BSI PD CEN/TR 16672:2014
$102.76
Information technology. Privacy capability features of current RFID technologies
Published By | Publication Date | Number of Pages |
BSI | 2014 | 22 |
The scope of the Technical Report is to identify technical characteristics of particular RFID air interface protocols that need to be taken into consideration by operators of RFID systems in undertaking their privacy impact assessment. It also provides information for those operators who provide RFID-tagged items that are likely to be read by customers or other organizations.
This Technical Report provides detailed privacy and security characteristics that apply to products that are compliant with specific air interface protocols, and also to variant models that comply with such standards.
The Technical Report also identifies proprietary privacy and security features which have been added to tags, which are problematic of being implemented in open systems which depend on interoperability between different devices. Such proprietary solutions, whilst being technically sound, in fact impede interoperability. The gap analysis thus identified can be used to encourage greater standardization.
PDF Catalog
PDF Pages | PDF Title |
---|---|
5 | Foreword |
6 | Introduction |
7 | 1 Scope 2 Terms and definitions |
8 | 3 Symbols and abbreviations 4 Access protection features 4.1 General 4.2 Overview of access protection features 4.2.1 General 4.2.2 No protection 4.2.3 Password protection 4.2.3.1 General |
9 | 4.2.3.2 Password protection with security timeout 4.2.3.3 Password protection with cover coding 4.2.4 Cryptographic protection 4.2.4.1 General |
10 | 4.2.4.2 Symmetric-key cryptography 4.2.4.3 Public-key cryptography 4.3 Application of access protection features |
11 | 5 Features to protect Consumer Privacy 5.1 General 5.2 Unique chip ID or Tag ID 5.3 Chip selection with random number 5.4 Reduced read range on the tag 5.5 Untraceable 5.6 Hide |
12 | 5.7 Kill 5.8 Destroy 5.9 Remove 6 Features to protect Data Security 6.1 Features to protect Read access to the tag data 6.1.1 Protection level 6.1.2 “Normal” Read access 6.1.3 Read (Lock) protection 6.1.3.1 General 6.1.3.2 Temporary read Lock protection 6.1.3.3 Permanent (or Perma) read Lock protection |
13 | 6.1.4 Data protection using the TID 6.2 Features to protect Write access to the tag data 6.2.1 General 6.2.2 Protection level 6.2.3 “Normal” Write access 6.2.4 Write (Lock) protection 6.2.4.1 General 6.2.4.2 Temporary write Lock protection 6.2.4.3 Permanent (or Perma) write Lock protection 6.2.5 Write protection using the TID 6.2.6 Write protection using a digital signature in User Memory |
14 | 7 Features for tag authentication 7.1 General 7.2 Verification using the Unique chip ID or Tag ID 7.3 Verification using the Unique chip ID or Tag ID with a digital signature 7.4 Verification using a password 8 Standards support of privacy capability features |
18 | 9 Proprietary features |
19 | Bibliography |