Special Publication 800-73-2 Interfaces for Personal Identity Verification Part 4:
The PIV Transitional Interfaces and Data Model Specification
Page iii
TABLE OF CONTENTS
U1.U UINTRODUCTIONU ..........................................................................................................................................1
U1.1U UAUTHORITYU ..................................................................................................................................................1
U1.2U UPURPOSEU ...................................................................................................................................................... 1
U1.3U USCOPEU .......................................................................................................................................................... 2
U1.4U UAUDIENCE AND ASSUMPTIONSU ..................................................................................................................... 2
U1.5U UDOCUMENT OVERVIEW AND STRUCTUREU .................................................................................................... 2
U2.U UOVERVIEW AND MIGRATION CONSIDERATIONSU............................................................................ 3
U2.1U UMIGRATION CONSIDERATIONSU ..................................................................................................................... 3
U2.2U UPIV DATA MODELU ....................................................................................................................................... 4
U2.3U UMANDATORY DATA ELEMENTSU ................................................................................................................... 5
U2.3.1U UCard Capability ContainerU ................................................................................................................5
U2.3.2U UCardholder Unique IdentifierU ............................................................................................................5
U2.3.3U UX.509 Certificate for PIV AuthenticationU ...........................................................................................6
U2.3.4U UCardholder FingerprintsU....................................................................................................................6
U2.3.5U USecurity ObjectU...................................................................................................................................7
U2.4U UOPTIONAL DATA ELEMENTSU ........................................................................................................................ 7
U2.4.1U UCardholder Facial ImageU ..................................................................................................................7
U2.4.2U UPrinted InformationU ...........................................................................................................................7
U2.4.3U UX.509 Certificate for Digital SignatureU..............................................................................................7
U2.4.4U UX.509 Certificate for Key ManagementU .............................................................................................8
U2.4.5U UX.509 Certificate for Card AuthenticationU .........................................................................................8
U2.4.6U UDiscovery ObjectU ...............................................................................................................................8
U3.U UTRANSITION CARD INTERFACESU ........................................................................................................10
U3.1U UMIDDLEWARE APPLICATION PROGRAMMING INTERFACEU .......................................................................... 10
U3.2U UCARD EDGE COMMANDSU ............................................................................................................................ 10
List of Appendices
UAPPENDIX A— TERMS, ACRONYMS, AND NOTATIONU ...........................................................................11
UA.1U UTERMSU ................................................................................................................................................... 11
UA.2U UACRONYMSU ........................................................................................................................................... 11
UA.3U UNOTATIONU ............................................................................................................................................. 12
UAPPENDIX B— REFERENCESU .........................................................................................................................14
List of Tables
UTable 1. Data Model ContainersU ..................................................................................................4