BSI PD ISO/IEC TR 29144:2014
$142.49
Information technology. Biometrics. The use of biometric technology in commercial Identity Management applications and processes
Published By | Publication Date | Number of Pages |
BSI | 2014 | 24 |
1.1 In scope
This Technical Report will discuss
-
concepts and considerations for the use of biometrics in a commercial Identity Management Solutions,
-
items that need to be considered when integrating biometrics into a commercial Identity Management Solutions, and
-
implementation Issues when implementing biometrics into commercial Identity Management Solutions.
1.2 Exclusions
This Technical Report will not
-
define an architecture and framework for IDM,
-
discuss any specification or assessment of government policy,
-
discuss the business need for a biometric database or process,
-
discuss the specific biometrics and which ones are to be used in particular systems,
-
consider the legality and acceptability in particular jurisdictions and cultures,
-
analyse the general structure of identifiers and the global identification of objects (e.g. object identifiers), and
-
discuss technical specifications in relation to the use of trusted biometric hardware and software.
PDF Catalog
PDF Pages | PDF Title |
---|---|
6 | Foreword |
7 | Introduction |
9 | Section sec_1 Section sec_1.1 Section sec_1.2 Section sec_2 Section sec_3 1 Scope 1.1 In scope 1.2 Exclusions 2 Normative references 3 Terms and definitions |
10 | Section sec_4 Section sec_5 Section sec_5.1 Section sec_5.2 Section sec_5.3 4 Symbols and abbreviated terms 5 Biometrics and Identity Management Systems 5.1 General 5.2 Biometrics and identity 5.3 Identity and biometric identification |
11 | Section sec_5.4 5.4 Biometric identifiers |
12 | Section sec_5.5 Section sec_5.6 Section sec_6 Section sec_6.1 Section sec_6.2 Section sec_6.2.1 5.5 Human role in biometrics 5.6 Assuring the integrity of the database 6 Biometric considerations in Identity Management Systems 6.1 General 6.2 Capturing and recording biometric characteristics |
13 | Section sec_6.2.2 Section sec_6.2.3 Section sec_6.2.4 Section sec_6.3 Section sec_6.3.1 6.3 Adhesion of biometric characteristics |
14 | Section sec_6.3.2 Section sec_6.3.3 Section sec_6.3.4 Section sec_6.3.5 |
15 | Section sec_6.4 Section sec_6.5 Section sec_6.5.1 Section sec_6.5.2 Section sec_6.6 Section sec_6.7 6.4 Changes to name, alias and identification data 6.5 Changes of condition 6.6 Biometric spoofing 6.7 Legitimate use of another identity |
16 | Section sec_6.8 Section sec_6.9 Section sec_6.9.1 Section sec_6.9.2 Section sec_6.9.3 Section sec_7 Section sec_7.1 Section sec_7.2 6.8 Other exceptions 6.9 Other issues of importance 7 Implementation issues 7.1 General 7.2 Aggregation of databases |
17 | Section sec_7.3 Section sec_7.4 Section sec_7.5 7.3 Strengthening of token and knowledge based identity systems 7.4 Restrictions to accessing data 7.5 Privacy |
19 | Section sec_7.6 Section sec_7.7 7.6 Mechanisms for preventing abuse of systems 7.7 Multinational commercial organizations |
20 | Reference ref_1 Reference ref_2 Reference ref_3 Reference ref_4 Reference ref_5 Reference ref_6 Bibliography |