{"id":112175,"date":"2024-10-18T16:22:49","date_gmt":"2024-10-18T16:22:49","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-iso-iec-8802-1ar-2014\/"},"modified":"2024-10-24T22:03:59","modified_gmt":"2024-10-24T22:03:59","slug":"ieee-iso-iec-8802-1ar-2014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-iso-iec-8802-1ar-2014\/","title":{"rendered":"IEEE ISO IEC 8802.1AR 2014"},"content":{"rendered":"
New IEEE Standard – Draft for an Adoption. A secure device identifier (DevID) is cryptographically bound to a device and supports authentication of the devices identity. Locally significant identities can be securely associated with an initial manufacturer-provisioned DevID and used in provisioning and authentication protocols to allow a network administrator to establish the trustworthiness of a device and select appropriate policies for transmission and reception of data and control protocols to and from the device.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | ISO\/IEC\/IEEE 8802-1AR-2014 Front Cover \n <\/td>\n<\/tr>\n | ||||||
3<\/td>\n | Foreword \n <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction \n Notice to users \n Laws and regulations \n Copyrights \n Updating of IEEE documents \n <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Errata \n Interpretations \n Patents \n <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Contents \n <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Important notice \n 1. Overview <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 1.1 Scope 1.2 Purpose 1.3 Relationship to other standards <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 2. Normative references <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 3. Definitions <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 4. Acronyms and abbreviations <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5. Conformance 5.1 Requirements terminology 5.2 Protocol Implementation Conformance Statement 5.3 Required capabilities <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 5.4 Optional capabilities 5.5 Recommended capabilities <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6. Secure Device Identifier Module 6.1 What is a device? 6.2 Components of a DevID module <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 6.3 DevID Service Interface <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 6.4 DevID Management Interface <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 6.5 PKI hierarchy requirements <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 6.6 Trust Model <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 7. DevID Credential details 7.1 DevID hierarchy credential fields 7.2 DevID credential fields <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 7.3 Cryptographic Primitives <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 8. Management Information Base 8.1 Internet-Standard Management Framework 8.2 Relationship to other MIB modules 8.3 Structure of the MIB <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 8.4 Security considerations <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 8.5 Definitions for Secure Device Identifier MIB <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | Annex A (normative) \nPICS Proforma A.1 Introduction A.2 Abbreviations and special symbols <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | A.3 Instructions for completing the PICS proforma <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | A.4 PICS proforma for IEEE 802.1AR <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | A.5 Major capabilities and options A.6 DevID Service Interface <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | A.7 DevID Management Interface A.8 DevID Supplied Information <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | Annex B (normative) \nImplementing a DevID with a TPM B.1 DevID goals <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | B.2 DevID requirements <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | Annex C (informative) \nScenarios for DevID C.1 DevID use in EAP-TLS <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | C.2 DevID uses in consumer devices C.3 DevID uses in enterprise devices <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | Annex D (informative) Bibliography \n <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | IEEE list of participants <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" ISO\/IEC\/IEEE International Standard for Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Part 1AR: Secure device identity<\/b><\/p>\n |