Integrated Services Digital Network (ISDN); Security tools (SET) for use within telecommunication services

Description of security mechanisms for networks like ISDN including confidentiality authentication access control, authorization procedures - Identification of necessary levels of security

Digitalno omrežje z integriranimi storitvami (ISDN) – Varnostna orodja (SET) za uporabo v telekomunikacijskih storitvah

General Information

Status
Published
Publication Date
30-Nov-2003
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
01-Dec-2003
Due Date
01-Dec-2003
Completion Date
01-Dec-2003

Buy Standard

Standard
EN 301 132 V1.1.1:2003
English language
14 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.Digitalno omrežje z integriranimi storitvami (ISDN) – Varnostna orodja (SET) za uporabo v telekomunikacijskih storitvahIntegrated Services Digital Network (ISDN); Security tools (SET) for use within telecommunication services33.080Digitalno omrežje z integriranimi storitvami (ISDN)Integrated Services Digital Network (ISDN)ICS:Ta slovenski standard je istoveten z:EN 301 132 Version 1.1.1SIST EN 301 132 V1.1.1:2003en01-december-2003SIST EN 301 132 V1.1.1:2003SLOVENSKI
STANDARD



SIST EN 301 132 V1.1.1:2003



EN 301 132 V1.1.1 (1998-10)European Standard (Telecommunications series)Integrated Services Digital Network (ISDN);Security tools (SET) for use within telecommunication servicesSIST EN 301 132 V1.1.1:2003



ETSIEN 301 132 V1.1.1 (1998-10)2ReferenceDEN/NA-020036 (ahc00ico.PDF)KeywordsISDN, securityETSIPostal addressF-06921 Sophia Antipolis Cedex - FRANCEOffice address650 Route des Lucioles - Sophia AntipolisValbonne - FRANCETel.: +33 4 92 94 42 00
Fax: +33 4 93 65 47 16Siret N° 348 623 562 00017 - NAF 742 CAssociation à but non lucratif enregistrée à laSous-Préfecture de Grasse (06) N° 7803/88Internetsecretariat@etsi.frhttp://www.etsi.orgCopyright NotificationNo part may be reproduced except as authorized by written permission.The copyright and the foregoing restriction extend to reproduction in all media.© European Telecommunications Standards Institute 1998.All rights reserved.SIST EN 301 132 V1.1.1:2003



ETSIEN 301 132 V1.1.1 (1998-10)3ContentsIntellectual Property Rights.4Foreword.41Scope.52References.52.1Normative references.52.2Informative references.63Definitions and abbreviations.63.1Definitions.63.2Abbreviations.64General aspects.74.1Description.74.2Procedures.74.2.1Provision and withdrawal.74.2.2Activation, deactivation and registration.84.2.3Erasure.84.2.4Invocation and operation.84.2.5Interrogation.84.3Intercommunication considerations.85Security Tools (SET).85.1Personal Identification Number (PIN).85.1.1Description.85.1.2Provision and withdrawal.95.1.3Normal procedures.95.1.3.1Registration and erasure.95.1.3.2Activation, deactivation.95.1.3.3Invocation and operation.105.1.3.4Interrogation.105.1.4Exceptional procedures.105.1.4.1Activation, deactivation and registration.105.1.4.2Erasure.105.1.4.3Invocation and operation.105.1.4.4Interrogation.115.2Transaction Number (TAN).115.2.1Description.115.2.2Provision and withdrawal.115.2.3Procedures.125.2.3.1Activation, deactivation and registration.125.2.3.2Erasure.125.2.3.3Invocation and operation.125.2.3.4Interrogation.125.2.4Exceptional procedures.125.2.4.1Activation, deactivation and registration.125.2.4.2Erasure.125.2.4.3Invocation and operation.125.2.4.4Interrogation.13History.14SIST EN 301 132 V1.1.1:2003



ETSIEN 301 132 V1.1.1 (1998-10)4Intellectual Property RightsIPRs essential or potentially essential to the present document may have been declared to ETSI. The informationpertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be foundin SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respectof ETSI standards", which is available free of charge from the ETSI Secretariat. Latest updates are available on theETSI Web server (http://www.etsi.org/ipr).Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guaranteecan be given as to the existence of other IPRs not referenced in SR 000 314 (or the updates on the ETSI Web server)which are, or may be, or may become, essential to the present document.ForewordThis European Standard (Telecommunications series) has been produced by ETSI Technical Committee NetworkAspects (NA).National transposition datesDate of adoption of this EN: 30 October 1998Date of latest announcement of this EN (doa): 31 January 1999Date of latest publication of new National Standardor endorsement of this EN (dop/e): 31 July 1999Date of withdrawal of any conflicting National Standard (dow): 31 July 1999SIST EN 301 132 V1.1.1:2003



ETSIEN 301 132 V1.1.1 (1998-10)51ScopeThe present document is a description of Security Tools (SET) for use within ISDN telecommunication services fromthe user's point of view. It does not deal with the details of the human interface itself.NOTE 1:The SETs are in principle application independent. Although they are designed for the use within ISDN,they could be applicable to other networks such as B-ISDN or PSTN depending on the requirements forthe telecommunication service to be protected and the service provider's decision.Charging principles are outside the scope of the present document.The use of one of the SET helps in providing an appropriate level of security for a given ISDN telecommunicationservices.NOTE 2:The present document describes two security tools for the use in ISDN, i.e. Personal IdentificationNumber (PIN) and Transaction Number (TAN). These are intended to be used for the Integrated ServicesDigital Network (ISDN) Remote Control (RC) service and Outgoing Call Barring – User Controlled(OCB-UC) supplementary service. Due to the increasing demand for enhanced security mechanisms intelecommunication services, more tools may be added in future versions of the standard. Possiblecandidates for the use within N-ISDN are described in ETR 237 [4].The present document is applicable to the stage two and stage three standards for the ISDN Security Tools. The terms"stage two" and "stage three" are also defined in CCITT Recommendation I.130 [2]. Where the text indicates the statusof a requirement (i.e. as strict command or prohibition, as authorization leaving freedom, as a capability or possibility),this shall be reflected in the text of the relevant stage two and stage three standards.Furthermore, conformance to the present document is met by conforming to the stage three standards with the field ofapplication appropriate to the equipment being implemented. Therefore, no method of testing is provided for the presentdocument.2ReferencesReferences may be made to:a)specific versions of publications (identified by date of publication, edition number, version number, etc.), inwhich case, subsequent revisions to the referenced document do not apply; orb)all versions up to and including the identified version (identified by "up to and including" before the versionidentity); orc)all versions subsequent to and including the identified version (identified by "onwards" following the versionidentity); ord)publications without mention of a specific version, in which case the latest version applies.A non-specific reference to an ETS shall also be taken to refer to later versions published as an EN with the samenumber.2.1Normative references[1]ITU-T Recommendation I.112 (1993): "Vocabulary of terms for ISDNs".[2]CCITT Recommendation I.130 (1988): "Method for the characterization of telecommunicationservices supported by an ISDN and network capabilities of an ISDN".[3]ETR 232 (1996): "Security Technical Advisory Group (STAG); Glossary of security terminology".[4]ETR 237 (1996): "Security Technical Advisory Group (STAG); Baseline security standards;Features and mechanisms".SIST EN 301 132 V1.1.1:2003



ETSIEN 301 132 V1.1.1 (1998-10)6[5]ETR 236 (1996): "Security Technical Advisory Group (STAG); A guide to the ETSI securitystandards policy".[6]TCR-TR 49: "Security Technical Advisory Group (STAG); Security requirements capture".[7]ETS 300 391-1 (1995): "Universal Personal Telecommunication (UPT); Specification of thesecurity architecture for UPT phase 1; Part 1: specification".2.2Informative referencesNone3Definitions and abbreviations3.1DefinitionsFor the purposes of the present document, the following definitions in addition to those contained in ETR 232 [3] apply:telecommunication service: see ITU-T Recommendation I.112 [1], subclause 2.2, definition 201. In the context of thepresent document, the term telecommunication service includes basic services, teleservices and supplementary services.confidential information: the information that is necessary to make use of a SET.Integrated Services Digital Network (ISDN): see ITU-T Recommendation I.112 [1], subclause 2.3, definition 308.network operator: the entity which provides the network operating elements and resources for the execution of theSecurity Tool.Security Tool (SET): a tool provided in support of the security of a service.served user: the user to whom a SET is provided to in combination with a telecommunication service.Transaction Number (TAN): a TAN is a one time password.3.2AbbreviationsFor the purposes of the present document, the following abbreviations apply:(N)-ISDN(Narrowband)-Integrated Services Digital NetworkB-ISDNBroadband Integrated Services Digital NetworkDTMFDual Tone Multi F
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.