CONTENTS

 1     Scope 
 2     References 
 3     Definitions  
        3.1     Terms defined elsewhere    
        3.2     Terms defined in this Recommendation       
 4     Abbreviations and acronyms        
 5     Conventions     
 6     Components and vulnerabilities of a biometric system       
 7     Protection of biometric input devices        
        7.1     Vulnerabilities        
        7.2     Guidelines for protection    
 8     Protection of the process of transmitting biometric raw data          
        8.1     Vulnerabilities        
        8.2     Guidelines for protection    
 9     Protection of the signal processing component      
        9.1     Vulnerabilities        
        9.2     Guidelines for protection    
10     Protection of the process of transmitting extracted biometric templates     
       10.1     Vulnerabilities       
       10.2     Guidelines for protection   
11     Protection of the biometric template comparison component        
       11.1     Vulnerabilities       
       11.2     Guidelines for protection   
12     Protection of the storage 
       12.1     Vulnerabilities       
       12.2     Guidelines for protection   
13     Protection of the process of transmitting data from the registration to the storage  
       13.1     Vulnerabilities       
       13.2     Guidelines for protection   
14     Protection of the process of transmitting results from the comparisoncomponent  
       14.1     Vulnerabilities       
       14.2     Guidelines for protection   
15     Protection of the registration        
       15.1     Vulnerability         
       15.2     Guideline for protection     
16     Protection of the biometric template decision component 
       16.1     Vulnerability         
       16.2     Guideline for protection     
17     Protection of the process oftransmitting the stored biometric templates    
       17.1     Vulnerabilities       
       17.2     Guidelines for protection   
18     Protection of the process of transmitting results from the decision component       
       18.1     Vulnerabilities       
       18.2     Guidelines for protection   
Annex A – Check list for usage of telebiometric system mechanism    
Appendix I – Check list for the application of telebiometric protection procedures    
        I.1        Definition of check list      
        I.2        Check list of items
Appendix II – Biometric verification process model     
Appendix III – Comparison between vulnerabilities and threats    
Appendix IV – Replay attacks on telebiometrics    
       IV.1     Definition of a replay attack           
       IV.2     Countermeasures for replay attack