{"id":375864,"date":"2024-10-20T02:45:37","date_gmt":"2024-10-20T02:45:37","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-cen-ts-176312021\/"},"modified":"2024-10-26T04:50:53","modified_gmt":"2024-10-26T04:50:53","slug":"bsi-pd-cen-ts-176312021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-cen-ts-176312021\/","title":{"rendered":"BSI PD CEN\/TS 17631:2021"},"content":{"rendered":"
This document provides guidance on providing access:<\/p>\n
to areas with physical access control, e.g. entertainment facilities, train stations, shops, libraries, banks, or border control,<\/p>\n<\/li>\n
for small groups of persons, e.g. families with small children or seniors, or other accompanied persons in need of support,<\/p>\n<\/li>\n
by means of biometric authentication technologies, e.g. facial, fingerprint, or vein recognition,<\/p>\n<\/li>\n
in the European regulatory context.<\/p>\n<\/li>\n<\/ol>\n
The document addresses the following aspects, which are specific for biometric and group access:<\/p>\n
accessibility and usability,<\/p>\n<\/li>\n
user guidance including group guidance and interaction control,<\/p>\n<\/li>\n
privacy including data set content,<\/p>\n<\/li>\n
presentation attack detection,<\/p>\n<\/li>\n
applicable biometric technologies,<\/p>\n<\/li>\n
storage of reference data,<\/p>\n<\/li>\n
biometric process integration,<\/p>\n<\/li>\n
specific needs considering biometrics for groups,<\/p>\n<\/li>\n
biometric performance and error rates, and<\/p>\n<\/li>\n
group internal linkage.<\/p>\n<\/li>\n<\/ol>\n
The following aspects which reflect on generic access control issues are out of scope:<\/p>\n
IT security,<\/p>\n<\/li>\n
application specific physical security,<\/p>\n<\/li>\n
policy definition,<\/p>\n<\/li>\n
processes not related to biometric authentication, and<\/p>\n<\/li>\n
specific performance requirements of identification (1:N) and verification (1:1) applications.<\/p>\n<\/li>\n<\/ol>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 3 Terms and definitions 4 Symbols and abbreviations 5 Group access control processes and technologies 5.1 Architecture 5.1.1 General <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 5.1.2 Biometric process and background integration <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5.1.3 Segregated two steps access control <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.2 Integration of Access Control into other management systems 5.3 Applicable biometric technologies 5.3.1 General <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.3.2 Segregated two steps access control 5.4 Interoperability issues 5.5 Storage of reference data 5.5.1 General <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.5.2 Segregated two steps access control 5.6 Biometric performance and error rates <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6 Accessibility, usability, and guidance 6.1 General 6.2 Accessibility 6.3 Usability 6.4 Guidance <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.5 Segregated two steps access control 7 Privacy and security considerations 7.1 Privacy 7.1.1 General 7.1.2 Segregated two steps access control <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7.2 Presentation attack detection 7.3 Group internal linkage <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Annex A (informative)Example for need of group internal linkage: Human being trafficking A.1 Background A.2 Detection of illegal activities in a two step travel application <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Personal identification. Biometric group access control<\/b><\/p>\n |