Rec. ITU-T X.1279 (09/2020 Framework of enhanced authentication using telebiometrics with anti-spoofing detection mechanisms Summary History FOREWORD Table of Contents Introduction 1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Security threats to telebiometric authentication and countermeasures 6.1 Background 6.2 Reference authentication modes 6.3 Security threats 6.3.1 Security threats on the client side 6.3.2 Security threats on the server side 6.3.3 Security threats to the transmission channel between client and server 6.4 Countermeasures 7 Architectural framework 7.1 Architectural diagram 7.2 Client side functionalities 7.2.1 Environment detection function 7.2.2 Biometric data capturing function 7.2.3 ASD detection function 7.2.4 Quality detection function 7.2.5 Security management function 7.3 Server side functionalities 7.3.1 Biometric data registration function 7.3.2 Anti-spoofing judgement function 7.3.3 Quality judgement function 7.3.4 Biometric data comparison function 7.3.5 Decision logic function 7.3.6 Biometric reference database 7.3.7 Security management function 8 Authentication process flows 8.1 Message types 8.2 Process flows 8.2.1 Registration process flows 8.2.2 Authentication process flows 8.2.3 Deregistration process flows 9 Security guidelines 9.1 Client security 9.2 Server security 9.3 Storage security 9.4 Communication security 9.5 Other security considerations Appendix I Use cases and scenarios I.1 Use case study for mobile payment services I.2 Use case study for e-commerce services Appendix II Secure remote password (SRP) Appendix III Examples of how a server performs ASD in face recognition Bibliography