Cena s DPH / bez DPH
Hlavní stránka>BS ISO/IEC 29167-1:2012 Information technology. Automatic identification and data capture techniques Air interface for security services and file management for RFID architecture
sklademVydáno: 2012-03-31
BS ISO/IEC 29167-1:2012 Information technology. Automatic identification and data capture techniques Air interface for security services and file management for RFID architecture

BS ISO/IEC 29167-1:2012

Information technology. Automatic identification and data capture techniques Air interface for security services and file management for RFID architecture

Formát
Dostupnost
Cena a měna
Anglicky Zabezpečené PDF
K okamžitému stažení
4500 Kč
Čtěte normu po dobu 1 hodiny. Více informací v kategorii E-READING
Čtení normy
na 1 hodinu
450.00 Kč
Čtěte normu po dobu 24 hodin. Více informací v kategorii E-READING
Čtení normy
na 24 hodin
1350.00 Kč
Anglicky Tisk
Skladem
4500 Kč
Označení normy:BS ISO/IEC 29167-1:2012
Počet stran:16
Vydáno:2012-03-31
ISBN:978 0 580 73943 9
Status:Standard
Popis

BS ISO/IEC 29167-1:2012


This standard BS ISO/IEC 29167-1:2012 Information technology. Automatic identification and data capture techniques is classified in these ICS categories:
  • 35.040.50 Automatic identification and data capture techniques

This part of ISO/IEC 29167 defines the architecture for security and file management for the ISO/IEC 18000 air interface standards for radio frequency identification (RFID) devices. It provides a common technical specification for security and file management for RFID devices that can be used by ISO committees developing RFID application standards.

This part of ISO/IEC 29167 specifies architecture for

  • untraceability,

  • security services, and

  • file management

as a further optional extension of the air interface. Both security and file management are defined in alignment with existing air interfaces and this part of ISO/IEC 29167 only covers extensions on security and file management beyond the scope of the ISO/IEC 18000 air interfaces.

This part of ISO/IEC 29167 defines various security features called security mechanisms that can be implemented by a tag depending on the application. A tag can support one, a subset, or all of the specified security mechanisms. For an interrogator it is possible to get information about the security mechanisms that are actually implemented and supported by a tag. Moreover, it has been considered that adding new security mechanisms remains possible. Besides signaling the presence of certain security services, further details of the mechanisms such as utilized encryption algorithm and key length also need to be specified and accessible.