Shopping Cart

No products in the cart.

BSI PD CEN/TR 16672:2014

$102.76

Information technology. Privacy capability features of current RFID technologies

Published By Publication Date Number of Pages
BSI 2014 22
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

The scope of the Technical Report is to identify technical characteristics of particular RFID air interface protocols that need to be taken into consideration by operators of RFID systems in undertaking their privacy impact assessment. It also provides information for those operators who provide RFID-tagged items that are likely to be read by customers or other organizations.

This Technical Report provides detailed privacy and security characteristics that apply to products that are compliant with specific air interface protocols, and also to variant models that comply with such standards.

The Technical Report also identifies proprietary privacy and security features which have been added to tags, which are problematic of being implemented in open systems which depend on interoperability between different devices. Such proprietary solutions, whilst being technically sound, in fact impede interoperability. The gap analysis thus identified can be used to encourage greater standardization.

PDF Catalog

PDF Pages PDF Title
5 Foreword
6 Introduction
7 1 Scope
2 Terms and definitions
8 3 Symbols and abbreviations
4 Access protection features
4.1 General
4.2 Overview of access protection features
4.2.1 General
4.2.2 No protection
4.2.3 Password protection
4.2.3.1 General
9 4.2.3.2 Password protection with security timeout
4.2.3.3 Password protection with cover coding
4.2.4 Cryptographic protection
4.2.4.1 General
10 4.2.4.2 Symmetric-key cryptography
4.2.4.3 Public-key cryptography
4.3 Application of access protection features
11 5 Features to protect Consumer Privacy
5.1 General
5.2 Unique chip ID or Tag ID
5.3 Chip selection with random number
5.4 Reduced read range on the tag
5.5 Untraceable
5.6 Hide
12 5.7 Kill
5.8 Destroy
5.9 Remove
6 Features to protect Data Security
6.1 Features to protect Read access to the tag data
6.1.1 Protection level
6.1.2 “Normal” Read access
6.1.3 Read (Lock) protection
6.1.3.1 General
6.1.3.2 Temporary read Lock protection
6.1.3.3 Permanent (or Perma) read Lock protection
13 6.1.4 Data protection using the TID
6.2 Features to protect Write access to the tag data
6.2.1 General
6.2.2 Protection level
6.2.3 “Normal” Write access
6.2.4 Write (Lock) protection
6.2.4.1 General
6.2.4.2 Temporary write Lock protection
6.2.4.3 Permanent (or Perma) write Lock protection
6.2.5 Write protection using the TID
6.2.6 Write protection using a digital signature in User Memory
14 7 Features for tag authentication
7.1 General
7.2 Verification using the Unique chip ID or Tag ID
7.3 Verification using the Unique chip ID or Tag ID with a digital signature
7.4 Verification using a password
8 Standards support of privacy capability features
18 9 Proprietary features
19 Bibliography
BSI PD CEN/TR 16672:2014
$102.76