BS ISO 22378:2022 2023
$167.15
Security and resilience. Authenticity, integrity and trust for products and documents. Guidelines for interoperable object identification and related authentication systems to deter counterfeiting and illicit trade
Published By | Publication Date | Number of Pages |
BSI | 2023 | 36 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
7 | Foreword |
8 | Introduction |
11 | 1 Scope 2 Normative references 3 Terms and definitions |
12 | 4 Abbreviated terms 5 Overview 5.1 General |
13 | 5.2 Object identification systems — Operating process 5.2.1 General 5.2.2 Object examination function |
14 | 5.2.3 Trusted query processing function 5.2.4 Trusted verification function 5.2.5 Attribute data management system 5.2.6 Response formatting function 5.3 Object identification systems — Set-up of trusted framework 5.3.1 General |
15 | 5.3.2 Owner 5.3.3 UID-generating function 5.3.4 Object information |
16 | 5.3.5 UID verification rules 5.3.6 Physical identity assignment 5.3.7 Object attribute data 5.3.8 Data management rules 5.3.9 Query processing rules 6 Key principals 6.1 General 6.2 Availability and timely response |
17 | 6.3 One authoritative source 6.4 Data management 6.5 Need to know 6.6 Data protection 6.7 Privacy |
18 | 6.8 Regulatory compliance 6.9 Vetting 6.10 Interoperability aspects 6.11 UID generation |
19 | 7 Plan and implementation 7.1 General 7.2 Determination of trusted services 7.2.1 General 7.2.2 Trust in the TQPF 7.2.3 Use of prefix or postfix 7.2.4 Object examination techniques |
20 | 7.3 Management of object identification data and attributes 7.3.1 General 7.3.2 Verify the service entry point (TQPF) 7.3.3 Maintenance and management 7.3.4 Privilege levels and user roles 7.3.5 Access control |
21 | 7.3.6 Ownership of transactional data 7.3.7 Use of transactional data 7.3.8 Governmental or intergovernmental agencies or competent authorities 7.4 Common frauds 7.4.1 Duplicate UID codes |
22 | 7.4.2 Substitution 7.4.3 Feature deception |
23 | 7.4.4 Malicious services 7.4.5 Malicious inspector 7.4.6 Insider attacks |
25 | Annex A (informative) Digital certificate (for inspectors) |
28 | Annex B (informative) Master data management |
29 | Annex C (informative) Illustrative implementation examples |
34 | Bibliography |