{"id":418393,"date":"2024-10-20T06:20:47","date_gmt":"2024-10-20T06:20:47","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-223782022-2023\/"},"modified":"2024-10-26T11:50:40","modified_gmt":"2024-10-26T11:50:40","slug":"bs-iso-223782022-2023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-223782022-2023\/","title":{"rendered":"BS ISO 22378:2022 2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4 Abbreviated terms 5 Overview 5.1 General <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.2 Object identification systems \u2014 Operating process 5.2.1 General 5.2.2 Object examination function <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.2.3 Trusted query processing function 5.2.4 Trusted verification function 5.2.5 Attribute data management system 5.2.6 Response formatting function 5.3 Object identification systems \u2014 Set-up of trusted framework 5.3.1 General <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.3.2 Owner 5.3.3 UID-generating function 5.3.4 Object information <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.3.5 UID verification rules 5.3.6 Physical identity assignment 5.3.7 Object attribute data 5.3.8 Data management rules 5.3.9 Query processing rules 6 Key principals 6.1 General 6.2 Availability and timely response <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.3 One authoritative source 6.4 Data management 6.5 Need to know 6.6 Data protection 6.7 Privacy <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.8 Regulatory compliance 6.9 Vetting 6.10 Interoperability aspects 6.11 UID generation <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7 Plan and implementation 7.1 General 7.2 Determination of trusted services 7.2.1 General 7.2.2 Trust in the TQPF 7.2.3 Use of prefix or postfix 7.2.4 Object examination techniques <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 7.3 Management of object identification data and attributes 7.3.1 General 7.3.2 Verify the service entry point (TQPF) 7.3.3 Maintenance and management 7.3.4 Privilege levels and user roles 7.3.5 Access control <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 7.3.6 Ownership of transactional data 7.3.7 Use of transactional data 7.3.8 Governmental or intergovernmental agencies or competent authorities 7.4 Common frauds 7.4.1 Duplicate UID codes <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 7.4.2 Substitution 7.4.3 Feature deception <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 7.4.4 Malicious services 7.4.5 Malicious inspector 7.4.6 Insider attacks <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Annex A (informative) Digital certificate (for inspectors) <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Annex B (informative) Master data management <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Annex C (informative) Illustrative implementation examples <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Security and resilience. Authenticity, integrity and trust for products and documents. Guidelines for interoperable object identification and related authentication systems to deter counterfeiting and illicit trade<\/b><\/p>\n |