BSI PD CEN/TS 17261:2018
$102.76
Biometric authentication for critical infrastructure access control. Requirements and Evaluation
Published By | Publication Date | Number of Pages |
BSI | 2018 | 20 |
This document addresses biometric recognition systems that are used as part of an automated access control system to provide a second and independent authentication factor of the individual using the AACS to access secured areas of critical infrastructure. This document: – specifies requirements for biometric recognition systems to be used as part of an AACS for critical infrastructure, – describes a methodology for the evaluation of biometric authentication for AACSs against the specified requirements. The requirements and test methods address biometric authentication for AACS that: (i) operate in an internal environment constituting part of a larger site, access to which is restricted and controlled by a separate access control system; and (ii) use biometrics as a second authentication factor to a token or proximity card. This document does not consider access by the general public, e.g. passengers in an airport, or visitors to a hospital. Products that meet the requirements of this document will comprise (i) a biometric sensor(s) external to the secured area, which reads the biometric characteristics of the user at the point of access; and (ii) a biometric server system performing biometric enrolment, signal processing, storage of biometric references and biometric comparison within a secured area. This document does not address AACS or AACS portals (turnstiles) but is only concerned with the biometric components which integrate with the AACS. Other standards address requirements and testing of the non-biometric parts of the AACS.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
5 | European foreword |
6 | Introduction |
7 | 1 Scope 2 Normative references 3 Terms and definitions |
9 | 4 Symbols and abbreviations 5 Conformance |
10 | 6 Typical use-case 7 Requirements and recommendations 7.1 General 7.2 Design 7.2.1 General 7.2.2 Protection of access to biometric server, biometric data and functions of the biometric subsystem |
11 | 7.2.3 Operator/Administrator control and authentication 7.2.4 Door unit 7.2.5 Biometric enrolment, re-enrolment and deletion 7.2.6 Biometric recognition |
12 | 7.3 Operation 7.3.1 General 7.3.2 Identity assurance for enrolment 7.3.3 Enrolment process 7.3.4 Fallback authentication 7.4 Technical performance 7.4.1 General 7.4.2 Failure to enrol rate |
13 | 7.4.3 Enrolment transaction duration 7.4.4 False accept rate 7.4.5 False reject rate 7.4.6 Verification transaction duration 7.5 Attack resistance 7.5.1 General |
14 | 7.5.2 Resistance to tamper 7.5.3 Resistance to presentation attack 7.6 Performance and attack resistance requirements |
15 | 8 Testing and reporting 8.1 System information and documentation 8.2 Configuration of system for testing 8.2.1 Scenario AACS |
16 | 8.2.2 Configuration of biometric systems under test 8.3 Outline of test processes 8.3.1 Pretesting 8.3.2 Scenario performance evaluation |
18 | 8.3.3 Attack resistance evaluation |
19 | Bibliography |