CONTENTS

 

�1��� �Scope�
2��� �References
3��� �Definitions
������ �3.1��� �Vocabulary definitions within ISO/IEC JTC 1/SC 37 [b-SC37SD2V8]��
������ �3.2��� �Terms defined in this Recommendation���
4��� �Abbreviations�
5��� �Conventions����
6��� �Prerequisites���
7��� �Authentication models����
8��� �Security threats for each models
9��� �General requirements�����
10��� �General protocol�����������
����� �10.1��� �Requirement of the biometrics handshake protocol���������
����� �10.2��� �Alert protocol for biometric handshake��
����� �10.3��� �Implementation of the extended protocol�
11��� �Requirements of the biometric transportation stage for each model������
����� �11.1��� �Local model��������
����� �11.2��� �Download model�
����� �11.3��� �Attached model���
����� �11.4��� �Centre model�������
����� �11.5��� �Reference management on TTP for local model��
����� �11.6��� �Reference management on TTP for centre model
����� �11.7��� �Comparison outsourcing by client model
����� �11.8��� �Comparison outsourcing by server model�����������
����� �11.9��� �Storage and comparison outsourcing model��������
Annex A � ASN.1 definitions for modified TLS extension protocol��� �
Appendix I � Telebiometrics system mechanism definitions by TLS extension��� �
������ �I.1��� ��� Extensions for biometric transfer protocol���������
������ �I.2��� ��� Biometrics Verify�����������
������ �I.3��� ��� Biometrics Retry Request�����������
������ �I.4��� ��� Finished Biometrics�������
������ �I.5��� ��� Biometrics TTP Request
������ �I.6��� ��� Biometrics TTP response�����������
������ �I.7��� ��� Extension alert protocol�
Appendix II � Implementation example of the biometric transfer protocol using BIP��� �
����� �II.1��� �Local model����������
����� �II.2��� �Download model��
����� �II.3��� �Attached model�����
����� �II.4��� �Centre model��������
����� �II.5��� �Comparison outsourcing by client model��
����� �II.6��� �Reference management on TTP for local model���
����� �II.7��� �Reference management on TTP for centre model��
����� �II.8��� �Comparison outsourcing by server model�
����� �II.9��� �Storage and comparison outsourcing model����������
Appendix III � Template registration and updating process for this Recommendation��� �
���� �III.1��� �Registration process���������
���� �III.2��� �Updating or revocation process����
Appendix IV ASN.1 definitions for the protocol of TSM based on Appendix I��� �
Appendix V ECN modules for Appendix IV��� �
������ �V.1��� �EDM module�������
������ �V.2��� �ELM module��������
Bibliography��� �