CEN TR 16672-2014 Information technology - Privacy capability features of current RFID technologies《信息技术 目前RFID技术的隐私功能特征》.pdf
《CEN TR 16672-2014 Information technology - Privacy capability features of current RFID technologies《信息技术 目前RFID技术的隐私功能特征》.pdf》由会员分享,可在线阅读,更多相关《CEN TR 16672-2014 Information technology - Privacy capability features of current RFID technologies《信息技术 目前RFID技术的隐私功能特征》.pdf(22页珍藏版)》请在麦多课文档分享上搜索。
1、BSI Standards PublicationPD CEN/TR 16672:2014Information technology Privacy capability features ofcurrent RFID technologiesPD CEN/TR 16672:2014 PUBLISHED DOCUMENTNational forewordThis Published Document is the UK implementation of CEN/TR 16672:2014.The UK participation in its preparation was entrust
2、ed to Technical Committee IST/34, Automatic identification and data capture techniques.A list of organizations represented on this committee can be obtained on request to its secretary.This publication does not purport to include all the necessary provisions of a contract. Users are responsible for
3、its correct application. The British Standards Institution 2014. Published by BSI Standards Limited 2014ISBN 978 0 580 83897 2ICS 35.240.60Compliance with a British Standard cannot confer immunity from legal obligations.This Published Document was published under the authority of the Standards Polic
4、y and Strategy Committee on 30 June 2014.Amendments/corrigenda issued since publicationDate T e x t a f f e c t e dPD CEN/TR 16672:2014TECHNICAL REPORT RAPPORT TECHNIQUE TECHNISCHER BERICHT CEN/TR 16672 June 2014 ICS 35.240.60 English Version Information technology - Privacy capability features of c
5、urrent RFID technologies Technologies de linformation - Fonctions de protection de la vie prive dans les technologies RFID actuelles Informationstechnik - Leistungsmerkmale fr den Schutz der Privatsphre in gegenwrtigen RFID-Technologien This Technical Report was approved by CEN on 20 January 2014. I
6、t has been drawn up by the Technical Committee CEN/TC 225. CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia
7、, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom. EUROPEAN COMMITTEE FOR STANDARDIZATION COMIT EUROPEN DE NORMALISATION EUROPISCHES KOMITEE FR NORMUNG CEN-CENELEC Management Centre: Avenue Marnix
8、 17, B-1000 Brussels 2014 CEN All rights of exploitation in any form and by any means reserved worldwide for CEN national Members. Ref. No. CEN/TR 16672:2014 EPD CEN/TR 16672:2014CEN/TR 16672:2014 (E) 2 Contents Page Foreword 4 Introduction .5 1 Scope 6 2 Terms and definitions .6 3 Symbols and abbre
9、viations 7 4 Access protection features .7 4.1 General 7 4.2 Overview of access protection features 7 4.2.1 General 7 4.2.2 No protection 7 4.2.3 Password protection .7 4.2.4 Cryptographic protection 8 4.3 Application of access protection features 9 5 Features to protect Consumer Privacy. 10 5.1 Gen
10、eral . 10 5.2 Unique chip ID or Tag ID 10 5.3 Chip selection with random number. 10 5.4 Reduced read range on the tag . 10 5.5 Untraceable . 10 5.6 Hide 11 5.7 Kill 11 5.8 Destroy . 11 5.9 Remove 11 6 Features to protect Data Security . 11 6.1 Features to protect Read access to the tag data . 11 6.1
11、.1 Protection level . 11 6.1.2 “Normal“ Read access . 11 6.1.3 Read (Lock) protection . 11 6.1.4 Data protection using the TID 12 6.2 Features to protect Write access to the tag data 12 6.2.1 General . 12 6.2.2 Protection level . 12 6.2.3 “Normal“ Write access . 12 6.2.4 Write (Lock) protection 12 6
12、.2.5 Write protection using the TID 12 6.2.6 Write protection using a digital signature in User Memory . 13 7 Features for tag authentication . 13 7.1 General . 13 7.2 Verification using the Unique chip ID or Tag ID 13 7.3 Verification using the Unique chip ID or Tag ID with a digital signature 13 7
13、.4 Verification using a password . 13 8 Standards support of privacy capability features . 13 9 Proprietary features 17 Bibliography . 18 PD CEN/TR 16672:2014CEN/TR 16672:2014 (E) 3 Foreword This document (CEN/TR 16672:2014) has been prepared by Technical Committee CEN/TC 225 “AIDC Technologies”, th
14、e secretariat of which is held by NEN. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. CEN and/or CENELEC shall not be held responsible for identifying any or all such patent rights. This Technical Report is one of a series of rel
15、ated deliverables, which comprise mandate 436 Phase 2. The other deliverables are: EN 16570, Information technology Notification of RFID The information sign and additional information to be provided by operators of RFID application systems EN 16571, Information technology RFID privacy impact assess
16、ment process EN 16656, Information technology - Radio frequency identification for item management - RFID Emblem (ISO/IEC 29160:2012, modified) CEN/TR 16684, Information technology Notification of RFID Additional information to be provided by operators CEN/TS 16685, Information technology Notificati
17、on of RFID The information sign to be displayed in areas where RFID interrogators are deployed CEN/TR 16669, Information technology Device interface to support ISO/IEC 18000-3 CEN/TR 16670, Information technology RFID threat and vulnerability analysis CEN/TR 16671, Information technology Authorisati
18、on of mobile phones when used as RFID interrogators CEN/TR 16673, Information technology RFID privacy impact assessment analysis for specific sectors CEN/TR 16674, Information technology Analysis of privacy impact assessment methodologies relevant to RFID PD CEN/TR 16672:2014CEN/TR 16672:2014 (E) 4
19、Introduction In response to the growing deployment of RFID systems in Europe, the European Commission published in 2007 the Communication COM (2007) 96 RFID in Europe: steps towards a policy framework. This Communication proposed steps which needed to be taken to reduce barriers to adoption of RFID
20、whilst respecting the basic legal framework safeguarding fundamental values such as health, environment, data protection, privacy and security. In December 2008, the European Commission addressed Mandate M/436 to CEN, CENELEC and ETSI in the field of ICT as applied to RFID systems. The Mandate M/436
21、 was accepted by the ESOs in the first months of 2009. The Mandate addresses the data protection, privacy and information aspects of RFID, and is being executed in two phases. Phase 1, completed in May 2011, identified the work needed to produce a complete framework of future RFID standards. The Pha
22、se 1 results are contained in the ETSI Technical Report TR 187 020, which was published in May 2011. Phase 2 is concerned with the execution of the standardisation work programme identified in the first phase. This Technical Report provides privacy and security characteristics that apply to the rele
23、vant standards. Furthermore it provides an overview of these standards and their respective support of the described features. PD CEN/TR 16672:2014CEN/TR 16672:2014 (E) 5 1 Scope The scope of the Technical Report is to identify technical characteristics of particular RFID air interface protocols tha
24、t need to be taken into consideration by operators of RFID systems in undertaking their privacy impact assessment. It also provides information for those operators who provide RFID-tagged items that are likely to be read by customers or other organizations. This Technical Report provides detailed pr
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- CENTR166722014INFORMATIONTECHNOLOGYPRIVACYCAPABILITYFEATURESOFCURRENTRFIDTECHNOLOGIES 信息技术 目前 RFID 技术

链接地址:http://www.mydoc123.com/p-592277.html