Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

ISO/IEC 29167-1:2012

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

View Superseded by
withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

Information technology Automatic identification and data capture techniques Part 1: Air interface for security services and file management for RFID architecture

Available format(s)

Hardcopy , PDF 1 User , PDF 3 Users , PDF 5 Users , PDF 9 Users

Withdrawn date

02-04-2019

Language(s)

English

Published date

05-03-2012

Preview

ISO/IEC 29167-1:2012 defines the architecture for security and file management for the ISO/IEC 18000 air interface standards for radio frequency identification (RFID) devices. It provides a common technical specification for security and file management for RFID devices that can be used by ISO committees developing RFID application standards.

ISO/IEC 29167-1:2012 specifies architecture for

  • untraceability,
  • security services, and
  • file management

as a further optional extension of the air interface. Both security and file management are defined in alignment with existing air interfaces and ISO/IEC 29167-1:2012 only covers extensions on security and file management beyond the scope of the ISO/IEC 18000 air interfaces.

ISO/IEC 29167-1:2012 defines various security features called security mechanisms that can be implemented by a tag depending on the application. A tag can support one, a subset, or all of the specified security mechanisms. For an interrogator it is possible to get information about the security mechanisms that are actually implemented and supported by a tag. Moreover, it has been considered that adding new security mechanisms remains possible. Besides signaling the presence of certain security services, further details of the mechanisms such as utilized encryption algorithm and key length also need to be specified and accessible.

DocumentType
Standard
Pages
7
PublisherName
International Organization for Standardization
Status
Withdrawn
SupersededBy

View more information
$118.72
Including GST where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more