Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines for interoperable object identification and related authentication systems to deter counterfeiting and illicit trade

This document establishes a framework for identification and authentication systems. It provides recommendations and best practice that include: — management and verification of identifiers; — physical representation of identifiers; — participants’ due diligence; — vetting of all participants within the system; — relationship between the unique identifier (UID) and possible authentication elements related to it; — questions that deal with the identification of the inspector and any authorized access to privileged information about the object; — inspector access history (logs). The model described in this document is intended to determine the common functions of different systems. This document describes processes, functions and functional units of a generic model. It does not specify any specific technical solutions. Object identification systems can incorporate other functions and features such as supply chain traceability, quality traceability, marketing activities and others, but these aspects are out of scope of this document. NOTE This document does not refer to industry-specific requirements such as GS1 Global Trade Item Number (GTIN).

Sécurité et résilience — Authenticité, intégrité et confiance pour les produits et les documents — Lignes directrices pour l’identification interopérable d’objets et systèmes d’authentification associés destinés à décourager la contrefaçon et le commerce illicite

General Information

Status
Published
Publication Date
07-Dec-2022
Current Stage
6060 - International Standard published
Start Date
08-Dec-2022
Due Date
15-Sep-2023
Completion Date
08-Dec-2022
Ref Project

Relations

Buy Standard

Standard
ISO 22378:2022 - Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines for interoperable object identification and related authentication systems to deter counterfeiting and illicit trade Released:8. 12. 2022
English language
24 pages
sale 15% off
Preview
sale 15% off
Preview
Draft
REDLINE ISO/PRF 22378 - Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines for interoperable object identification and related authentication systems to deter counterfeiting and illicit trade Released:21. 10. 2022
English language
24 pages
sale 15% off
Preview
sale 15% off
Preview
Draft
ISO/PRF 22378 - Security and resilience — Authenticity, integrity and trust for products and documents — Guidelines for interoperable object identification and related authentication systems to deter counterfeiting and illicit trade Released:21. 10. 2022
English language
24 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

INTERNATIONAL ISO
STANDARD 22378
First edition
2022-12
Security and resilience — Authenticity,
integrity and trust for products
and documents — Guidelines for
interoperable object identification
and related authentication systems to
deter counterfeiting and illicit trade
Sécurité et résilience — Authenticité, intégrité et confiance pour les
produits et les documents — Lignes directrices pour l’identification
interopérable d’objets et systèmes d’authentification associés destinés
à décourager la contrefaçon et le commerce illicite
Reference number
ISO 22378:2022(E)
© ISO 2022

---------------------- Page: 1 ----------------------
ISO 22378:2022(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO 2022
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii
  © ISO 2022 – All rights reserved

---------------------- Page: 2 ----------------------
ISO 22378:2022(E)
Contents Page
Foreword .v
Introduction . vi
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated terms . 2
5 Overview . 2
5.1 General . 2
5.2 Object identification systems — Operating process . 3
5.2.1 General . 3
5.2.2 Object examination function . 3
5.2.3 Trusted query processing function . 4
5.2.4 Trusted verification function . 4
5.2.5 Attribute data management system . 4
5.2.6 Response formatting function . 4
5.3 Object identification systems — Set-up of trusted framework . 4
5.3.1 General . 4
5.3.2 Owner . 5
5.3.3 UID-generating function . . 5
5.3.4 Object information . 5
5.3.5 UID verification rules . 6
5.3.6 Physical identity assignment . 6
5.3.7 Object attribute data . 6
5.3.8 Data management rules . 6
5.3.9 Query processing rules . 6
6 Key principals . 6
6.1 General . 6
6.2 Availability and timely response . 6
6.3 One authoritative source . 7
6.4 Data management . 7
6.5 Need to know . 7
6.6 Data protection . 7
6.7 Privacy . 7
6.8 Regulatory compliance . 8
6.9 Vetting . 8
6.10 Interoperability aspects . . 8
6.11 UID generation . 8
7 Plan and implementation . 9
7.1 General . 9
7.2 Determination of trusted services. 9
7.2.1 General . 9
7.2.2 Trust in the TQPF . 9
7.2.3 Use of prefix or postfix . . 9
7.2.4 Object examination techniques . 9
7.3 Management of object identification data and attributes . 10
7.3.1 General . 10
7.3.2 Verify the service entry point (TQPF) . 10
7.3.3 Maintenance and management . 10
7.3.4 Privilege levels and user roles . 10
7.3.5 Access control . 10
7.3.6 Ownership of transactional data . 11
7.3.7 Use of transactional data . 11
iii
© ISO 2022 – All rights reserved

---------------------- Page: 3 ----------------------
ISO 22378:2022(E)
7.3.8 Governmental or intergovernmental agencies or competent authorities . 11
7.4 Common frauds . 11
7.4.1 Duplicate UID codes . 11
7.4.2 Substitution. 12
7.4.3 Feature deception . .12
7.4.4 Malicious services . 13
7.4.5 Malicious inspector .13
7.4.6 Insider attacks .13
Annex A (informative) Digital certificate (for inspectors) .15
Annex B (informative) Master data management .18
Annex C (informative) Illustrative implementation examples .19
Bibliography .24
iv
  © ISO 2022 – All rights reserved

---------------------- Page: 4 ----------------------
ISO 22378:2022(E)
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO’s adherence to
the World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see
www.iso.org/iso/foreword.html.
This document was prepared by Technical Committee ISO/TC 292, Security and resilience.
This first edition cancels and replaces ISO 16678:2014, which has been technically revised.
The main changes are as follows:
— the title and number have been updated to follow the same structure as all other documents
developed by ISO/TC 292.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html.
v
© ISO 2022 – All rights reserved

---------------------- Page: 5 ----------------------
ISO 22378:2022(E)
Introduction
This document is based on three foundational assumptions:
— detecting counterfeit objects is a complex and often difficult task;
— accurate identity information about the object in question simplifies the counterfeit detection
process;
— accurate identity information is often difficult and hard to find.
The main objective of this document is to simplify access and delivery of accurate identity information
to inspectors when authenticating objects.
To accomplish this objective, the document provides guidance intended to make object identity
information easier to find and use. Identity data and information can be found in many places, including
verification and authentication systems. This document will make it easier for inspectors to access
identity information and granting inspectors access to reliable identity information helps facilitate the
detection of counterfeits.
This document focuses attention on routing requests for object information to the appropriate
authoritative service and then routing responses back to inspectors.
Object identification systems commonly use unique identifiers (UID) to reference or access object
information. UID can be assigned to a class of objects or can be assigned to distinct object. In either case,
the UID can enhance detection of counterfeiting and fraud, although UIDs assigned to single instances
can be more efficient.
This document contains:
— terms and definitions;
— an overview on how object information is used to detect counterfeits;
— principles, concepts and values;
— recommendations on how to improve interoperability of systems capable of providing object
information to inspectors;
— specific examples that illustrate some of the concepts presented.
This document enables reliable and safe object identification to deter the introduction of illegal objects
to the market.
It includes a framework with the objective to increase trust by making object identification solutions
interoperable. For example, the framework describes method and solutions for how to:
— detect some counterfeits without authenticating products;
— evaluate an authentication element;
— formally prove that a remote description of an object can be trusted.
This is document is part of a family of standards which includes ISO 22380, ISO 22381, ISO 22382,
ISO 22383, ISO 22384.
One goal of this document is to describe a framework in which disparate object identification solutions
are interoperable and trust is increased, and therefore will be used more frequently. The framework
should also include solutions which simply detect some counterfeits without authenticating products.
Likewise, the framework should also include a solution which only evaluates an authentication element.
vi
  © ISO 2022 – All rights reserved

---------------------- Page: 6 ----------------------
ISO 22378:2022(E)
Assuming that the object identification systems themselves can also be counterfeited and copied,
This document establishes a method to formally prove that a remote description of an object can be
trusted. establishes a method to formally prove that a remote description of an object can be trusted.
Consideration is given to prevent interference between different independent implementations of such
systems and to allow an unambiguous unique identification reference to service multiple use-cases and
applications.
The theory supporting the design of the system is that a lack of trust and lack of interoperability
introduces “friction” for users. By reducing this friction, there will be greater awareness and usage, and
therefore greater detection and deterrence of fraud.
This document is complemented by ISO 22381:2018, which guides the establishment and set-up of
interoperability.
vii
© ISO 2022 – All rights reserved

---------------------- Page: 7 ----------------------
INTERNATIONAL STANDARD ISO 22378:2022(E)
Security and resilience — Authenticity, integrity
and trust for products and documents — Guidelines
for interoperable object identification and related
authentication systems to deter counterfeiting and illicit
trade
1 Scope
This document establishes a framework for identification and authentication systems. It provides
recommendations and best practice that include:
— management and verification of identifiers;
— physical representation of identifiers;
— participants’ due diligence;
— vetting of all participants within the system;
— relationship between the unique identifier (UID) and possible authentication elements related to it;
— questions that deal with the identification of the inspector and any authorized access to privileged
information about the object;
— inspector access history (logs).
The model described in this document is intended to determine the common functions of different
systems.
This document describes processes, functions and functional units of a generic model. It does not
specify any specific technical solutions.
Object identification systems can incorporate other functions and features such as supply chain
traceability, quality traceability, marketing activities and others, but these aspects are out of scope of
this document.
NOTE This document does not refer to industry-specific requirements such as GS1 Global Trade Item
Number (GTIN).
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
ISO 22300, Security and resilience — Vocabulary
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO 22300 apply.
ISO and IEC maintain terminology databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https:// www .iso .org/ obp
1
© ISO 2022 – All rights reserved

---------------------- Page: 8 ----------------------
ISO 22378:2022(E)
— IEC Electropedia: available at https:// www .electropedia .org/
4 Abbreviated terms
ADMS attribute data management system
[8]
AI application identifier (see ANSI MH 10.8.2 )
CA Certification Authority
[8]
DI data identifier (see ANSI MH 10.8.2 )
IP Internet Protocol
OEF object examination function
RFF response formatting function
TQPF trusted query processing function
TVF trusted verification function
UID unique identifier
SLA service level agreement
5 Overview
5.1 General
The advantage of interoperability of these systems is to enhance detection of counterfeiting and fraud
by:
— increasing use by specific user groups;
— increasing the number of inspected objects;
— increasing access to the authoritative sources;
— lowering the cost of:
— training;
— equipment;
— development;
— deployment;
— inspection time.
Once interoperability is achieved and these systems are widely deployed, a trusted entity uses an
identifier to make inquiries about an object to guide disposition decisions regarding the object. The
inspector will have credible evidence that the information provided in response to the inquiry is
accurate and trustworthy.
All participants should perform their roles with due diligence considering the following:
— Auditing and vetting of the service providers should be considered to ensure they are acting in good
faith and are not threat agents operating from behind a deceptive “store front”.
2
  © ISO 2022 – All rights reserved

---------------------- Page: 9 ----------------------
ISO 22378:2022(E)
— Auditing and vetting of the manufacturers should be considered to ensure they are following
documented processes and feed accurate information into the systems.
— The interested parties with a need-to-know should obtain appropriate credentials to process
inquiries, so that the rights holder can release information in a socially responsible manner.
5.2 Object identification systems — Operating process
5.2.1 General
Object identification systems typically consist of functional units as depicted in the model shown in
Figure 1.
Figure 1 — Object identification model
The model makes no assumptions on specific implementation of the functions.
Multiple instances of a function can exist across the system. Different functions can be combined into a
single service.
Illustrative examples implementing this model are given in Annex C.
5.2.2 Object examination function
The inspector examines an object of interest (such as a material good) to determine if the object has
a UID. If a UID is found, further examination can be required to determine which TQPF(s) are likely to
3
© ISO 2022 – All rights reserved

---------------------- Page: 10 ----------------------
ISO 22378:2022(E)
know of this UID. The function forms a query that can consist of only a UID, a combination of UID with
the inspector’s credentials, or other physical attribute data including intrinsic authentication elements
that can uniquely identify an object such as a digital image. The OEF ends when a query is submitted to
one or more TQPF. When the process is iterated, the OEF can evaluate the response of a previous query.
5.2.3 Trusted query processing function
A TQPF routes information between the other functions according to defined rules. The TQPF can
examine credentials from requesting parties according to defined rules. The TQPF can be distributed
across multiple services.
EXAMPLE 1 A TQPF routes a query formed by an OEF to the appropriate TVF.
EXAMPLE 2 A TQPF combines the verification or authentication response from a TVF with any credentials
from an inspector to form a query into an ADMS.
5.2.4 Trusted verification function
The TVF verifies whether the UID exists within the domain. The TVF should check the credentials of
the requesting TQPF. The TVF should enforce access privileges based on defined rules. It can respond
to the source of the query or through one or more other TQPF. The response would typically include
verification information about the UID (e.g. “is the UID valid or not?”) TVF can also generate alerts to
interested parties. TVF should protect sensitive data from unauthorized access.
The TVF can execute an authenticating procedure or algorithm against the information (data) received.
5.2.5 Attribute data management system
An ADMS is the authoritative source of object master data. There should be only one master data
record for each object attribute. If multiple instances of attribute data records exist, only one should
be “master” and all others “subordinate”. Different object attributes can reside in different databases.
Multiple databases can exist in federated environment.
An ADMS receives a response (via a TQPF) from a TVF. The ADMS verifies credentials of both the
requesting TQPF, TVF and the credentials of the inspector. Access privileges should be based on
credentials and rules. The ADMS responds with data selected corresponding to the request and filtered
by rules. The response can resolve all the inspector’s questions or can include information on how to
proceed. If a response contains further instructions, an inspector decides if further action should be
taken by initiating a new query.
Attributes in an ADMS can include information details on how to authenticate objects or proceed with
further examination.
The ADMS should protect sensitive data from unauthorized access.
5.2.6 Response formatting function
This function converts ADMS responses into a defined format and communicates them to the inspector.
This is the end of the process.
In some cases, the inspection process can be iterated based on the results given by the ADMS or
depending on the architecture of the system.
5.3 Object identification systems — Set-up of trusted framework
5.3.1 General
The identification and authentication system should operate in accordance with the following
definitions, rules, data and data relationships.
4
  © ISO 2022 – All rights reserved

---------------------- Page: 11 ----------------------
ISO 22378:2022(E)
Figure 2 shows how the example model can be configured.

Figure 2 — Set-up and configuration
5.3.2 Owner
Owners determine all of the detail on whom, how, where and when access rights to attribute data are
granted. Owners choose the service providers that implement the functional block and provide the
access and business rules to the various providers.
5.3.3 UID-generating function
The UID-generating function should ensure UIDs are unique within the domain the service operates.
UID can be generated following a specific format or function that can include object specific attribute
data.
The function also generates or produces the verification rules that TVF use when considering a specific
UID during a query.
5.3.4 Object information
Object information should be a subset of object attribute data or pointer (reference) to object attribute
data.
5
© ISO 2022 – All rights reserved

---------------------- Page: 12 ----------------------
ISO 22378:2022(E)
5.3.5 UID verification rules
The algorithms and procedures that allow a TVF to determine if a UID is valid within the domain. They
can include algorithms and processes that allow authentication. They can also include a list of generated
UIDs.
5.3.6 Physical identity assignment
In creating the link between a UID and an object, assignment can be accomplished by enrolment of an
intrinsic UID.
5.3.7 Object attribute data
Object attribute data refers to the attributes sufficient to identify an object or class of objects. Owner
can include additional attributes at their discretion.
5.3.8 Data management rules
The policies regarding protection and disclosure of attribute data include, but are not limited to:
— access rights, including:
— requiremen
...

© ISO 2022 – All rights reserved
ISO/PRF 22378:2022(E)
Date: 2022-09-2010-21
ISO/TC 292
Secretariat: SIS
Security and resilience — Authenticity, integrity and trust for
products and documents — Guidelines for interoperable object
identification and related authentication systems to deter
counterfeiting and illicit trade
Sécurité et résilience — Authenticité, intégrité et confiance pour les produits et les documents —
Lignes directrices pour l’identification interopérable d’objets et systèmes d’authentification
associés destinés à décourager la contrefaçon et le commerce illicite

---------------------- Page: 1 ----------------------
ISO/PRF 22378:2022(E)
© ISO 2022
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of
this publication may be reproduced or utilized otherwise in any form or by any means, electronic or
mechanical, including photocopying, or posting on the internet or an intranet, without prior written
permission. Permission can be requested from either ISO at the address below or ISO’s member body in the
country of the requester.
ISO Copyright Office
CP 401 • CH-1214 Vernier, Geneva
Phone: + 41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland.
ii © ISO 2022 – All rights reserved

---------------------- Page: 2 ----------------------
ISO/PRF 22378:2022(E)
Contents
Foreword . v
Introduction .vi
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 2
4 Abbreviated terms . 2
5 Overview . 2
5.1 General . 2
5.2 Object identification systems — Operating process . 3
5.2.1 General . 3
5.2.2 Object examination function . 4
5.2.3 Trusted query processing function . 4
5.2.4 Trusted verification function . 4
5.2.5 Attribute data management system . 4
5.2.6 Response formatting function. 5
5.3 Object identification systems — Set-up of trusted framework . 5
5.3.1 General . 5
5.3.2 Owner . 5
5.3.3 UID-generating function . 6
5.3.4 Object information . 6
5.3.5 UID verification rules . 6
5.3.6 Physical identity assignment . 6
5.3.7 Object attribute data . 6
5.3.8 Data management rules . 6
5.3.9 Query processing rules . 6
6 Key principals . 7
6.1 General . 7
6.2 Availability and timely response . 7
6.3 One authoritative source . 7
6.4 Data management . 7
6.5 Need to know . 7
6.6 Data protection . 8
6.7 Privacy . 8
6.8 Regulatory compliance . 8
6.9 Vetting . 8
6.10 Interoperability aspects . 8
6.11 UID generation . 9
7 Plan and implementation . 9
7.1 General . 9
7.2 Determination of trusted services. 9
7.2.1 General . 9
7.2.2 Trust in the TQPF . 9
7.2.3 Use of prefix or postfix . 10
7.2.4 Object examination techniques . 10
7.3 Management of object identification data and attributes . 10
© ISO 2022 – All rights reserved iii

---------------------- Page: 3 ----------------------
ISO/PRF 22378:2022(E)
7.3.1 General .10
7.3.2 Verify the service entry point (TQPF) .10
7.3.3 Maintenance and management .11
7.3.4 Privilege levels and user roles .11
7.3.5 Access control .11
7.3.6 Ownership of transactional data .11
7.3.7 Use of transactional data .11
7.3.8 Governmental or intergovernmental agencies or competent authorities .12
7.4 Common frauds .12
7.4.1 Duplicate UID codes .12
7.4.2 Substitution .13
7.4.3 Feature deception .13
7.4.4 Malicious services .13
7.4.5 Malicious inspector .14
7.4.6 Insider attacks .14
Annex A (informative) Digital certificate (for inspectors) .15
Annex B (informative) Master data management .18
Annex C (informative) Illustrative implementation examples .19
Bibliography .24

iv © ISO 2022 – All rights reserved

---------------------- Page: 4 ----------------------
ISO/PRF 22378:2022(E)
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work. ISO
collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shouldshall not be held responsible for identifying any or all such patent rights. Details
of any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO’s adherence to the World
Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see
www.iso.org/iso/foreword.html.
This document was prepared by Technical Committee ISO/TC 292, Security and resilience.
This secondfirst edition of ISO 22378 cancels and replaces the first edition (ISO 16678:2014),, which has
been technically revised.
The main changes are as follows:
— th etitlethe title and number hashave been updated to follow the same structure as all other
documents developed by ISO/TC 292;.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html.
© ISO 2022 – All rights reserved v

---------------------- Page: 5 ----------------------
ISO/PRF 22378:2022(E)
Introduction
This document is based on three foundational assumptions:
— detecting counterfeit objects is a complex and often difficult task;
— accurate identity information about the object in question simplifies the counterfeit detection
process;
— accurate identity information is often difficult and hard to find.
The main objective of this document is to simplify access and delivery of accurate identity information to
inspectors when authenticating objects.
To accomplish this objective, the document provides guidance intended to make object identity
information easier to find and use. Identity data and information can be found in many places, including
verification and authentication systems. This document will make it easier for inspectors to access
identity information and help them to detect counterfeits and granting inspectors access to reliable
identity information helps facilitate the detection of counterfeits.
This document focuses attention on routing requests for object information to the appropriate
authoritative service and then routing responses back to inspectors.
Object identification systems commonly use unique identifiers (UID) to reference or access object
information. UID can be assigned to a class of objects or can be assigned to distinct object. In either case,
the UID can enhance detection of counterfeiting and fraud, although UIDs assigned to single instances can
be more efficient.
This document contains:
— terms and definitions;
— an overview on how object information is used to detect counterfeits;
— principles, concepts and values;
— recommendations on how to improve interoperability of systems capable of providing object
information to inspectors;
— specific examples that illustrate some of the concepts presented.
This document enables reliable and safe object identification to deter the introduction of illegal objects
to the market.
It includes a framework with the objective to increase trust by making object identification solutions
interoperable. For example, the framework describes method and solutions for how to:
— detect some counterfeits without authenticating products;
— evaluate an authentication element;
— formally prove that a remote description of an object can be trusted.
This is document is part of a family of standards which includes ISO 22380, ISO 22381, ISO 22382,
ISO 22383, ISO 22384.
vi © ISO 2022 – All rights reserved

---------------------- Page: 6 ----------------------
ISO/PRF 22378:2022(E)
One goal of this document is to describe a framework in which disparate object identification solutions
are interoperable and trust is increased, and therefore will be used more frequently. The framework
should also include solutions which simply detect some counterfeits without authenticating products.
Likewise, the framework should also include a solution which only evaluates an authentication element.
Assuming that the object identification systems themselves can also be counterfeited and copied, This
document establishes a method to formally prove that a remote description of an object can be trusted.
establishes a method to formally prove that a remote description of an object can be trusted.
Consideration is given to prevent interference between different independent implementations of such
systems and to allow an unambiguous unique identification reference to service multiple use-cases and
applications.
The theory supporting the design of the system is that a lack of trust and lack of interoperability
introduces “friction” for users. By reducing this friction, there will be greater awareness and usage, and
therefore greater detection and deterrence of fraud.
This document is complemented by ISO 22381:2018, which guides the establishment and set-up of
interoperability.
© ISO 2022 – All rights reserved vii

---------------------- Page: 7 ----------------------
INTERNATIONAL STANDARD ISO/PRF 22378:2022(E)

Security and resilience — Authenticity, integrity and trust for
products and documents — Guidelines for interoperable object
identification and related authentication systems to deter
counterfeiting and illicit trade
1 Scope
This document establishes a framework for identification and authentication systems. It provides
recommendations and best practice that include:
— management and verification of identifiers;
— physical representation of identifiers;
— participants’ due diligence;
— vetting of all participants within the system;
— relationship between the unique identifier (UID) and possible authentication elements related to it;
— questions that deal with the identification of the inspector and any authorized access to privileged
information about the object;
— inspector access history (logs).
The model described in this document is intended to determine the common functions of different
systems.
This document describes processes, functions and functional units of a generic model. It does not specify
any specific technical solutions.
Object identification systems can incorporate other functions and features such as supply chain
traceability, quality traceability, marketing activities and others, but these aspects are out of scope of this
document.
NOTE This document does not refer to industry-specific requirements such as GS1 Global Trade Item Number
(GTIN).
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
ISO 22300, Security and resilience — Vocabulary
© ISO 2022 – All rights reserved 1

---------------------- Page: 8 ----------------------
ISO/PRF 22378:2022(E)
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO 22300 apply.
ISO and IEC maintain terminology databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https://www.iso.org/obp
— IEC Electropedia: available at https://www.electropedia.org/
4 Abbreviated terms
ADMS attribute data management system
[158]
AI application identifier (see ANSI MH 10.8.2 )
CA Certification Authority
[158]
DI data identifier (see ANSI MH 10.8.2 )
IP Internet Protocol
OEF object examination function
RFF response formatting function
TQPF trusted query processing function
TVF trusted verification function
UID unique identifier
SLA service level agreement
5 Overview
5.1 General
The advantage of interoperability of these systems is to enhance detection of counterfeiting and fraud by:
— increasing use by specific user groups;
— increasing the number of inspected objects;
— increasing access to the authoritative sources;
— lowering the cost of:
— training;
— equipment;
— development;
— deployment;
— inspection time.
2 © ISO 2022 – All rights reserved

---------------------- Page: 9 ----------------------
ISO/PRF 22378:2022(E)
Once interoperability is achieved and these systems are widely deployed, a trusted entity uses an
identifier to make inquiries about an object to guide disposition decisions regarding the object. The
inspector will have credible evidence that the information provided in response to the inquiry is accurate
and trustworthy.
All participants should perform their roles with due diligence considering the following:
— Auditing and vetting of the service providers should be considered to ensure they are acting in good
faith and are not threat agents operating from behind a deceptive “store front”.
— Auditing and vetting of the manufacturers should be considered to ensure they are following
documented processes and feed accurate information into the systems.
— The interested parties with a need-to-know should obtain appropriate credentials to process
inquiries, so that the rights holder can release information in a socially responsible manner.
5.2 Object identification systems — Operating process
5.2.1 General
Object identification systems typically consist of functional units as depicted in the model shown in
Figure 1.

Figure 1 — Object identification model
© ISO 2022 – All rights reserved 3

---------------------- Page: 10 ----------------------
ISO/PRF 22378:2022(E)
The model makes no assumptions on specific implementation of the functions.
Multiple instances of a function can exist across the system. Different functions can be combined into a
single service.
Illustrative examples implementing this model are given in Annex C.
5.2.2 Object examination function
The inspector examines an object of interest (such as a material good) to determine if the object has a
UID. If a UID is found, further examination can be required to determine which TQPF(s) are likely to know
of this UID. The function forms a query that can consist of only a UID, a combination of UID with the
inspector’s credentials, or other physical attribute data including intrinsic authentication elements that
can uniquely identify an object such as a digital image. The OEF ends when a query is submitted to one or
more TQPF. When the process is iterated, the OEF can evaluate the response of a previous query.
5.2.3 Trusted query processing function
A TQPF routes information between the other functions according to defined rules. The TQPF can
examine credentials from requesting parties according to defined rules. The TQPF can be distributed
across multiple services.
EXAMPLE 1 A TQPF routes a query formed by an OEF to the appropriate TVF.
EXAMPLE 2 A TQPF combines the verification or authentication response from a TVF with any credentials from
an inspector to form a query into an ADMS.
5.2.4 Trusted verification function
The TVF verifies whether the UID exists within the domain. The TVF should check the credentials of the
requesting TQPF. The TVF should enforce access privileges based on defined rules. It can respond to the
source of the query or through one or more other TQPF. The response would typically include verification
information about the UID (e.g. “is the UID valid or not?”) TVF can also generate alerts to interested
parties. TVF should protect sensitive data from unauthorized access.
The TVF can execute an authenticating procedure or algorithm against the information (data) received.
5.2.5 Attribute data management system
An ADMS is the authoritative source of object master data. There should be only one master data record
for each object attribute. If multiple instances of attribute data records exist, only one should be “master”
and all others “subordinate”. Different object attributes can reside in different databases. Multiple
databases can exist in federated environment.
An ADMS receives a response (via a TQPF) from a TVF. The ADMS verifies credentials of both the
requesting TQPF, TVF and the credentials of the inspector. Access privileges should be based on
credentials and rules. The ADMS responds with data selected corresponding to the request and filtered
by rules. The response can resolve all the inspector’s questions or can include information on how to
proceed. If a response contains further instructions, an inspector decides if further action should be taken
by initiating a new query.
Attributes in an ADMS can include information details on how to authenticate objects or proceed with
further examination.
The ADMS should protect sensitive data from unauthorized access.
4 © ISO 2022 – All rights reserved

---------------------- Page: 11 ----------------------
ISO/PRF 22378:2022(E)
5.2.6 Response formatting function
This function converts ADMS responses into a defined format and communicates them to the inspector.
This is the end of the process.
In some cases, the inspection process can be iterated based on the results given by the ADMS or
depending on the architecture of the system.
5.3 Object identification systems — Set-up of trusted framework
5.3.1 General
The identification and authentication system should operate in accordance with the following definitions,
rules, data and data relationships.
Figure 2 shows how the example model can be configured.

Figure 2 — Set-up and configuration
5.3.2 Owner
Owners determine all of the detail on whom, how, where and when access rights to attribute data are
granted. Owners choose the service providers that implement the functional block and provide the access
and business rules to the various providers.
© ISO 2022 – All rights reserved 5

---------------------- Page: 12 ----------------------
ISO/PRF 22378:2022(E)
5.3.3 UID-generating function
The UID-generating function should ensure UIDs are unique within the domain the service operates. UID
can be generated following a specific format or function that can include object specific attribute data.
The function also generates or produces the verification rules that TVF use when considering a specific
UID during a query.
5.3.4 Object information
Object information should be a subset of object attribute data or pointer (reference) to object attribute
data.
5.3.5 UID verification rules
The algorithms and procedures that allow a TVF to determine if a UID is valid within the domain. They
can include algorithms and processes that allow authentication. They can also include a list of generated
UIDs.
5.3.6 Physical identity assignment
In creating the link between a UID and an object, assignment can be accomplished by enrolment of an
intrinsic UID.
5.3.7 Object attribute data
Object attribute data refers to the attributes sufficient to identify an object or class of objects. Owner can
include additional attributes at their discretion.
5.3.8 Data management rules
The policies regarding protection and disclosure of attribute data include, but are not limited to:
— access rights, including:
— requirements to gain privilege to an access level;
— assigns attributes to access levels;
— the protection levels of the attribute data;
— user (inspector) roles;
— standard query responses, including:
— business rules for data disclosure;
— responses to queries in all situation including invalid UID cases ;
— privileged versus unprivileged response.
5.3.9 Query processing rules
The query processing rules enable a function to:
— route a query or response to the appropriate function;
6 © ISO 2022 – All rights reserved

---------------------- Page: 13 ----------------------
ISO/PRF 22378:2022(E)
— verify a request is authorized or allowed;
— verify communication is authorized or allowed.
6 Key principals
6.1 General
This clause provides key principles on how to design the identification and authentication system.
6.2 Availability and timely response
The identification and authentication system should be designed so that:
— availability and response times meet the inspector’s expectations;
— response times are long enough to verify credentials.
This may be addressed and specified by a service level agreement (SLA).
6.3 One authoritative source
The identification and authentication system should be designed so that only one authoritative source
corresponds to the object to be identified.
Allowing multiple sources can confuse the inspector. It can also be possible for malicious service
providers to copy the source, manipulate it and publish as one of the authoritative sources to the
inspector.
The identification and authentication system can allow custodian privileges to service providers, but it
should always be clear who the authoritative source is and why custodian copies of the data can be
trusted.
6.4 Data management
The identification and authentication system should be designed so that:
— master data and transactional data are kept up to date;
— all data isare managed in line with the expected life cycle of the object;
— it is possible to adapt to future changes in regulatory requirements;
— long-term object id
...

INTERNATIONAL ISO
STANDARD 22378
First edition
Security and resilience — Authenticity,
integrity and trust for products
and documents — Guidelines for
interoperable object identification
and related authentication systems to
deter counterfeiting and illicit trade
Sécurité et résilience — Authenticité, intégrité et confiance pour les
produits et les documents — Lignes directrices pour l’identification
interopérable d’objets et systèmes d’authentification associés destinés
à décourager la contrefaçon et le commerce illicite
PROOF/ÉPREUVE
Reference number
ISO 22378:2022(E)
© ISO 2022

---------------------- Page: 1 ----------------------
ISO 22378:2022(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO 2022
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii
PROOF/ÉPREUVE © ISO 2022 – All rights reserved

---------------------- Page: 2 ----------------------
ISO 22378:2022(E)
Contents Page
Foreword .v
Introduction . vi
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated terms . 2
5 Overview . 2
5.1 General . 2
5.2 Object identification systems — Operating process . 3
5.2.1 General . 3
5.2.2 Object examination function . 3
5.2.3 Trusted query processing function . 4
5.2.4 Trusted verification function . 4
5.2.5 Attribute data management system . 4
5.2.6 Response formatting function . 4
5.3 Object identification systems — Set-up of trusted framework . 4
5.3.1 General . 4
5.3.2 Owner . 5
5.3.3 UID-generating function . . 5
5.3.4 Object information . 5
5.3.5 UID verification rules . 6
5.3.6 Physical identity assignment . 6
5.3.7 Object attribute data . 6
5.3.8 Data management rules . 6
5.3.9 Query processing rules . 6
6 Key principals . 6
6.1 General . 6
6.2 Availability and timely response . 6
6.3 One authoritative source . 7
6.4 Data management . 7
6.5 Need to know . 7
6.6 Data protection . 7
6.7 Privacy . 7
6.8 Regulatory compliance . 8
6.9 Vetting . 8
6.10 Interoperability aspects . . 8
6.11 UID generation . 8
7 Plan and implementation . 9
7.1 General . 9
7.2 Determination of trusted services. 9
7.2.1 General . 9
7.2.2 Trust in the TQPF . 9
7.2.3 Use of prefix or postfix . . 9
7.2.4 Object examination techniques . 9
7.3 Management of object identification data and attributes . 10
7.3.1 General . 10
7.3.2 Verify the service entry point (TQPF) . 10
7.3.3 Maintenance and management . 10
7.3.4 Privilege levels and user roles . 10
7.3.5 Access control . 10
7.3.6 Ownership of transactional data . 11
7.3.7 Use of transactional data . 11
iii
© ISO 2022 – All rights reserved PROOF/ÉPREUVE

---------------------- Page: 3 ----------------------
ISO 22378:2022(E)
7.3.8 Governmental or intergovernmental agencies or competent authorities . 11
7.4 Common frauds . 11
7.4.1 Duplicate UID codes . 11
7.4.2 Substitution. 12
7.4.3 Feature deception . .12
7.4.4 Malicious services . 13
7.4.5 Malicious inspector .13
7.4.6 Insider attacks .13
Annex A (informative) Digital certificate (for inspectors) .15
Annex B (informative) Master data management .18
Annex C (informative) Illustrative implementation examples .19
Bibliography .24
iv
PROOF/ÉPREUVE © ISO 2022 – All rights reserved

---------------------- Page: 4 ----------------------
ISO 22378:2022(E)
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO’s adherence to
the World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see
www.iso.org/iso/foreword.html.
This document was prepared by Technical Committee ISO/TC 292, Security and resilience.
This first edition of ISO 22378 cancels and replaces the first edition ISO 16678:2014, which has been
technically revised.
The main changes are as follows:
— the title and number have been updated to follow the same structure as all other documents
developed by ISO/TC 292.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html.
v
© ISO 2022 – All rights reserved PROOF/ÉPREUVE

---------------------- Page: 5 ----------------------
ISO 22378:2022(E)
Introduction
This document is based on three foundational assumptions:
— detecting counterfeit objects is a complex and often difficult task;
— accurate identity information about the object in question simplifies the counterfeit detection
process;
— accurate identity information is often difficult and hard to find.
The main objective of this document is to simplify access and delivery of accurate identity information
to inspectors when authenticating objects.
To accomplish this objective, the document provides guidance intended to make object identity
information easier to find and use. Identity data and information can be found in many places, including
verification and authentication systems. This document will make it easier for inspectors to access
identity information and granting inspectors access to reliable identity information helps facilitate the
detection of counterfeits.
This document focuses attention on routing requests for object information to the appropriate
authoritative service and then routing responses back to inspectors.
Object identification systems commonly use unique identifiers (UID) to reference or access object
information. UID can be assigned to a class of objects or can be assigned to distinct object. In either case,
the UID can enhance detection of counterfeiting and fraud, although UIDs assigned to single instances
can be more efficient.
This document contains:
— terms and definitions;
— an overview on how object information is used to detect counterfeits;
— principles, concepts and values;
— recommendations on how to improve interoperability of systems capable of providing object
information to inspectors;
— specific examples that illustrate some of the concepts presented.
This document enables reliable and safe object identification to deter the introduction of illegal objects
to the market.
It includes a framework with the objective to increase trust by making object identification solutions
interoperable. For example, the framework describes method and solutions for how to:
— detect some counterfeits without authenticating products;
— evaluate an authentication element;
— formally prove that a remote description of an object can be trusted.
This is document is part of a family of standards which includes ISO 22380, ISO 22381, ISO 22382,
ISO 22383, ISO 22384.
One goal of this document is to describe a framework in which disparate object identification solutions
are interoperable and trust is increased, and therefore will be used more frequently. The framework
should also include solutions which simply detect some counterfeits without authenticating products.
Likewise, the framework should also include a solution which only evaluates an authentication element.
vi
PROOF/ÉPREUVE © ISO 2022 – All rights reserved

---------------------- Page: 6 ----------------------
ISO 22378:2022(E)
Assuming that the object identification systems themselves can also be counterfeited and copied,
This document establishes a method to formally prove that a remote description of an object can be
trusted. establishes a method to formally prove that a remote description of an object can be trusted.
Consideration is given to prevent interference between different independent implementations of such
systems and to allow an unambiguous unique identification reference to service multiple use-cases and
applications.
The theory supporting the design of the system is that a lack of trust and lack of interoperability
introduces “friction” for users. By reducing this friction, there will be greater awareness and usage, and
therefore greater detection and deterrence of fraud.
This document is complemented by ISO 22381:2018, which guides the establishment and set-up of
interoperability.
vii
© ISO 2022 – All rights reserved PROOF/ÉPREUVE

---------------------- Page: 7 ----------------------
INTERNATIONAL STANDARD ISO 22378:2022(E)
Security and resilience — Authenticity, integrity
and trust for products and documents — Guidelines
for interoperable object identification and related
authentication systems to deter counterfeiting and illicit
trade
1 Scope
This document establishes a framework for identification and authentication systems. It provides
recommendations and best practice that include:
— management and verification of identifiers;
— physical representation of identifiers;
— participants’ due diligence;
— vetting of all participants within the system;
— relationship between the unique identifier (UID) and possible authentication elements related to it;
— questions that deal with the identification of the inspector and any authorized access to privileged
information about the object;
— inspector access history (logs).
The model described in this document is intended to determine the common functions of different
systems.
This document describes processes, functions and functional units of a generic model. It does not
specify any specific technical solutions.
Object identification systems can incorporate other functions and features such as supply chain
traceability, quality traceability, marketing activities and others, but these aspects are out of scope of
this document.
NOTE This document does not refer to industry-specific requirements such as GS1 Global Trade Item
Number (GTIN).
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
ISO 22300, Security and resilience — Vocabulary
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO 22300 apply.
ISO and IEC maintain terminology databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https:// www .iso .org/ obp
1
© ISO 2022 – All rights reserved PROOF/ÉPREUVE

---------------------- Page: 8 ----------------------
ISO 22378:2022(E)
— IEC Electropedia: available at https:// www .electropedia .org/
4 Abbreviated terms
ADMS attribute data management system
[8]
AI application identifier (see ANSI MH 10.8.2 )
CA Certification Authority
[8]
DI data identifier (see ANSI MH 10.8.2 )
IP Internet Protocol
OEF object examination function
RFF response formatting function
TQPF trusted query processing function
TVF trusted verification function
UID unique identifier
SLA service level agreement
5 Overview
5.1 General
The advantage of interoperability of these systems is to enhance detection of counterfeiting and fraud
by:
— increasing use by specific user groups;
— increasing the number of inspected objects;
— increasing access to the authoritative sources;
— lowering the cost of:
— training;
— equipment;
— development;
— deployment;
— inspection time.
Once interoperability is achieved and these systems are widely deployed, a trusted entity uses an
identifier to make inquiries about an object to guide disposition decisions regarding the object. The
inspector will have credible evidence that the information provided in response to the inquiry is
accurate and trustworthy.
All participants should perform their roles with due diligence considering the following:
— Auditing and vetting of the service providers should be considered to ensure they are acting in good
faith and are not threat agents operating from behind a deceptive “store front”.
2
PROOF/ÉPREUVE © ISO 2022 – All rights reserved

---------------------- Page: 9 ----------------------
ISO 22378:2022(E)
— Auditing and vetting of the manufacturers should be considered to ensure they are following
documented processes and feed accurate information into the systems.
— The interested parties with a need-to-know should obtain appropriate credentials to process
inquiries, so that the rights holder can release information in a socially responsible manner.
5.2 Object identification systems — Operating process
5.2.1 General
Object identification systems typically consist of functional units as depicted in the model shown in
Figure 1.
Figure 1 — Object identification model
The model makes no assumptions on specific implementation of the functions.
Multiple instances of a function can exist across the system. Different functions can be combined into a
single service.
Illustrative examples implementing this model are given in Annex C.
5.2.2 Object examination function
The inspector examines an object of interest (such as a material good) to determine if the object has
a UID. If a UID is found, further examination can be required to determine which TQPF(s) are likely to
3
© ISO 2022 – All rights reserved PROOF/ÉPREUVE

---------------------- Page: 10 ----------------------
ISO 22378:2022(E)
know of this UID. The function forms a query that can consist of only a UID, a combination of UID with
the inspector’s credentials, or other physical attribute data including intrinsic authentication elements
that can uniquely identify an object such as a digital image. The OEF ends when a query is submitted to
one or more TQPF. When the process is iterated, the OEF can evaluate the response of a previous query.
5.2.3 Trusted query processing function
A TQPF routes information between the other functions according to defined rules. The TQPF can
examine credentials from requesting parties according to defined rules. The TQPF can be distributed
across multiple services.
EXAMPLE 1 A TQPF routes a query formed by an OEF to the appropriate TVF.
EXAMPLE 2 A TQPF combines the verification or authentication response from a TVF with any credentials
from an inspector to form a query into an ADMS.
5.2.4 Trusted verification function
The TVF verifies whether the UID exists within the domain. The TVF should check the credentials of
the requesting TQPF. The TVF should enforce access privileges based on defined rules. It can respond
to the source of the query or through one or more other TQPF. The response would typically include
verification information about the UID (e.g. “is the UID valid or not?”) TVF can also generate alerts to
interested parties. TVF should protect sensitive data from unauthorized access.
The TVF can execute an authenticating procedure or algorithm against the information (data) received.
5.2.5 Attribute data management system
An ADMS is the authoritative source of object master data. There should be only one master data
record for each object attribute. If multiple instances of attribute data records exist, only one should
be “master” and all others “subordinate”. Different object attributes can reside in different databases.
Multiple databases can exist in federated environment.
An ADMS receives a response (via a TQPF) from a TVF. The ADMS verifies credentials of both the
requesting TQPF, TVF and the credentials of the inspector. Access privileges should be based on
credentials and rules. The ADMS responds with data selected corresponding to the request and filtered
by rules. The response can resolve all the inspector’s questions or can include information on how to
proceed. If a response contains further instructions, an inspector decides if further action should be
taken by initiating a new query.
Attributes in an ADMS can include information details on how to authenticate objects or proceed with
further examination.
The ADMS should protect sensitive data from unauthorized access.
5.2.6 Response formatting function
This function converts ADMS responses into a defined format and communicates them to the inspector.
This is the end of the process.
In some cases, the inspection process can be iterated based on the results given by the ADMS or
depending on the architecture of the system.
5.3 Object identification systems — Set-up of trusted framework
5.3.1 General
The identification and authentication system should operate in accordance with the following
definitions, rules, data and data relationships.
4
PROOF/ÉPREUVE © ISO 2022 – All rights reserved

---------------------- Page: 11 ----------------------
ISO 22378:2022(E)
Figure 2 shows how the example model can be configured.
Figure 2 — Set-up and configuration
5.3.2 Owner
Owners determine all of the detail on whom, how, where and when access rights to attribute data are
granted. Owners choose the service providers that implement the functional block and provide the
access and business rules to the various providers.
5.3.3 UID-generating function
The UID-generating function should ensure UIDs are unique within the domain the service operates.
UID can be generated following a specific format or function that can include object specific attribute
data.
The function also generates or produces the verification rules that TVF use when considering a specific
UID during a query.
5.3.4 Object information
Object information should be a subset of object attribute data or pointer (reference) to object attribute
data.
5
© ISO 2022 – All rights reserved PROOF/ÉPREUVE

---------------------- Page: 12 ----------------------
ISO 22378:2022(E)
5.3.5 UID verification rules
The algorithms and procedures that allow a TVF to determine if a UID is valid within the domain. They
can include algorithms and processes that allow authentication. They can also include a list of generated
UIDs.
5.3.6 Physical identity assignment
In creating the link between a UID and an object, assignment can be accomplished by enrolment of an
intrinsic UID.
5.3.7 Object attribute data
Object attribute data refers to the attributes sufficient to identify an object or class of objects. Owner
can include additional attributes at their
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.