
ISO 24729:2009
ISO 24729:2009 Information technology – Radio frequency identification for item management – Implementation guidelines – Part 4: Tag data security
CDN $233.00
Description
ISO/IEC TR 24729-4:2009 provides guidance to systems designers to help them determine potential threats to data security of the tag and tag-to-reader communication in an RFID system, and appropriate countermeasures to provide data security. Although important, it is beyond the scope of ISO/IEC TR 24729-4:2009 to address security aspects of the reader-to-host and back-end enterprise modules.
ISO/IEC TR 24729-4:2009 is not intended to specifically address consumer privacy concerns; however, since data and personal privacy depend on the use of appropriate security measures, privacy is addressed in general terms. Data access security provides a measure of personal privacy protection by mitigating the potential for unauthorized reading of data on a tag. However, not all data access security countermeasures provide the same level of protection.
Edition
1
Published Date
2009-03-11
Status
PUBLISHED
Pages
20
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment
Abstract
ISO/IEC TR 24729-4:2009 provides guidance to systems designers to help them determine potential threats to data security of the tag and tag-to-reader communication in an RFID system, and appropriate countermeasures to provide data security. Although important, it is beyond the scope of ISO/IEC TR 24729-4:2009 to address security aspects of the reader-to-host and back-end enterprise modules.
ISO/IEC TR 24729-4:2009 is not intended to specifically address consumer privacy concerns; however, since data and personal privacy depend on the use of appropriate security measures, privacy is addressed in general terms. Data access security provides a measure of personal privacy protection by mitigating the potential for unauthorized reading of data on a tag. However, not all data access security countermeasures provide the same level of protection.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-

ISO 80004:2020 Nanotechnologies – Vocabulary – Part 8: Nanomanufacturing processes
CDN $76.00 Add to cart -

ISO 612:1978 Road vehicles – Dimensions of motor vehicles and towed vehicles – Terms and definitions
CDN $173.00 Add to cart -

ISO 80000:2019 Quantities and units – Part 11: Characteristic numbers
CDN $312.00 Add to cart -

ISO 15424:2025 Information technology – Automatic identification and data capture techniques – Data carrier identifiers (including symbology identifiers)
CDN $233.00 Add to cart







