PRICES include / exclude VAT
Homepage>BS Standards>35 INFORMATION TECHNOLOGY. OFFICE MACHINES>35.040 Character sets and information coding>35.040.50 Automatic identification and data capture techniques>BS ISO/IEC 29167-19:2019 Information technology. Automatic identification and data capture techniques Crypto suite RAMON security services for air interface communications
Sponsored link
immediate downloadReleased: 2019-07-12
BS ISO/IEC 29167-19:2019 Information technology. Automatic identification and data capture techniques Crypto suite RAMON security services for air interface communications

BS ISO/IEC 29167-19:2019

Information technology. Automatic identification and data capture techniques Crypto suite RAMON security services for air interface communications

Format
Availability
Price and currency
English Secure PDF
Immediate download
399.30 EUR
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
39.93 EUR
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
119.79 EUR
English Hardcopy
In stock
399.30 EUR
Standard number:BS ISO/IEC 29167-19:2019
Pages:86
Released:2019-07-12
ISBN:978 0 580 51720 4
Status:Standard
DESCRIPTION

BS ISO/IEC 29167-19:2019


This standard BS ISO/IEC 29167-19:2019 Information technology. Automatic identification and data capture techniques is classified in these ICS categories:
  • 35.040.50 Automatic identification and data capture techniques

This document defines the Rabin-Montgomery (RAMON) crypto suite for the ISO/IEC 18000 series of air interfaces standards for radio frequency identification (RFID) devices. Its purpose is to provide a common crypto suite for security for RFID devices that can be referred to by ISO/IEC for air interface standards and application standards.

This document specifies a crypto suite for Rabin-Montgomery (RAMON) for air interface for RFID systems. The crypto suite is defined in alignment with existing air interfaces.

This document defines various authentication methods and methods of use for the cipher. A Tag and an Interrogator can support one, a subset, or all of the specified options, clearly stating what is supported.