ImageVerifierCode 换一换
格式:PDF , 页数:34 ,大小:1.82MB ,
资源ID:804485      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-804485.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T X 1087-2016 Technical and operational countermeasures for telebiometric applications using mobile devices (Study Group 17)《对于学应用使用移动设备的技术和操作对策(研究组17)》.pdf)为本站会员(cleanass300)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T X 1087-2016 Technical and operational countermeasures for telebiometric applications using mobile devices (Study Group 17)《对于学应用使用移动设备的技术和操作对策(研究组17)》.pdf

1、 I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1087 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (10/2016) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Information and network security Telebiometrics Technical and operational countermeasures for

2、 telebiometric applications using mobile devices Recommendation ITU-T X.1087 ITU-T X-SERIES RECOMMENDATIONS DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY PUBLIC DATA NETWORKS X.1X.199 OPEN SYSTEMS INTERCONNECTION X.200X.299 INTERWORKING BETWEEN NETWORKS X.300X.399 MESSAGE HANDLING SYSTEMS X

3、.400X.499 DIRECTORY X.500X.599 OSI NETWORKING AND SYSTEM ASPECTS X.600X.699 OSI MANAGEMENT X.700X.799 SECURITY X.800X.849 OSI APPLICATIONS X.850X.899 OPEN DISTRIBUTED PROCESSING X.900X.999 INFORMATION AND NETWORK SECURITY General security aspects X.1000X.1029 Network security X.1030X.1049 Security m

4、anagement X.1050X.1069 Telebiometrics X.1080X.1099 SECURE APPLICATIONS AND SERVICES Multicast security X.1100X.1109 Home network security X.1110X.1119 Mobile security X.1120X.1139 Web security X.1140X.1149 Security protocols X.1150X.1159 Peer-to-peer security X.1160X.1169 Networked ID security X.117

5、0X.1179 IPTV security X.1180X.1199 CYBERSPACE SECURITY Cybersecurity X.1200X.1229 Countering spam X.1230X.1249 Identity management X.1250X.1279 SECURE APPLICATIONS AND SERVICES Emergency communications X.1300X.1309 Ubiquitous sensor network security X.1310X.1339 PKI related Recommendations X.1340X.1

6、349 CYBERSECURITY INFORMATION EXCHANGE Overview of cybersecurity X.1500X.1519 Vulnerability/state exchange X.1520X.1539 Event/incident/heuristics exchange X.1540X.1549 Exchange of policies X.1550X.1559 Heuristics and information request X.1560X.1569 Identification and discovery X.1570X.1579 Assured

7、exchange X.1580X.1589 CLOUD COMPUTING SECURITY Overview of cloud computing security X.1600X.1601 Cloud computing security design X.1602X.1639 Cloud computing security best practices and guidelines X.1640X.1659 Cloud computing security implementation X.1660X.1679 Other cloud computing security X.1680

8、X.1699 For further details, please refer to the list of ITU-T Recommendations. Rec. ITU-T X.1087 (10/2016) i Recommendation ITU-T X.1087 Technical and operational countermeasures for telebiometric applications using mobile devices Summary Biometric technology in mobile devices is frequently used in

9、various areas which require a high level of reliability such as e-banking, and procurement services. It is necessary to make efforts to develop a security system that can pre-emptively cope with potential security threats for the purpose of ensuring mobile biometric data security. Since biometric te

10、chnology handles sensitive personally identifiable information (PII), some of the privacy issues for biometric in mobile devices should be considered. Recommendation ITU-T X.1087 specifies the implementation model and threats in the operating telebiometric systems in mobile devices. It provides a ge

11、neral guideline for security countermeasures from both the technical and operational perspectives in order to establish a safe mobile environment for the use of telebiometric systems. History Edition Recommendation Approval Study Group Unique ID* 1.0 ITU-T X.1087 2016-10-14 17 11.1002/1000/13061 Key

12、words E-payment, fast identity on-line, FIDO, mobile device, telebiometric applications, telebiometric authentication model. * To access the Recommendation, type the URL http:/handle.itu.int/ in the address field of your web browser, followed by the Recommendations unique ID. For example, http:/hand

13、le.itu.int/11.1002/1000/ 11830-en. ii Rec. ITU-T X.1087 (10/2016) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector

14、(ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every fo

15、ur years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, th

16、e necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary.

17、However, the Recommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the nega

18、tive equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTSITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the us

19、e of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation

20、, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/ww

21、w.itu.int/ITU-T/ipr/. ITU 2017 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec. ITU-T X.1087 (10/2016) iii Table of Contents Page 1 Scope . 1 2 References . 1 3 Definitions 2 3.1 Terms defined elsewhere 2 3

22、.2 Terms defined in this Recommendation . 2 4 Abbreviations and acronyms 2 5 Conventions 3 6 Prerequisites 3 7 Authentication models 3 7.1 Overview 3 7.2 Model 1 . 4 7.3 Model 2 . 5 7.4 Model 3 . 5 7.5 Model 4 . 6 7.6 Model 5 . 6 7.7 Model 6 . 7 7.8 Model 7 . 8 7.9 Model 8 . 8 7.10 Model 9 . 8 7.11

23、Model 10 . 9 7.12 Model 11 . 10 7.13 Model 12 . 10 8 Vulnerabilities of telebiometrics mobile devices . 11 8.1 Insufficient application programming interface management 11 8.2 Insecure wireless channels . 11 9 Security threats for each model 11 Appendix I Use cases 16 I.1 Micro secure digital (SD)-b

24、ased approach match on card using applet . 16 Appendix II Mobile storage study for biometrics . 18 II.1 Off-card comparison . 18 II.2 On-card comparison (sensor-off-card) . 18 II.3 Work-sharing on-card comparison . 19 II.4 System-on-card comparison . 20 iv Rec. ITU-T X.1087 (10/2016) Page Appendix I

25、II Use case study for mobile payment services . 21 III.1 Type A Pay payment procedure . 21 III.2 Type B Pay payment procedure . 21 III.3 Type B Pays built-in security. 22 Bibliography. 25 Rec. ITU-T X.1087 (10/2016) 1 Recommendation ITU-T X.1087 Technical and operational countermeasures for telebiom

26、etric applications using mobile devices 1 Scope This Recommendation provides a framework to ensure security and reliability of the flow of biometric information for telebiometric applications using mobile devices. This Recommendation defines 12 telebiometric authentication models depending on the co

27、nfiguration of the biometric sensor, the mobile device, and the server. It also specifies the threats in the operating telebiometric systems in the mobile devices and proposes a general guideline for security countermeasures from both the technical and operational perspectives in order to establish

28、a safe mobile environment for the use of telebiometric systems. The following topics are addressed within the scope of this Recommendation: Telebiometric security reference models in operating telebiometric systems using a mobile device including cloud computing services. General related threats and

29、 countermeasures to ensure security and reliability for telebiometric applications using mobile devices. The related standard environment is depicted in Figure 1. Figure 1 Standard environment for telebiometric applications using mobile devices 2 References The following ITU-T Recommendations and ot

30、her references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revision; users of this Recommendation are therefore encourage

31、d to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone documen

32、t, the status of a Recommendation. ITU-T X.1089 Recommendation ITU-T X.1089 (2008), Telebiometrics authentication infrastructure (TAI). IETF RFC 4346 IETF RFC 4346 (2008), The Transport Layer Security (TLS) Protocol Version 1.2. 2 Rec. ITU-T X.1087 (10/2016) 3 Definitions 3.1 Terms defined elsewhere

33、 This Recommendation uses the following terms defined elsewhere: 3.1.1 biometric (adjective) b-ISO/IEC 19784-1: Pertaining to the field of biometrics. 3.1.2 biometrics (noun) b-ISO/IEC 19784-1: Automated recognition of individuals based on their behavioural and biological characteristics. 3.1.3 biom

34、etric reference b-ISO/IEC 19784-1: One or more stored biometric samples, biometric templates or biometric models attributed to a biometric data subject and used for comparison. 3.1.4 biometric sample b-ISO/IEC 2382-37: Analogue or digital representation of biometric characteristics prior to biometri

35、c feature extraction process. 3.1.5 biometric template b-ISO/IEC 19784-1: Set of stored biometric features comparable directly to probe biometric features. 3.1.6 comparison (match/matching) b-ISO/IEC 19794-1: Estimation, calculation or measurement of similarity or dissimilarity between biometric pro

36、be(s and biometric reference(s). 3.1.7 comparison decision b-ISO/IEC 2382-37: Determination of whether the recognition biometric probe(s) and biometric reference(s) have the same biometric source, based on a comparison score(s), a decision policy(ies) including a threshold, and possibly other inputs

37、. 3.1.8 comparison score b-ISO/IEC 19784-1: Numerical value (or set of values) resulting from a comparison. 3.1.9 false match b-ISO/IEC 2382-37: Comparison decision of “match“ for a biometric probe and a biometric reference that are not from different biometric capture subjects. 3.1.10 false non-mat

38、ch b-ISO/IEC 2382-37: Comparison decision of “non-match“ for a biometric probe and a biometric reference that are from the same biometric capture subject and of the same biometric characteristics. 3.1.11 match b-ISO/IEC 2382-37: Comparison decision stating that the biometric probe(s) and and the bio

39、metric reference are from the same source. 3.1.12 mobile device b-ITU-T X.1158: A small, hand-held computing device with a subscriber identity module (SIM) card, typically having a display screen with touch input and/or a miniature keyboard and is not heavy. 3.1.13 non-match b-ISO/IEC 2382-37: Compa

40、rison decision stating that the biometric probe(s) and the biometric reference are not from the same source. 3.2 Terms defined in this Recommendation This Recommendation defines the following term: 3.2.1 biometric hardware security module: A physically combined hardware consisting of a hardware secu

41、rity module and a biometric module equipped with one or multiple biometric sensors. 4 Abbreviations and acronyms This Recommendation uses the following abbreviations and acronyms: APDU Application Protocol Data Unit API Application Programming Interface App Application Rec. ITU-T X.1087 (10/2016) 3

42、BC Biometric Certificate BioAPI Biometric Application Programming Interface CPU Central Processing Unit FIDO Fast Identity On-line ICC Integrated Circuit Card ID Identification MNO Mobile Network Operator MoC Match on Card NFC Near Field Communication OS Operating System OTA Over The Air PAN Private

43、 Access Network PII Personally Identifiable Information PKI Public Key Infrastructure POS Point-Of-Sale SD Secure Digital SE Secure Element SP Service Provider TSP Token Service Provider USB Universal Serial Bus USIM Universal Subscriber Identity Module TLS Transport Layer Security TSM Telebiometric

44、s System Mechanism WiFi Wireless Fidelity 5 Conventions None. 6 Prerequisites None. 7 Authentication models 7.1 Overview This Recommendation takes into account the three perspectives below, dividing the models into 12 categories depending on the configuration of the biometric sensor, the mobile devi

45、ce, and the server. It also specifies the threats in the operating telebiometric systems in the mobile devices and proposes a general guideline for security countermeasures from both the technical and operational perspectives in order to establish a safe mobile environment for the use of telebiometr

46、ic systems. 4 Rec. ITU-T X.1087 (10/2016) Table 1 Authentication models Biometric sensor Mobile device Server Model 1 Capturing Comparison Store* Model 2 Capturing Comparison Store Model 3 Capturing Comparison Store Model 4 Capturing Comparison Store Model 5 Capturing Comparison Store Model 6 Captur

47、ing Comparison Store Model 7 Capturing Store Comparison Model 8 Capturing Store Comparison Model 9 Capturing Store Comparison Model 10 Capturing Comparison Store Model 11 Capturing Comparison Store Model 12 Capturing Comparison Store * Biometric reference template location. 7.2 Model 1 Figure 2 illu

48、strates model 1. Figure 2 Model 1 The mobile device takes the request from the application (App); it acquires sample data, compares it with the registered users template, and transfers the result to the App. Rec. ITU-T X.1087 (10/2016) 5 Template identification (ID) information is required, which is

49、 the comparison result. For model 1, it is assumed that the mobile device is in a difficult situation to telecommunicate with the server including the wireless environment, and the mobile device side such as smartphones is given sufficient processing resources. The processing resources must be sufficient to acquire sample data and compare it. External biometric sensors communicate with the mobile device using near field communication (NFC) when the mobile device cannot support the senso

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1