BSI PD ISO/IEC TR 30125:2016
$167.15
Information technology. Biometrics used with mobile devices
Published By | Publication Date | Number of Pages |
BSI | 2016 | 40 |
This Technical Report provides guidance for developing a consistent and secure method of biometric (either alone or supported by non-biometric) personalization and authentication in a mobile environment for systems procured on the open market.
Guidance is provided for
-
1:1 verification or 1:few positive identification;
-
biometric sample capture in the mobile environment where conditions are not well controlled and not covered in ISO/IEC Biometric interchange format standards and the ISO/IEC Biometric sample quality Technical Reports;
NOTE 1Further information regarding architectures may be found in NIST/SP 500‑288 .
-
the best use of multiple biometric and non-biometric(PINs,passwords,personal data)personalization and authentication methods (i.e. multifactor).
NOTE 2More information may be found in ISO/IEC 30108‑1 .
This Technical Report defines a framework to address methods and approaches for remote and unsupervised enrolment, together with secure storage and transmission of biometric and supporting biographic data, covering a variety of both online connected and offline modes.
This Technical Report identifies the functional elements and components of a generic mobile biometric system and the distinct characteristics of each component. It provides guidance related to a generic mobile architecture with reference to supporting standards.
The context recognizes a) the user as being mobile and b) operation across a variety of platforms, particularly mobile devices but also including tablet, laptop and other personal computing devices. The key to defining this context is whether the user’s environment is physically controlled by the organization to which the user seeks access.
PDF Catalog
PDF Pages | PDF Title |
---|---|
6 | Foreword |
7 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
10 | 4 Abbreviated terms 5 The use of biometrics in mobile devices 5.1 Taxonomy of usage of biometrics in mobile devices 5.1.1 General 5.1.2 Generic considerations for all use cases |
12 | 5.1.3 Access to the device 5.1.4 Access to the local applications, services and/or data |
13 | 5.1.5 Access to the communications channel 5.1.6 Verification/authentication of, or to, a remote resource or point of transaction |
14 | 5.2 Generic challenges in the integration of biometrics in mobile devices 5.2.1 Computational power 5.2.2 Data protection and privacy |
16 | 5.2.3 Biometric sample capture |
17 | 5.2.4 Sample authentication process |
18 | 5.2.5 Usability |
20 | 5.2.6 Solution testing 5.2.7 Challenges common to other scenarios and platforms |
21 | 6 Biometrics services within the OS of the mobile device |
23 | 7 Biometric services at the application level in a mobile device |
24 | 8 Biometric application development [using the biometric engine(s) provided] |
28 | 9 Functional and operational guidance 9.1 General guidance 9.1.1 Guidance on functional architecture 9.1.2 Guidance on environmental conditions and constraints 9.2 Guidance for enrolment 9.2.1 General guidance for enrolment |
29 | 9.2.2 Supervised enrolment 9.2.3 Unsupervised enrolment |
30 | 9.3 Guidance for authentication 9.3.1 Remote unsupervised authentication |
31 | 9.3.2 Local unsupervised authentication 10 Use of multi-factor authentication 10.1 Fusion and scores for multi-biometrics |
32 | 10.2 Combining biometric and non-biometric authentication techniques for greater security and/or usability 11 Biometric modality specific guidance |
35 | Bibliography |