Overview#
AKA Chip CardSmart Card Security#
Two standardized approaches are Federal Information Processing Standard 140 (FIPS 140) and the Common Criteria for Information Technology Security Evaluation (CC).FIPS 140 specifies the requirements for cryptographic modules used by departments and agencies of the United States federal government. FIPS 140 defines four levels of security that require increasing security features.
Common Criteria for Information Technology Security Evaluation (CC) is an internationally approved security evaluation framework (ISO/IEC 15408) currently recognized by 25 countries.
More Information#
There might be more information for this subject on one of the following:- Authentication Method Reference Values
- Authentication intent
- Camellia
- Chip Card
- Common Access Card
- CredSSP
- E-residency
- FIDO Authenticator
- Gemalto
- Group Signatures
- Host Card Emulation
- IDM Related Compliance Items
- Identify and Authenticate access to system components
- Java Card
- LSA Protection
- Local Security Authority Subsystem Service
- NMAS
- Near Field Communication
- OpenID
- PKCS 11
- Remote Authentication Dial-In User Service
- Session Management
- Subscriber Identification Module
- Trusted Execution Environment
- U-Prove
- Universal Integrated Circuit Card
- Universal Second Factor
- User-Account-Control Attribute Values
- Who Owns the Data
- Windows Credential Provider
- Yubico
- Yubikey NEO