{"id":355900,"date":"2024-10-20T01:10:00","date_gmt":"2024-10-20T01:10:00","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-129312012\/"},"modified":"2024-10-26T01:29:38","modified_gmt":"2024-10-26T01:29:38","slug":"bs-iso-129312012","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-129312012\/","title":{"rendered":"BS ISO 12931:2012"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
3<\/td>\n | CVP_Secretariat_Loca <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1\tScope 2\tTerms and definitions <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 3\tGeneral principles 3.1\tIntroduction <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 3.2\tAuthentication process 3.3\tPerformance requirements for authentication solutions <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 3.4\tCategorization of authentication solutions <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 4\tPerformance criteria specification based on risk analysis 4.1\tIntroduction <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 4.2\tPerformance criteria categories 4.3\tCriteria for the selection of authentication elements <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 4.4\tAttack resistance criteria for the selection of authentication tools <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 4.5\tCriteria for the selection of authentication solutions <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 5\tEffectiveness assessment of the authentication solution 5.1\tGeneral <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5.2\tEffectiveness assessment in manufacturing of authentication elements <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5.3\tEffectiveness measurement in the normal verification\/authentication situation <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 5.4\tEffectiveness assessment in the emergency verification\/authentication situation 5.5\tSummary of effectiveness assessments <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Annex\u00a0A \n(informative)<\/p>\n Assessment grid <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Annex\u00a0B \n(informative)<\/p>\n Control means access table <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Performance criteria for authentication solutions used to combat counterfeiting of material goods<\/b><\/p>\n |