This standard defines a common set of Application Programming Interface (API) functions to access the WIC benefits on a smart card in the retailer environment; a common method (card discovery mechanism) to identify the issuer of the WIC EBT benefits and the WIC EBT scheme present on the smart card and, an interface to the card reader device that transmits and receives data from the WIC EBT smart card. The reference implementation provided by the WIC authority shall utilize this standard. This standard does not specify the reader driver used by the retailer application but it defines interfaces that may be implemented for the WIC module to access function of the Reader Driver Module (RDM). The use of pseudo Interface Definition Language (IDL) in this standard allows simpler definition of the API functions and their interface in a language independent manner. This standard does not define how WIC-EBT benefits are arranged on the card, the movement of security data or key management.
定价: 546元 / 折扣价: 465 元 加购物车
This standard defines the command set extensions to facilitate operation of SCSI direct-access block devices. The clauses of this standard, implemented in conjunction with the applicable clauses of SPC-3, fully specify the standard command set for SCSI direct-access block devices. The objective of this standard is to: a) permit an application client to communicate over a SCSI service delivery subsystem with a logical unit that declares itself to be a direct-access block device in the PERIPHERAL DEVICE TYPE field of the standard INQUIRY data (see SPC-3); and b) define commands unique to the direct-access block device type.
定价: 570元 / 折扣价: 485 元 加购物车
This standard assumes that the reader is familiar with the conventional INT 13h interface, the usage of the BIOS Device Parameter Table, and the basic operation of mass storage devices. This standard describes in detail BIOS functions and data structures that are used as an abstraction layer to allow higher-level applications to access mass storage devices in an interface and command-set independent manner. To comply with this standard, higher-level software shall call the INT functions using the data structures described herein, and system firmware shall provide the INT functions and data structures described herein. The storage industry has increased the capacity and functionality of many types of mass storage devices. This increase in capacity and functionality has required the development of a BIOS interface. This standard documents the BIOS interface that is supplied by many BIOS vendors. This standard defines solutions to the following INT 13h BIOS-specific issues: The INT 13h interface has a limit of 528 megabytes (MB); The INT 13h interface allows more than two devices to be attached to a system but has no consistent method for storing the additional configuration parameters; The INT 13h interface does not define CHS-independent methods for addressing devices. The methods defined by the INT 13h interface are not device-geometry independent. A different method of address representation and operation is needed; Methods of data transfer continue to be added to ATA devices. Capabilities such as, DMA modes, multisector data transfers and PIO modes are not reported to the operating system via the INT 13h interface; Systems require more than two storage devices, and with this requirement comes the requirement to assign the order in which the devices are to be accessed. The INT 13 interface does not provide this capability; The INT 13h interface does not make location and configuration information available to operating systems that do not use the BIOS to access mass storage devices; The INT 13h interface does not provide a linkage between the BIOS device assignments on the operating system device letter assignments; The INT 13h interface does not use data structures that apply to both IA-32 and IA-64 compatible architecture systems.
定价: 570元 / 折扣价: 485 元 加购物车
This Standard defines a structure to properly identify security features using automation. The Standard enables the incorporation of standard and proprietary security features into the original check by providing a trigger and identification structure. The Standard provides a means of registering security features for use within this Standard, however it does not specify the aspects of security features.
定价: 546元 / 折扣价: 465 元 加购物车
This Standard specifies a data interchange format for representation of digitized sign or signature data, for the purposes of biometric enrollment, verification or identification through the use of Raw Signature/Sign Sample Data or Common Feature Data. The data interchange format is generic, in that it may be applied and used in a wide range of application areas where electronic signs or signatures are involved. No application-specific requirements or features are addressed in this standard.
定价: 570元 / 折扣价: 485 元 加购物车
This standard defines a set of SCSI command descriptor blocks that are useful in accessing and controlling devices with a peripheral device type set to 5. This command set is transport independent and may be implemented across a wide variety of environments for which a SCSI transport protocol has been defined. To date, these include Parallel SCSI, ATA/ATAPI, Serial ATA, Universal Serial Bus (USB versions 1.1 and 2.0), and High Performance Serial Bus (IEEE 1394, 1394A, and 1394B). The command set described has been selected for correct operation when the physical interface is ATA with the ATAPI command protocol. Although some commands are also described in the SPC-3, the descriptions are also in this standard for the purpose of profiling mandatory and optional command features as applied to multimedia devices. The objective of this command set is to provide for the following: -A definition of the command formats and functions independent of delivery, protocol/signaling or transport mechanism. Architectural constraints regarding command functions, over the various transports, are addressed in the document specific to the physical transport. -Standardized access to common features of devices employed in multimedia applications. -System software/firmware independence across device classes and physical interfaces. Provision is made for the addition of special features and functions through the use of vendor specific options. -Compatibility such that properly conforming devices may interoperate with subsequent devices.
定价: 570元 / 折扣价: 485 元 加购物车
Defines the model and command set extensions to facilitate operation of automation/drive interface devices. The clauses of this standard, implemented in conjunction with the applicable clauses of SPC-2 and SPC-3, fully specify the standard command set for automation/drive interface devices.
定价: 570元 / 折扣价: 485 元 加购物车
This International Standard defines a schema describing the portrayal of geographic information in a form understandable by humans. It includes the methodology for describing symbols and mapping of the schema to an application schema. It does not include standardization of cartographic symbols, and their geometric and functional description.
定价: 475元 / 折扣价: 404 元 加购物车
In the current state of the art in public key cryptography, all methods require, in one way or another, the use of prime numbers as parameters to the various algorithms. This document presents a set of accepted techniques for generating primes. It is intended that ASC X9 standards that require the use of primes will refer to this document, rather than trying to define these techniques on a case-by-case basis. Standards, as they exist today, may differ in the methods they use for parameter generation from those specified in this document. It is anticipated that as each existing ASC X9 standard comes up for its 5-year review, it will be modified to reference this document instead of specifying its own techniques for generating primes. This standard defines methods for generating large prime numbers as needed by public key cryptographic algorithms. It also provides testing methods for testing candidate primes presented by a third party. This standard allows primes to be generated either deterministically or probabilistically, where:?A number shall be accepted as prime when a probabilistic algorithm that declares it to be prime is in error with probability less than 2?00.?A deterministic prime shall be generated using a method that guarantees that it is prime. In addition to algorithms for generating primes, this standard also presents primality certificates for some of the algorithms where it is feasible to do so. The syntax for such certificates is beyond the scope of this document. Primality certificates are never required by this standard. Primality certificates are not needed when a prime is generated and kept in a secure environment that is managed by the party that generated the prime. A requirement placed upon the use of this standard, but out of scope, is as follows:?When a random or pseudo-random number generator is used to generate prime numbers, an ANSI approved random number (or bit) generator (i.e., one that is specified in an ANSI X9 standard) shall be used. This requirement is necessary to ensure security. NOTE鵗he 2-100 failure probability is selected to be sufficiently small that errors are extremely unlikely ever to occur in normal practice. Moreover, even if an error were to occur when one party tests a prime, subsequent tests by the same or other parties would detect the error with overwhelming probability. Furthermore, the 2-100 probability is an upper bound on the worst-case probability that a test declares any non-prime candidate to be prime; not all non-primes may reach this bound, and the probability that a non-prime generated at random passes such a test is much lower. Accordingly, the 2-100 bound is considered appropriate independent of the size of the prime being generated and the intended security level of the cryptosystem in which the prime is to be employed. For high-assurance applications, however, the deterministic methods may nevertheless be preferable.
定价: 910元 / 折扣价: 774 元 加购物车
This technical report is intended to document interoperability behavior for Fabric elements (i.e., E_Port, F_Port, FL_Port). The scope of this technical report is to include a wide range of issues such as link initialization, error detection, error recovery, Fabric operation, management capabilities, and zoning
定价: 570元 / 折扣价: 485 元 加购物车
Defines a conceptual schema for the spatial characteristics of coverages. Coverages support mapping from a spatial, temporal or spatiotemporal domain to feature attribute values where feature attribute types are common to all geographic positions within the domain.
定价: 1358元 / 折扣价: 1155 元 加购物车
ISO 19123:2005 defines a conceptual schema for the spatial characteristics of coverages. Coverages support mapping from a spatial, temporal or spatiotemporal domain to feature attribute values where feature attribute types are common to all geographic positions within the domain. A coverage domain consists of a collection of direct positions in a coordinate space that may be defined in terms of up to three spatial dimensions as well as a temporal dimension. Examples of coverages include rasters, triangulated irregular networks, point coverages and polygon coverages. Coverages are the prevailing data structures in a number of application areas, such as remote sensing, meteorology and mapping of bathymetry, elevation, soil and vegetation. ISO 19123:2005 defines the relationship between the domain of a coverage and an associated attribute range. The characteristics of the spatial domain are defined whereas the characteristics of the attribute range are not part of ISO 19123:2005.
定价: 546元 / 折扣价: 465 元 加购物车