{"id":355900,"date":"2024-10-20T01:10:00","date_gmt":"2024-10-20T01:10:00","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-129312012\/"},"modified":"2024-10-26T01:29:38","modified_gmt":"2024-10-26T01:29:38","slug":"bs-iso-129312012","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-129312012\/","title":{"rendered":"BS ISO 12931:2012"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
3<\/td>\nCVP_Secretariat_Loca <\/td>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1\tScope
2\tTerms and definitions <\/td>\n<\/tr>\n
13<\/td>\n3\tGeneral principles
3.1\tIntroduction <\/td>\n<\/tr>\n
14<\/td>\n3.2\tAuthentication process
3.3\tPerformance requirements for authentication solutions <\/td>\n<\/tr>\n
15<\/td>\n3.4\tCategorization of authentication solutions <\/td>\n<\/tr>\n
17<\/td>\n4\tPerformance criteria specification based on risk analysis
4.1\tIntroduction <\/td>\n<\/tr>\n
18<\/td>\n4.2\tPerformance criteria categories
4.3\tCriteria for the selection of authentication elements <\/td>\n<\/tr>\n
22<\/td>\n4.4\tAttack resistance criteria for the selection of authentication tools <\/td>\n<\/tr>\n
23<\/td>\n4.5\tCriteria for the selection of authentication solutions <\/td>\n<\/tr>\n
27<\/td>\n5\tEffectiveness assessment of the authentication solution
5.1\tGeneral <\/td>\n<\/tr>\n
28<\/td>\n5.2\tEffectiveness assessment in manufacturing of authentication elements <\/td>\n<\/tr>\n
29<\/td>\n5.3\tEffectiveness measurement in the normal verification\/authentication situation <\/td>\n<\/tr>\n
30<\/td>\n5.4\tEffectiveness assessment in the emergency verification\/authentication situation
5.5\tSummary of effectiveness assessments <\/td>\n<\/tr>\n
31<\/td>\nAnnex\u00a0A
\n(informative)<\/p>\n

Assessment grid <\/td>\n<\/tr>\n

35<\/td>\nAnnex\u00a0B
\n(informative)<\/p>\n

Control means access table <\/td>\n<\/tr>\n

36<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Performance criteria for authentication solutions used to combat counterfeiting of material goods<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2013<\/td>\n40<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":355904,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-355900","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/355900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/355904"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=355900"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=355900"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=355900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}