{"id":415480,"date":"2024-10-20T06:05:26","date_gmt":"2024-10-20T06:05:26","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-27553-12022\/"},"modified":"2024-10-26T11:19:29","modified_gmt":"2024-10-26T11:19:29","slug":"bs-iso-iec-27553-12022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-27553-12022\/","title":{"rendered":"BS ISO\/IEC 27553-1:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 \u200bScope 2 \u200bNormative references 3 \u200bTerms and definitions <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4 \u200bAbbreviated terms 5 \u200bSecurity challenges 5.1 \u200bGeneral 5.2 \u200bSecurity challenges common to all biometric systems <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.3 \u200bSecurity challenges specific to authentication using biometrics on mobile devices 5.3.1 \u200bDiversity across mobile devices 5.3.2 \u200bOpen computation environment 5.3.3 \u200bOperation in an unsupervised environment <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6 \u200bSystem description 6.1 \u200bAn example architecture 6.2 \u200bEntities and components 6.2.1 \u200bBiometric system <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.2.2 \u200bRelying party agent 6.2.3 \u200bAuthentication agent <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.2.4 \u200bRelying party server 6.2.5 \u200bAuthentication server 7 \u200bInformation assets <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 8 \u200bThreat analysis 8.1 \u200bThreats to the biometric system <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 8.2 \u200bThreats to the authentication and relying party agents 9 \u200bSecurity requirements and recommendations 9.1 \u200bGeneral 9.2 \u200bBiometric system <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 9.3 \u200bMobile device <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 10 \u200bPrivacy considerations 10.1 \u200bGeneral <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 10.2 \u200bPrivacy policy for biometric data 10.3 \u200bOther privacy considerations <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Annex A (informative) Implementation example <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Annex B (informative) Security issues related to communication between agents and servers for authentication using biometric on mobile devices <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Annex C (informative) An example of authentication assurance and assurance levels <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security, cybersecurity and privacy protection. Security and privacy requirements for authentication using biometrics on mobile devices – Local modes<\/b><\/p>\n |