{"id":353890,"date":"2024-10-20T01:00:21","date_gmt":"2024-10-20T01:00:21","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-iec-tr-247412018-tc\/"},"modified":"2024-10-26T01:11:18","modified_gmt":"2024-10-26T01:11:18","slug":"bsi-pd-iso-iec-tr-247412018-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-iec-tr-247412018-tc\/","title":{"rendered":"BSI PD ISO\/IEC TR 24741:2018 – TC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
98<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions 4 Introduction and fundamental concepts 4.1 What are biometric technologies? <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 4.2 What biometric systems do <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | 5 History <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | 6 Overview of biometric technologies 6.1 Eye technologies 6.1.1 Iris recognition 6.1.2 Retina recognition <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | 6.2 Face technologies 6.3 Finger and palm ridge technologies 6.3.1 Fingerprint imaging <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 6.3.2 Fingerprint comparison <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | 6.3.3 Palm technologies 6.4 Hand geometry technologies 6.5 Dynamic signature technologies <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | 6.6 Speaker recognition technologies 6.7 Vascular patterns 6.8 Keystroke dynamics 6.9 Scent\/Odour 6.10 DNA <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | 6.11 Cardiogram 6.12 Gait and full body recognition 7 Example applications 7.1 Physical access control 7.2 Logical access control 7.3 Time and attendance <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | 7.4 Accountability 7.5 Electronic authorizations 7.6 Government\/citizen services 7.7 Border protection 7.7.1 ePassports and machine-readable travel documents 7.7.2 Automated border crossing (ABC) systems <\/td>\n<\/tr>\n | ||||||
116<\/td>\n | 7.7.3 Visas 7.7.4 EURODAC 7.8 Law enforcement 7.9 Civil background checks 7.10 Clustering <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | 8 General biometric system 8.1 Conceptual representation of general biometric system <\/td>\n<\/tr>\n | ||||||
118<\/td>\n | 8.2 Conceptual components of a general biometric system 8.2.1 Data capture subsystem 8.2.2 Transmission subsystem 8.2.3 Signal processing subsystem 8.2.4 Data storage subsystem 8.2.5 Comparison subsystem <\/td>\n<\/tr>\n | ||||||
119<\/td>\n | 8.2.6 Decision subsystem 8.2.7 Administration subsystem 8.2.8 Interface 8.3 Functions of general biometric system 8.3.1 Enrolment <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | 8.3.2 Verification of a positive biometric claim <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | 8.3.3 Identification <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | 9 Performance testing 9.1 General <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | 9.2 Types of technical tests 10 Biometric technical interfaces 10.1 BDBs and BIRs <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | 10.2 Service architectures 10.3 Common Biometric Exchange Formats Framework (CBEFF) <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | 10.4 The BioAPI International Standard <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | 10.5 The BIP International Standard 11 Biometrics and information security 11.1 General <\/td>\n<\/tr>\n | ||||||
127<\/td>\n | 11.2 Security of biometric data <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | 11.3 Presentation attacks (Spoofing) 11.4 Integrity of the enrolment process <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | 12 Biometrics and privacy 12.1 General <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | 12.2 Proportional application of biometrics 12.3 Biometric technology acceptability 12.4 Confidentiality of biometric data <\/td>\n<\/tr>\n | ||||||
133<\/td>\n | 12.5 Integrity of biometric data 12.6 Irreversibility of biometric data 12.7 Unlinkability of biometric information <\/td>\n<\/tr>\n | ||||||
135<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. Information technology. Biometrics. Overview and application<\/b><\/p>\n |