Entity authentication service for pet animals using telebiometrics |
 |
Recommendation ITU-T X.1095 defines an entity authentication infrastructure for pet animals using telebiometrics. It specifies multimodal telebiometrics, which uses nose patterns and faces of pet animals. This Recommendation is applicable in various pet animal services such as registration, insurance and e-health care for pet animals. Entity authentication for pet animals is always performed in a non-cooperative environment, therefore it is necessary to define criteria for acquiring suitable multimodal telebiometrics for pet entity authentication. There are also requirements for devices that acquire multimodal telebiometrics, and architecture in the operating platform for stable multimodal telebiometric applications for pet animals.
This Recommendation specifies functional requirements for biometric capture devices and data acquisition of biometrics for pet entity authentication. A platform architecture, performance testing methodology and privacy issues are also defined.
The following topics are addressed in the scope of this Recommendation:
–Pet animals cover dogs and cats;
–Multimodal telebiometrics cover nose patterns and faces;
–Biometric capture devices cover digital cameras, mobile cameras, specific cameras such as infrared cameras, high-speed cameras and optical scanners.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/15708 |
Series title: |
X series: Data networks, open system communications and security X.1000-X.1099: Information and network security X.1080-X.1099: Telebiometrics |
Approval date: |
2023-11-13 |
Provisional name: | X.pet_auth |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1095 (11/2023)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|