Rec. ITU-T X.1279 (09/2020 Framework of enhanced authentication using telebiometrics with anti-spoofing detection mechanisms
Summary
History
FOREWORD
Table of Contents
Introduction
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Security threats to telebiometric authentication and countermeasures
     6.1 Background
     6.2 Reference authentication modes
     6.3 Security threats
          6.3.1 Security threats on the client side
          6.3.2 Security threats on the server side
          6.3.3 Security threats to the transmission channel between client and server
     6.4 Countermeasures
7 Architectural framework
     7.1 Architectural diagram
     7.2 Client side functionalities
          7.2.1 Environment detection function
          7.2.2 Biometric data capturing function
          7.2.3 ASD detection function
          7.2.4 Quality detection function
          7.2.5 Security management function
     7.3 Server side functionalities
          7.3.1 Biometric data registration function
          7.3.2 Anti-spoofing judgement function
          7.3.3 Quality judgement function
          7.3.4 Biometric data comparison function
          7.3.5 Decision logic function
          7.3.6 Biometric reference database
          7.3.7 Security management function
8 Authentication process flows
     8.1 Message types
     8.2 Process flows
          8.2.1 Registration process flows
          8.2.2 Authentication process flows
          8.2.3 Deregistration process flows
9 Security guidelines
     9.1 Client security
     9.2 Server security
     9.3 Storage security
     9.4 Communication security
     9.5 Other security considerations
Appendix I  Use cases and scenarios
     I.1  Use case study for mobile payment services
     I.2 Use case study for e-commerce services
Appendix II  Secure remote password (SRP)
Appendix III  Examples of how a server performs ASD in face recognition
Bibliography