| Authentication framework with one-time telebiometric templates | 
                                  | 
                             
                            
                                This Recommendation describes a user authentication framework with a one-time telebiometric template. The framework provides secure user authentication and protection mechanisms for a biometric template transmitted over open networks. It prevents a replay attack and protects an  original biometric template by generating a new template upon each completion of authentication. This Recommendation also addresses the security requirements associated with the framework for a one-time telebiometric template.  | 
                             
                         
                     | 
                 
                
                    
                        
 
                            
                                | Citation: | 
                                https://handle.itu.int/11.1002/1000/11339 | 
                             
                            
                                | Series title: | 
                                X series: Data networks, open system communications and security   X.1000-X.1099: Information and network security   X.1080-X.1099: Telebiometrics | 
                             
                            
                                | Approval date: | 
                                2011-05-29 | 
                             
                            
                            | Provisional name: | X.ott |  
                            | Approval process: | AAP |  
                            
                                | 
                                    Status: | 
                                
                                    In force | 
                             
                            
                            
                                | 
                                    Maintenance responsibility: | 
                                
                                    ITU-T Study Group 17 | 
                             
                            
                            
                                | 
                                    Further details: | 
                                
                                    Patent statement(s) 
                                    Development history 
                                    
                                    
                                 | 
                             
                         
                     | 
                 
             
        
    
 
    
    
    
 
                     | 
		
		
			
                        
				
					
						
                                    
           
        
            
                | Ed. | 
                ITU-T Recommendation | 
                Status | 
                Summary | 
                Table of Contents | 
                Download | 
             
            
                    
                        | 
                            1
                         | 
                        
                            X.1090 (05/2011)
                         | 
                        
                            In force
                         | 
                        
                             
					here 
                         | 
                        
                             
					here 
                         | 
                        
                            here
                         | 
                     
                
         
        
     
    
        
        
     
    
 
                                
					 
						
                                    
    
    
        
            | Title | 
            Approved on | 
            Download | 
         
        
                
                    | 
                        Guidelines for identity-based cryptosystems used for cross-domain secure communications
                     | 
                    
                        2023
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Overview of hybrid approaches for key exchange with quantum key distribution
                     | 
                    
                        2022
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Guidelines for security management of using artificial intelligence technology
                     | 
                    
                        2022
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Successful use of security standards (2nd edition)
                     | 
                    
                        2020
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Description of the incubation mechanism and ways to improve it
                     | 
                    
                        2020
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Strategic approaches to the transformation of security studies
                     | 
                    
                        2020
                     | 
                    
                        here
                     | 
                 
            
     
    
 
    
    
 
                                
					 
				 
			 
                     |