ISO Standards for Digital Document Security: A Guide to ISO 22385

Standards are the invisible infrastructure of trust. When a border agent verifies a passport, when a pharmacist checks a medicine's authenticity, or when a consumer scans a product label, international standards make that verification possible — and reliable. For Visible Digital Seals (VDS), that foundation is built on ISO 22385 and related ICAO specifications.

The Standards Landscape

ICAO Doc 9303 — Where It All Began

The International Civil Aviation Organization (ICAO) pioneered the concept of machine-readable travel documents (MRTDs) decades ago. In its Doc 9303 series, ICAO defined the VDS format specifically for travel and identity documents:

  • VDS for travel documents — A signed DataMatrix barcode on visa stickers, emergency travel documents, and supplementary identity documents.
  • VDS-NC (Non-Constrained) — A format designed specifically for use cases beyond travel documents (health certificates, professional credentials, etc.), with no constraint on payload size and a flexible data schema.

ISO 22385 / ISO 22376 — Expanding the Scope

The ISO 22381 family of standards (ISO 22376 and ISO 22385) generalises VDS technology for broader applications:

  • ISO 22385 / ISO 22376 — ISO 22376 defines the general framework and data structure for VDS authentication of goods and documents; ISO 22385 specifies the technical implementation requirements (encoding, cryptography, trust lists) developed in close collaboration with VDSIC.
  • It defines how data fields are organised, which signature algorithms are supported, and how certificate chains should be managed.

ISO 17712 and ISO 28000 — Supply Chain Context

In supply-chain contexts, VDS technology is complementary to existing standards for container seals (ISO 17712) and supply-chain security management (ISO 28000), though direct normative alignment between these standards and VDS specifications is still evolving.

Why Standards Matter

Interoperability

A VDS issued by a French authority must be verifiable by a Japanese border control system. Standards ensure that the data format, signature algorithms, and certificate management are universally understood.

Trust

Standards define certificate hierarchies — who is authorised to issue seals, how their keys are managed, and how revocation works. Without this governance, anyone could claim to be a legitimate issuer.

Longevity

By specifying precise technical requirements, standards protect against obsolescence. A VDS printed today will remain verifiable for years, because the verification logic is defined in a stable, publicly available document.

Legal Admissibility

In many jurisdictions, adherence to recognised international standards is a prerequisite for legal admissibility of digital evidence. A VDS verified according to ISO 22381 carries more weight than a proprietary solution.

Key Technical Requirements

The standards define several critical elements:

Element

Specification

Barcode format

DataMatrix (ECC 200), QR Code, NFC, URL (VDS is carrier-agnostic)

Signature algorithm

ECDSA with P-256 or higher curves

Certificate format

X.509 v3

Data encoding

MessagePack (binary serialisation format used for VDS payload encoding)

Compression

Optional zlib compression for large payloads

These choices balance security strength with the practical constraints of printing and scanning barcodes on physical media.

The Role of VDSIC in Standardisation

VDSIC actively participates in the development and promotion of VDS standards through:

  • Technical committee contributions — VDSIC members contribute to ISO and ICAO working groups.
  • Interoperability testing — VDSIC organises plugfests and conformance testing events where implementers verify that their systems correctly generate and verify VDS.
  • Reference implementations — Tools like the Otentik Codes Reader serve as reference verification applications, ensuring that the standards are implemented correctly.
  • Education and outreach — VDSIC publishes guidance documents and organises workshops to help governments and industries adopt VDS.

Looking Ahead

As digital threats evolve, so do the standards. Current work includes:

  • Post-quantum cryptography — Preparing VDS for the era of quantum computing by evaluating quantum-resistant signature algorithms.
  • Extended data profiles — New data schemas for additional use cases such as academic credentials, environmental certificates, and digital product passports.
  • Enhanced privacy — Selective disclosure mechanisms that allow a VDS to reveal only the information needed for a specific verification context.