{"id":409318,"date":"2024-10-20T05:34:58","date_gmt":"2024-10-20T05:34:58","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-tr-232492022\/"},"modified":"2024-10-26T10:13:58","modified_gmt":"2024-10-26T10:13:58","slug":"bsi-pd-iso-tr-232492022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-tr-232492022\/","title":{"rendered":"BSI PD ISO\/TR 23249:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5 Existing taxonomies and conceptual architectures 5.1 General 5.2 NIST Taxonomic approach for blockchain IDMS 5.2.1 General 5.2.2 Authority model <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.2.3 Custody and delegation <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.2.4 Identifier origination schemes <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.2.5 Credential architectures <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.3 Functional role of DLT in identity systems 5.4 Trust Over IP Foundation 6 Existing DLT systems for identity management 6.1 General 6.2 uPort <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.3 Decentralized Identity Foundation (DIF) <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.4 Alastria ID <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.5 European Self Sovereign Identity Framework (ESSIF) <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.6 SovrinTM Network, Hyperledger Indy, Hyperledger Aries and Hyperledger Ursa <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 6.7 WEF Known Traveller Digital Identity (KTDITM) <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 6.8 WeIdentity <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 6.9 Masterchain 6.9.1 General <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 6.9.2 Actors in the system 6.10 LACChain <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 6.11 Decentralised digital architecture based on blind signatures 6.11.1 General <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 6.11.2 Actors in the system 6.11.3 Functions in the system <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 6.11.4 Flow of messages in the system <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 7 Existing relevant standards and frameworks <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Blockchain and distributed ledger technologies. Overview of existing DLT systems for identity management<\/b><\/p>\n |