{"id":394260,"date":"2024-10-20T04:13:12","date_gmt":"2024-10-20T04:13:12","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-247452022\/"},"modified":"2024-10-26T07:53:08","modified_gmt":"2024-10-26T07:53:08","slug":"bs-iso-iec-247452022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-247452022\/","title":{"rendered":"BS ISO\/IEC 24745:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5 Biometric systems 5.1 General <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.2 Biometric system operations <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.3 Biometric references and identity references (IRs) 5.4 Biometric systems and identity management systems <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.5 Personally identifiable information (PII) and privacy 5.6 Societal considerations <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6 Security aspects of a biometric system 6.1 Security requirements for biometric systems to protect biometric information 6.1.1 Confidentiality 6.1.2 Integrity 6.1.3 Renewability and revocability <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.1.4 Availability 6.2 Security threats and countermeasures in biometric systems 6.2.1 Threats and countermeasures against biometric system components <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6.2.2 Threats and countermeasures during the transmission of biometric information <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 6.2.3 Renewable biometric references as countermeasure technology <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 6.3 Security of data records containing biometric information 6.3.1 Security for biometric information processing in a single database <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 6.3.2 Security for biometric information processing in separated databases <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 7 Biometric information privacy management 7.1 Biometric information privacy threats <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 7.2 Biometric information privacy requirements and guidelines 7.2.1 Irreversibility 7.2.2 Unlinkability <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 7.2.3 Confidentiality 7.3 Biometric information lifecycle privacy management 7.3.1 Collection 7.3.2 Transfer (disclosure of information to a third party) <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 7.3.3 Use 7.3.4 Storage 7.3.5 Retention 7.3.6 Archiving and data backup <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 7.3.7 Disposal 7.4 Responsibilities of a biometric system owner <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 8 Biometric system application models and security 8.1 Biometric system application models <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 8.2 Security in each biometric application model 8.2.1 General 8.2.2 Model A \u2014 Store on server and compare on server <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 8.2.3 Model B \u2014 Store on token and compare on server <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 8.2.4 Model C \u2014 Store on server and compare on client <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 8.2.5 Model D \u2014 Store on client and compare on client <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 8.2.6 Model E \u2014 Store on token and compare on client <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 8.2.7 Model F \u2014 Store on token and compare on token <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 8.2.8 Model G \u2014 Store distributed on token and server, compare on server <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 8.2.9 Model H \u2014 Store distributed on token and client, compare on client <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 8.2.10 Model I \u2014 Store on server, compare distributed <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 8.2.11 Model J \u2014 Store on token, compare distributed <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 8.2.12 Model K \u2014 Store distributed, compare distributed <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | Annex A (informative) Secure binding and use of separated DBIR and DBBR <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | Annex B (informative) Framework for renewable biometric references (RBRs) <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | Annex C (informative) Technology examples for biometric information protection <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | Annex D (informative) Biometric watermarking <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | Annex E (informative) Biometric information protection using information splitting <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | Annex F (informative) Selection of biometric application models <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security, cybersecurity and privacy protection. Biometric information protection<\/b><\/p>\n |