1
Scope
2 References
3 Definitions
3.1 Vocabulary definitions
within ISO/IEC JTC 1/SC 37 [b-SC37SD2V8]
3.2 Terms defined in this
Recommendation
4 Abbreviations
5 Conventions
6 Prerequisites
7 Authentication models
8 Security threats for each
models
9 General requirements
10 General protocol
10.1 Requirement of the
biometrics handshake protocol
10.2 Alert protocol for
biometric handshake
10.3 Implementation of the
extended protocol
11 Requirements of the biometric
transportation stage for each model
11.1 Local model
11.2 Download model
11.3 Attached model
11.4 Centre model
11.5 Reference management
on TTP for local model
11.6 Reference management
on TTP for centre model
11.7 Comparison outsourcing
by client model
11.8 Comparison outsourcing by server model
11.9 Storage and comparison
outsourcing model
Annex A – ASN.1 definitions for modified TLS extension
protocol
Appendix I – Telebiometrics system mechanism definitions by
TLS extension
I.1 Extensions for biometric transfer protocol
I.2 Biometrics Verify
I.3 Biometrics Retry Request
I.4 Finished Biometrics
I.5 Biometrics TTP Request
I.6 Biometrics TTP response
I.7 Extension alert protocol
Appendix II – Implementation example of the biometric transfer protocol using
BIP
II.1 Local model
II.2 Download model
II.3 Attached model
II.4 Centre model
II.5 Comparison outsourcing by client model
II.6 Reference management on TTP for local model
II.7 Reference management on TTP for centre model
II.8 Comparison outsourcing by server model
II.9 Storage and comparison outsourcing model
Appendix III – Template registration and updating process for this
Recommendation
III.1 Registration process
III.2 Updating or revocation process
Appendix IV – ASN.1 definitions for
the protocol of TSM based on Appendix I
Appendix V – ECN modules for Appendix
IV
V.1 EDM module
V.2 ELM module
Bibliography