CONTENTS

 

 1     Scope 
 2     References
 3     Definitions
        3.1     Vocabulary definitions within ISO/IEC JTC 1/SC 37 [b-SC37SD2V8]  
        3.2     Terms defined in this Recommendation   
 4     Abbreviations 
 5     Conventions    
 6     Prerequisites   
 7     Authentication models    
 8     Security threats for each models
 9     General requirements     
10     General protocol           
       10.1     Requirement of the biometrics handshake protocol         
       10.2     Alert protocol for biometric handshake  
       10.3     Implementation of the extended protocol 
11     Requirements of the biometric transportation stage for each model      
       11.1     Local model        
       11.2     Download model 
       11.3     Attached model   
       11.4     Centre model       
       11.5     Reference management on TTP for local model  
       11.6     Reference management on TTP for centre model
       11.7     Comparison outsourcing by client model
       11.8     Comparison outsourcing by server model           
       11.9     Storage and comparison outsourcing model        
Annex A – ASN.1 definitions for modified TLS extension protocol     
Appendix I – Telebiometrics system mechanism definitions by TLS extension     
        I.1        Extensions for biometric transfer protocol         
        I.2        Biometrics Verify           
        I.3        Biometrics Retry Request           
        I.4        Finished Biometrics       
        I.5        Biometrics TTP Request
        I.6        Biometrics TTP response           
        I.7        Extension alert protocol 
Appendix II – Implementation example of the biometric transfer protocol using BIP     
       II.1     Local model          
       II.2     Download model  
       II.3     Attached model     
       II.4     Centre model        
       II.5     Comparison outsourcing by client model  
       II.6     Reference management on TTP for local model   
       II.7     Reference management on TTP for centre model  
       II.8     Comparison outsourcing by server model 
       II.9     Storage and comparison outsourcing model          
Appendix III – Template registration and updating process for this Recommendation     
      III.1     Registration process         
      III.2     Updating or revocation process    
Appendix IV ASN.1 definitions for the protocol of TSM based on Appendix I     
Appendix V ECN modules for Appendix IV     
        V.1     EDM module       
        V.2     ELM module        
Bibliography