Search
×
FR

Placeholder headline

This is just a placeholder headline

API Technical Report TDB-6 Chapter 6 – Density

$

204

BUY NOW

Placeholder headline

This is just a placeholder headline

API STD 560: Fired Heaters for General Refinery Services

$

721

BUY NOW

Placeholder headline

This is just a placeholder headline

API STD 64: Diverter Equipment Systems

$

324

BUY NOW

Placeholder headline

This is just a placeholder headline

API MPMS CH 17.10.1: Refrigerated Light Hydrocarbon Fluids – Measurement of Cargoes on Board LNG Carries

$

417

BUY NOW

Placeholder headline

This is just a placeholder headline

API RP 13B-1: Testing Water-based Drilling Fluids

$

418

BUY NOW

Placeholder headline

This is just a placeholder headline

API Technical Report TDB-12 Chapter 12 – Thermal Conductivity

$

214

BUY NOW

Placeholder headline

This is just a placeholder headline

API 16FI Frac Iron Guidelines and Requirements

$

129

BUY NOW

ISO 19092:2023

ISO 19092:2023 Financial services – Biometrics – Security framework

CDN $351.00

SKU: 369105c6ba97 Categories: ,

Description

This document specifies the security framework for using biometrics for authentication of customers in financial services, focusing exclusively on retail payments. It introduces the most common types of biometric technologies and addresses issues concerning their application. This document also describes representative architectures for the implementation of biometric authentication and associated minimum control objectives.

The following are within the scope of this document:

     use of biometrics for the purpose of:

     verification of a claimed identity;

     identification of an individual;

     biometric authentication threats, vulnerabilities and controls;

     validation of credentials presented at enrolment to support authentication;

     management of biometric information across its life cycle, comprising enrolment, transmission and storage, verification, identification and termination processes;

     security requirements for hardware used in conjunction with biometric capture and biometric data processing;

     biometric authentication architectures and associated security requirements.

The following are not within the scope of this document:

     detailed specifications for data collection, feature extraction and comparison of biometric data and the biometric decision-making process;

     use of biometric technology for non-financial transaction applications, such as physical or logical system access control.

Edition

2

Published Date

2023-03-02

Status

PUBLISHED

Pages

65

Language Detail Icon

English

Format Secure Icon

Secure PDF

Abstract

This document specifies the security framework for using biometrics for authentication of customers in financial services, focusing exclusively on retail payments. It introduces the most common types of biometric technologies and addresses issues concerning their application. This document also describes representative architectures for the implementation of biometric authentication and associated minimum control objectives.

The following are within the scope of this document:

-     use of biometrics for the purpose of:

-     verification of a claimed identity;

-     identification of an individual;

-     biometric authentication threats, vulnerabilities and controls;

-     validation of credentials presented at enrolment to support authentication;

-     management of biometric information across its life cycle, comprising enrolment, transmission and storage, verification, identification and termination processes;

-     security requirements for hardware used in conjunction with biometric capture and biometric data processing;

-     biometric authentication architectures and associated security requirements.

The following are not within the scope of this document:

-     detailed specifications for data collection, feature extraction and comparison of biometric data and the biometric decision-making process;

-     use of biometric technology for non-financial transaction applications, such as physical or logical system access control.

Previous Editions

Can’t find what you are looking for?

Please contact us at: