ISO IEC TR 29156-2015 Information technology - Guidance for specifying performance requirements to meet security and usability needs in applications using biome.pdf
《ISO IEC TR 29156-2015 Information technology - Guidance for specifying performance requirements to meet security and usability needs in applications using biome.pdf》由会员分享,可在线阅读,更多相关《ISO IEC TR 29156-2015 Information technology - Guidance for specifying performance requirements to meet security and usability needs in applications using biome.pdf(48页珍藏版)》请在麦多课文档分享上搜索。
1、Information technology Guidance for specifying performance requirements to meet security and usability needs in applications using biometrics Technologies de linformation Directives spcifiant les exigences de performance afin datteindre la scurit et les besoins dutilisation dans les applications bio
2、mtriques TECHNICAL REPORT ISO/IEC TR 29156 First edition 2015-11-15 Reference number ISO/IEC TR 29156:2015(E) ISO/IEC 2015 ii ISO/IEC 2015 All rights reserved COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2015, Published in Switzerland All rights reserved. Unless otherwise specified, no part of this publicat
3、ion may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below or ISOs member body in the country
4、of the requester. ISO copyright office Ch. de Blandonnet 8 CP 401 CH-1214 Vernier, Geneva, Switzerland Tel. +41 22 749 01 11 Fax +41 22 749 09 47 copyrightiso.org www.iso.org ISO/IEC TR 29156:2015(E) ISO/IEC TR 29156:2015(E)Foreword v Introduction vi 1 Scope . 1 2 Normative references 1 3 T erms and
5、 definitions . 2 4 Abbreviated terms 3 5 Authentication factors 3 5.1 Overview 3 5.2 Security and usability of authentication mechanisms 4 5.3 Knowledge-based authentication (PIN, passwords) 5 5.3.1 General description with examples . 5 5.3.2 Security considerations . 6 5.3.3 Usability consideration
6、s 7 5.4 Possession based authentication (tokens, cards) . 7 5.4.1 General description with examples . 7 5.4.2 Security considerations . 8 5.4.3 Usability considerations 9 5.5 Personal characteristic based authentication (biometrics) . 9 5.5.1 General description with examples . 9 5.5.2 Security cons
7、iderations 11 5.5.3 Usability considerations .12 5.6 Multi-factor authentication .12 5.6.1 General.12 5.6.2 Example: token and PIN .13 5.6.3 Implementation options .13 5.6.4 Performance requirements for multi-factor authentication .14 5.7 Comparing security performance of authentication mechanisms 1
8、4 5.8 Summary comparison of authentication factors 15 6 Determining biometric authentication security requirements .15 6.1 General 15 6.2 Business requirements .15 6.3 Security-enhancing aspects 16 6.4 Suitable target figures for false acceptance rates 16 6.5 Other considerations in authentication s
9、ecurity 16 6.6 Limits of authentication assurance 16 7 Determining biometric authentication usability requirements .17 7.1 General 17 7.2 Accessibility considerations .17 7.3 Throughput .17 7.4 Authentication failure rate for authorized users 18 7.5 Ease of use at point of authentication 19 7.6 Ease
10、 of use for enrolment .19 7.7 Other aspects of usability .19 8 A dditional c onsider ations in defining biometric security and usability r equir ements .19 8.1 Organization of requirements .19 8.2 Verification and identification modes of operation20 8.3 Stages of authentication .20 8.4 Authenticatio
11、n assurance and standards 21 8.5 Application-specific performance considerations 21 8.5.1 Performance for business functionality 21 8.5.2 Performance for identity proofing and enrolment 22 ISO/IEC 2015 All rights reserved iii Contents Page ISO/IEC TR 29156:2015(E)8.5.3 Performance for identity verif
12、ication .23 8.6 Additional security related requirements 23 8.7 Exception handling .24 8.8 Multi-factor authentication .24 8.8.1 General.24 8.8.2 Improved discrimination .24 8.8.3 Improvements in accessibility 25 8.8.4 Improvements in usability .25 8.8.5 Improvements in overall security 25 8.9 Deali
13、ng with security and usability shortfalls 25 8.10 Hypothetical example of quantitative performance requirements 26 9 Use cases 27 9.1 General 27 9.2 Time and attendance 27 9.3 Physical access control 27 9.4 Computer sign-on 28 9.5 Remote authentication 29 Annex A (informative) Risk assessment 31 Bib
14、liography .40 iv ISO/IEC 2015 All rights reserved ISO/IEC TR 29156:2015(E) Foreword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or I
15、EC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, gov
16、ernmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. The procedures used to develop this document and those intended for its further maintenance are de
17、scribed in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the different types of document should be noted. This document was drafted in accordance with the editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives). Attention is drawn to
18、the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. Details of any patent rights identified during the development of the document will be in the Introduction and/or o
19、n the ISO list of patent declarations received (see www.iso.org/patents). Any trade name used in this document is information given for the convenience of users and does not constitute an endorsement. For an explanation on the meaning of ISO specific terms and expressions related to conformity asses
20、sment, as well as information about ISOs adherence to the WTO principles in the Technical Barriers to Trade (TBT) see the following URL: Foreword - Supplementary information The committee responsible for this document is ISO/IEC JTC 1, Information technology, SC 37, Biometrics. ISO/IEC 2015 All righ
21、ts reserved v ISO/IEC TR 29156:2015(E) Introduction This Technical Report is aimed at helping readers to make informed decisions about the specification of performance requirements for authentication systems using biometric recognition in order to achieve desired levels of security and usability for
22、 the authentication process. Guidance extends to the use of biometric recognition with and without other authentication factors such as passwords and physical tokens. This Technical Report describes security and usability trade-offs in biometric recognition relative to those of other authentication
23、mechanisms and provides advice on how to balance conflicting security and usability parameters in the context of real applications. In addition to a consideration of technical performance parameters such as biometric error rates and password strength, this Technical Report also addresses technical,
24、human and procedural vulnerabilities associated with the various types of human authentication. Vulnerabilities when exploited can lead to an undermining of the integrity of the authentication result. These need to be considered as part of the risk management process which would seek to avoid risk o
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ISOIECTR291562015INFORMATIONTECHNOLOGYGUIDANCEFORSPECIFYINGPERFORMANCEREQUIREMENTSTOMEETSECURITYANDUSABILITYNEEDSINAPPLICATIONSUSINGBIOMEPDF

链接地址:http://www.mydoc123.com/p-1257436.html