Technologies de l'information – Biométrie – Protocole d'interfonctionnement à l'interface BioAPI |
La Recommandation UIT-T X.1083 | ISO/CEI 24708 (Protocole d'interfonctionnement à l'interface BioAPI, BIP) spécifie la syntaxe, la sémantique et le codage d'un ensemble de messages ("messages BIP") qui permettent à une application conforme BioAPI de demander des opérations biométriques dans des fournisseurs de service biométrique conformes BioAPI (BSP) de part et d'autre des frontières entre des noeuds ou des processus, et de recevoir la notification des événements provenant de ces BSP distants. Elle spécifie aussi des extensions relatives à l'architecture et au comportement du cadre BioAPI (spécifié dans la norme ISO/CEI 19784-1) afin de prendre en charge la création, le traitement, l'envoi et la réception de messages BIP. |
|
Citation: |
https://handle.itu.int/11.1002/1000/9257 |
Series title: |
X series: Data networks, open system communications and security X.1000-X.1099: Information and network security X.1080-X.1099: Telebiometrics |
Approval date: |
2007-11-13 |
Identical standard: | ISO/IEC 24708:2008 (Common) |
Provisional name: | X.bip |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1083 (11/2007)
|
In force
|
here
|
here
|
here
|
X.1083 (2007-11)
|
Index of all ASN.1 assignments defined in this Recommendation.
|
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|