Informējam, ka Sistēma pielāgota darbam ar interneta pārlūkprogrammu Internet Explorer (8. un jaunākām versijām) un Mozilla Firefox (3.6 un jaunākām versijām).
Izmantojot citu interneta pārlūkprogrammu, brīdinām, ka Sistēmas funkcionalitāte var tikt traucēta.
<p>This document covers the protection of biometric information under various requirements for confidentiality, integrity and renewability/revocability during storage and transfer. It also provides requirements and recommendations for the secure and privacy-compliant management and processing of biometric information.</p>
<p>This document specifies the following:</p>
<p>— analysis of the threats to and countermeasures inherent to biometrics and biometric system application models;</p>
<p>— security requirements for securely binding between a biometric reference (BR) and an identity reference (IR);</p>
<p>— biometric system application models with different scenarios for the storage and comparison of BRs;</p>
<p>— guidance on the protection of an individual's privacy during the processing of biometric information.</p>
<p>This document does not include general management issues related to physical security, environmental security and key management for cryptographic techniques.</p>
Reģistrācijas numurs (WIID)
75302
Darbības sfēra
<p>This document covers the protection of biometric information under various requirements for confidentiality, integrity and renewability/revocability during storage and transfer. It also provides requirements and recommendations for the secure and privacy-compliant management and processing of biometric information.</p>
<p>This document specifies the following:</p>
<p>— analysis of the threats to and countermeasures inherent to biometrics and biometric system application models;</p>
<p>— security requirements for securely binding between a biometric reference (BR) and an identity reference (IR);</p>
<p>— biometric system application models with different scenarios for the storage and comparison of BRs;</p>
<p>— guidance on the protection of an individual's privacy during the processing of biometric information.</p>
<p>This document does not include general management issues related to physical security, environmental security and key management for cryptographic techniques.</p>