ISO/IEC TR 24729-4:2009
Current
The latest, up-to-date edition.
Information technology — Radio frequency identification for item management — Implementation guidelines — Part 4: Tag data security
Hardcopy , PDF
English
11-03-2009
ISO/IEC TR 24729-4:2009 provides guidance to systems designers to help them determine potential threats to data security of the tag and tag-to-reader communication in an RFID system, and appropriate countermeasures to provide data security. Although important, it is beyond the scope of ISO/IEC TR 24729-4:2009 to address security aspects of the reader-to-host and back-end enterprise modules.
ISO/IEC TR 24729-4:2009 is not intended to specifically address consumer privacy concerns; however, since data and personal privacy depend on the use of appropriate security measures, privacy is addressed in general terms. Data access security provides a measure of personal privacy protection by mitigating the potential for unauthorized reading of data on a tag. However, not all data access security countermeasures provide the same level of protection.
| Committee |
ISO/IEC JTC 1/SC 31
|
| DocumentType |
Standard
|
| Pages |
20
|
| ProductNote |
This standard also refers to ISO/IEC 24791-6
|
| PublisherName |
International Organization for Standardization
|
| Status |
Current
|
| Standards | Relationship |
| NEN NPR ISO/IEC TR 24729-4 : 2009 | Identical |
| PD ISO/TS 18625:2017 | Freight containers. Container Tracking and Monitoring Systems (CTMS): Requirements |
| ISO/TS 18625:2017 | Freight containers — Container Tracking and Monitoring Systems (CTMS): Requirements |
| FIPS PUB 140 : 0001 | SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
| ISO/IEC 19762-3:2008 | Information technology — Automatic identification and data capture (AIDC) techniques — Harmonized vocabulary — Part 3: Radio frequency identification (RFID) |
| ISO/IEC 15963:2009 | Information technology — Radio frequency identification for item management — Unique identification for RF tags |
| ISO/IEC 27002:2013 | Information technology — Security techniques — Code of practice for information security controls |
| ISO/IEC 19762-1:2008 | Information technology — Automatic identification and data capture (AIDC) techniques — Harmonized vocabulary — Part 1: General terms relating to AIDC |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.