{"id":394260,"date":"2024-10-20T04:13:12","date_gmt":"2024-10-20T04:13:12","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-247452022\/"},"modified":"2024-10-26T07:53:08","modified_gmt":"2024-10-26T07:53:08","slug":"bs-iso-iec-247452022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-247452022\/","title":{"rendered":"BS ISO\/IEC 24745:2022"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
7<\/td>\nForeword <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
14<\/td>\n4 Abbreviated terms <\/td>\n<\/tr>\n
15<\/td>\n5 Biometric systems
5.1 General <\/td>\n<\/tr>\n
17<\/td>\n5.2 Biometric system operations <\/td>\n<\/tr>\n
19<\/td>\n5.3 Biometric references and identity references (IRs)
5.4 Biometric systems and identity management systems <\/td>\n<\/tr>\n
20<\/td>\n5.5 Personally identifiable information (PII) and privacy
5.6 Societal considerations <\/td>\n<\/tr>\n
21<\/td>\n6 Security aspects of a biometric system
6.1 Security requirements for biometric systems to protect biometric information
6.1.1 Confidentiality
6.1.2 Integrity
6.1.3 Renewability and revocability <\/td>\n<\/tr>\n
22<\/td>\n6.1.4 Availability
6.2 Security threats and countermeasures in biometric systems
6.2.1 Threats and countermeasures against biometric system components <\/td>\n<\/tr>\n
24<\/td>\n6.2.2 Threats and countermeasures during the transmission of biometric information <\/td>\n<\/tr>\n
25<\/td>\n6.2.3 Renewable biometric references as countermeasure technology <\/td>\n<\/tr>\n
27<\/td>\n6.3 Security of data records containing biometric information
6.3.1 Security for biometric information processing in a single database <\/td>\n<\/tr>\n
29<\/td>\n6.3.2 Security for biometric information processing in separated databases <\/td>\n<\/tr>\n
30<\/td>\n7 Biometric information privacy management
7.1 Biometric information privacy threats <\/td>\n<\/tr>\n
31<\/td>\n7.2 Biometric information privacy requirements and guidelines
7.2.1 Irreversibility
7.2.2 Unlinkability <\/td>\n<\/tr>\n
32<\/td>\n7.2.3 Confidentiality
7.3 Biometric information lifecycle privacy management
7.3.1 Collection
7.3.2 Transfer (disclosure of information to a third party) <\/td>\n<\/tr>\n
33<\/td>\n7.3.3 Use
7.3.4 Storage
7.3.5 Retention
7.3.6 Archiving and data backup <\/td>\n<\/tr>\n
34<\/td>\n7.3.7 Disposal
7.4 Responsibilities of a biometric system owner <\/td>\n<\/tr>\n
35<\/td>\n8 Biometric system application models and security
8.1 Biometric system application models <\/td>\n<\/tr>\n
36<\/td>\n8.2 Security in each biometric application model
8.2.1 General
8.2.2 Model A \u2014 Store on server and compare on server <\/td>\n<\/tr>\n
38<\/td>\n8.2.3 Model B \u2014 Store on token and compare on server <\/td>\n<\/tr>\n
40<\/td>\n8.2.4 Model C \u2014 Store on server and compare on client <\/td>\n<\/tr>\n
41<\/td>\n8.2.5 Model D \u2014 Store on client and compare on client <\/td>\n<\/tr>\n
43<\/td>\n8.2.6 Model E \u2014 Store on token and compare on client <\/td>\n<\/tr>\n
45<\/td>\n8.2.7 Model F \u2014 Store on token and compare on token <\/td>\n<\/tr>\n
46<\/td>\n8.2.8 Model G \u2014 Store distributed on token and server, compare on server <\/td>\n<\/tr>\n
47<\/td>\n8.2.9 Model H \u2014 Store distributed on token and client, compare on client <\/td>\n<\/tr>\n
49<\/td>\n8.2.10 Model I \u2014 Store on server, compare distributed <\/td>\n<\/tr>\n
50<\/td>\n8.2.11 Model J \u2014 Store on token, compare distributed <\/td>\n<\/tr>\n
52<\/td>\n8.2.12 Model K \u2014 Store distributed, compare distributed <\/td>\n<\/tr>\n
54<\/td>\nAnnex A (informative) Secure binding and use of separated DBIR and DBBR <\/td>\n<\/tr>\n
57<\/td>\nAnnex B (informative) Framework for renewable biometric references (RBRs) <\/td>\n<\/tr>\n
61<\/td>\nAnnex C (informative) Technology examples for biometric information protection <\/td>\n<\/tr>\n
63<\/td>\nAnnex D (informative) Biometric watermarking <\/td>\n<\/tr>\n
65<\/td>\nAnnex E (informative) Biometric information protection using information splitting <\/td>\n<\/tr>\n
67<\/td>\nAnnex F (informative) Selection of biometric application models <\/td>\n<\/tr>\n
70<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information security, cybersecurity and privacy protection. Biometric information protection<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2022<\/td>\n74<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":394267,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[693,2641],"product_tag":[],"class_list":{"0":"post-394260","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-240-15","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/394260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/394267"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=394260"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=394260"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=394260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}