1、 Reference number ISO 19092:2008(E) ISO 2008INTERNATIONAL STANDARD ISO 19092 First edition 2008-01-15 Financial services Biometrics Security framework Services financiers Biomtrie Cadre de scurit ISO 19092:2008(E) PDF disclaimer This PDF file may contain embedded typefaces. In accordance with Adobes
2、 licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility of not infringing Adobes licensing policy. T
3、he ISO Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters were optimized for printing. Every care h
4、as been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below. COPYRIGHT PROTECTED DOCUMENT ISO 2008 All rights reserved. Unless otherwise specified, no pa
5、rt of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale
6、56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in Switzerland ii ISO 2008 All rights reservedISO 19092:2008(E) ISO 2008 All rights reserved iii Contents Page Foreword. v Introduction . vi 1 Scope . 1 2 Conformance. 2 3 Normative re
7、ferences . 2 4 Terms and definitions. 2 5 Symbols and abbreviated terms . 8 6 Biometric technology overview. 9 6.1 General. 9 6.2 Fingerprint biometrics 9 6.3 Voice biometrics . 10 6.4 Iris biometrics . 10 6.5 Retina biometrics 11 6.6 Face biometrics. 11 6.7 Hand geometry biometrics 11 6.8 Signature
8、 biometrics 12 6.9 Vein biometrics . 12 7 Technological considerations . 12 7.1 Biometric system properties . 12 7.2 Universality 13 7.3 Distinctiveness 13 7.4 Accuracy 14 7.5 Performance evaluation . 15 7.6 Interoperability 17 8 Basic principles of biometric architectures.17 8.1 Biometric system mo
9、del 17 8.2 Data collection subsystem 18 8.3 Transmission subsystem. 18 8.4 Signal processing subsystem . 18 8.5 Matching subsystem 19 8.6 Decision subsystem . 20 8.7 Storage subsystem. 20 8.8 Portable tokens . 20 9 Management and security requirements 21 9.1 Basic applications 21 9.2 Core security r
10、equirements . 21 9.3 Enrolment 22 9.4 Verification 23 9.5 Identification 24 9.6 Transmission and storage . 25 9.7 Termination and archiving. 26 9.8 Compliance and event journal. 27 10 Security infrastructure . 27 10.1 Components 27 10.2 Physical techniques . 28 11 Biometric validation control object
11、ives 29 ISO 19092:2008(E) iv ISO 2008 All rights reserved11.1 Periodic review and audit considerations 29 11.2 Environmental controls 30 11.3 Key management life-cycle controls. 41 11.4 Biometric information life cycle. 45 Annex A (informative) Event journal. 54 Annex B (normative) Biometric enrolme
12、nt 58 Annex C (normative) Security considerations 60 Annex D (normative) Security requirements for biometric devices 72 Annex E (informative) Existing applications 75 Bibliography . 77 ISO 19092:2008(E) ISO 2008 All rights reserved v Foreword ISO (the International Organization for Standardization)
13、is a worldwide federation of national standards bodies (ISO member bodies). The work of preparing International Standards is normally carried out through ISO technical committees. Each member body interested in a subject for which a technical committee has been established has the right to be repres
14、ented on that committee. International organizations, governmental and non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization. International Standards are
15、drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of technical committees is to prepare International Standards. Draft International Standards adopted by the technical committees are circulated to the member bodies for voting. Publication as an International
16、 Standard requires approval by at least 75 % of the member bodies casting a vote. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO shall not be held responsible for identifying any or all such patent rights. ISO 19092 was prepa
17、red by Technical Committee ISO/TC 68, Financial services, Subcommittee SC 2, Security management and general banking operations. This first edition of ISO 19092 cancels and replaces ISO 19092-1:2006, of which it constitutes a minor revision, notably to remove references to the ISO 19092-2 project. I
18、SO 19092:2008(E) vi ISO 2008 All rights reservedIntroduction This International Standard replaces ISO 19092-1:2006. When ISO 19092-1:2006 was published, it was expected that a second part of ISO 19092 (ISO 19092-2, Financial services Biometrics Part 2: Message syntax and cryptographic requirements)
19、would subsequently be published. However, ISO 19092-2 was not completed due to a lack of consensus. As a result, ISO 19092-1:2006 has been updated into this International Standard, removing all references to ISO 19092-2 and incorporating some minor editorial corrections. Business practice has change
20、d with the introduction of computer-based technologies. The substitution of electronic transactions for their paper-based predecessors has reduced costs and improved efficiency. Trillions of dollars in funds and securities are transferred daily on systemically important payment systems and other fin
21、ancial systems by telephone, wire services and other electronic communication mechanisms. The high value or sheer volume of such transactions within an open environment exposes the financial community and its customers to potentially severe risks from accidental or deliberate alteration, substitutio
22、n or destruction of data. Interconnected networks, and the increased number and sophistication of malicious adversaries compound this risk. The inevitable advent of electronic communications across uncontrolled public networks, such as the Internet, is also increasing risk to the financial industry.
23、 The necessity to expand business operations into these environments has elevated the awareness for strong authentication and created the need for alternate forms of authentication. The financial community is responding to these needs. Biometrics, the “something you are or are able to do” identity f
24、actor, has come of age, and includes such technologies as finger image, voice identification, eye scan and facial image. The cost of biometric technology has been decreasing while the reliability has been increasing, and both are now acceptable and viable for the financial industry. This Internation
25、al Standard describes adequate controls and proper procedures for using biometrics as an authentication mechanism for secure remote electronic access or local physical access controls for the financial industry. Biometrics can be used for human authentication for physical and logical access. Logical
26、 access can include access to applications, services, or entitlements. This International Standard promotes the integration of biometrics into the financial industry, and the management of biometric information as part of the overall information security management programme of the organization. It
27、positions biometric technology to strengthen public key infrastructure (PKI) for higher authentication by providing stronger methods as well as multi-factor authentication. In addition, this International Standard allows continuous reassurance that the entity about to generate a digital signature is
28、, in fact, the person authorized to access the private key. The success of a biometric system with the public is based on a number of factors, and these factors differ among the available biometric technologies: convenience and ease of use; level of apparent security; performance; non-invasiveness.
29、The authentication systems discussed in this International Standard are those for a closed user group in which the group members have agreed to use biometric identification or perform identification themselves. Such agreements might be explicit (e.g. service agreement) or implicit (e.g. entering a f
30、acility indicating a clear intent to conduct a transaction). Such systems that will be used to monitor an indefinite number of people are excluded from the scope of this International Standard. ISO 19092:2008(E) ISO 2008 All rights reserved vii The techniques specified in this International Standard
31、 are designed to maintain the integrity and confidentiality of biometric information and to provide authentication. However, this International Standard does not guarantee that a particular implementation is secure. It is the responsibility of the financial institution to put an overall process in p
32、lace with the necessary controls to ensure that the process is securely implemented. Furthermore, the controls should include the application of appropriate audit tests in order to verify compliance with this International Standard. INTERNATIONAL STANDARD ISO 19092:2008(E) ISO 2008 All rights reserv
33、ed 1 Financial services Biometrics Security framework 1 Scope This International Standard describes the security framework for using biometrics for authentication of individuals in financial services. It introduces the types of biometric technologies and addresses issues concerning their application
34、. This International Standard also describes the architectures for implementation, specifies the minimum security requirements for effective management, and provides control objectives and recommendations suitable for use by a professional practitioner. The following are within the scope of this Int
35、ernational Standard: usage of biometrics for the authentication of employees and persons seeking financial services by: verification of a claimed identity; identification of an individual; validation of credentials presented at enrolment to support authentication as required by risk management; mana
36、gement of biometric information across its life cycle comprised of the enrolment, transmission and storage, verification, identification and termination processes; security of biometric information during its life cycle, encompassing data integrity, origin authentication and confidentiality; applica
37、tion of biometrics for logical and physical access control; surveillance to protect the financial institution and its customers; security of the physical hardware used throughout the biometric information life cycle. The following are not within the scope of this International Standard: the individu
38、als privacy rights and ownership of biometric information; specific techniques for data collection, signal processing and matching of biometric data, and the biometric matching decision-making process; usage of biometric technology for non-authentication convenience applications such as speech recog
39、nition, user interaction and anonymous access control. This International Standard provides the mandatory means whereby biometric information may be encrypted for data confidentiality or other reasons. Although this International Standard does not address specific requirements and limitations of bus
40、iness applications employing biometric technology, other standards may address these topics. ISO 19092:2008(E) 2 ISO 2008 All rights reserved2 Conformance A biometric authentication system may claim compliance to this International Standard if the implementation satisfies the management and security
41、 requirements identified in this International Standard. A biometric authentication system that utilizes the cryptographic message requirements recommended in this International Standard and that has implemented appropriate policies, practices and operational procedures shall comply with this Intern
42、ational Standard. Compliance of many of the aspects of a biometric authentication system can be achieved by satisfying the management and security requirements specified in Clauses 9 and 10, and verified if the implementation and its associated policies, practices and operational procedures meet the
43、 validation control objectives identified in Clause 11. An organization can document compliance to many operational aspects of this International Standard using the biometric event journal specified in Annex A. 3 Normative references The following referenced documents are indispensable for the appli
44、cation of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ISO 10202-3, Financial transaction cards Security architecture of financial transaction systems using integrated ci
45、rcuit cards Part 3: Cryptographic key relationships ISO/IEC 19790, Information technology Security techniques Security requirements for cryptographic modules 4 Terms and definitions For the purposes of this document, the following terms and definitions apply. 4.1 adaptation process of automatically
46、updating or refreshing a reference template 4.2 attempt submission of a biometric sample on the part of an individual for the purposes of enrolment, verification, or identification in a biometric system NOTE An individual can be permitted several attempts to enrol, to verify, or to be identified. 4.
47、3 binning database partitioning based on information contained within (endogenous to) the biometric patterns 4.4 biometrics measurable biological or behavioural characteristic, which reliably distinguishes one person from another, used to recognize the identity, or verify the claimed identity, of an
48、 enrolee 4.5 biometric authentication process of confirming an individuals identity, either by verification or by identification ISO 19092:2008(E) ISO 2008 All rights reserved 3 4.6 biometric data extracted information taken from the biometric sample and used to generate either a reference template
49、or a match template 4.7 biometric identification one-to-many process of comparing a submitted biometric sample against some or all enrolled reference templates to determine an individuals identity 4.8 Biometric Policy BP named set of rules that indicate the applicability of a biometric template to some community or class of application having common security requirements 4.9 Biometric Practice Statement BPS statement of the practices which an organization follows during the biometric temp
copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1