pm#process_supporting_the_security_of_some_RFID_reader
exclusion: pm#process_supporting_the_security_of_some_RFID_tag pm#process_supporting_the_security_of_some_RFID_related_network pm#process_supporting_the_security_of_some_RFID_related_application
supertype: pm#process_supporting_the_security_of_some_RFID_element
object: bridge#RFID_reader [49..*,49..*] (pm)
subtype: bridge#process_supporting_authentication_in_some_RFID_reader__id_req_rea_1___RC3 Mechanisms must be in place for an RFID reader to authenticate its identity and function, to tags and network components
subtype: bridge#process_supporting_the_access_control_of_some_RFID_reader__id_req_rea_6 The reader must implement access control on any interfaces that allow the modification of reader operation or access to internal information.
subtype: bridge#process_forbidding_corrupted_or_fake_readers_to_access_internal_business__RC2
subtype: bridge#process_supporting_the_integrity_of_information_in/from_some_RFID_reader__id_req_rea_7___R12__r12 Injection of data from readers needs to be controlled in order to avoid the data corruption with false information.
subtype: bridge#process_permitting_RFID_reader_to_read_and_correctly_transmit_tag_information__RI3
subtype: bridge#process_protecting_companies_internal_systems_from_attacks_by_corrupted_malicious_or_fake_RFID_readers__RI1
subtype: bridge#process_preventing_an_RFID_reader_to_allow_injection_attacks_from_malicious_tag_data__RO3
subtype: bridge#process_preventing_a_compromised_RFID_reader_to_provide_means_to_attack_other_IT_systems__RO2
subtype: bridge#process_supporting_the_confidentiality_of_communication_with_a_RFID_reader__id_req_rea_2
subtype: bridge#process_permitting_an_RFID_reader_to_identify_in_which_way_the_tag_information_is_encoded_and_to_implement_different_protocols_simultaneously__id_req_rea_2
subtype: bridge#process_forbidding_corrupted_readers_to_eavesdrop_on_tag_events__RC1
subtype: bridge#process_supporting_the_privacy_of_information_in_some_RFID_reader
subtype: bridge#identification_or_use_by_a_RFID_reader_of_the_right_password_or_shared_secret_for_communications__id_req_rea_4a The reader must be able to identify which secret should be applied to encoded information. The right password or shared secret should be provided to the right reader with secure communication.
subtype: bridge#secure_storage_of_the_secret_information_by_a_RFID_reader__id_req_rea_4b The secret information required to decode the tag must be maintained in a secure memory part of the reader. A secret can not be disclosed to the wrong application, user or reader owner.
subtype: bridge#process_supporting_interoperability_from/to_some_RFID_reader
subtype: bridge#process_supporting_the_compliance_of_some_RFID_reader_with_some_reading_policy__id_req_rea_8a It is mandatory to provide a mechanism to guarantee that the RFID reader complies with a specific reading policy in support of fair information practice principles.
subtype: bridge#process_permitting_a_secure_RFID_reader_to_operate_with_secure_and_insecure_RFID_tags__id_req_rea_8b___RO1 Secure reader should be able to operate with secure and insecure RFID tags.
No statement uses or specializes pm#process_supporting_the_security_of_some_RFID_reader; click here to add one.