Shopping Cart

No products in the cart.

BSI PD CEN/TS 17261:2018

$102.76

Biometric authentication for critical infrastructure access control. Requirements and Evaluation

Published By Publication Date Number of Pages
BSI 2018 20
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This document addresses biometric recognition systems that are used as part of an automated access control system to provide a second and independent authentication factor of the individual using the AACS to access secured areas of critical infrastructure. This document: – specifies requirements for biometric recognition systems to be used as part of an AACS for critical infrastructure, – describes a methodology for the evaluation of biometric authentication for AACSs against the specified requirements. The requirements and test methods address biometric authentication for AACS that: (i) operate in an internal environment constituting part of a larger site, access to which is restricted and controlled by a separate access control system; and (ii) use biometrics as a second authentication factor to a token or proximity card. This document does not consider access by the general public, e.g. passengers in an airport, or visitors to a hospital. Products that meet the requirements of this document will comprise (i) a biometric sensor(s) external to the secured area, which reads the biometric characteristics of the user at the point of access; and (ii) a biometric server system performing biometric enrolment, signal processing, storage of biometric references and biometric comparison within a secured area. This document does not address AACS or AACS portals (turnstiles) but is only concerned with the biometric components which integrate with the AACS. Other standards address requirements and testing of the non-biometric parts of the AACS.

PDF Catalog

PDF Pages PDF Title
2 National foreword
5 European foreword
6 Introduction
7 1 Scope
2 Normative references
3 Terms and definitions
9 4 Symbols and abbreviations
5 Conformance
10 6 Typical use-case
7 Requirements and recommendations
7.1 General
7.2 Design
7.2.1 General
7.2.2 Protection of access to biometric server, biometric data and functions of the biometric subsystem
11 7.2.3 Operator/Administrator control and authentication
7.2.4 Door unit
7.2.5 Biometric enrolment, re-enrolment and deletion
7.2.6 Biometric recognition
12 7.3 Operation
7.3.1 General
7.3.2 Identity assurance for enrolment
7.3.3 Enrolment process
7.3.4 Fallback authentication
7.4 Technical performance
7.4.1 General
7.4.2 Failure to enrol rate
13 7.4.3 Enrolment transaction duration
7.4.4 False accept rate
7.4.5 False reject rate
7.4.6 Verification transaction duration
7.5 Attack resistance
7.5.1 General
14 7.5.2 Resistance to tamper
7.5.3 Resistance to presentation attack
7.6 Performance and attack resistance requirements
15 8 Testing and reporting
8.1 System information and documentation
8.2 Configuration of system for testing
8.2.1 Scenario AACS
16 8.2.2 Configuration of biometric systems under test
8.3 Outline of test processes
8.3.1 Pretesting
8.3.2 Scenario performance evaluation
18 8.3.3 Attack resistance evaluation
19 Bibliography
BSI PD CEN/TS 17261:2018
$102.76