IEEE 2410-2017
$59.58
IEEE Standard for Biometric Open Protocol
Published By | Publication Date | Number of Pages |
IEEE | 2017 | 88 |
Revision Standard – Superseded. Identity assertion, role gathereing, multilevel access control, assurance, and auditing are provided by the Biometric Open Protocol Standard (BOPS). The BOPS implementation includes software running on a client device, a trusted BOPS server, and an intrusion detection system. The BOPS implementation allows pluggable components to replace existing components’ functionality, accepting integration into current operating environments in a short period of time. The BOPS implementation provides continuous protection to the resources and assurance of the placement and viability of adjudication and other key features. Accountability is the mechanism that proves a service-level guarantee of security. The BOPS implementation allows the systems to meet security needs by using the application programming interface. The BOPS implementation need not know whether the underlying system is a relational database management system or a search engine. The BOPS implementation functionality offers a “point-and-cut” mechanism to add the appropriate security to the production systems as well as to the systems in development. The architecture is language neutral, allowing Representational State Transfer (REST), JavaScript Object Notation (JSON), and Secure Sockets Layer (SSL) or Transport Layer Security (TLS) to provide the communication interface. The architecture is built on the servlet specification, open SSLs, Java, JSON, REST, and an open persistent store. All tools adhere to open standards, allowing maximum interoperability.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 2410™-2017 Front cover |
2 | Title page |
4 | Important Notices and Disclaimers Concerning IEEE Standards Documents |
7 | Participants |
8 | Introduction |
10 | Contents |
12 | 1. Overview 1.1 Scope 1.2 Purpose 1.3 Intended audience 2. Normative references |
13 | 3. Definitions, acronyms, and abbreviations 3.1 Definitions 3.2 Acronyms and abbreviations |
14 | 4. Conformance |
15 | 5. Security considerations 5.1 Background 5.2 Identity assertion 5.3 Role gathering |
16 | 5.4 Access control 5.5 Auditing and assurance |
17 | 6. BOPS interoperability |
18 | 7. BOPS overview, application, registration, and prevention of replay 7.1 Overview |
21 | 7.2 Application |
22 | 7.3 Security architecture |
23 | 7.4 System overview |
25 | 7.5 Solution architecture |
27 | 7.6 Biometric engines and their scopes 7.7 Genesis |
28 | 7.8 Enrollment 7.9 Biometric matching with visual cryptography |
32 | 7.10 Homomorphic encryption |
35 | 7.11 Defaults |
36 | 7.12 Authentication Requirement 7.13 Enrollment requirement 7.14 Registration |
38 | 7.15 Prevention of replay |
40 | 8. BOPS infrastructure 8.1 BOPS DNS 8.2 BOPS TrustStore 8.3 BOPS KeyStore |
41 | 8.4 Key negotiation protocol 8.5 Enrollment elements 8.6 Inside the BOPS infrastructure 8.7 Client roles 8.8 Message encoding and decoding |
42 | 8.9 Data privacy |
43 | 8.10 Genesis logical flow |
46 | 8.11 Certificate distribution |
49 | 8.12 Certificate management policy |
50 | 9. BOPS API overview 9.1 Format |
51 | 9.2 Identity assertion API |
52 | 10. API 10.1 Enterprise concepts 10.2 Format of API cells 10.3 The start of the biometric workflow |
53 | 10.4 Authentication overview |
54 | 10.5 API—genesis |
56 | 10.6 API enrollment |
58 | 10.7 Data Structure |
59 | 10.8 API—QROpportunity |
62 | 10.9 Client side authentication |
63 | 10.10 Server side authentication |
68 | 10.11 Biometric engines configuration |
69 | 10.12 Application settings |
70 | 10.13 Business integration |
71 | 10.14 Role gathering API |
73 | 10.15 Access control API |
74 | 10.16 Auditing 10.17 Administration |
75 | 10.18 Reporting 10.19 Admin statistics API |
76 | 11. Server-side intrusion detection system 11.1 API list blacklist 11.2 API—incident |
77 | 12. Client device requirements 13. Privacy considerations 13.1 Background |
78 | 13.2 BOPS data privacy reference 13.3 BOPS governance and compliance |
80 | 13.4 BOPS PII 13.5 BOPS privacy specific safeguards |
82 | 13.6 BOPS and privacy controls |
85 | Annex A (informative) Glossary |
86 | Annex B (informative) Bibliography |
88 | Back cover |