Protection Profile List

Protection Profile for Biometric Verification Products
1.2

National Institute of Advanced Industrial Science and Technology
Protection Profile Name :
Protection Profile for Biometric Verification Products
Version of PP :
1.2
Technology Type :
Biometric Verification Products
Certification No. :
C0501
Date :
2016-03-31
Version of Common Criteria:
3.1 release4
Conformance Claim :
EAL2 Augmented with ALC_FLR.1
PP Identifier :
None
Procurement Entity :
-

PRODUCT DESCRIPTION

Description of PP

This PP specifies security functional requirements for biometric verification products that are used for user authentication for a PC at office, bank ATM, entrance access control and a mobile device such as a smartphone.
The TOE performs the biometric verification for user authentication and user enrolment required for the biometric verification. The biometric verification compares the features extracted from the biometric characteristics (fingerprint, face, iris, vein, etc.) presented by a user against his/her biometric template to determine whether or not both the features and the template are belong to the same user.
This PP does not specify any specific biometric characteristic and body part (in case of vein: finger, palm, back of the hand, etc.). Biometric identification is out of scope of this PP.

 

PP security functionality

The PP requests a TOE to have the following security features:

- Feature extraction function
- Quality control function
- Comparison function
- Decision function
- PAD feature extraction function
- Memory clear function

 

Security functional requirements

The PP requests the following security functional requirements:

Security audit Non-repudiation of origin/receipt Cryptographic functionality Access control
Data authentication Export data protection Information flow control Import data protection
Internal transfer data protection Residual information protection Rollback Stored data integrity
Transfer data confidentiality Transfer data integrity Identification and authentication Security management
Privacy Control Security functionality protection Resource utilisation management TOE access control
Trusted path/channels Random number generation    

- Biometric information checking for enrolment
- Biometric information enrolment at low failure to enrol rate
- High performance biometric verification
- Rejection of artificial biometric characteristics and the like during the biometric verification