CONTENTS

 

 1     Scope 
 2     References 
 3     Definitions  
        3.1     Terms defined elsewhere    
        3.2     Terms defined in this Recommendation       
 4     Abbreviations and acronyms        
 5     Conventions     
 6     Biometric digital key        
        6.1     Biometric cryptosystem      
        6.2     Model of biometric digital key        
 7     Biometric digital key framework   
        7.1     Framework overview         
        7.2     Prerequisites          
        7.3     Biometric digital key generation and protection framework  
        7.4     Biometric encryption and signature framework with biometric digital key     
 8     Security requirements on biometric digital key framework 
        8.1     Basic security requirements
        8.2     Security requirements on biometric digital key generation    
        8.3     Security requirements on biometric digital key protection    
 9     Biometric digital key with biometric certificate       
        9.1     Biometric certificate based biometric digital key      
        9.2     Biometric certificate-based biometric digital signature          
10     Security requirements on biometric certificate-based biometric digital key 
       10.1     Basic security requirements           
       10.2     Security requirements on biometric certificate-based biometric digital key   
       10.3     Security requirements on biometric certificate-based biometric digital key protection          
       10.4     Security requirements on client-side           
       10.5     Security requirements between client-side and BCA          
       10.6     Security requirements between client-side and CA 
Appendix I – Biometric digital key based on biometric certificate     
        I.1        Biometric digital key         
        I.2        Biometric certificate generation for biometric digital key    
        I.3        BC-based biometric digital key generation
Appendix II – Applications of biometric digital key     
       II.1     Introduction           
       II.2     Server-side asymmetric biometric key generation    
       II.3     Client-side asymmetric biometric key generation     
Bibliography