Sensor vulnerability analysis

An objective and credible analysis of sensor resistance to common spoofing tactics and materials.

  • Biometric authentication

    Biometric authentication is rapidly becoming the desired alternative to conventional authentication methods such as passwords and tokens. Fake finger detection and spoof mitigation is an on-going effort at Precise Biometrics and its lab affiliation with Clarkson University and the Center for Identification and Technology Research (CITeR). These efforts and the resulting knowledgebase of spoofing measures and countermeasures insure that the Precise Biometrics’ Liveness Detection and Spoof Mitigation technology continues to evolve and provide best-of-breed performance in the on-going fight against fake finger authentication.

  • Comprehensive report

    Upon conclusion of the analysis, a comprehensive report is
    produced that fully describes all procedures and materials
    utilized, and all outcomes of each test procedure. The document
    is fully referenced, and the report quality is suitable for
    external distribution, should that be desired. This provides your
    organization with an objective and highly credible third-party
    analysis of your technology’s resistance to spoof attacks. It can
    also provide guidance to your internal roadmap discussions of
    how to best incorporate additional spoof mitigation capability
    into your sensor function.

  • Thorough and objective analysis

    Precise Biometrics’ Vulnerability Analysis utilizes cooperative
    and non-cooperative (latent fingerprint) attack methods to
    create a variety of spoof molds. From these molds, spoofs are
    created from 15-20 of the most effective spoof materials readily
    available to consumers. Strict preparation of materials and
    consistent image capture procedures insures a complete and
    objective analysis is undertaken.

  • Sensor vulnerability to spoofing

    To assess a given fingerprint sensor’s vulnerability to spoofing,
    manufacturers can turn to Precise Biometrics. Our many years
    of developing spoof mitigation technology have ingrained in
    our staff a deep understanding of latent and cooperative print
    capture, fingerprint mold and spoof production, and spoofing
    attack strategies.