Sensor vulnerability analysis
An objective and credible analysis of sensor resistance to common spoofing tactics and materials.
-
Biometric authentication
Biometric authentication is rapidly becoming the desired alternative to conventional authentication methods such as passwords and tokens. Fake finger detection and spoof mitigation is an on-going effort at Precise Biometrics and its lab affiliation with Clarkson University and the Center for Identification and Technology Research (CITeR). These efforts and the resulting knowledgebase of spoofing measures and countermeasures insure that the Precise Biometrics’ Liveness Detection and Spoof Mitigation technology continues to evolve and provide best-of-breed performance in the on-going fight against fake finger authentication.
-
Comprehensive report
Upon conclusion of the analysis, a comprehensive report is
produced that fully describes all procedures and materials
utilized, and all outcomes of each test procedure. The document
is fully referenced, and the report quality is suitable for
external distribution, should that be desired. This provides your
organization with an objective and highly credible third-party
analysis of your technology’s resistance to spoof attacks. It can
also provide guidance to your internal roadmap discussions of
how to best incorporate additional spoof mitigation capability
into your sensor function. -
Thorough and objective analysis
Precise Biometrics’ Vulnerability Analysis utilizes cooperative
and non-cooperative (latent fingerprint) attack methods to
create a variety of spoof molds. From these molds, spoofs are
created from 15-20 of the most effective spoof materials readily
available to consumers. Strict preparation of materials and
consistent image capture procedures insures a complete and
objective analysis is undertaken. -
Sensor vulnerability to spoofing
To assess a given fingerprint sensor’s vulnerability to spoofing,
manufacturers can turn to Precise Biometrics. Our many years
of developing spoof mitigation technology have ingrained in
our staff a deep understanding of latent and cooperative print
capture, fingerprint mold and spoof production, and spoofing
attack strategies.