Академический Документы
Профессиональный Документы
Культура Документы
RECOMMENDED PRACTICE
RECOMMENDED
PRACTICE
2005-2008, IATA, ATA, ACI. All rights reserved. First edition: 03JUN2007 Acknowledgments: ActiveX is a registered trademark of Microsoft Corporation. Acrobat is a registered trademark of Adobe Systems Incorporated. Citrix is a registered trademark of Citrix Systems, Inc. Intel is a registered trademark of Intel Corporation. Intel Core is a trademark of Intel Corporation. Java and JRE are trademarks of Sun Microsystems, Inc. Windows is a registered trademark of Microsoft Corporation. Windows Vista is a trademark of Microsoft Corporation.
Contents
1. 2. 2.1. 2.2. 2.3. 2.4. 2.5. 2.6. 3. 3.1. Common Use Passenger Processing Systems............................................................. 5 Overview ....................................................................................................................... 7 Benefits of CUPPS..........................................................................................................7 CUPPS Product Strategy.................................................................................................8 CUPPS vs. CUTE Summary...........................................................................................8 CUPPS Platform Standards.............................................................................................9 CUPPS Management Oversight......................................................................................9 CUTE to CUPPS Migration............................................................................................9 CUPPS Technical Documentation Summary .......................................................... 11 General..........................................................................................................................11 3.1.1. Access to the CUPPS-TR and CUPPS-TS ..................................................11 3.1.2. CUPPS Technical Documentation Ownership ............................................11 3.1.3. Data Privacy ................................................................................................12 3.1.4. Public Data ..................................................................................................12 3.1.5. Personal Data...............................................................................................12 3.1.6. Proprietary Data...........................................................................................12 3.1.7. Usage and/or Performance Data ..................................................................13 CUPPS Logical System Architecture............................................................................13 3.2.1. CUPPS Logical System Architecture Summary..........................................13 Network.........................................................................................................................15 Hardware.......................................................................................................................16 3.4.1. Workstations................................................................................................16 3.4.2. Vendors........................................................................................................17 3.4.3. Servers .........................................................................................................18 Software ........................................................................................................................18 3.5.1. Workstations................................................................................................18 3.5.2. Servers .........................................................................................................20 Logo Repository............................................................................................................21 Roles and Responsibilities ......................................................................................... 23 4.1. 4.2. Platform Providers Responsibility...............................................................................23 Application Providers Responsibility ..........................................................................23
3.5.
3.6. 4.
CUPPS-RP-V01.00-I01.01.0003.DOC
Contents Establishment of Service Levels ...................................................................................24 Management Information and Availability Figures ......................................................24 Certification and Deployment .......................................................................................24 Applicable Industry Standards................................................................................. 25 Abbreviations and Glossary...................................................................................... 27 References................................................................................................................... 31 Index............................................................................................................................ 33
CUPPS-RP-V01.00-I01.01.0003.DOC
iii
List of Tables
Table 1.1: CUPPS Foundational Principles..................................................................................... 5 Table 2.1: CUTE vs. CUPPS Summary .......................................................................................... 8 Table 2.2: CUTE to CUPPS Migration Considerations ............................................................... 10 Table 3.1: Comparison of Data Privacy Rules ............................................................................. 12 Table 3.2: Network Standards ....................................................................................................... 16 Table 3.3: Standard Device Abbreviations.................................................................................... 17 Table 3.4: Required Workstation Components ............................................................................. 18 Table 3.5: CUPPS Platform Workstation Software Components ................................................ 19 Table 3.6: CUPPS Device Interfaces............................................................................................. 20 Table 3.7: CUPPS Platform Server Software Components.......................................................... 20 Table 5.1: IATA Recommend Practices Reference...................................................................... 25 Table 5.2: IATA/ARC Resolutions Reference ............................................................................. 25 Table 5.3: IATA/ATA Resolutions Reference ............................................................................. 26 Table 5.4: Other Document References ....................................................................................... 26
List of Figures
Figure 3.1: CUPPS Logical System Architecture Summary ........................................................ 14 Figure 3.2: Logical System Architecture Detail............................................................................ 15
CUPPS-RP-V01.00-I01.01.0003.DOC
Platform Independence
Serviceability
Differences in legacy CUTE Platforms lead to additional application complexities and CUTE vendor-specific versions that must be maintained over time. CUPPS provides a flexible Platform that facilitates Application functionality that may be used for a variety of business functions. CUPPS Platforms must provide the functionality defined as required in the CUPPS Technical Specification. CUPPS provides the tools and technologies that may lead to additional economies of scale and economies of scope. CUPPS provides enhanced predictability in terms of deployment and overall platform and application maintenance (duration, cost, etc.) CUPPS provides the tools and technologies to increase efficiencies of application upgrades and maintenance.
CUPPS-RP-V01.00-I01.01.0003.DOC
2. Overview
This section provides an overview of the benefits of CUPPS, its strategy as a product, the management oversight of the ongoing CUPPS activities, and migration strategies.
CUPPS-RP-V01.00-I01.01.0003.DOC
Chapter 2: Overview
CUTE
Proprietary peripheral interfaces per supplier. Varying support for various peripherals and varying functionality provided. Built-in AEA support including ATB-II with propriety supplier-specific extensions. Proprietary management interfaces with varying levels of functionality. Legacy CUTE may utilize a mixture of workstation operating systems and network protocols. Legacy CUTE implementations provided a mixture of low- and high-level peripheral interface technologies that were largely incompatible and supplier-specific.
Unified peripheral interface across suppliers Unified support for each device category with defined basic functionality Elimination of proprietary device firmware in favor of current formats supporting barcodes; no ATB-II operations. Unified approach to system management, including remote administration capabilities. All CUPPS workstations will use a defined operating system and network protocol (including network services). CUPPS defines a standard high-level interface standard between applications and the platform.
CUPPS-RP-V01.00-I01.01.0003.DOC
CUPPS-RP-V01.00-I01.01.0003.DOC
10
Chapter 2: Overview
NOTE: CUTE suppliers are required to provide support for their existing CUTE platforms for a period of three years from the date of first publication of the CUPPS Technical Specification.
Table 2.2 shows the general considerations that each suppliers migration strategy will likely address. Not every item will be applicable for a given situation nor will the list presented in Table 2.2 constitute the entire list of considerations that every site must contemplate. These reflect examples of major considerations.
Consideration
Potential operating system changes Application changes Elimination of proprietary device firmware
For applications built on a non-supported operating system, applications must be ported or rewritten for the CUPPS supported operating systems. Legacy CUTE applications must be adapted to work with the CUPPS platform. Applications and business processes that rely on proprietary device firmware must be adapted to E-Tickets and barcode technologies. Proprietary peripheral interfaces are eliminated in favor of a standard high-level interface.
CUPPS suppliers are not required to provide solutions to any or all of the considerations given in Table 2.2 nor are the suppliers prohibited from providing functionality that is outside of the CUPPS specification. It is understood that CUPPS suppliers will continue to offer solutions to customers based on mutually agreeable terms and conditions.
CUPPS-RP-V01.00-I01.01.0003.DOC
11
3.1. General
The general considerations for CUPPS are provided below.
CUPPS-RP-V01.00-I01.01.0003.DOC
12
Data Type
Acquired as desired Only as allowed and appropriate Only as allowed and appropriate Automatically as CUPPS is used
Period defined by the PP Only as allowed and appropriate Only as allowed and appropriate Period defined by the PP
Available to all users or interfaced systems Only as allowed and appropriate Only as allowed and appropriate To using entity (PP, PS, AS, and User)
CUPPS-RP-V01.00-I01.01.0003.DOC
13
o o
CUPPS-RP-V01.00-I01.01.0003.DOC
14
NOTE: Figure 3.1 and Figure 3.2 are presented here for illustrative purposes only. Refer to the CUPPS-TS for actual architectural definitions.}
CUPPS-RP-V01.00-I01.01.0003.DOC
15
3.3. Network
The network infrastructure for a CUPPS implementation will provide functions described below. Technical specifications for these functions are described more fully in CUPPS-TS. It is understood that the provider of the network infrastructure may not be the same entity as the provider of CUPPS. If a different entity provides the network, then Table 3.2 below represents examples of service requirements that CUPPS expects.
CUPPS-RP-V01.00-I01.01.0003.DOC
16
Function
BC/DR
DHCP DNS
Wireless
The network underlying CUPPS should provide Business Continuity/Disaster Recovery functionality, ensuring redundancy and resiliency. Dynamic Host Configuration Protocol may be used to manage network address allocation. DNS provides name-to-IP and IP-to-name address lookup functionality for computer addresses and names. DNS used by CUPPS must support multiple zone-to-zone transfers and multiple partial zone-to-zone transfers. A standardized login scheme will be used to gain access to network resources. Networks used for CUPPS must meet a MQoS standard. NAPT hides the internal structure of the network by mapping all addresses on the network to a single address using different network ports. NAT translates one range of network addresses onto another range. SNMP provides a standard for remote management of network devices. CUPPS networks must be managed with a set of standardized procedures, e.g. ITIL, ISO, etc. A VPN provides for a secure tunnel between two points on a network. VPNs are often used to tunnel from a workstation on an external network into a corporate private network. Wireless infrastructure may be made available for use by the airlines, airports, and/or the general public. Appropriate security measures must be undertaken to ensure access is controlled and data is kept secure for CUPPS.
3.4. Hardware
The CUPPS hardware standards are overviewed below. The details of the hardware requirements for CUPPS are defined in the CUPPS-TS.
3.4.1. Workstations
The hardware used by workstations is summarized below. Table 3.3 provides the standard abbreviations and descriptions for CUPPS-related devices. Note that a single hardware device may implement more than one function described by the CUPPS documentation. Choices of specific hardware are left to the individual CUPPS supplier. It is recognized that additional defined devices and functionality may be added in the future.
CUPPS-RP-V01.00-I01.01.0003.DOC
17
Table 3.3: Standard Device Abbreviations Description
Abbrev.
Interface
BC BE BG BP BS BT DD ID MS OC PO PR RB RF RW SN ZI ZL
Barcode reader Beep Device Boarding Gate Reader Boarding Pass Printer Baggage Scale Baggage Tag Printer Display Device Information Display Magnetic Stripe Reader Optical Character Reader Point of Entry Printer RFID Baggage Tag Printer RFID Reader/Encoder Raw Snapshot Device IATA Message Software Device Logging Software Device
Barcode reading functionality including PDF-417. Basic sound prompts. BC and DD functionality arranged for boarding purposes. Prints boarding pass style documents Weighs baggage Prints baggage tags Provides basic text display capabilities such as that found on a gate reader. Provides branding and other information display capabilities Reads of magnetic stripes from FFP or credit cards. Reads OCR data from passports, visas, etc. Turnstile or other self-boarding devices General printing device RFID enabled BT General-purpose RFID reader/encoder. Dedicated or other specialized device Still camera snapshot (image capture) Reception of IATA defined messages. Integration with local systems is still required. Basic logging functionality that may be used by the application and platform.
3.4.2. Vendors
Workstation hardware may be provisioned from any vendor provided that the hardware meets the requirements for a given implementation. The vendors that are appropriate for a given implementation will vary depending upon the local implementation details and local preferences.
Table 3.4 shows the minimum components, e.g. the internal components that make up the workstation and its operating system, used by CUPPS workstations. A CUPPS interface will not be defined for these components. These components are directly accessed by either CUPPS or COTS applications.
CUPPS-RP-V01.00-I01.01.0003.DOC
18
Function
Computer Keyboard Pointing Device Touch Screen Windows Operating System Services
The computer and its internal components. A standard 101+-key keyboard is required for each end-user workstation per local configurations. A pointing device is required for each workstation. A touch screen is required to support the check-in and boarding functionality required by airlines and airports. Windows provided print spooler, file access, memory management, etc.
Workstation Ergonomics
The workstations should be designed to maximize utilization of limited counter-top surfaces (e.g. trackball versus mouse, etc.). The counter design should be configured in conjunction with ergonomically placed peripherals, to minimize time/motion activities in issuing/reading documents. Consideration will be given to the occupational requirements related to accommodation for physical challenges and overall occupational health and safety. A repository will be established for counter design documents related to common use installations. This repository will tentatively be held by Airports Council International World.
3.4.3. Servers
Server hardware may be provisioned from any vendor provided that the hardware meets the requirements for a given implementation. The vendors that are appropriate for a given implementation will vary depending upon the local implementation details and local preferences.
3.5. Software
CUPPS software will be designed as described below.
3.5.1. Workstations
Table 3.5 shows the CUPPS software and design considerations for end-user workstations. The CUPPS-TS shall define the exact requirements for each of these functions. The workstation requirements given below do not imply or require any particular implementation by a CUPPS supplier other than these functions must be accessible via the
CUPPS-RP-V01.00-I01.01.0003.DOC
19 defined interfaces from every CUPPS workstation in a given implementation. CUPPS suppliers are free to implement a software architecture that implements the standard CUPPS interfaces as they deem appropriate.
Function
Event Management Hardware Abstraction Layer (HAL) IATA Message Interface Logging Menus Operating System Performance Permissions Platform Management Software Distribution Storage Supplier World-Wide Naming Standards
Platforms must provide security alert distribution by authorized administrators CUPPS platforms must implement application management functionality appropriate to support the CUPPS platforms. Applications must be well-behaved, with no unreasonable performance impacts, security risks to the platform or local network. Platforms must provide authentication services for users onto the workstation and local network resources. COTS applications must be well-behaved and must not pose any unreasonable performance or security impacts to the platform or local network. Platform must implement an event management functions for application and platform events. Platforms must provide a HAL that shields applications from the supplier, firmware, and connectivity of the peripheral. To facilitate integration with airport systems, platforms must provide the capability to send and receive IATA defined message formats. Platforms must provide a logging interface appropriate for application support and debugging purposes. Platforms must provide a menu system with appropriate security. Workstations must use an operating system as defined in the CUPPSTS. Platform performance must meet or exceed defined parameters. Platforms must manage and secure access to the platform, network resources, and user or airline data. Platforms must provide management functionality to facilitate the administration, support, and usage. Platforms must provide a mechanism to distribute software Platforms must provide an interface for secure storage of data in or persistent areas. CUPPS applications work across CUPPS implementations. A world-wide naming convention for the naming of CUPPS workstations and peripherals.
Table 3.6 shows the requirement level for each of the device functions. The Abbrev. column shows the standard abbreviation used for each device type. [ReqID: 410000]
CUPPS-RP-V01.00-I01.01.0003.DOC
20
Abbrev.
BC BE BG BP BS BT DD ID MS OC PO PR RB RF RW SN ZI ZL
Barcode reader Beep Device Boarding Gate Reader Boarding Pass Printer Baggage Scale Baggage Tag Printer Display Device Information Display Magnetic Stripe Reader Optical Character Reader Point of Entry Printer RFID Baggage Tag Printer RFID Reader/Encoder Raw Snapshot Device IATA Message Software Device Logging Software Device
Defined, Required Defined, Required Defined, Required Defined, Required Not Defined, Not Required Defined, Required Defined, Required Defined, Required Defined, Required Defined, Required Not Defined, Not Required Defined, Required Defined, Required Not Defined, Not Required Defined, Required Defined, Required Defined, Required Defined, Required
3.5.2. Servers
Table 3.7 shows the CUPPS software and design considerations used on application or platform servers. The CUPPS-TS shall define the exact requirements for each of these functions. The server requirements given below do not imply or require any particular implementation by a CUPPS supplier. CUPPS suppliers are free to implement a software architecture that implements the standard CUPPS interfaces as they deem appropriate.
Function
CUPPS suppliers may implement software components on the CUPPS servers as they deem appropriate. CUPPS suppliers are free to implement any operating system on the server hardware that satisfies CUPPS-TS.
CUPPS-RP-V01.00-I01.01.0003.DOC
21
CUPPS-RP-V01.00-I01.01.0003.DOC
23
CUPPS-RP-V01.00-I01.01.0003.DOC
24
If the application provider decides to use a dedicated application Server, either at the CUPPS site or a location that is under the control of the application provider, then that application provider is responsible for the maintenance, administration, and support of the Server. The application provider is responsible for any communication lines to and from the application providers server(s). The application provider must provide the correct protocol and interfaces to allow connection at the CUPPS site as mutually agreed between the platform provider and the application provider.
CUPPS-RP-V01.00-I01.01.0003.DOC
25
1008 100.15 Glossary of Commonly Used Air Passenger Terms 1706 n/a Functional Specification for Standard Departure Control System 1706e 30.102 Paper Specifications Documents to be Printed by a General Purpose Printer (GPP) In A Common Use Self-Service (CUSS) Kiosk 1720 n/a Seat Assignment Parameters 1724 20.03 General Conditions of Carriage (Passenger and Baggage) 1740a 30.42 Form of Interline Baggage Tag 1796 x Baggage System Interface 1774 n/a Protection of Privacy and Transborder Data Flows of Personal Data Used in International Air Transport of Passengers and Cargo 1778 n/a Corporate Client Identification Service 1784 * Electronic Reservation Services Providers (ERSPs) 1797 n/a Common Use Terminal Equipment * ATA Electronic Marketplace Committee RP
IATA
30.42 Form of Interline Baggage Tag n/a Electronic Ticketing n/a Electronic Reservation Services Providers
CUPPS-RP-V01.00-I01.01.0003.DOC
26
IATA
ATA
722e 722f 722g 722h 724 728 725f 725g 740 791
ATB Standard 20.60 Electronic Ticket Airline 20.61 Electronic Ticket Neutral 20.62 Electronic Ticket Ground Handling 20.03 Passenger Ticket Notice and Conditions of Contract 110.16 Code Designators for Passenger Ticket and Baggage Check 20.63 Electronic Miscellaneous Documents Airline 20.64 Electronic Miscellaneous Documents Neutral 30.35 Form of Interline Baggage Tag 20.204 Specifications for Airline Industry Integrated Circuit Card (ICC)
Reference Electronic Reservation Services Providers Implementation guide Electronic Ticketing Implementation Guide Integrated Circuit Card Implementation Guide Workstation Ergonomics ACI Logo Repository IATA Payment Card Industry Data Security Standards
CUPPS-RP-V01.00-I01.01.0003.DOC
27
CUPPS-RP-V01.00-I01.01.0003.DOC
28
Application conforms to the application standards defined in the CUPPS Technical Specification. CUPPS Certified A CUPPS Certified Platform, Application or Device has successfully completed all three steps (Technical Compliance, Integration and Beta Testing) of the Certification process. CUPPS Compliant A CUPPS Compliant Platform, Application or Device has successfully completed the Technical Compliance Testing phase of the Certification process. CUPPS Platform A CUPPS Platform is an IT environment that supports applications for one or more Application Providers (usually airlines or other entities operating in an airport environment). A CUPPS Platform conforms to the platform standards defined in the CUPPS Technical Specification. CUPPS Platform Device Interface The software interface(s) used when an application communicates with a CUPPS Platform System. This interface provides functionality used for device-related activities. CUPPS Platform Management Interface The software interface(s) used when an application communicates with a CUPPS Platform System. This interface provides functionality used for control of applications and for other non-device related activities. CUPPS Platform Interface The software interface(s) used when an application communicates with a CUPPS Platform System. The Platform Interface is divided into the Device Interface and the Management Interface. CUPPS Platform Instance An instance of a CUPPS Platform including the functionality available through the CUPPS Platform Interface(s) and the run-time environment specified herein. CUPPSMG CUPPS Working Group. CUTE Common Use Terminal Equipment. Deployment Deployment includes all of the activities that make a CUPPS certified system available for use. Deployment consists of several interrelated phases, such as: Distribution, Activation, Validation, Fallback/Rollback (if applicable) and Clean-Up. The Deployment process is followed in order to
CUPPS-RP-V01.00-I01.01.0003.DOC
29
IETF Internet Engineering Task Force. IME Input Method Editor. Integration Testing Integration Testing is testing using procedures in a CUPPS compliant environment to ensure that a CUPPS Compliant Application successfully operates on a CUPPS Compliant Platform and that it does not adversely affect the IT environment. IP Internet Protocol. If not specified, IP typically refers to IPv4. IPSEC IP Security. ITIL Information Technology Infrastructure Library. JAR Java Archive. JIS-II Japanese Industrial Standard for magnetic stripe cards. JRE Java Runtime Environment. LAN Local Area Network. MAC Media Access Control. MD5 Message digest checksum, per RFC 1321 MQoS Minimum Quality of Service. NAPT Network Address Port Translation. NAT Network Address Translation. OCR Optical Character Recognition or Optical Character Reader. Oversight Board The Oversight Board is a formal entity created jointly by IATA, ATA, and ACI that includes representative members from those three organizations, as well as one nominated representative of the CUPPS Management Group. PAT See NAPT. PDF Portable Document Format. Platform Provider A Platform Provider is an entity that acquires a CUPPS Platform from a Platform Supplier and offers it to the user community. A Platform Provider is responsible to manage, maintain and administer the implemented Platform in a production environment. Platform Supplier A Platform Supplier is an entity that creates the CUPPS Platform. Platform Test Suite See Test Suite. RFC Request For Comments; Request for Change. RFID Radio Frequency Identification. Rollback Rollback is the process that restores the Environment(s) or Application(s) to their previous working production version(s) that existed before the update was installed. SLA Service Level Agreement. SNMP Simple Network Management Protocol. SSL Secure Sockets Layer. TCP Transmission Control Protocol. TCP/IP Transmission Control Protocol over Internet Protocol. Technical Compliance Testing Technical Compliance Testing is testing to ensure that Applications and Platforms adhere to the Technical Specifications interface definitions, performance, installation rules, storage needs, and timing specifications. Technical Compliance Testing must be witnessed by third-party Compliance Testing Entity to qualify for compliance. Test Suite Test Suites will be used to test platform and application compliance with the CUPPS Technical Specification and to allow entities creating CUPPS
CUPPS-RP-V01.00-I01.01.0003.DOC
30
compliant software to prepare their software for CUPPS Certification. TLS Transport Layer Security. TTL Time To Live. UDP User Datagram Protocol. Unicode Unicode is a standard to support languages with broad character sets. ASCII text uses an 8-bit character (i.e. 255 characters possible), whereas Unicode uses a 16bit character (i.e. 65,535 characters possible). USB Universal Serial Bus. UTF-8 Unicode Transformation Format (RFC 3629). Validation Validation is the negative impact testing of a CUPPS Certified Application and CUPPS Certified Platform on a specific network infrastructure that meets the CUPPS Technical Specification. VPN
CUPPS-RP-V01.00-I01.01.0003.DOC
31
7. References
AEA. AEA Technical Specifications 2007. AEA, 2007. IATA. Common Use Self Service (CUSS). IATA. Passenger Services Conference Manual. ICAO. Document 9303: Machine Readable Travel Documents. Tech. Rep. IEEE. Part 11: Wireless LAN Medium Access Control (MAC) And Physical Layer (Phy) Specifications. Tech. Rep. IEEE Std 802-11a-1999(R2003), IEEE, 2003. ISO/IEC 8802-11:2005. IEEE. Part 11: Wireless LAN Medium Access Control (MAC) And Physical Layer (Phy) Specifications: High-Speed Physical Layer In The 5 Ghz Band. Tech. Rep. IEEE Std 802-11a1999 (R2003), IEEE, 2003. ISO/IEC 8802-11: 1999/Amd 1:2000(E). IEEE. Part 11: Wireless LAN Medium Access Control (MAC) And Physical Layer (Phy) Specifications: Higher-Speed Physical Layer Extension In The 2.4 Ghz Band. Tech. Rep. IEEE Std 802.11b-1999 (R2003), IEEE, 2003. ISO/IEC 8802- 11:1999/Amd 1:2000(E). IEEE. Part 11: Wireless LAN Medium Access Control (MAC) And Physical Layer (Phy) Specifications: Amendment 4: Further Higher Data Rate Extension In The 2.4 Ghz Band. Tech. Rep. IEEE Std 802.11g-2003, IEEE, 2003. ISO/IEC 8802- 11:2005/Amd 4:2006. IEEE. Part 11: Wireless LAN Medium Access Control (MAC) And Physical Layer (Phy) Specifications: Amendment 6: Medium Access Control (MAC) Security Enhancements. Tech. Rep. IEEE Std 802.11i-2004, IEEE, 2004. ISO/IEC 8802- 11:2005/Amd 6:2006. IEEE. 802. 1x-2004 IEEE Standards For Local And Metropolitan Area Networks: Port-Based Network Access Control. Tech. Rep., IEEE, 2004. IEEE. Part 11: Wireless LAN Medium Access Control (MAC) And Physical Layer (Phy) Specifications: Amendment: Enhancements For Higher Throughput [Draft]. Tech. Rep. IEEE Std P802.11n/D2.00, IEEE, 2007. ISO/IEC. ISO/IEC 7810 Identification Cards Physical Characteristics. ISO/IEC. ISO/IEC 7811 Identification Cards Recording Technique. ISO/IEC. ISO/IEC 7812 Identification Cards Identification Of Issuers.
CUPPS-RP-V01.00-I01.01.0003.DOC
32
Chapter 7: References
ISO/IEC. ISO/IEC 7813 Identification Cards Financial Transaction Cards. ISO/IEC. ISO/IEC 8601 Data Elements And Interchange Formats Information Interchange. Representation Of Dates And Times. Payment Card Industry (PCI). Data Security Standard (DSS), Version 1.1. IETF. RFC 1321: The Md5 Message-Digest Algorithm, 1992. [13] IETF. RFC 1918: Address Allocation For Private Internets, 1996. IETF. RFC 2119: Key Words For Use In RFCs To Indicate Requirement Levels, 1997. IETF. RFC 2281: Cisco Hot Standby Router Protocol (HSRP), 1998. IETF. RFC 3418: Management Information Base (MIB) For The Simple Network Management Protocol (SNMP), 2002. IETF. RFC 3411: An Architecture For Describing Simple Network Management Protocol (SNMP) Management Frameworks, 2002. IETF. RFC 3548: The Base16, Base32, And Base64 Data Encodings, 2003. IETF. RFC 3629: UTF-8, A Transformation Format Of ISO 10646, 2003. IETF. RFC 3768: Virtual Router Redundancy Protocol (VRRP), 2004. IETF. RFC 4346: The Transport Layer Security (TLC) Protocol Version 1.1, April 2006. The Unicode Consortium. The Unicode Standard, Version 5.0. 2006. W3C. Namespaces In XML. Extensible Markup Language (XML). World Wide Web Journal 2, 4 (1997), 2766.
CUPPS-RP-V01.00-I01.01.0003.DOC
33
8. Index
A ActiveX ..............................................................4 B Base64 ..............................................................32 C Citrix...................................................................4 I IEEE .................................................................31 IETF .................................................................32 ISO .............................................................31, 32 M Mode AEA .............................................................31 MQoS .............................................................. 29 R RFC ................................................................. 30 1321............................................................. 29 3548............................................................. 27 3629............................................................. 30 U Unicode............................................................ 32 USB ................................................................. 30 UTF-8 .............................................................. 32 W WLAN ............................................................. 30
CUPPS-RP-V01.00-I01.01.0003.DOC