Telebiometrics protection procedures – Part 1: A guideline to technical and managerial countermeasures for biometric data security |
Recommendation ITU-T X.1086 defines the requirements of a guideline to provide security countermeasures for telebiometrics and tele-multibiometrics protection procedures. This Recommendation defines the vulnerabilities and threats in operating telebiometric and tele multibiometric systems, and proposes a general guideline for security countermeasures, from both the technical and managerial perspectives, in order to establish a safe environment for the use of telebiometric systems and the protection of individual privacy. In particular, this Recommendation focuses on the vulnerabilities and countermeasures in the process of combining multibiometrics data or information by four different fusion schemes: sample-level, feature-level, score-level, and decision-level.
This Recommendation describes countermeasures that allow the protection of biometric devices as related to their installation, removal, and delivery. Countermeasures are proposed for the protection of biometric systems as related to their operational procedures, as well as the roles and responsibilities of personnel involved in system design. It is expected that the proposed countermeasures will ensure the security and reliability of the flow of single and multiple biometric information in a telecommunications environment.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/9616 |
Series title: |
X series: Data networks, open system communications and security X.1000-X.1099: Information and network security X.1080-X.1099: Telebiometrics |
Approval date: |
2008-11-13 |
Provisional name: | X.tpp1 |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|