{"id":402939,"date":"2024-10-20T05:03:46","date_gmt":"2024-10-20T05:03:46","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-22-30445254-dc-2022\/"},"modified":"2024-10-26T09:00:40","modified_gmt":"2024-10-26T09:00:40","slug":"bsi-22-30445254-dc-2022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-22-30445254-dc-2022\/","title":{"rendered":"BSI 22\/30445254 DC 2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5 Conformance 6 Biometric data handling and encoding <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 7 Architecture of biometric comparison using an ICC 7.1 General 7.2 Off-card biometric comparison <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 7.3 On-card biometric comparison (sensor-off-card) 7.4 Work-sharing on-card biometric comparison <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 7.5 Biometric system-on-card <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 8 Framework for on-card biometric comparison 8.1 General 8.2 Application selection using AID 8.3 Data for on-card biometric comparison 8.3.1 General <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 8.3.2 Format of biometric reference 8.3.3 Data objects in the scope of biometric verification <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 8.3.4 Usage of one biometric reference by multiple applications 8.4 Processes 8.4.1 Enrolment 8.4.2 Biometric verification <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 8.4.3 Comparison process and result output 8.5 Termination 9 Security policies for on-card biometric comparison 9.1 General <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 9.2 Common security policies for on-card biometric comparison 9.2.1 Minimum security policy 9.2.2 Retry counter management <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 9.3 Security policies (SP1) for global application-linked biometric comparison parameters 9.4 Security policies (SP2) for application-specific biometric comparison parameters <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Annex\u00a0A (informative) Sample APDU for on-card biometric comparison <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Annex\u00a0B (informative) Example of usage of one biometric reference by multiple applications <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Annex\u00a0C (informative) Examples of implementations of on-card biometric comparison mechanisms <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Annex\u00a0D (informative) Considerations for security mechanisms in on-card biometric comparison <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | Annex\u00a0E (informative) Example of biometric information template including CBEFF-3 data elements <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS EN ISO\/IEC 24787-1. Information technology. On-card biometric comparison – Part 1. General principles and specifications<\/b><\/p>\n |