{"id":352129,"date":"2024-10-20T00:50:50","date_gmt":"2024-10-20T00:50:50","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-iec-tr-291442014\/"},"modified":"2024-10-26T00:48:45","modified_gmt":"2024-10-26T00:48:45","slug":"bsi-pd-iso-iec-tr-291442014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-iec-tr-291442014\/","title":{"rendered":"BSI PD ISO\/IEC TR 29144:2014"},"content":{"rendered":"
1.1<\/b> In scope<\/p>\n
This Technical Report will discuss<\/p>\n
concepts and considerations for the use of biometrics in a commercial Identity Management Solutions,<\/p>\n<\/li>\n
items that need to be considered when integrating biometrics into a commercial Identity Management Solutions, and<\/p>\n<\/li>\n
implementation Issues when implementing biometrics into commercial Identity Management Solutions.<\/p>\n<\/li>\n<\/ul>\n
1.2<\/b> Exclusions<\/p>\n
This Technical Report will not<\/p>\n
define an architecture and framework for IDM,<\/p>\n<\/li>\n
discuss any specification or assessment of government policy,<\/p>\n<\/li>\n
discuss the business need for a biometric database or process,<\/p>\n<\/li>\n
discuss the specific biometrics and which ones are to be used in particular systems,<\/p>\n<\/li>\n
consider the legality and acceptability in particular jurisdictions and cultures,<\/p>\n<\/li>\n
analyse the general structure of identifiers and the global identification of objects (e.g. object identifiers), and<\/p>\n<\/li>\n
discuss technical specifications in relation to the use of trusted biometric hardware and software.<\/p>\n<\/li>\n<\/ul>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Section sec_1 Section sec_1.1 Section sec_1.2 Section sec_2 Section sec_3 1\tScope 1.1\tIn scope 1.2\tExclusions 2\tNormative references 3\tTerms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Section sec_4 Section sec_5 Section sec_5.1 Section sec_5.2 Section sec_5.3 4\tSymbols and abbreviated terms 5\tBiometrics and Identity Management Systems 5.1\tGeneral 5.2\tBiometrics and identity 5.3\tIdentity and biometric identification <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Section sec_5.4 5.4\tBiometric identifiers <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | Section sec_5.5 Section sec_5.6 Section sec_6 Section sec_6.1 Section sec_6.2 Section sec_6.2.1 5.5\tHuman role in biometrics 5.6\tAssuring the integrity of the database 6\tBiometric considerations in Identity Management Systems 6.1\tGeneral 6.2\tCapturing and recording biometric characteristics <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Section sec_6.2.2 Section sec_6.2.3 Section sec_6.2.4 Section sec_6.3 Section sec_6.3.1 6.3\tAdhesion of biometric characteristics <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | Section sec_6.3.2 Section sec_6.3.3 Section sec_6.3.4 Section sec_6.3.5 <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | Section sec_6.4 Section sec_6.5 Section sec_6.5.1 Section sec_6.5.2 Section sec_6.6 Section sec_6.7 6.4\tChanges to name, alias and identification data 6.5\tChanges of condition 6.6\tBiometric spoofing 6.7\tLegitimate use of another identity <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | Section sec_6.8 Section sec_6.9 Section sec_6.9.1 Section sec_6.9.2 Section sec_6.9.3 Section sec_7 Section sec_7.1 Section sec_7.2 6.8\tOther exceptions 6.9\tOther issues of importance 7\tImplementation issues 7.1\tGeneral 7.2\tAggregation of databases <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | Section sec_7.3 Section sec_7.4 Section sec_7.5 7.3\tStrengthening of token and knowledge based identity systems 7.4\tRestrictions to accessing data 7.5\tPrivacy <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Section sec_7.6 Section sec_7.7 7.6\tMechanisms for preventing abuse of systems 7.7\tMultinational commercial organizations <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Reference ref_1 Reference ref_2 Reference ref_3 Reference ref_4 Reference ref_5 Reference ref_6 Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Biometrics. The use of biometric technology in commercial Identity Management applications and processes<\/b><\/p>\n |