By making this purchase, you agree to the AIM Privacy Policy.
ISO/IEC 15459-3:2014. Information technology - Automatic identification and data capture techniques - Unique identification - Part 3: Common rules ISO/IEC 15459-3:2014 specifies the common rules applicable for unique identification that are required to ensure full compatibility across different identities. This product is a single user license only. Copying and/or networking...
Information technology - Automatic identification and data capture techniques - Unique identification - Part 4: Individual products and product packages ISO/IEC 15459-4:2014 specifies a unique string of characters for the identification of individual products and product packages. The character string is intended to be represented in a linear bar code...
Information technology - Automatic identification and data capture techniques - Unique identification - Part 5: Individual returnable transport items (RTIs) ISO/IEC 15459-5:2014 specifies a unique string of characters for the identification of individual returnable transport items (RTIs). The character string is intended to be represented in a bar code label...
Information technology - Automatic identification and data capture techniques - Unique identification - Part 6: Groupings ISO/IEC 15459-6:2014 specifies a unique string of characters for the identification of groupings of products, product packages, transport units and items. The character string is intended to be represented in a linear bar code...
ISO/IEC 15693-1:2018 Cards and security devices for personal identification - Contactless vicinity objects - Part 1: Physical characteristics This document defines the physical characteristics of vicinity cards (VICCs). It is intended to be used in conjunction with other parts of the ISO/IEC 15693 series. This product is a single user...
Information Technology - Data Protocol For Radio Frequency Identification (RFID) For Item Management - Part 2: Registration Of RFID Data Constructs This document specifies the procedural requirements to maintain specific RFID data constructs. The data constructs are associated with managing open and closed applications that utilise RFID systems which conform...