X.1171-2009

Threats and requirements for protection of personally identifiable information in applications using tag-based identification (Study Group 17)


 

 

非常抱歉,我们暂时无法提供预览,您可以试试: 免费下载 X.1171-2009 前三页,或者稍后再访问。

如果您需要购买此标准的全文,请联系:

点击下载后,生成下载文件时间比较长,请耐心等待......

 

标准号
X.1171-2009
发布日期
2009年02月01日
实施日期
2009年10月27日
废止日期
中国标准分类号
/
国际标准分类号
/
发布单位
ITU-T - International Telecommunication Union/ITU Telcommunication Sector
引用标准
26
适用范围
The scope of this Recommendation covers the following objectives including threats and requirements for protection of personally identifiable information (PII) in applications using tag-based identification as described below: ?C To describe PII threats in a business-to-customer (B2C)-based environment of applications using tag-based identification; ?C To identify requirements for PII protection in a B2C-based environment of applications using tag-based identification. The following objectives are not covered by the scope of this Recommendation: ?C to analyse the general security threats and requirements of applications using tag-based identification; ?C to analyse the PII threats and requirements between an identification (ID) tag and an ID terminal; ?C to analyse the PII threats and requirements depending on the specific ID tagging and reading method@ e.g.@ radio frequency identification (RFID) tag and ID terminal; ?C to define and develop the message formats and mechanism for protection of PII based on the user PII policy profile of an application using tag-based identification. NOTE 1 ?C Further work will be necessary to define such formats@ which may not be restricted to the sole protection of PII of tag-based identification use@ but perhaps with a more general (privacy) approach. In this Recommendation@ the ID tag user has the capability for controlling the ID tag itself@ and therefore it is assumed that the ID tag user is responsible for the behaviour of the ID tag. NOTE 2 ?C In some cases@ the ID tag user cannot have any capability for controlling the ID tag. For example@ someone buys a tagged product and the manufacturer requires the ID tag to remain active for warranty purposes. In this scenario@ the ID tag user may be just a person carrying and using the tagged product. Hence@ this Recommendation cannot be applied to solve the above problem for this case. This scenario involves some legislation and policy issues (see [b-OECD]) and this issue can be addressed in another Recommendation.




Copyright ©2007-2022 ANTPEDIA, All Rights Reserved
京ICP备07018254号 京公网安备1101085018 电信与信息服务业务经营许可证:京ICP证110310号