ISO IEC 7816-11:2017 download free

06-25-2021 comment

ISO IEC 7816-11:2017 download free.Identification cards — Integrated circuit cards — Part 11: Personal verification through biometric methods.
ACBio may be used by a validator to validate the authenticity of the biometric verification process (see
ISO/IEC 24761). This is an alternative use case to validate the authenticity of the verification process
(see2).
52 Commands for a static biometric verification process
The commands to be used for a static venficatlon process (see Annex A) shall be VERIFY command as specified In ISO/IEC 7816-4 or PERFORM BIOMETRIC OPERATION (P80) command with relevant operations. e.g. comparison of biometric probe as specified In 14. When vsitwv command is used and the biometric data is externally captured, the command shall contain the biometric data as biometric probe to be compared In Its data field, encoded as defined in LI. and 72. The biometric algorithm identifier shall be either
— implicitly known.
— defined In a security environment (SE) within a control reference template for authentication (AT),
— defined in a command data within a biometric information template (see ISO/IEC 24787). or
— defined in a command data within a control reference template for authentication.
The biometric reference qualifier may be either
— defined in a security environment (SE) within control reference template for authentication,
— defined in parameter P2 of VERIFY or P90 command,
— defined in a command data within a biometric information template (see Li).
— defined in a command data within a biometric data template (see 7.2). or
— defined in a command data within a control reference template for authentication.
The biometric probe may be encoded as BER-TL.V data object (see Table 10). It may be recorded in a biometric information template (see Tl7 and Tab1e8) or a biometric information template group template (Tahl.e.9).
Biometric data captured either In ICC or out of ICC can be compared, In the case olcomparing Internally- captured biometric probe, feedback mechanism specified In lSO/IEC 17839-3 with the P80 operatIons In £4.f should be implemented.
5.3 Commands for a dynamic biometric verification process
To get a challenge to which a user response is required (see Annex A). GET CHALLENGE command defined in ISO/IEC 7816-4 or pao command defined in 1.4 shall be used.
As specified in lSO/IEC 7816-4, the P1 set to ‘00’ means that no information is given, i.e. the biometric algorithm is known before issuing the command. Any other values of the P1 are RFIJ.
The type of challenge in a biometric verification process, e.g. a phrase for volceprint or a phrase for keystroke, depends on the biometric algorithm. If the challenge is requested using GET CHALLENGE command, parameter P1 of GET CHALLENGE command shall identify the biometric algorithm, lithe challenge is requested using P80 command, the biometric algorithm shall be either
— implicitly known, or
— defined in a security environment (SE) within control reference template for authentication.
The respective algorithm may be selected alternatively by using MSE command (e.g. SET option with AT. usage qualifier DO and algorithm reference DO In the command data field).
6.2.4 Comparison of biometric probe
6.2.4.1 Comparison olexternally-captured biometric probe
The main purpose of the comparison of externally-captured biometric probe for ACBio is to compare the biometric probe with a biometric reference in an ICC. The procedure of this comparison with its related processes may consist of four consecutive PHO commands with operations defined In Table3 and Tabici as below:
— to execute ao command with SET INITIAL VALUES operation to set a control value input Index and/or out put index of BPIJ I/O (see Table 6)
— to execute peo command with COMPARE BIOMETRIC PROBE Operation;
— to execute Ilø command with GENERATE CONTROL VAUJE operation to calculate the hash value of the result of biometric comparison;
— to execute command with GENERATE BIoMETRIC VALIDATION CERTIFICATE operation to generate ACBIo Instance.
6.2.4.2 Comparison of Internally-captured biometric probe
The main purpose of the comparison of Internally-captured biometric probe for ACBIo Is to compare the biometric probe with a bIometric reference In an ICC. The procedure of this comparison with Its related processes may consist of four consecutive mo commands with operations defined In Table 3 and Table 4 as below:
— to execute PRO command with SET INITIAL VALUES operation to set a control value, input index and/or output index of BPU I/O (see Table6);
— to execute Pno command with CAPTURE AND COMPARE BIOMETRIC PROBE operation:
— to execute o command wIth GENERATE CONTROL VAWE operation to calculate the hash value of
the result of biometric comparison;
— to execute PRO command with C.ENERATR RIOMF.TRIC VALIDATION CERTIFICATE operation to generate ACBIo instance.
7 Data elements
7.1 Biometric Information
The biometric Information template provides descriptive information regarding the associated biometric data. It Is provided by the card In response to a retrieval command prior to a verification process. Table 7 and Tableil define biometric information DOs.
A biometric information template may include biometric data (see Z2). in case of off-card comparison, a biometric reference as biometric data should be included In a biometric information template because off-card veriticat on needs both biometric reference and its information. In case of on-card comparison and if the off-card system needs information regarding a biometric reference, a biometric information template without biometric data and a biometric data as a biometric reference should be stored separately in an ICC because this biometric reference should be protected against retrieving.
information, which indicates enable/disable verification requirement using a biometric reference. For switching this verification Information state, ENABLE VERIFICATION REQUIREMENT/DISABLE VERIFICATiON REQUIREMENT command defined in ISO/IEC 7816-4 may be used VIDO and VIT also contain Information which Indicates whether further attempts of verification are allowed (usable) or not (unusable). When maximum tries of biometric verification are set and the number of consecutive biometric verification failure is reached to this maximum, the biometric reference Is unusable. For switching unusable state into usable state, RESET RETRY COUNTER may be used lithe security attribute allows this.
NOTE P2 fIeld of ENABLE VERIFICATION REQUIREMENT or DISABLE VERIFICATION REQUIREMENT command Indicates a qual her. I.e. number of the reference data or number oF the secrel A usage qualifier In a control reference template valid for authentication (AT) In the current security environment (SE) can Indicate whether user authentication Is password-based (secret) or biometric-based (biometric reference). This usage qualifier in the current SE can be handled by using MANAGE SECURITY ENVIRONMENT (5455) command,
7.3.2 VerifIcation Information data object (VIDO)
The first byte of value field in a verification information data object (VIDO) Indicates verification information of biometric references (see TabhLi.2 and Table 13). Bit bS of this byte indicates enabled/disabled verification information ci biometric references (see Table 14) referred to by the third byte of value field in a VIDO, if it is present. Each hit followed by bB indicates verification information of a biometric reference referred to by each byte followed by the third byte.
The second byte of value field In a VIDO Indicates usable biometric references (see Table.I.4). Bit b8 of this byte indicates usable/unusable of a biometric reference referred to by the third byte of value field In a VIDO, lilt Is present. Each bit followed by bB Indicates usable of a biometric reference referred by each byte followed by the third byte.
Biometric reference qualifiers are at most eight in value field of a VIDO. When the number of biometric reference qualifiers is less than eight, the number of bits from WI in first and second byte is valid.

Download infomation Go to download
Note: If you can share this website on your Facebook,Twitter or others,I will share more.

ISO 9885:1991 download free

ISO 9885:1991 download free.Wide-mouth glass containers - Deviation from flatness of top sealing surface - Test methods. ISO 9885 specifies two complementary test methods for the determination or the deviation from flatness of the top sealing surface...
Download Now

ISO 9009:1991 download

ISO 9009:1991 download.Glass containers — Height and non-parallelism of finish with reference to container base — Test methods. ISO 9009 specifies test methods for determining the height and the non-parallelism of finish with reference to the container...
Download Now

ISO 10076:1991 pdf free download

ISO 10076:1991 pdf free download.Metallic powders — Determination of particle size distribution by gravitational sedimentation in a liquid and attenuation measurement. The settling behaviour under gravity of a given mass of particles dispersed in an initially static...
Download Now

LEAVE A REPLY

Anonymous netizen Fill in information