{"id":353188,"date":"2024-10-20T00:56:38","date_gmt":"2024-10-20T00:56:38","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-iec-tr-247412018\/"},"modified":"2024-10-26T01:02:09","modified_gmt":"2024-10-26T01:02:09","slug":"bsi-pd-iso-iec-tr-247412018","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-iec-tr-247412018\/","title":{"rendered":"BSI PD ISO\/IEC TR 24741:2018"},"content":{"rendered":"
This document describes the history of biometrics and what biometrics does, the various biometric technologies in general use today (for example, fingerprint recognition and face recognition) and the architecture of the systems and the system processes that allow automated recognition using those technologies. It also provides information about the application of biometrics in various business domains such as border management, law enforcement and driver licensing, the societal and jurisdiction considerations that are typically taken into account in biometric systems, and the international standards that underpin their use.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions 4 Introduction and fundamental concepts 4.1 What are biometric technologies? <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4.2 What biometric systems do <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5 History <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6 Overview of biometric technologies 6.1 Eye technologies 6.1.1 Iris recognition 6.1.2 Retina recognition <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6.2 Face technologies 6.3 Finger and palm ridge technologies 6.3.1 Fingerprint imaging <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.3.2 Fingerprint comparison <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.3.3 Palm technologies 6.4 Hand geometry technologies 6.5 Dynamic signature technologies <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.6 Speaker recognition technologies 6.7 Vascular patterns 6.8 Keystroke dynamics 6.9 Scent\/Odour 6.10 DNA <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.11 Cardiogram 6.12 Gait and full body recognition 7 Example applications 7.1 Physical access control 7.2 Logical access control 7.3 Time and attendance <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7.4 Accountability 7.5 Electronic authorizations 7.6 Government\/citizen services 7.7 Border protection 7.7.1 ePassports and machine-readable travel documents 7.7.2 Automated border crossing (ABC) systems <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 7.7.3 Visas 7.7.4 EURODAC 7.8 Law enforcement 7.9 Civil background checks 7.10 Clustering <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 8 General biometric system 8.1 Conceptual representation of general biometric system <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 8.2 Conceptual components of a general biometric system 8.2.1 Data capture subsystem 8.2.2 Transmission subsystem 8.2.3 Signal processing subsystem 8.2.4 Data storage subsystem 8.2.5 Comparison subsystem <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 8.2.6 Decision subsystem 8.2.7 Administration subsystem 8.2.8 Interface 8.3 Functions of general biometric system 8.3.1 Enrolment <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 8.3.2 Verification of a positive biometric claim <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 8.3.3 Identification <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 9 Performance testing 9.1 General <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 9.2 Types of technical tests 10 Biometric technical interfaces 10.1 BDBs and BIRs <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 10.2 Service architectures 10.3 Common Biometric Exchange Formats Framework (CBEFF) <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 10.4 The BioAPI International Standard <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 10.5 The BIP International Standard 11 Biometrics and information security 11.1 General <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 11.2 Security of biometric data <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 11.3 Presentation attacks (Spoofing) 11.4 Integrity of the enrolment process <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 12 Biometrics and privacy 12.1 General <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 12.2 Proportional application of biometrics 12.3 Biometric technology acceptability 12.4 Confidentiality of biometric data <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 12.5 Integrity of biometric data 12.6 Irreversibility of biometric data 12.7 Unlinkability of biometric information <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Biometrics. Overview and application<\/b><\/p>\n |