The telebiometric multimodal model – A framework for the specification of security and safety aspects of telebiometrics |
|
This Recommendation defines a telebiometric multimodal model that can be used as a framework for identifying and specifying safety aspects of telebiometrics, and for classifying biometric technologies used for identification (security aspects).The telebiometric multimodal model has been developed from two main sources that provide the solid foundation for the model. The first relates to theoretical work on systems, scale propinquity, hierarchies and modalities of interaction between a human being and the environment. The second is the specification in ISO 31 and in IEC 60027-1 of quantities and units for all known forms of measurement of the magnitude of physical interactions between a person and its environment.The telebiometric multimodal model is not limited to consideration of purely physical interactions, but also recognizes behavioural interactions. Such interactions are currently not quantified by standard units.The model itself consists of a specification of a number of dimensions related to interactions in a set of specified modalities, in both directions, at various intensities, using the complete range of quantities and units specified in ISO 31 and IEC 60027-1. This provides a taxonomy of all possible interactions, which contains more than 1600 combinations of measurement units, modalities and fields of study. |
|
Citation: |
https://handle.itu.int/11.1002/1000/7287 |
Series title: |
X series: Data networks, open system communications and security X.1000-X.1099: Information and network security X.1080-X.1099: Telebiometrics |
Approval date: |
2004-04-29 |
Provisional name: | X.tb |
Approval process: | AAP |
Status: |
Superseded |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|