{"id":430780,"date":"2024-10-20T07:24:40","date_gmt":"2024-10-20T07:24:40","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-190922023\/"},"modified":"2024-10-26T14:04:52","modified_gmt":"2024-10-26T14:04:52","slug":"bs-iso-190922023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-190922023\/","title":{"rendered":"BS ISO 19092:2023"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
8<\/td>\nForeword <\/td>\n<\/tr>\n
9<\/td>\nIntroduction <\/td>\n<\/tr>\n
11<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
12<\/td>\n3 Terms and definitions <\/td>\n<\/tr>\n
18<\/td>\n4 Abbreviated terms
5 Biometrics in financial service context
5.1 General <\/td>\n<\/tr>\n
20<\/td>\n5.2 Generic security considerations
5.3 Personal device vulnerabilities and controls strategy
5.4 Biometric verification versus biometric identification <\/td>\n<\/tr>\n
21<\/td>\n6 Biometric modalities and core systems
6.1 General
6.2 Modalities of biometrics
6.2.1 General
6.2.2 Fingerprint <\/td>\n<\/tr>\n
22<\/td>\n6.2.3 Voice biometrics
6.2.4 Iris biometrics
6.2.5 Face biometrics <\/td>\n<\/tr>\n
23<\/td>\n6.2.6 Signature biometrics
6.2.7 Vein biometrics <\/td>\n<\/tr>\n
24<\/td>\n6.2.8 Palm print biometrics
6.2.9 Keystroke biometrics
6.3 Biometric system and its supporting systems
6.3.1 Overview <\/td>\n<\/tr>\n
25<\/td>\n6.3.2 Core systems <\/td>\n<\/tr>\n
26<\/td>\n6.3.3 Core biometric authentication usage scenarios <\/td>\n<\/tr>\n
30<\/td>\n7 Financial biometric authentication systems \u2014 usability considerations
7.1 General
7.2 Properties of biometric modalities <\/td>\n<\/tr>\n
31<\/td>\n7.3 Properties and evaluation of biometric system
7.3.1 Recognition performance <\/td>\n<\/tr>\n
32<\/td>\n7.3.2 Recognition performance evaluation <\/td>\n<\/tr>\n
33<\/td>\n7.3.3 Presentation attack detection
7.3.4 Interoperability <\/td>\n<\/tr>\n
34<\/td>\n8 Financial biometric authentication systems \u2013 architectures
8.1 Overview
8.2 Conceptual business architecture <\/td>\n<\/tr>\n
35<\/td>\n8.3 Technical architecture
8.4 Registration architecture <\/td>\n<\/tr>\n
36<\/td>\n8.5 PBP devices and associated biometric authentication architectures
8.5.1 PBP device operators <\/td>\n<\/tr>\n
38<\/td>\n8.5.2 PBP device types
8.5.3 Point of biometric presentation (PBP) <\/td>\n<\/tr>\n
40<\/td>\n8.5.4 Biometric authentication architecture <\/td>\n<\/tr>\n
44<\/td>\n9 Financial biometric authentication systems \u2013 threats and vulnerabilities
9.1 Generic threat considerations <\/td>\n<\/tr>\n
45<\/td>\n9.2 Biometric presentation vulnerabilities
9.2.1 Overview
9.2.2 Synthetic biometric presentation attack vulnerabilities <\/td>\n<\/tr>\n
46<\/td>\n9.2.3 Improper PBP device calibration vulnerabilities
9.2.4 Fault injection
9.3 Comparison, decision and storage subsystem vulnerabilities
9.3.1 Overview <\/td>\n<\/tr>\n
47<\/td>\n9.3.2 Improper threshold settings vulnerability
9.3.3 Score and threshold vulnerabilities
9.3.4 Reference refinement vulnerabilities <\/td>\n<\/tr>\n
48<\/td>\n9.3.5 Self-targeted match search vulnerabilities
9.3.6 Other-party targeted match search vulnerabilities
9.3.7 Match collision vulnerabilities
9.3.8 Authentication result transmission vulnerabilities
9.3.9 Biometric storage vulnerabilities
10 Financial biometric authentication systems \u2014 security requirements
10.1 General
10.2 Generic security requirements
10.2.1 Physical security requirements <\/td>\n<\/tr>\n
49<\/td>\n10.2.2 Logical security requirements <\/td>\n<\/tr>\n
50<\/td>\n10.3 Identity registration
10.3.1 Overview
10.3.2 Security requirements
10.4 Presentation
10.4.1 Overview
10.4.2 Security requirements
10.5 Data storage and handling
10.5.1 Overview
10.5.2 Reference splitting procedure <\/td>\n<\/tr>\n
52<\/td>\n10.6 Comparison and decision
10.6.1 Overview
10.6.2 Security requirements
10.7 Enrolment
10.7.1 Overview
10.7.2 Security requirements <\/td>\n<\/tr>\n
53<\/td>\n10.8 Re-enrolment
10.8.1 Overview
10.8.2 Security requirements
10.9 Refinement
10.9.1 Overview
10.9.2 Security requirements
10.10 \u200bVerification
10.10.1 Overview <\/td>\n<\/tr>\n
54<\/td>\n10.10.2 Security requirements
10.11 Identification
10.11.1 Overview
10.11.2 Security requirements <\/td>\n<\/tr>\n
55<\/td>\n10.12 Termination
10.12.1 Overview
10.12.2 Security requirements
10.13 Suspension and reactivation
10.13.1 Overview
10.13.2 Security requirements <\/td>\n<\/tr>\n
56<\/td>\n10.14 Archiving
10.14.1 Overview
10.14.2 Security requirements
10.15 Security compliance verification <\/td>\n<\/tr>\n
57<\/td>\nAnnex A (informative) Threats and vulnerabilities for biometric environments <\/td>\n<\/tr>\n
60<\/td>\nAnnex B (informative) Biometric implementation scenarios <\/td>\n<\/tr>\n
69<\/td>\nAnnex C (normative) Biometric security controls checklist <\/td>\n<\/tr>\n
73<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Financial services. Biometrics. Security framework<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n76<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":430785,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-430780","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/430780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/430785"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=430780"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=430780"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=430780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}