Itu-T: Telebiometric Access Control With Smart ID Cards
Itu-T: Telebiometric Access Control With Smart ID Cards
ITU-T X.1093
TELECOMMUNICATION (11/2018)
STANDARDIZATION SECTOR
OF ITU
Summary
The biometrics-on-card can be classified into three types such as store-on-card, which is a form in
which biometric information is stored in a smart card, compare-on-card in which biometric
information is compared in a smart card, and sensor-on-card in which a biometric sensor is embedded
in a smart card to acquire, store and compare the biometric information within the card. The application
scheme is also divided into two types depending on whether or not the digital signature function is
provided by embedding the ITU-T X.509 certificate.
Recommendation ITU-T X.1093 describes the general scheme for logical and/or physical access
control using the biometrics-on-card. This Recommendation can be applied to the recent emerging
area of requiring secure physical and also logical access control management.
History
Edition Recommendation Approval Study Group Unique ID*
1.0 ITU-T X.1093 2018-11-13 17 11.1002/1000/13725
Keywords
Access control, biometrics-on-card, ID card, telebiometrics.
* To access the Recommendation, type the URL http://handle.itu.int/ in the address field of your web
browser, followed by the Recommendation's unique ID. For example, http://handle.itu.int/11.1002/1000/11
830-en.
NOTE
In this Recommendation, the expression "Administration" is used for conciseness to indicate both a
telecommunication administration and a recognized operating agency.
Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain
mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the
Recommendation is achieved when all of these mandatory provisions are met. The words "shall" or some other
obligatory language such as "must" and the negative equivalents are used to express requirements. The use of
such words does not suggest that compliance with the Recommendation is required of any party.
ITU 2019
All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior
written permission of ITU.
1 Scope
This Recommendation addresses the telebiometric access control requirements and architecture of
personal identity verification platform, which allows users to ensure personal identification using
biometrics with smart ID cards for logical and physical access control. Biometrics has been
considered for the telebiometric authentication of proving ownership of a smart ID card registered
with a registration authority. This Recommendation provides functional requirements for deploying
the smart ID card scheme to securely operate the telebiometric authentication under PKI
environments. The scheme focuses on providing how to assure the telebiometric authentication with
biometric techniques when telebiometrics and [ITU-T X.509] certificate are combined.
2 References
The following ITU-T Recommendations and other references contain provisions which, through
reference in this text, constitute provisions of this Recommendation. At the time of publication, the
editions indicated were valid. All Recommendations and other references are subject to revision;
users of this Recommendation are therefore encouraged to investigate the possibility of applying the
most recent edition of the Recommendations and other references listed below. A list of the currently
valid ITU-T Recommendations is regularly published. The reference to a document within this
Recommendation does not give it, as a stand-alone document, the status of a Recommendation.
[ITU-T X.509] Recommendation ITU-T X.509 (2016) | ISO/IEC 9594-8:2017, Information
technology – Open systems interconnection – The directory: Public-key and
attributes certificate frameworks.
3 Definitions
5 Conventions
None.
The hardware and software specifications of the smart IC card to be used as a biometrics-on-card
should be referenced to the domestic and international standards in accordance with the application
field. Therefore, this Recommendation describes the following functional requirements related to
biometrics in addition to the general smart card specification.
In the store-on-card with digital signature function, authentication using the private key is composed
of a process of verifying the certificate in the biometrics-on-card and a request of signing the existence
of the private key corresponding to the certificate. Therefore, the biometrics-on-card must contain an
asymmetric private key and corresponding certificate in it. By using the digital signatures in addition
to biometrics, more secure multi-factor personal authentication can be performed. However, this
requires additional infrastructure to enable the online status checking of certificates. In this case,
overall personal authentication processes shown in Figure 9 are as follows:
1) The cardholder presents the card through the local system of the access control point.
2) The local system reads the BoCHUID of the presented biometrics-on-card.
3) The local system verifies the expiration date to ensure that the expiration date of the
biometrics-on-card is not expired.
4) The local system receives the PIN from the card owner, and then requests verification and
receives the result.
5) When the validity of the cardholder's PIN is confirmed, the local system reads the biometric
reference in the biometrics-on-card.
6) Check whether the digital signature of the cardholder's biometric is signed by a trusted
authority and whether the biometric reference stored on the card has not been altered.
7) The local system scans the actual biometric information of the cardholder and compares the
biometric information stored in the card with the biometric reference stored in the card to
check whether the cardholder is the same, and then it confirms the cardholder's legitimacy.
8) The local system verifies the signature included in the card certificate and checks the validity
period and certificate revocation. The local system retrieves the signature algorithm and key
length specified in the certificate and requests the card to sign the BoCHUID.
9) By verifying the signature for the BoCHUID returned from the card, the cardholder finally
authenticates the user that it has the correct private key.
1) The cardholder presents the card through the local system of the access control point.
2) The local system reads the BoCHUID of the presented biometrics-on-card.
3) The local system verifies the expiration date to ensure that the expiration date of the
biometrics-on-card is not expired.
4) The local system receives the PIN from the card owner, and then requests verification and
receives the result.
Figure 14 – Telebiometric access model with shared identity information and policy
[b-ITU-T X.1080.0] Recommendation ITU-T X.1080.0 (2017), Access control for telebiometrics
data protection.
[b-ITU-T X.1085] Recommendation ITU-T X.1085 (2016), Information technology – Security
techniques – Telebiometric authentication framework using biometric
hardware security module.
[b-ISO/IEC 24745] ISO/IEC 24745:2011, Information Technology – Security techniques –
Biometric information protection.
[b-ISO/IEC 24761] ISO/IEC 19761:2009, Information Technology – Security techniques –
Authentication context for biometrics.
[b-ISO/IEC 29146] ISO/IEC 29146:2016, Information Technology – Security techniques –
A framework for access management.
Series E Overall network operation, telephone service, service operation and human factors
Series F Non-telephone telecommunication services
Printed in Switzerland
Geneva, 2019