1
Scope
2 References
3 Definitions
3.1 Terms defined
elsewhere
3.2 Terms defined in this
Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Biometric digital key
6.1
Biometric cryptosystem
6.2
Model of biometric digital key
7 Biometric digital key framework
7.1 Framework overview
7.2
Prerequisites
7.3 Biometric digital key
generation and protection framework
7.4 Biometric encryption
and signature framework with biometric digital key
8 Security requirements on biometric digital key framework
8.1 Basic security
requirements
8.2 Security requirements
on biometric digital key generation
8.3 Security requirements
on biometric digital key protection
9 Biometric digital key with biometric certificate
9.1 Biometric certificate
based biometric digital key
9.2 Biometric
certificate-based biometric digital signature
10 Security requirements on biometric certificate-based biometric digital key
10.1 Basic security
requirements
10.2 Security requirements
on biometric certificate-based biometric digital key
10.3 Security requirements
on biometric certificate-based biometric digital key protection
10.4 Security requirements
on client-side
10.5 Security requirements
between client-side and BCA
10.6 Security requirements
between client-side and CA
Appendix I – Biometric digital key based on biometric
certificate
I.1 Biometric digital
key
I.2 Biometric
certificate generation for biometric digital key
I.3 BC-based biometric
digital key generation
Appendix II – Applications of biometric digital key
II.1 Introduction
II.2 Server-side asymmetric
biometric key generation
II.3 Client-side asymmetric
biometric key generation
Bibliography