Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

CSA ISO/IEC TR 24729-4:14 (R2019)

Current

Current

The latest, up-to-date edition.

Information technology - Radio frequency identification for item management - Implementation guidelines - Part 4: Tag data security (Adopted ISO/IEC TR 24729-4:2009, first edition, 2009-03-15)

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

01-01-2014

$216.57
Including GST where applicable

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Background
6 RFID data access security risk assessment
7 Threats
8 Scenarios
9 Types of security safeguarding countermeasures
10 Threat response 'best practices'
Annex A (informative) - Encryption
Bibliography

CSA Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard has been formally approved, without modification, by the Technical Committee and has been approved as a National Standard of Canada by the Standards Council of Canada. Scope This Technical Report provides guidance to systems designers to help them determine potential threats to data security of the tag and tag-to-reader communication in an RFID system, and appropriate countermeasures to provide data security (identified as 1 through 2 in Figure 1). Although important, it is beyond the scope of this Technical Report to address security aspects of the reader-to-host and back-end enterprise modules (identified as 4 through 7 in Figure 1).1) This Technical Report is not intended to specifically address consumer privacy concerns; however, since data and personal privacy depend on the use of appropriate security measures, privacy is addressed in general terms. Data access security provides a measure of personal privacy protection by mitigating the potential for unauthorized reading of data on a tag. However, not all data access security countermeasures provide the same level of protection.

DocumentType
Standard
ISBN
978-1-77139-480-2
Pages
0
ProductNote
THIS STANDARD ALSO REFERS TO ISO/IEC 24791-6,FIPS 199
PublisherName
Canadian Standards Association
Status
Current

CSA Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). This Standard has been formally approved, without modification, by the Technical Committee and has been approved as a National Standard of Canada by the Standards Council of Canada. Scope This Technical Report provides guidance to systems designers to help them determine potential threats to data security of the tag and tag-to-reader communication in an RFID system, and appropriate countermeasures to provide data security (identified as 1 through 2 in Figure 1). Although important, it is beyond the scope of this Technical Report to address security aspects of the reader-to-host and back-end enterprise modules (identified as 4 through 7 in Figure 1).1) This Technical Report is not intended to specifically address consumer privacy concerns; however, since data and personal privacy depend on the use of appropriate security measures, privacy is addressed in general terms. Data access security provides a measure of personal privacy protection by mitigating the potential for unauthorized reading of data on a tag. However, not all data access security countermeasures provide the same level of protection.

Standards Relationship
ISO/IEC TR 24729-4:2009 Identical

ISO/IEC 19762-3:2008 Information technology Automatic identification and data capture (AIDC) techniques Harmonized vocabulary Part 3: Radio frequency identification (RFID)
FIPS PUB 140-2 : 0 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
ISO/IEC 15963:2009 Information technology Radio frequency identification for item management Unique identification for RF tags
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
ISO/IEC 19762-1:2008 Information technology Automatic identification and data capture (AIDC) techniques Harmonized vocabulary Part 1: General terms relating to AIDC

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more