This part of EN 1546 gives an overview of an IEP System by describing the participants, physical devices and functions needed. The models presented here are the most general ones, and simpler systems ("closed systems") can be designed by selecting subsets of the functionality described. However, this could also lead to limitations in interoperability.

  • Standard
    34 pages
    English language
    sale 10% off
    e-Library read for
    1 day

This part of EN 1546 defines the Tag values required and describes the Dictionary mechanisms necessary for their utilisation in order to achieve interoperability between IEP Systems where Data Elements have different lengths and/or the ordering of Data Elements in commands and responses is different from that defined in EN 1546-3. The mechanisms are based on TLV (Tag-length-value) definitions of each Data Element.

  • Standard
    29 pages
    English language
    sale 10% off
    e-Library read for
    1 day

This part of prEN 1546 defines the detailed security architecture for IEP systems as they are described in prEN 1546-1. It also describes the application protocols the use of cryptographic algorithms and some underlying assumptions concerning the key management necessary to implement IEP systems with sufficient security levels. The general architecture described here allows many types of implementation. It should be noted that the informative annexes of this standard focus on particular implementations.

  • Standard
    105 pages
    English language
    sale 10% off
    e-Library read for
    1 day

This part of prEN 1546 provides the necessary information on the data elements to be stored and exchanged in order to enable IEP Systems conforming to this standard to be interoperable. The transaction types involving IEPs as defined in prEN 1546-1 (Definitions, concepts and structures) and prEN 1546-2 (Security architecture) are covered by this part of prEN 1546.

  • Standard
    76 pages
    English language
    sale 10% off
    e-Library read for
    1 day