{"id":462680,"date":"2024-10-20T10:23:35","date_gmt":"2024-10-20T10:23:35","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-24787-12024\/"},"modified":"2024-10-26T19:16:43","modified_gmt":"2024-10-26T19:16:43","slug":"bs-iso-iec-24787-12024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-24787-12024\/","title":{"rendered":"BS ISO\/IEC 24787-1:2024"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5 Conformance <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6 Biometric data handling and encoding 7 Architecture of biometric verification using an ICC 7.1 General 7.2 Off-card biometric comparison <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 7.3 On-card biometric comparison (sensor-off-card) 7.4 Work-sharing on-card biometric comparison <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 7.5 Biometric system-on-card <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 8 Framework for on-card biometric comparison 8.1 General 8.2 Application selection using AID 8.3 Data for on-card biometric comparison 8.3.1 General <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 8.3.2 Format of biometric data <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 8.3.3 Specific data objects <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 8.3.4 Use of biometric reference for multiple applications (informative) <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 8.4 Processes 8.4.1 Enrolment and re-enrolment 8.4.2 Biometric verification 8.4.3 Biometric comparison process and decision <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 8.5 Termination 9 Security policies for on-card biometric comparison 9.1 Minimum security policies for on-card biometric comparison 9.1.1 General 9.1.2 Minimum security policies 9.1.3 Retry counter management <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 9.2 Security policies for multiple on-card biometric comparison applications 9.2.1 Taxonomy of biometric comparison applications used in ICC 9.2.2 Security policy for universal verification mechanism (SP1) <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 9.2.3 Security policy for shared biometric reference with independent verification mechanism (SP2) <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 9.2.4 Security policy for independent applications (SP3) <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Annex A (informative) Sample APDU for on-card biometric comparison <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Annex B (informative) Example for implementation of global biometric reference <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Annex C (informative) Examples of security status transition model <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Annex D (informative) Considerations for security mechanisms in on-card biometric comparison <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | Annex E (informative) Example of biometric information template including CBEFF-3 data elements <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. On-card biometric comparison – General principles and specifications<\/b><\/p>\n |