Shopping Cart

No products in the cart.

BS ISO/IEC 24745:2022

$215.11

Information security, cybersecurity and privacy protection. Biometric information protection

Published By Publication Date Number of Pages
BSI 2022 74
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weā€™re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
2 National foreword
7 Foreword
8 Introduction
9 1 Scope
2 Normative references
3 Terms and definitions
14 4 Abbreviated terms
15 5 Biometric systems
5.1 General
17 5.2 Biometric system operations
19 5.3 Biometric references and identity references (IRs)
5.4 Biometric systems and identity management systems
20 5.5 Personally identifiable information (PII) and privacy
5.6 Societal considerations
21 6 Security aspects of a biometric system
6.1 Security requirements for biometric systems to protect biometric information
6.1.1 Confidentiality
6.1.2 Integrity
6.1.3 Renewability and revocability
22 6.1.4 Availability
6.2 Security threats and countermeasures in biometric systems
6.2.1 Threats and countermeasures against biometric system components
24 6.2.2 Threats and countermeasures during the transmission of biometric information
25 6.2.3 Renewable biometric references as countermeasure technology
27 6.3 Security of data records containing biometric information
6.3.1 Security for biometric information processing in a single database
29 6.3.2 Security for biometric information processing in separated databases
30 7 Biometric information privacy management
7.1 Biometric information privacy threats
31 7.2 Biometric information privacy requirements and guidelines
7.2.1 Irreversibility
7.2.2 Unlinkability
32 7.2.3 Confidentiality
7.3 Biometric information lifecycle privacy management
7.3.1 Collection
7.3.2 Transfer (disclosure of information to a third party)
33 7.3.3 Use
7.3.4 Storage
7.3.5 Retention
7.3.6 Archiving and data backup
34 7.3.7 Disposal
7.4 Responsibilities of a biometric system owner
35 8 Biometric system application models and security
8.1 Biometric system application models
36 8.2 Security in each biometric application model
8.2.1 General
8.2.2 Model A ā€” Store on server and compare on server
38 8.2.3 Model B ā€” Store on token and compare on server
40 8.2.4 Model C ā€” Store on server and compare on client
41 8.2.5 Model D ā€” Store on client and compare on client
43 8.2.6 Model E ā€” Store on token and compare on client
45 8.2.7 Model F ā€” Store on token and compare on token
46 8.2.8 Model G ā€” Store distributed on token and server, compare on server
47 8.2.9 Model H ā€” Store distributed on token and client, compare on client
49 8.2.10 Model I ā€” Store on server, compare distributed
50 8.2.11 Model J ā€” Store on token, compare distributed
52 8.2.12 Model K ā€” Store distributed, compare distributed
54 Annex A (informative) Secure binding and use of separated DBIR and DBBR
57 Annex B (informative) Framework for renewable biometric references (RBRs)
61 Annex C (informative) Technology examples for biometric information protection
63 Annex D (informative) Biometric watermarking
65 Annex E (informative) Biometric information protection using information splitting
67 Annex F (informative) Selection of biometric application models
70 Bibliography
BS ISO/IEC 24745:2022
$215.11