• There are no items in your cart

INCITS/ISO/IEC 24745 : 2012(R2017)

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION

Superseded date

23-04-2024

Published date

13-05-2018

Sorry this product is not available in your region.

Foreword
Introduction
1 Scope
2 Terms and definitions
3 Abbreviated terms
4 Biometric systems
5 Security aspects of a biometric system
6 Biometric information privacy management
7 Biometric system application models and security
Annex A (informative) - Secure binding and use of separated
        DB[IR] and DB[BR]
Annex B (informative) - Cryptographic algorithms for security
        of biometric systems
Annex C (informative) - Framework for renewable biometric
        references
Annex D (informative) - Technology examples for renewable
        biometric references
Annex E (informative) - Biometric watermarking
Bibliography

Gives guidance for the protection of biometric information under various requirements for confidentiality, integrity and renewability/revocability during storage and transfer.

DocumentType
Standard
PublisherName
Information Technology Industry Council
Status
Superseded
SupersededBy

Standards Relationship
ISO/IEC 24745:2011 Identical

ISO/IEC 19772:2009 Information technology Security techniques Authenticated encryption
ISO/IEC 19785-4:2010 Information technology — Common Biometric Exchange Formats Framework — Part 4: Security block format specifications
ISO 19092:2008 Financial services — Biometrics — Security framework
ISO/IEC 19792:2009 Information technology Security techniques Security evaluation of biometrics
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO/IEC 24760-1:2011 Information technology Security techniques A framework for identity management Part 1: Terminology and concepts
ISO/IEC 24787:2010 Information technology Identification cards On-card biometric comparison
ISO/IEC 7816-4:2013 Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange
ISO/IEC TR 24714-1:2008 Information technology — Biometrics — Jurisdictional and societal considerations for commercial applications — Part 1: General guidance
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary
ISO/IEC 24761:2009 Information technology Security techniques Authentication context for biometrics
ISO/IEC 18033-4:2011 Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers
ISO/IEC 29100:2011 Information technology — Security techniques — Privacy framework

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.