1、 I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1087 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (10/2016) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Information and network security Telebiometrics Technical and operational countermeasures for
2、 telebiometric applications using mobile devices Recommendation ITU-T X.1087 ITU-T X-SERIES RECOMMENDATIONS DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY PUBLIC DATA NETWORKS X.1X.199 OPEN SYSTEMS INTERCONNECTION X.200X.299 INTERWORKING BETWEEN NETWORKS X.300X.399 MESSAGE HANDLING SYSTEMS X
3、.400X.499 DIRECTORY X.500X.599 OSI NETWORKING AND SYSTEM ASPECTS X.600X.699 OSI MANAGEMENT X.700X.799 SECURITY X.800X.849 OSI APPLICATIONS X.850X.899 OPEN DISTRIBUTED PROCESSING X.900X.999 INFORMATION AND NETWORK SECURITY General security aspects X.1000X.1029 Network security X.1030X.1049 Security m
4、anagement X.1050X.1069 Telebiometrics X.1080X.1099 SECURE APPLICATIONS AND SERVICES Multicast security X.1100X.1109 Home network security X.1110X.1119 Mobile security X.1120X.1139 Web security X.1140X.1149 Security protocols X.1150X.1159 Peer-to-peer security X.1160X.1169 Networked ID security X.117
5、0X.1179 IPTV security X.1180X.1199 CYBERSPACE SECURITY Cybersecurity X.1200X.1229 Countering spam X.1230X.1249 Identity management X.1250X.1279 SECURE APPLICATIONS AND SERVICES Emergency communications X.1300X.1309 Ubiquitous sensor network security X.1310X.1339 PKI related Recommendations X.1340X.1
6、349 CYBERSECURITY INFORMATION EXCHANGE Overview of cybersecurity X.1500X.1519 Vulnerability/state exchange X.1520X.1539 Event/incident/heuristics exchange X.1540X.1549 Exchange of policies X.1550X.1559 Heuristics and information request X.1560X.1569 Identification and discovery X.1570X.1579 Assured
7、exchange X.1580X.1589 CLOUD COMPUTING SECURITY Overview of cloud computing security X.1600X.1601 Cloud computing security design X.1602X.1639 Cloud computing security best practices and guidelines X.1640X.1659 Cloud computing security implementation X.1660X.1679 Other cloud computing security X.1680
8、X.1699 For further details, please refer to the list of ITU-T Recommendations. Rec. ITU-T X.1087 (10/2016) i Recommendation ITU-T X.1087 Technical and operational countermeasures for telebiometric applications using mobile devices Summary Biometric technology in mobile devices is frequently used in
9、various areas which require a high level of reliability such as e-banking, and procurement services. It is necessary to make efforts to develop a security system that can pre-emptively cope with potential security threats for the purpose of ensuring mobile biometric data security. Since biometric te
10、chnology handles sensitive personally identifiable information (PII), some of the privacy issues for biometric in mobile devices should be considered. Recommendation ITU-T X.1087 specifies the implementation model and threats in the operating telebiometric systems in mobile devices. It provides a ge
11、neral guideline for security countermeasures from both the technical and operational perspectives in order to establish a safe mobile environment for the use of telebiometric systems. History Edition Recommendation Approval Study Group Unique ID* 1.0 ITU-T X.1087 2016-10-14 17 11.1002/1000/13061 Key
12、words E-payment, fast identity on-line, FIDO, mobile device, telebiometric applications, telebiometric authentication model. * To access the Recommendation, type the URL http:/handle.itu.int/ in the address field of your web browser, followed by the Recommendations unique ID. For example, http:/hand
13、le.itu.int/11.1002/1000/ 11830-en. ii Rec. ITU-T X.1087 (10/2016) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector
14、(ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every fo
15、ur years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, th
16、e necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary.
17、However, the Recommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the nega
18、tive equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTSITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the us
19、e of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation
20、, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/ww
21、w.itu.int/ITU-T/ipr/. ITU 2017 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec. ITU-T X.1087 (10/2016) iii Table of Contents Page 1 Scope . 1 2 References . 1 3 Definitions 2 3.1 Terms defined elsewhere 2 3
22、.2 Terms defined in this Recommendation . 2 4 Abbreviations and acronyms 2 5 Conventions 3 6 Prerequisites 3 7 Authentication models 3 7.1 Overview 3 7.2 Model 1 . 4 7.3 Model 2 . 5 7.4 Model 3 . 5 7.5 Model 4 . 6 7.6 Model 5 . 6 7.7 Model 6 . 7 7.8 Model 7 . 8 7.9 Model 8 . 8 7.10 Model 9 . 8 7.11
23、Model 10 . 9 7.12 Model 11 . 10 7.13 Model 12 . 10 8 Vulnerabilities of telebiometrics mobile devices . 11 8.1 Insufficient application programming interface management 11 8.2 Insecure wireless channels . 11 9 Security threats for each model 11 Appendix I Use cases 16 I.1 Micro secure digital (SD)-b
24、ased approach match on card using applet . 16 Appendix II Mobile storage study for biometrics . 18 II.1 Off-card comparison . 18 II.2 On-card comparison (sensor-off-card) . 18 II.3 Work-sharing on-card comparison . 19 II.4 System-on-card comparison . 20 iv Rec. ITU-T X.1087 (10/2016) Page Appendix I
25、II Use case study for mobile payment services . 21 III.1 Type A Pay payment procedure . 21 III.2 Type B Pay payment procedure . 21 III.3 Type B Pays built-in security. 22 Bibliography. 25 Rec. ITU-T X.1087 (10/2016) 1 Recommendation ITU-T X.1087 Technical and operational countermeasures for telebiom
26、etric applications using mobile devices 1 Scope This Recommendation provides a framework to ensure security and reliability of the flow of biometric information for telebiometric applications using mobile devices. This Recommendation defines 12 telebiometric authentication models depending on the co
27、nfiguration of the biometric sensor, the mobile device, and the server. It also specifies the threats in the operating telebiometric systems in the mobile devices and proposes a general guideline for security countermeasures from both the technical and operational perspectives in order to establish
28、a safe mobile environment for the use of telebiometric systems. The following topics are addressed within the scope of this Recommendation: Telebiometric security reference models in operating telebiometric systems using a mobile device including cloud computing services. General related threats and
29、 countermeasures to ensure security and reliability for telebiometric applications using mobile devices. The related standard environment is depicted in Figure 1. Figure 1 Standard environment for telebiometric applications using mobile devices 2 References The following ITU-T Recommendations and ot
30、her references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revision; users of this Recommendation are therefore encourage
31、d to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone documen
32、t, the status of a Recommendation. ITU-T X.1089 Recommendation ITU-T X.1089 (2008), Telebiometrics authentication infrastructure (TAI). IETF RFC 4346 IETF RFC 4346 (2008), The Transport Layer Security (TLS) Protocol Version 1.2. 2 Rec. ITU-T X.1087 (10/2016) 3 Definitions 3.1 Terms defined elsewhere
33、 This Recommendation uses the following terms defined elsewhere: 3.1.1 biometric (adjective) b-ISO/IEC 19784-1: Pertaining to the field of biometrics. 3.1.2 biometrics (noun) b-ISO/IEC 19784-1: Automated recognition of individuals based on their behavioural and biological characteristics. 3.1.3 biom
34、etric reference b-ISO/IEC 19784-1: One or more stored biometric samples, biometric templates or biometric models attributed to a biometric data subject and used for comparison. 3.1.4 biometric sample b-ISO/IEC 2382-37: Analogue or digital representation of biometric characteristics prior to biometri
35、c feature extraction process. 3.1.5 biometric template b-ISO/IEC 19784-1: Set of stored biometric features comparable directly to probe biometric features. 3.1.6 comparison (match/matching) b-ISO/IEC 19794-1: Estimation, calculation or measurement of similarity or dissimilarity between biometric pro
36、be(s and biometric reference(s). 3.1.7 comparison decision b-ISO/IEC 2382-37: Determination of whether the recognition biometric probe(s) and biometric reference(s) have the same biometric source, based on a comparison score(s), a decision policy(ies) including a threshold, and possibly other inputs
37、. 3.1.8 comparison score b-ISO/IEC 19784-1: Numerical value (or set of values) resulting from a comparison. 3.1.9 false match b-ISO/IEC 2382-37: Comparison decision of “match“ for a biometric probe and a biometric reference that are not from different biometric capture subjects. 3.1.10 false non-mat
38、ch b-ISO/IEC 2382-37: Comparison decision of “non-match“ for a biometric probe and a biometric reference that are from the same biometric capture subject and of the same biometric characteristics. 3.1.11 match b-ISO/IEC 2382-37: Comparison decision stating that the biometric probe(s) and and the bio
39、metric reference are from the same source. 3.1.12 mobile device b-ITU-T X.1158: A small, hand-held computing device with a subscriber identity module (SIM) card, typically having a display screen with touch input and/or a miniature keyboard and is not heavy. 3.1.13 non-match b-ISO/IEC 2382-37: Compa
40、rison decision stating that the biometric probe(s) and the biometric reference are not from the same source. 3.2 Terms defined in this Recommendation This Recommendation defines the following term: 3.2.1 biometric hardware security module: A physically combined hardware consisting of a hardware secu
41、rity module and a biometric module equipped with one or multiple biometric sensors. 4 Abbreviations and acronyms This Recommendation uses the following abbreviations and acronyms: APDU Application Protocol Data Unit API Application Programming Interface App Application Rec. ITU-T X.1087 (10/2016) 3
42、BC Biometric Certificate BioAPI Biometric Application Programming Interface CPU Central Processing Unit FIDO Fast Identity On-line ICC Integrated Circuit Card ID Identification MNO Mobile Network Operator MoC Match on Card NFC Near Field Communication OS Operating System OTA Over The Air PAN Private
43、 Access Network PII Personally Identifiable Information PKI Public Key Infrastructure POS Point-Of-Sale SD Secure Digital SE Secure Element SP Service Provider TSP Token Service Provider USB Universal Serial Bus USIM Universal Subscriber Identity Module TLS Transport Layer Security TSM Telebiometric
44、s System Mechanism WiFi Wireless Fidelity 5 Conventions None. 6 Prerequisites None. 7 Authentication models 7.1 Overview This Recommendation takes into account the three perspectives below, dividing the models into 12 categories depending on the configuration of the biometric sensor, the mobile devi
45、ce, and the server. It also specifies the threats in the operating telebiometric systems in the mobile devices and proposes a general guideline for security countermeasures from both the technical and operational perspectives in order to establish a safe mobile environment for the use of telebiometr
46、ic systems. 4 Rec. ITU-T X.1087 (10/2016) Table 1 Authentication models Biometric sensor Mobile device Server Model 1 Capturing Comparison Store* Model 2 Capturing Comparison Store Model 3 Capturing Comparison Store Model 4 Capturing Comparison Store Model 5 Capturing Comparison Store Model 6 Captur
47、ing Comparison Store Model 7 Capturing Store Comparison Model 8 Capturing Store Comparison Model 9 Capturing Store Comparison Model 10 Capturing Comparison Store Model 11 Capturing Comparison Store Model 12 Capturing Comparison Store * Biometric reference template location. 7.2 Model 1 Figure 2 illu
48、strates model 1. Figure 2 Model 1 The mobile device takes the request from the application (App); it acquires sample data, compares it with the registered users template, and transfers the result to the App. Rec. ITU-T X.1087 (10/2016) 5 Template identification (ID) information is required, which is
49、 the comparison result. For model 1, it is assumed that the mobile device is in a difficult situation to telecommunicate with the server including the wireless environment, and the mobile device side such as smartphones is given sufficient processing resources. The processing resources must be sufficient to acquire sample data and compare it. External biometric sensors communicate with the mobile device using near field communication (NFC) when the mobile device cannot support the senso
copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1