/obp
— IEC Electropedia: available at http://www.electropedia.org/
3.1
access ID
identifier of an access request
3.2
access object
physical entity which access the access system
3.3
access object ID
identifier of an access object
3.4
access point
object ID receiver from access object for starting access system activities and an access system activity
final result receiver for completion of the activities
© ISO/IEC 2020 – All rights reserved 1
3.5
access point ID
identifier of an access point
3.6
edge
boundary between pertinent digital and physical entities, delineated by networked access points
Note: see ISO/IEC TR 23188
3.7
edge node ID
identifier of an edge
3.8
transaction
suite of functions and message exchanges to generate a final result and sent to a receiver (Source:
ISO/IEC 20933)
4 Overview
A distributed real‐time access system, as described in ECMA‐412 and ISO/IEC 20933, (hereafter;
access system) is a system which decides in a timely manner to permit or deny access from an
access object and proceed with an access system service after access is granted. The access points of
the system are spatially distributed. An access system will be activated by the access of an access
object at the access point. After its validity confirmation, authentication, some services of the access
system will proceed serially and/or parallelly. When the processing of all the services is completed,
the service result is sent back to the access point. During such transaction, the series of action
should be authenticated through an authentication process, logically and physically as illustrated in
Figure 1.
Figure 1 shows an access system activity flow for an access system which is activated by the access
object access at the access point to the end of the series of actions of the system. In Figure 1, the
blue arrow shows the message(s) flow from the access object to the access point, access point
to the processor and any processor to any other processors. Those object ID messages from the access
object to the access point are used to process results messages to Process 1 and so on. At any
process functions, based on the received messages, each process function performs various
processing. The message results of each process, are accepted or denied, (process complete or
incomplete), and the result related ID(s) are sent to the next processing function.
All of the processing result messages from Process 1 to process N‐1 are sent to Process N function,
final judgement process, which decides of the final result, accept or deny. Then, the final result is
sent to the access point as a receiver of the result and completes a transaction and access system
activity. If the result of any processing function is ”deny” at any steps of an access system activity, such
messages are sent to the final judgement process. Then, the final result is judged as “deny” by the final
judge process function. The “deny” message is sent to the receiver and completes the transaction and
access system activity.
2 © ISO/IEC 2020 – All rights reserved
Au
Process 3
Access
Final
point
Access result
Process N
Process 1
Process 2
object
(final judge)
(authentication)
Access
point
Process N-1
Authenticated Area
Figure 1 — Access System Behaviour
The rules of message management and procedures of the system activities are provided by policy in the
policy function (Figure 3) of the platform function group. Those rules vary and depend on the services
and applications of each access system. Furthermore, the direction management rules of the messages
from each process are also provided by policy function and based on the rules., The message from the
access point sent to an appropriate process function is managed by an edge node. Access point result
messages will send through edge node to authentication process in the service function group. (Figure
3)
Activities of each process functions are out of the scope of this standard.
Figure 2 shows an example, a hotel‐check in process. There are many rooms in a hotel and each room
entrance access point is locked. An access object is a human in this case, who has a key card with an
object ID. When the person inserts or touches the key card at the entrance door, the access point
receives an object ID from key card then an access system, which includes an authentication process
starts. If the key card was authenticated at the hotel front desk, the authentication result, final result,
requesting access is accepted and an open the door message, final result, goes to the access point, then,
the door will open. If the key card is not authenticated, access request denied through the
authentication process and the door
...










Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...