Information technology - Security techniques - Telebiometric authentication framework using biometric hardware security module |
|
Recommendation ITU-T X.1085 | ISO/IEC 17992 describes a telebiometric authentication scheme using biometric hardware security module (BHSM) for the telebiometric authentication of proving owner of X.509 certificate registered individual at RA (Register Authority). This Recommendation | International Standard provides the requirements for deploying the BHSM scheme to securely operate the telebiometric authentication under PKI environments. The scheme focuses on providing how to assure the telebiometric authentication with biometric techniques and hardware security module and it also suggests ASN.1 standard format for including the proposed scheme in X.509 framework when telebiometric authentication and X.509 certificate are combined to prove the owner of the certificate. |
|
Citation: |
https://handle.itu.int/11.1002/1000/13060 |
Series title: |
X series: Data networks, open system communications and security X.1000-X.1099: Information and network security X.1080-X.1099: Telebiometrics |
Approval date: |
2016-10-14 |
Identical standard: | ISO/IEC 17922:2017 (Common) |
Provisional name: | X.bhsm |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1085 (10/2016)
|
In force
|
here
|
here
|
here
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|