{"id":398689,"date":"2024-10-20T04:38:02","date_gmt":"2024-10-20T04:38:02","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-2410-2017\/"},"modified":"2024-10-26T08:25:41","modified_gmt":"2024-10-26T08:25:41","slug":"ieee-2410-2017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-2410-2017\/","title":{"rendered":"IEEE 2410-2017"},"content":{"rendered":"
Revision Standard – Superseded. Identity assertion, role gathereing, multilevel access control, assurance, and auditing are provided by the Biometric Open Protocol Standard (BOPS). The BOPS implementation includes software running on a client device, a trusted BOPS server, and an intrusion detection system. The BOPS implementation allows pluggable components to replace existing components\u2019 functionality, accepting integration into current operating environments in a short period of time. The BOPS implementation provides continuous protection to the resources and assurance of the placement and viability of adjudication and other key features. Accountability is the mechanism that proves a service-level guarantee of security. The BOPS implementation allows the systems to meet security needs by using the application programming interface. The BOPS implementation need not know whether the underlying system is a relational database management system or a search engine. The BOPS implementation functionality offers a \u201cpoint-and-cut\u201d mechanism to add the appropriate security to the production systems as well as to the systems in development. The architecture is language neutral, allowing Representational State Transfer (REST), JavaScript Object Notation (JSON), and Secure Sockets Layer (SSL) or Transport Layer Security (TLS) to provide the communication interface. The architecture is built on the servlet specification, open SSLs, Java, JSON, REST, and an open persistent store. All tools adhere to open standards, allowing maximum interoperability.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 2410\u2122-2017 Front cover <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Important Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 1.\u2002Overview 1.1\u2002Scope 1.2\u2002Purpose 1.3\u2002Intended audience 2.\u2002Normative references <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 3.\u2002Definitions, acronyms, and abbreviations 3.1\u2002Definitions 3.2\u2002Acronyms and abbreviations <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4.\u2002Conformance <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.\u2002Security considerations 5.1\u2002Background 5.2\u2002Identity assertion 5.3\u2002Role gathering <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.4\u2002Access control 5.5\u2002Auditing and assurance <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.\u2002BOPS interoperability <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7.\u2002BOPS overview, application, registration, and prevention of replay 7.1\u2002Overview <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 7.2\u2002Application <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 7.3\u2002Security architecture <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 7.4\u2002System overview <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 7.5\u2002Solution architecture <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 7.6\u2002Biometric engines and their scopes 7.7\u2002Genesis <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.8\u2002Enrollment 7.9\u2002Biometric matching with visual cryptography <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 7.10\u2002Homomorphic encryption <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 7.11\u2002Defaults <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 7.12\u2002Authentication Requirement 7.13\u2002Enrollment requirement 7.14\u2002Registration <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 7.15\u2002Prevention of replay <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 8.\u2002BOPS infrastructure 8.1\u2002BOPS DNS 8.2\u2002BOPS TrustStore 8.3\u2002BOPS KeyStore <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 8.4\u2002Key negotiation protocol 8.5\u2002Enrollment elements 8.6\u2002Inside the BOPS infrastructure 8.7\u2002Client roles 8.8\u2002Message encoding and decoding <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 8.9\u2002Data privacy <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 8.10\u2002Genesis logical flow <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 8.11\u2002Certificate distribution <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 8.12\u2002Certificate management policy <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 9.\u2002BOPS API overview 9.1\u2002Format <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 9.2\u2002Identity assertion API <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 10.\u2002API 10.1\u2002Enterprise concepts 10.2\u2002Format of API cells 10.3\u2002The start of the biometric workflow <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 10.4\u2002Authentication overview <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 10.5\u2002API\u2014genesis <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 10.6\u2002API enrollment <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 10.7\u2002Data Structure <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 10.8\u2002API\u2014QROpportunity <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 10.9\u2002Client side authentication <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 10.10\u2002Server side authentication <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | 10.11\u2002Biometric engines configuration <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 10.12\u2002Application settings <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | 10.13\u2002Business integration <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 10.14\u2002Role gathering API <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 10.15\u2002Access control API <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 10.16\u2002Auditing 10.17\u2002Administration <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 10.18\u2002Reporting 10.19\u2002Admin statistics API <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 11.\u2002Server-side intrusion detection system 11.1\u2002API list blacklist 11.2\u2002API\u2014incident <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 12.\u2002Client device requirements 13.\u2002Privacy considerations 13.1\u2002Background <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 13.2\u2002BOPS data privacy reference 13.3\u2002BOPS governance and compliance <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | 13.4\u2002BOPS PII 13.5\u2002BOPS privacy specific safeguards <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 13.6\u2002BOPS and privacy controls <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | Annex\u00a0A (informative) Glossary <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | Annex\u00a0B (informative) Bibliography <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | Back cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Biometric Open Protocol<\/b><\/p>\n |