CSA ISO/IEC TR 24729-4:14 (R2019)
Current
The latest, up-to-date edition.
Information technology - Radio frequency identification for item management - Implementation guidelines - Part 4: Tag data security (Adopted ISO/IEC TR 24729-4:2009, first edition, 2009-03-15)
Hardcopy , PDF
English
01-01-2014
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Background
6 RFID data access security risk assessment
7 Threats
8 Scenarios
9 Types of security safeguarding countermeasures
10 Threat response 'best practices'
Annex A (informative) - Encryption
Bibliography
CSA Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard has been formally approved, without modification, by the Technical Committee and has been approved as a National Standard of Canada by the Standards Council of Canada. Scope This Technical Report provides guidance to systems designers to help them determine potential threats to data security of the tag and tag-to-reader communication in an RFID system, and appropriate countermeasures to provide data security (identified as 1 through 2 in Figure 1). Although important, it is beyond the scope of this Technical Report to address security aspects of the reader-to-host and back-end enterprise modules (identified as 4 through 7 in Figure 1).1) This Technical Report is not intended to specifically address consumer privacy concerns; however, since data and personal privacy depend on the use of appropriate security measures, privacy is addressed in general terms. Data access security provides a measure of personal privacy protection by mitigating the potential for unauthorized reading of data on a tag. However, not all data access security countermeasures provide the same level of protection.
DocumentType |
Standard
|
ISBN |
978-1-77139-480-2
|
Pages |
0
|
ProductNote |
THIS STANDARD ALSO REFERS TO ISO/IEC 24791-6,FIPS 199
|
PublisherName |
Canadian Standards Association
|
Status |
Current
|
CSA Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard has been formally approved, without modification, by the Technical Committee and has been approved as a National Standard of Canada by the Standards Council of Canada. Scope This Technical Report provides guidance to systems designers to help them determine potential threats to data security of the tag and tag-to-reader communication in an RFID system, and appropriate countermeasures to provide data security (identified as 1 through 2 in Figure 1). Although important, it is beyond the scope of this Technical Report to address security aspects of the reader-to-host and back-end enterprise modules (identified as 4 through 7 in Figure 1).1) This Technical Report is not intended to specifically address consumer privacy concerns; however, since data and personal privacy depend on the use of appropriate security measures, privacy is addressed in general terms. Data access security provides a measure of personal privacy protection by mitigating the potential for unauthorized reading of data on a tag. However, not all data access security countermeasures provide the same level of protection.
Standards | Relationship |
ISO/IEC TR 24729-4:2009 | Identical |
ISO/IEC 19762-3:2008 | Information technology Automatic identification and data capture (AIDC) techniques Harmonized vocabulary Part 3: Radio frequency identification (RFID) |
FIPS PUB 140-2 : 0 | SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
ISO/IEC 15963:2009 | Information technology Radio frequency identification for item management Unique identification for RF tags |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO/IEC 19762-1:2008 | Information technology Automatic identification and data capture (AIDC) techniques Harmonized vocabulary Part 1: General terms relating to AIDC |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.