10/30136309 DC : 0
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
BS ISO/IEC 24745 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION
Hardcopy , PDF
31-07-2011
English
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols (and abbreviated terms)
5 Biometric systems
6 Security aspects of a biometric system to protect
biometric information
7 Biometric information privacy management
8 Biometric system application models and security
Annex A (informative) - Secure binding of separated
DB[IR] and DB[BR] and their uses
Annex B (informative) - Crypographic algortithms for
security of biometric systems
Annex C (normative) - Framework for renewable
biometric references
Annex D (informative) - Technology examples for
renewable biometric references
Annex E (informative) - Biometric watermarking
Bibliography
Committee |
IST/33
|
DocumentType |
Draft
|
Pages |
65
|
PublisherName |
British Standards Institution
|
Status |
Superseded
|
SupersededBy |
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
ISO 19092:2008 | Financial services — Biometrics — Security framework |
ISO/IEC 19792:2009 | Information technology Security techniques Security evaluation of biometrics |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 24787:2010 | Information technology Identification cards On-card biometric comparison |
ISO/IEC 7816-4:2013 | Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange |
ISO/IEC TR 24714-1:2008 | Information technology — Biometrics — Jurisdictional and societal considerations for commercial applications — Part 1: General guidance |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
ISO/IEC 24761:2009 | Information technology Security techniques Authentication context for biometrics |
ISO/IEC 18033-4:2011 | Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
ISO/IEC 29100:2011 | Information technology — Security techniques — Privacy framework |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.