ISO/IEC TR 24729-4:2009
Current
The latest, up-to-date edition.
Information technology Radio frequency identification for item management Implementation guidelines Part 4: Tag data security
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
11-03-2009
ISO/IEC TR 24729-4:2009 provides guidance to systems designers to help them determine potential threats to data security of the tag and tag-to-reader communication in an RFID system, and appropriate countermeasures to provide data security. Although important, it is beyond the scope of ISO/IEC TR 24729-4:2009 to address security aspects of the reader-to-host and back-end enterprise modules.
ISO/IEC TR 24729-4:2009 is not intended to specifically address consumer privacy concerns; however, since data and personal privacy depend on the use of appropriate security measures, privacy is addressed in general terms. Data access security provides a measure of personal privacy protection by mitigating the potential for unauthorized reading of data on a tag. However, not all data access security countermeasures provide the same level of protection.
DocumentType |
Standard
|
Pages |
20
|
ProductNote |
This standard also refers to ISO/IEC 24791-6
|
PublisherName |
International Organization for Standardization
|
Status |
Current
|
Standards | Relationship |
CSA ISO/IEC TR 24729-4:14 (R2019) | Identical |
NEN NPR ISO/IEC TR 24729-4 : 2009 | Identical |
PD ISO/TS 18625:2017 | Freight containers. Container Tracking and Monitoring Systems (CTMS): Requirements |
ISO/TS 18625:2017 | Freight containers — Container Tracking and Monitoring Systems (CTMS): Requirements |
FIPS PUB 140 : 0001 | SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
ISO/IEC 19762-3:2008 | Information technology Automatic identification and data capture (AIDC) techniques Harmonized vocabulary Part 3: Radio frequency identification (RFID) |
ISO/IEC 15963:2009 | Information technology Radio frequency identification for item management Unique identification for RF tags |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO/IEC 19762-1:2008 | Information technology Automatic identification and data capture (AIDC) techniques Harmonized vocabulary Part 1: General terms relating to AIDC |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.