Shopping Cart

No products in the cart.

BSI PD ISO/IEC TR 29144:2014

$142.49

Information technology. Biometrics. The use of biometric technology in commercial Identity Management applications and processes

Published By Publication Date Number of Pages
BSI 2014 24
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

1.1 In scope

This Technical Report will discuss

  • concepts and considerations for the use of biometrics in a commercial Identity Management Solutions,

  • items that need to be considered when integrating biometrics into a commercial Identity Management Solutions, and

  • implementation Issues when implementing biometrics into commercial Identity Management Solutions.

1.2 Exclusions

This Technical Report will not

  • define an architecture and framework for IDM,

  • discuss any specification or assessment of government policy,

  • discuss the business need for a biometric database or process,

  • discuss the specific biometrics and which ones are to be used in particular systems,

  • consider the legality and acceptability in particular jurisdictions and cultures,

  • analyse the general structure of identifiers and the global identification of objects (e.g. object identifiers), and

  • discuss technical specifications in relation to the use of trusted biometric hardware and software.

PDF Catalog

PDF Pages PDF Title
6 Foreword
7 Introduction
9 Section sec_1
Section sec_1.1
Section sec_1.2
Section sec_2
Section sec_3
1 Scope
1.1 In scope
1.2 Exclusions
2 Normative references
3 Terms and definitions
10 Section sec_4
Section sec_5
Section sec_5.1
Section sec_5.2
Section sec_5.3
4 Symbols and abbreviated terms
5 Biometrics and Identity Management Systems
5.1 General
5.2 Biometrics and identity
5.3 Identity and biometric identification
11 Section sec_5.4
5.4 Biometric identifiers
12 Section sec_5.5
Section sec_5.6
Section sec_6
Section sec_6.1
Section sec_6.2
Section sec_6.2.1
5.5 Human role in biometrics
5.6 Assuring the integrity of the database
6 Biometric considerations in Identity Management Systems
6.1 General
6.2 Capturing and recording biometric characteristics
13 Section sec_6.2.2
Section sec_6.2.3
Section sec_6.2.4
Section sec_6.3
Section sec_6.3.1
6.3 Adhesion of biometric characteristics
14 Section sec_6.3.2
Section sec_6.3.3
Section sec_6.3.4
Section sec_6.3.5
15 Section sec_6.4
Section sec_6.5
Section sec_6.5.1
Section sec_6.5.2
Section sec_6.6
Section sec_6.7
6.4 Changes to name, alias and identification data
6.5 Changes of condition
6.6 Biometric spoofing
6.7 Legitimate use of another identity
16 Section sec_6.8
Section sec_6.9
Section sec_6.9.1
Section sec_6.9.2
Section sec_6.9.3
Section sec_7
Section sec_7.1
Section sec_7.2
6.8 Other exceptions
6.9 Other issues of importance
7 Implementation issues
7.1 General
7.2 Aggregation of databases
17 Section sec_7.3
Section sec_7.4
Section sec_7.5
7.3 Strengthening of token and knowledge based identity systems
7.4 Restrictions to accessing data
7.5 Privacy
19 Section sec_7.6
Section sec_7.7
7.6 Mechanisms for preventing abuse of systems
7.7 Multinational commercial organizations
20 Reference ref_1
Reference ref_2
Reference ref_3
Reference ref_4
Reference ref_5
Reference ref_6
Bibliography
BSI PD ISO/IEC TR 29144:2014
$142.49