{"id":398256,"date":"2024-10-20T04:34:49","date_gmt":"2024-10-20T04:34:49","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-2410-2015-2\/"},"modified":"2024-10-26T08:23:08","modified_gmt":"2024-10-26T08:23:08","slug":"ieee-2410-2015-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-2410-2015-2\/","title":{"rendered":"IEEE 2410-2015"},"content":{"rendered":"

New IEEE Standard – Superseded. Identity assertion, role gathereing, multilevel access control, assurance, and auditing are provided by the Biometric Open Protocol Standard (BOPS). The BOPS implementation includes software running on a client device (smartphone or mobile device), a trusted BOPS server, and an intrusion detection system. The BOPS implementation allows pluggable components to replace existing components\u2019 functionality, accepting integration into current operating environments in a short period of time. The BOPS implementation provides continuous protection to the resources and assurance of the placement and viability of adjudication and other key features. Accountability is the mechanism that proves a service-level guarantee of security. The BOPS implementation allows the systems to meet security needs by using the application programming interface. The BOPS implementation need not know whether the underlying system is a relational database management system or a search engine. The BOPS implementation functionality offers a \u201cpoint-and-cut\u201d mechanism to add the appropriate security to the production systems as well as to the systems in development. The architecture is language neutral, allowing Representational State Transfer (REST), JavaScript Object Notation (JSON), and Secure Sockets Layer (SSL) or Transport Layer Security to provide the communication interface. The architecture is built on the servlet specification, open SSLs, Java, JSON, REST, and an open persistent store. All tools adhere to open standards, allowing maximum interoperability.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std 2410\u2122-2015 Front cover <\/td>\n<\/tr>\n
2<\/td>\nTitle page <\/td>\n<\/tr>\n
4<\/td>\nImportant notices and disclaimers concerning IEEE standards documents <\/td>\n<\/tr>\n
7<\/td>\nParticipants <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\nContents <\/td>\n<\/tr>\n
10<\/td>\nImportant notice
1. Overview
1.1 Scope
1.2 Purpose <\/td>\n<\/tr>\n
11<\/td>\n1.3 Intended audience
2. Normative references
3. Definitions, acronyms, and abbreviations
3.1 Definitions
3.2 Acronyms and abbreviations <\/td>\n<\/tr>\n
12<\/td>\n4. Conformance <\/td>\n<\/tr>\n
13<\/td>\n5. Security considerations
5.1 Background
5.2 Identity assertion
5.3 Role gathering
5.4 Access control <\/td>\n<\/tr>\n
14<\/td>\n5.5 Auditing and assurance <\/td>\n<\/tr>\n
15<\/td>\n6. BOPS interoperability
7. BOPS overview, application, registration, and prevention of replay
7.1 Overview <\/td>\n<\/tr>\n
18<\/td>\n7.2 Application <\/td>\n<\/tr>\n
19<\/td>\n7.3 Registration <\/td>\n<\/tr>\n
21<\/td>\n7.4 Prevention of replay <\/td>\n<\/tr>\n
22<\/td>\n8. BOPS API overview
8.1 Format
8.2 Identity assertion API <\/td>\n<\/tr>\n
23<\/td>\n9. API
9.1 Enterprise concepts
9.2 Format of API cells
9.3 Genesis <\/td>\n<\/tr>\n
24<\/td>\n9.4 API\u2014genesis <\/td>\n<\/tr>\n
25<\/td>\n9.5 API\u2014QROpportunity <\/td>\n<\/tr>\n
28<\/td>\n9.6 Role gathering API <\/td>\n<\/tr>\n
30<\/td>\n9.7 Access control API <\/td>\n<\/tr>\n
31<\/td>\n9.8 Auditing
9.9 Administration <\/td>\n<\/tr>\n
32<\/td>\n9.10 Reporting
10. Client device requirements <\/td>\n<\/tr>\n
33<\/td>\n11. Server-side intrusion detection system
11.1 API list blacklist
11.2 API\u2014Incident <\/td>\n<\/tr>\n
35<\/td>\nAnnex A (informative) Glossary <\/td>\n<\/tr>\n
36<\/td>\nAnnex B (informative) Bibliography <\/td>\n<\/tr>\n
37<\/td>\nBack cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Biometric Open Protocol<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2015<\/td>\n37<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":398258,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-398256","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/398256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/398258"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=398256"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=398256"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=398256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}