BS ISO/IEC 24745:2011
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Information technology. Security techniques. Biometric information protection
Hardcopy , PDF
09-03-2022
English
31-07-2011
Committee |
IST/33/5
|
DevelopmentNote |
Supersedes 10/30136309 DC. (07/2011)
|
DocumentType |
Standard
|
Pages |
62
|
PublisherName |
British Standards Institution
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
This International Standard provides guidance for the protection of biometric information under various requirements for confidentiality, integrity and renewability/revocability during storage and transfer. Additionally, this International Standard provides requirements and guidelines for the secure and privacy-compliant management and processing of biometric information.
This International Standard specifies the following:
-
analysis of the threats to and countermeasures inherent in a biometric and biometric system application models;
-
security requirements for securely binding between a biometric reference and an identity reference;
-
biometric system application models with different scenarios for the storage and comparison of biometric references; and
-
guidance on the protection of an individual\'s privacy during the processing of biometric information.
This International Standard does not include general management issues related to physical security, environmental security and key management for cryptographic techniques.
Standards | Relationship |
ISO/IEC 24745:2011 | Identical |
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
ISO/IEC 19785-4:2010 | Information technology — Common Biometric Exchange Formats Framework — Part 4: Security block format specifications |
ISO 19092:2008 | Financial services — Biometrics — Security framework |
ISO/IEC 19792:2009 | Information technology Security techniques Security evaluation of biometrics |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 24760-1:2011 | Information technology Security techniques A framework for identity management Part 1: Terminology and concepts |
ISO/IEC 24787:2010 | Information technology Identification cards On-card biometric comparison |
ISO/IEC 7816-4:2013 | Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange |
ISO/IEC TR 24714-1:2008 | Information technology — Biometrics — Jurisdictional and societal considerations for commercial applications — Part 1: General guidance |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
ISO/IEC 24761:2009 | Information technology Security techniques Authentication context for biometrics |
ISO/IEC 18033-4:2011 | Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
ISO/IEC 29100:2011 | Information technology — Security techniques — Privacy framework |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.