{"id":375864,"date":"2024-10-20T02:45:37","date_gmt":"2024-10-20T02:45:37","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-cen-ts-176312021\/"},"modified":"2024-10-26T04:50:53","modified_gmt":"2024-10-26T04:50:53","slug":"bsi-pd-cen-ts-176312021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-cen-ts-176312021\/","title":{"rendered":"BSI PD CEN\/TS 17631:2021"},"content":{"rendered":"

This document provides guidance on providing access:<\/p>\n

    \n
  1. \n

    to areas with physical access control, e.g. entertainment facilities, train stations, shops, libraries, banks, or border control,<\/p>\n<\/li>\n

  2. \n

    for small groups of persons, e.g. families with small children or seniors, or other accompanied persons in need of support,<\/p>\n<\/li>\n

  3. \n

    by means of biometric authentication technologies, e.g. facial, fingerprint, or vein recognition,<\/p>\n<\/li>\n

  4. \n

    in the European regulatory context.<\/p>\n<\/li>\n<\/ol>\n

    The document addresses the following aspects, which are specific for biometric and group access:<\/p>\n

      \n
    1. \n

      accessibility and usability,<\/p>\n<\/li>\n

    2. \n

      user guidance including group guidance and interaction control,<\/p>\n<\/li>\n

    3. \n

      privacy including data set content,<\/p>\n<\/li>\n

    4. \n

      presentation attack detection,<\/p>\n<\/li>\n

    5. \n

      applicable biometric technologies,<\/p>\n<\/li>\n

    6. \n

      storage of reference data,<\/p>\n<\/li>\n

    7. \n

      biometric process integration,<\/p>\n<\/li>\n

    8. \n

      specific needs considering biometrics for groups,<\/p>\n<\/li>\n

    9. \n

      biometric performance and error rates, and<\/p>\n<\/li>\n

    10. \n

      group internal linkage.<\/p>\n<\/li>\n<\/ol>\n

      The following aspects which reflect on generic access control issues are out of scope:<\/p>\n

        \n
      1. \n

        IT security,<\/p>\n<\/li>\n

      2. \n

        application specific physical security,<\/p>\n<\/li>\n

      3. \n

        policy definition,<\/p>\n<\/li>\n

      4. \n

        processes not related to biometric authentication, and<\/p>\n<\/li>\n

      5. \n

        specific performance requirements of identification (1:N) and verification (1:1) applications.<\/p>\n<\/li>\n<\/ol>\n

        PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
        PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
        2<\/td>\nundefined <\/td>\n<\/tr>\n
        7<\/td>\n1 Scope
        2 Normative references <\/td>\n<\/tr>\n
        8<\/td>\n3 Terms and definitions
        4 Symbols and abbreviations
        5 Group access control processes and technologies
        5.1 Architecture
        5.1.1 General <\/td>\n<\/tr>\n
        9<\/td>\n5.1.2 Biometric process and background integration <\/td>\n<\/tr>\n
        11<\/td>\n5.1.3 Segregated two steps access control <\/td>\n<\/tr>\n
        13<\/td>\n5.2 Integration of Access Control into other management systems
        5.3 Applicable biometric technologies
        5.3.1 General <\/td>\n<\/tr>\n
        14<\/td>\n5.3.2 Segregated two steps access control
        5.4 Interoperability issues
        5.5 Storage of reference data
        5.5.1 General <\/td>\n<\/tr>\n
        15<\/td>\n5.5.2 Segregated two steps access control
        5.6 Biometric performance and error rates <\/td>\n<\/tr>\n
        16<\/td>\n6 Accessibility, usability, and guidance
        6.1 General
        6.2 Accessibility
        6.3 Usability
        6.4 Guidance <\/td>\n<\/tr>\n
        17<\/td>\n6.5 Segregated two steps access control
        7 Privacy and security considerations
        7.1 Privacy
        7.1.1 General
        7.1.2 Segregated two steps access control <\/td>\n<\/tr>\n
        18<\/td>\n7.2 Presentation attack detection
        7.3 Group internal linkage <\/td>\n<\/tr>\n
        19<\/td>\nAnnex A (informative)Example for need of group internal linkage: Human being trafficking
        A.1 Background
        A.2 Detection of illegal activities in a two step travel application <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

        Personal identification. Biometric group access control<\/b><\/p>\n\n\n\n\n
        Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
        BSI<\/b><\/a><\/td>\n2021<\/td>\n22<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":375873,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[693,2641],"product_tag":[],"class_list":{"0":"post-375864","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-240-15","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/375864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/375873"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=375864"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=375864"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=375864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}