1
Scope
2
References
3
Definitions
3.1
Terms
defined elsewhere
3.2
Terms
defined in this Recommendation
4
Abbreviations
and acronyms
5
Conventions
6
Components
and vulnerabilities of a biometric system
7
Protection
of biometric input devices
7.1 Vulnerabilities
7.2
Guidelines
for protection
8
Protection
of the process of transmitting biometric raw data
8.1
Vulnerabilities
8.2
Guidelines
for protection
9 Protection of the signal processing component
9.1 Vulnerabilities
9.2
Guidelines
for protection
10 Protection
of the process
of transmitting
extracted
biometric
templates
10.1 Vulnerabilities
10.2 Guidelines for protection
11 Protection
of the biometric
template
comparison
component
11.1 Vulnerabilities
11.2
Guidelines
for protection
12 Protection
of the storage
12.1 Vulnerabilities
12.2
Guidelines
for protection
13 Protection of the process of transmitting data from the registration to the storage
13.1
Vulnerabilities
13.2 Guidelines for protection
14 Protection of the process of transmitting results from the comparisoncomponent
14.1 Vulnerabilities
14.2 Guidelines for protection
15 Protection of the registration
15.1 Vulnerability
15.2 Guideline for protection
16 Protection
of the biometric
template
decision
component
16.1 Vulnerability
16.2 Guideline for protection
17
Protection
of the process oftransmitting the stored biometric templates
17.1 Vulnerabilities
17.2 Guidelines for protection
18 Protection of the process of transmitting
results
from the decision
component
18.1 Vulnerabilities
18.2 Guidelines for protection
Annex A – Check list for usage of telebiometric system mechanism
Appendix I
– Check list for the application of telebiometric protection procedures
I.1 Definition of check list
I.2 Check list of items
Appendix II
– Biometric verification process model
Appendix
III – Comparison between vulnerabilities and threats
Appendix IV
– Replay attacks on telebiometrics
IV.1 Definition of a replay attack
IV.2 Countermeasures for replay attack