Skip to main content

Biometric Security Standards

  • Reference work entry
  • First Online:
Encyclopedia of Biometrics

Synonyms

ACBio instance

Definition

Biometrics holds out the promise of increased confidence in personal authentication processes compared with traditional passwords and tokens (e.g., keys and cards). This is because of the direct link between the biometric characteristic and the individual (strong binding) compared with the indirect link represented by passwords and tokens (weak binding).

Biometric systems are IT systems that include biometric recognition functionality. The security of biometric systems shares much with the traditional IT system security, but there are some factors that are biometric specific. These include threats such as spoofing and the personal nature of biometric data that require special handling.

The earliest work on biometric security standards has been related to biometric security management for the financial services sector. However the recent growth in the deployment of biometric systems, particularly in public domain applications such as passports, visas,...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 899.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. ISO/IEC JTC 1 SC 37 19784 Biometric Application Programming Interface (BioAPI). Multi-part standard, some parts under development at the time of writing

    Google Scholar 

  2. ISO/IEC JTC 1 SC 37 19785 Common Biometric Exchange Format Framework (CBEFF). Multi-part standard, some parts under development at the time of writing

    Google Scholar 

  3. ISO/IEC JTC 1 SC 27 24761 Authentication Context for Biometrics (ACBio). Standard under development at the time of writing

    Google Scholar 

  4. SC 27 http://www.iso.org/iso/standards_developme-nt/technical_committees/list_of_iso_technical_com-mittees/iso_technical_committee.htm?commid=45-306. Accessed 30 Oct 2007

  5. SC 37 http://www.iso.org/iso/standards_developme-nt/technical_committees/list_of_iso_technical_com-mittees/iso_technical_committee.htm?commid=31-3770. Accessed 30 Oct 2007

  6. ANSI X9.84 Biometric information management and security for the financial services industry, see:http://www.techstreet.com/cgi-bin/detail?product_id=1327237 for further details. Accessed 30 Oct 2007

  7. ISO 19092-2008 – Financial services – biometrics – security framework. ISO 19092-1, see:http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=50145 for further details. Accessed 30 Oct 2007

  8. ISO 27000 family of Information Security Management Systems (ISMS) standards, see:http://www.itgovernance.co.uk/infosec.aspx for further details. Accessed 30 Oct 2007

  9. RFC Cryptographic Message Syntax 3852. The Internet Society, see ftp://ftp.rfc-editor.org/in-notes/rfc3852.txt. Accessed 30 Oct 2007

  10. ITU-T X.509 Information technology – open systems interconnection – the directory: public-key and attribute certificate frameworks

    Google Scholar 

  11. ISO/IEC JTC 1 SC 37 19795 Biometric testing and reporting. Multi-part standard, some parts under development at the time of writing

    Google Scholar 

  12. ISO/IEC JTC 1 SC 37 29120 Information technology: machine readable test data for biometric testing and reporting. Multi-part standard under development at the time of writing

    Google Scholar 

  13. ISO/IEC JTC 1 SC 27 19792: Information technology – security techniques – security evaluation of biometrics. Standard under development at the time of writing

    Google Scholar 

  14. ISO/IEC 15408, Common criteria for information technology security evaluation, http://www.commoncriteriaportal.org/

  15. BioscryptTM enterprise for NT logon, version 2.1.3: common criteria evaluation http://www.cse-cst.gc.ca/services/cc/bioscrypt-eng.html. Accessed 30 Oct 2007

  16. Common Criteria, Common evaluation methodology for information technology security evaluation – Biometric Evaluation Methodology supplement (BEM), http://www.cesg.gov.uk/policy_technologies/biometrics/media/bem_10.pdf

  17. NIST SP800-63, Electronic authentication guideline, http://csrc.nist.gov/publications/nistpubs/800-63/SP800-63V1_0_2.pdf. Accessed 30 Oct 2007

  18. OMB M-04-04, E-authentication guidance for federal agencies, http://www.whitehouse.gov/omb/memoranda/fy04/m04-04.pdf. Accessed 30 Oct 2007

  19. INCITS M1/06-0642 study report on biometrics in E-authentication, http://m1.incits.org

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Greg Cannon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this entry

Cite this entry

Cannon, G., Yamada, A., Statham, P. (2015). Biometric Security Standards. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_230

Download citation

Publish with us

Policies and ethics