Home>ISO Standards>BS ISO 28560-1:2014 pdf free

BS ISO 28560-1:2014 pdf free

BS ISO 28560-1:2014 pdf free.Information and documentation – RFID in libraries
RFID tags that comply with this International Standard have a mandatory AFI system data element and should only use one of the two AFI values that are listed above. The AFI together with the primary item identifier and owner institution (ISIL) guarantee global uniqueness of the item (see Annex B).
The AFI has a feature that enables the application to specify that the AFI is to be locked, or to be left unlocked. Once locked, the AFI cannot be unlocked. The AFI shall not be locked if it is used as part of an item security system where two values of the AFI are used, one for on-loan items and one for in-stock items. If other security mechanisms are used, then the AFI can be locked at the individual library’s discretion. Before locking, libraries should give consideration to the item’s use in other libraries through cooperative arrangements or interlibrary loans (for example, if the recipient library wanted to use the AFI for security while the item was in its possession even though the donor library did not).
Various approaches can be used for securing library items against unauthorized removal. The choice of an item security system is outside the scope of this International Standard and it is the responsibility of solution providers to develop particular schemes for libraries to choose. Some options are discussed in Annex E, without any comment on their particular merits. Combinations of these options can also be provided in particular systems.
The DSFID can be present in certain types of tags as a system data element. If the DSFID is hard-coded,in other words has a specific memory allocation, then the write-DSFID command in the air interface protocol is usually supported by a lock-DSFID command.
When data elements are not programmed in a non-volatile memory or are not locked, they can be modified by unauthorized persons. This part of ISO 28560 does not specify methods for maintaining the integrity of the data. However, as described for AFI values in 5.2.2, locking of the data stored in the tag user memory is a possible method. Some types of tag hardware can provide additional (often proprietary) security tools such as the following.BS ISO 28560-1 pdf download.

Related standards