{"id":430780,"date":"2024-10-20T07:24:40","date_gmt":"2024-10-20T07:24:40","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-190922023\/"},"modified":"2024-10-26T14:04:52","modified_gmt":"2024-10-26T14:04:52","slug":"bs-iso-190922023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-190922023\/","title":{"rendered":"BS ISO 19092:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 4 Abbreviated terms 5 Biometrics in financial service context 5.1 General <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.2 Generic security considerations 5.3 Personal device vulnerabilities and controls strategy 5.4 Biometric verification versus biometric identification <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6 Biometric modalities and core systems 6.1 General 6.2 Modalities of biometrics 6.2.1 General 6.2.2 Fingerprint <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.2.3 Voice biometrics 6.2.4 Iris biometrics 6.2.5 Face biometrics <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.2.6 Signature biometrics 6.2.7 Vein biometrics <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6.2.8 Palm print biometrics 6.2.9 Keystroke biometrics 6.3 Biometric system and its supporting systems 6.3.1 Overview <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 6.3.2 Core systems <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 6.3.3 Core biometric authentication usage scenarios <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 7 Financial biometric authentication systems \u2014 usability considerations 7.1 General 7.2 Properties of biometric modalities <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 7.3 Properties and evaluation of biometric system 7.3.1 Recognition performance <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 7.3.2 Recognition performance evaluation <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 7.3.3 Presentation attack detection 7.3.4 Interoperability <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 8 Financial biometric authentication systems \u2013 architectures 8.1 Overview 8.2 Conceptual business architecture <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 8.3 Technical architecture 8.4 Registration architecture <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 8.5 PBP devices and associated biometric authentication architectures 8.5.1 PBP device operators <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 8.5.2 PBP device types 8.5.3 Point of biometric presentation (PBP) <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 8.5.4 Biometric authentication architecture <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 9 Financial biometric authentication systems \u2013 threats and vulnerabilities 9.1 Generic threat considerations <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 9.2 Biometric presentation vulnerabilities 9.2.1 Overview 9.2.2 Synthetic biometric presentation attack vulnerabilities <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 9.2.3 Improper PBP device calibration vulnerabilities 9.2.4 Fault injection 9.3 Comparison, decision and storage subsystem vulnerabilities 9.3.1 Overview <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 9.3.2 Improper threshold settings vulnerability 9.3.3 Score and threshold vulnerabilities 9.3.4 Reference refinement vulnerabilities <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 9.3.5 Self-targeted match search vulnerabilities 9.3.6 Other-party targeted match search vulnerabilities 9.3.7 Match collision vulnerabilities 9.3.8 Authentication result transmission vulnerabilities 9.3.9 Biometric storage vulnerabilities 10 Financial biometric authentication systems \u2014 security requirements 10.1 General 10.2 Generic security requirements 10.2.1 Physical security requirements <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 10.2.2 Logical security requirements <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 10.3 Identity registration 10.3.1 Overview 10.3.2 Security requirements 10.4 Presentation 10.4.1 Overview 10.4.2 Security requirements 10.5 Data storage and handling 10.5.1 Overview 10.5.2 Reference splitting procedure <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 10.6 Comparison and decision 10.6.1 Overview 10.6.2 Security requirements 10.7 Enrolment 10.7.1 Overview 10.7.2 Security requirements <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 10.8 Re-enrolment 10.8.1 Overview 10.8.2 Security requirements 10.9 Refinement 10.9.1 Overview 10.9.2 Security requirements 10.10 \u200bVerification 10.10.1 Overview <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 10.10.2 Security requirements 10.11 Identification 10.11.1 Overview 10.11.2 Security requirements <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 10.12 Termination 10.12.1 Overview 10.12.2 Security requirements 10.13 Suspension and reactivation 10.13.1 Overview 10.13.2 Security requirements <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 10.14 Archiving 10.14.1 Overview 10.14.2 Security requirements 10.15 Security compliance verification <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | Annex A (informative) Threats and vulnerabilities for biometric environments <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | Annex B (informative) Biometric implementation scenarios <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | Annex C (normative) Biometric security controls checklist <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Financial services. Biometrics. Security framework<\/b><\/p>\n |