Fingerprint Verification for Smartcards
System Requirement Specifications
Version 1.3
July 22nd 1999
Project Supervisor: Jan Machotka (PES)
Sponsor: Motorola
University Of South Australia
School of Physics and Electronic Systems Engineering Preface
The System Requirements Specification is one of the critical documents since it identifies the aims and goals of the project. This is important to the success of the project since it clearly outlines what the development team must achieve in order to classify the project to be complete. A strict definition of this type also enables the project team to outline the necessary means to achieve these goals. If this step is not carried out correctly the project can encounter delays caused by changes to the requirements brought about by developers and customers, thus altering the project schedule. Table of Contents
1 INTRODUCTION 4
1.1 SYSTEM PURPOSE 4
1.2 SYSTEM SCOPE 4
1.3 DEFINITIONS, ACRONYMS, AND ABBREVIATIONS 5
1.4 PROJECT GROUP 6
1.5 REFERENCES 7
1.6 SYSTEM OVERVIEW 8
2 GENERAL SYSTEM DESCRIPTION 9
2.1 SYSTEM CONTEXT 9
2.2 SYSTEM MODES AND STATES 10
2.3 MAJOR SYSTEM CONDITIONS 10
2.4 MAJOR SYSTEM CONSTRAINTS 11
2.5 ASSUMPTIONS AND DEPENDENCIES 11
2.5.1 Assumptions relating to users: 11
2.5.2 Assumptions relating to the system: 11
2.5.3 Dependencies in the system: 11
2.6 OPERATIONAL SCENARIOS 12
3 SYSTEM COMPATIBILITIES, CONDITIONS AND CONSTRAINTS 12
3.1 PHYSICAL 12
3.1.1 Adaptability 12
3.1.2 Environmental Conditions 13
3.2 SYSTEM PERFORMANCE CHARACTERISTICS 13
3.3 SYSTEM SECURITY 13
3.4 INFORMATION MANAGEMENT 14
3.5 SYSTEM OPERATIONS 14
3.5.1 System Human Factors 14
3.5.2 System Maintenance 15
3.5.3 System Reliability 15
3.6 POLICY AND REGULATION 16
HISTORY OF SRS 17
Table of Figures
FIGURE 1 - SYSTEM OVERVIEW 7
FIGURE 2 SYSTEM CONNECTIVITY 8 1 Introduction
This is a System Requirements Specification for the Final
References: Baskerville, R (1998), Security and Privacy of Information and Information Systems, [Online accessed 8th April 1999]. URL: http://cis.gsu.edu/~rbaskerv/cis8680/index.html Gerck, E (1997), Overview of certification Systems, [Online accessed 31st March 1999]. Pfleeger, Charles P (1997), Security in computing, Prentice Hall, Upper Saddle River, NJ. Priisalu, J (1995), A Frequently asked Questions List (FAQ) for alt.technology.smartcards, [Online accessed 20th March 1999]. URL: http://www.ioc.ee/atsc/faq.html Reinert, Lawrence A, Luther, Stephen C (1997), User Authentication Techniques Using Public Key Certificates. Part 1: Certificate Options, National Security Agency, Department of Defense, USA. Reinert, Lawrence A, Luther, Stephen C (1997), User Authentication Techniques Using Public Key Certificates. Part 2: Authentication Information Including Biometrics, National Security Agency, Department of Defense, USA. Reinert, Lawrence A, Luther, Stephen C (1998), Authentication Protocols for Smart Cards, National Security Agency, Department of Defense, USA.