throbber
Case 6:21-cv-01101-ADA Document 31-23 Filed 05/19/22 Page 1 of 14
`Case 6:21-cv-01101-ADA Document 31-23 Filed 05/19/22 Page 1 of 14
`
`EXHIBIT 23
`EXHIBIT 23
`
`

`

`Case 6:21-cv-01101-ADA Document 31-23 Filed 05/19/22 Page 2 of 14
`
`BIOMETRIC AUTHENTICATION 一
`SECURTTY AND USABILITY
`
`Vaclav Matyââ and Zdenek Riha
`Faculty of Informatics^ Masaryk University Brno^ Czech Republic
`(matyas, zrifea} Mi.muni.cz
`
`Abstract We would like to outline our opinions about the usability of biometric
`authentication systems. We outline the position of biometrics in the
`current field of computer security in the first section of our paper. 하he
`second chapter introduces a more systematic view of the process of bio­
`metric authentication - a layer model (of the biometric authentication
`process). The third section discusses the advantage and disadvantages
`of biometric authentication systems. We also propose a classification of
`biometric systems that would allow us to compare the biometrics sys­
`tems reasonably, along similar lines to Common Criteria [Ij or FIPS
`140-1/2 [4]. We conclude this paper with some suggestions where we
`would suggest to use biometric systems and where not.
`
`Keywords: authentication, biometricsj classificationj evaluation, security.
`1.
`INTRODUCTION
`This paper summarises our opinions and findings after several years
`of studying biometric authentication systems 褪효d thei호 security. Our
`research on security and reliability issues related to biometric authenti­
`cation started in 1999 at Ubilab, the Zurich research lab of bank UBS,
`and has been continuing at the Masaryk University Brno since inid-200〇.
`This paper summarises our personal views and opinions on pros and cons
`of biometric authentication in computer systems and networks.
`Proper user identification/authentication is a crucial part of the access
`control that makes the major building block of any system's security.
`User identifieation/authentic砒io효 has been traditionally based on:
`* something that the user knows (typically a PIN? a password or a
`passphrase) or
`* something that the user has (e.g., a key, a token, a magnetic or
`smart card, a badge, a pas힜port)*
`
`The original version of this chapter was revised: The copyright line was incorrect. This has been
`corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0~387-35612-9..23
`注:.-:d. /〈爲丄,号,:•ね"済qは し:方担冷治方/、就沽心 心酒',:》;以*泠3•:•氽' •ふ]::眾海?
`B.
`i七<xwで・”滾 ぶ.;:;,:..£
`K,;’
`U' : P
`
`DEF-AIRE-EXTRINSIC00000155
`
`

`

`Case 6:21-cv-01101-ADA Document 31-23 Filed 05/19/22 Page 3 of 14
`
`228
`
`Advanced Communicidions and Mvitmedia S^urity
`
`These traditional methods of the user authentication unfortunately
`do not authenticate the user as such. Traditional methods are based
`on properties that can be forgotten, disclosed, lost or stolen. Passwords
`often are easily accessible to colleagues and even occasional visitors and
`users tend to pass their tokens to or share their password웡 with their
`colleagues to make their work easier. Biometrics, on the other hand, au­
`thenticate humans as such ~ in case the biometric system used is working
`prope외y and reliably, which is not so easy to achieve. Biometrics are
`automated methods of identity verification or identification based on the
`principle of measurable physiological or behavioural characteristic않 such
`as a fingerprint, an iris pattern。호 a voice sample. Biometric characteris­
`tics are (or rather should be) unique and not duplicable or transferable.
`While the advantages of biometric authentication definitely look very
`attractive, there are also many problems with biometric authentication
`that one should be aware of.
`2. m壬E LAYER MODEL
`Although the use of each biometric technology has its own specific
`issues, the basic operation of any biometric system is very similar. The
`separation of actions can lead to identifying critical i잉suむ옪 and to improv­
`ing security of the overall process of biometric aethe효ticatiom The layer
`model was designed by our biometrics team (the authors, Hans-Peter
`Frei> Kan Zhang) during the Ubiiab biometrics project, and its struc­
`ture is also similar to some findings presented in other seminal works on
`biometric authentication (e.g., [3? 5]).
`The whole process starts with the enrolment:
`First measurement (acquisition)
`2,1
`This is the first contact of the user with the biometric system. The
`user’s biometric sample is obtained using an input device. Quality of the
`first biometric sample is crucial for further authentications of this user.
`It may happen that even multiple acquisitions do not generate 'biometric
`samples with sufficient quality. Such a user cannot be registered with
`the system. There are also mute people, people without fingers or with
`injured eyes. Both these categories create a ^fail to enroF (FTE) group
`of users. Users very often do not have any previous experience with the
`kind of the biometric system they are being registered with, so the first
`measurement should be gnided by a professional who explains the use
`of the biometric reader.
`
`DEF-AIRE-EXTRINSIC00000156
`
`

`

`Case 6:21-cv-01101-ADA Document 31-23 Filed 05/19/22 Page 4 of 14
`
`229
`
`Biometric Authentication — Security and Usability
`2.2
`Creation of master characteristics
`The biometric measurements are processed after the acquisition. The
`number of biometric samples necessary for further processing is based
`on the nature of given biometric technology. Sometime다 a single sam­
`ple is suflBcient, but often multiple (usually 3 or 5) biometric samples
`are required. The biometric characteristics are most commonly neither
`compared nor stored in the raw format (say as a bitmap).
`Storage of master characteristics
`2.3
`After processing the first biometric sainple(s) and extracting the fear
`tures, we have to store (and maintain) the newly obtained master tem­
`plate, Choosing proper discriminating characteristic for the categori­
`sation of records in large databases can improve identification (search)
`tasks iater on. There are basically 4 possibilities where to store the tern-
`piate: in a card, in the central database on a server, on a workstation
`or directly in an authenticatio효 terminal. The storage in an authenti­
`cation 切rmm이 cannot be used for large-scale systems, in such a case
`only the first two possibilities are applicable. If privacy issues need to
`be considered then the storage on a card (magnetic stripe, smart or 2D
`bar) has an advantage, because in this case no biometric data must be
`stored (and potentially misused) in a central database.
`As soon as the user is enrolledj she cm use the system for successful
`authentications or identifications. This process is 翊picallg fully auto­
`mated and takes the following steps:
`2A Acquisition(s)
`Current biometric measurements must be obtained for the system
`to be able to make comparison with the master template. These sub­
`sequent ac아由sitions of the user's biometric measurements are done at
`various places whe호€ authentication of the user is required. It is often
`up to the reader to check that the measurements obtained really belong
`to a live persons (the liveness property). In many biometric techniques
`(e.g., fingerprinting) the further processing trusts the biometric hard­
`ware to check the liveness of the person and provide genuine biometric
`measurements only. Some other systems (like the face recognition) check
`the user's liveness in software (time-phased sampling).
`2.5
`Creation of new characteristics
`The biometric measurements obtained in the previous step are pro­
`cessed and new characteristics are created. Only a single biometric sam-
`
`DEF-AIRE-EXTRINSIC00000157
`
`

`

`Case 6:21-cv-01101-ADA Document 31-23 Filed 05/19/22 Page 5 of 14
`
`230
`
`Advanced Communications and Multimedia Security
`
`pie is usually available. This might mean that the number or quality of
`extracted features is lower than at the time of enrolment.
`2.6
`Comparison
`Currently computed characteristics are compared with the charac­
`teristics obtained during enrolment. If the system performs (identity)
`verification then these newly obtained characteristics are compared only
`to the master template. For an identification request the new character­
`istics are matched against a large number of master templates.
`2.7
`Decision
`The final step in the verification process is the yes/no decision based
`on a threshold. This security threshold is either a parameter of the
`matching process or the resulting score is compared with the threshold
`value. Although the error rates quoted by manufactures (typical values
`of equal error rate (ERR)' do not exceed 1%) might indicate that bio­
`metric systems are very accurate, the reality is much worse. Especially
`the false rejection rate is quite high (very often over 10%) in real appli­
`cations. This prevents legitimate users to gain their access rights and
`stands for a significant problem of biometric systems.
`& WHAT ARE THE ADVANTAGES OF
`BIOMETRIC AUTHENTICATION
`The primary advantage of biometric authentication methods over other
`methods of user authentic湖;is that they really do what they should,
`i.e., they authenticate the user. These methods use real human physio-
`togic이 or behavioural diaracteristics to authenticate users. These bio­
`metric characteristics are (more or less) permanent and not changeable.
`It is also not easy (although In some cases not principally impossible) to
`change oneM fingerprint, iris or other biometric characteristics.
`Users cannot pass their biometric characteristics to other users 題딶
`easily as they do with their cards or p財swo호ds.
`Biometric objects cannot be stolen as tokens, keys, cards or other ob­
`jects used for the traditional user anthentication, yet biometric charac­
`teristics can be stolen from computer systems and networks. Biometric
`characteristics are not secret and therefore the availability of a U8孩ド3
`fingerprint or iris pattern does not break security the same way as avail­
`ability of the 眼eFs password. Even the use of dead or artificial biometric
`characteristics should not let the attacker in.
`
`DEF-AIRE-EXTRINSIC00000158
`
`

`

`Case 6:21-cv-01101-ADA Document 31-23 Filed 05/19/22 Page 6 of 14
`
`Biometric Authentication — Security and Usability/
`
`231
`
`Most biometric techniques are based on something that cannot be lost
`or forgotten. This is an advantage for users as well as for system admin­
`istrators because the problems and costs associated with lost, reissued or
`temporarily issued tokens/cards/passwords can be avoided, thus saving
`some costs of the system management.
`Another advantage of biometric authentication systems may be their
`speed. The authentication of a habituated user using an iris»based iden­
`tification system may take 2 (or 3) seconds while finding your key ring,
`locating the right key and using it may take some 5 (or 10) 았econd乩
`Disadvantages of biometric authentication
`3,1
`So why do not we use biometrics everywhere instead of p醐$word욍 or
`tokens? Nothing is perfect, and biometric authentication methods also
`have their own shortcomings. First of all the performance of biometric
`systems is not ideal (yet?). Biometric systems still need to be improved
`in the terms of accuracy and speed. Biometric systems with the false
`rejection rate under 1% (together with a reasonably low false acceptance
`rate) are still rare today. Although few biometric systems are fest and
`accurate (in terms of low feise acceptance rate) enough to aliow iden­
`tification (automatically recognising the user identity), most of current
`systems are suitable for the verification only, as the false acceptance rate
`is too high^.
`The fall to enrol rate brings up another important problem. Not all
`users can use any given biometric system. People without hands cannot
`use fingerprint or hand-based systems^. Visually impaired people have
`difficulties using iris or retina based techniques. As not all users are able
`to use a specific biometric system, the authentication system must be
`extended to handle users felling into the FTE category. This can make
`the resulting system more complicated, less secure or more expensive.
`Even enrolled users can have difficulties using a biometric system. The
`FTE rate says how many of the input samples are of insufficient quality.
`Data acquisition must be repeated if the quality of input sample is not
`sufficient for further processing and this would be annoying for users.
`Biometric data are not considered to be secret and security of a bio­
`metric system cannot be based on the secrecy of user*§ biometric charac­
`teristics. The server cannot authenticate the user just after receiving her
`correct biometric characteristics. The user authentication can be suc­
`cessful only when user's characteristics are fresh and have been collected
`from the user being authenticated. This implies that the biometric input
`device must be trusted. Its authenticity should be verified (unless the
`device and the link are physically secure) and tier's liveness would be
`
`DEF-AIRE-EXTRINSIC00000159
`
`

`

`Case 6:21-cv-01101-ADA Document 31-23 Filed 05/19/22 Page 7 of 14
`
`232
`
`Advanced Communications and Multimedia Security
`
`checked. The input de히ice also should be under human supervision or
`tamper-resistant. The feet that biometric characteristics are not secret
`brings some issues that traditional authentication systems need not deal
`with. Many of the current biometric systeros are not aware of this feet
`and therefore the security level they ofier is limited.
`Some biometric sensors (particularly those having contact with users)
`also have a limited lifetime. While a magnetic card reader may be used
`for years (or even decades), the optical fingerprint reader (if heavily used)
`must be regularly cleaned and even then the lifetime need not exceed
`one year.
`Biometric systems may violate user's privacy. Biometric characteris­
`tics are sensitive data that may contain a lot of personal information.
`The DNA (being the typical example) contains (among others) the ixseFs
`preposition to diseases. This may be a very interesting piece of informa­
`tion for an insurance company. The body odour can provide information
`about user*8 recent activities. It is also told [3] that people with asym­
`metric fingerprints are more likely to be homosexuaily oriented, etc.
`Use of biometric systems may also imply loss of anonymity. While
`one can have multiple identities when authentication methods are based
`on something the user knows or has, biometric systems can sometimes
`link all 畦웡er actio】坎 to a single identity.
`Biometric systems can potentially be quite troublesome for some users.
`These users find some biometric systems intrusive or personally invasive.
`E후en if 효〇 biometric system is really dangerous, users are occasionally
`afraid of somethi효g they do 효ot know much about. In some countries
`people do not like to touch something that has already been touched
`many times (eg, biometric sensor), while in some countries people do
`not like to be photographed or their faces are completely covered.
`Lack of standards (or ignorance of standards) may also posses a serious
`problem. Two similar biometric systems from two difierent vendors are
`not likely to interoperate at present.
`4. POSSIBLE CLASSIFICATION OF
`BIOMETRIC SYSTEMS
`Classifications help to compare systems. The famous Orange Book
`[2] divided systems into four categories (A D) with additional subcat­
`egories. Ali the security f。泌;成es (such as 悬cces뒀 control or auditing) get
`attention. The higher security level the more sophisticated protection
`is required. But the higher levels also have more stringent assurance
`requirements. There must be more reason to believe that the system
`functions as designed.
`
`DEF-AIRE-EXTRINSICOOO00160
`
`

`

`Case 6:21-cv-01101-ADA Document 31-23 Filed 05/19/22 Page 8 of 14
`
`Biometric Authentication — Security and Usability
`
`233
`
`The ITSEC also classifies the security of systems, so does the Common
`Criteria. A product or a system can be certified for a particular security
`class. The vendor asks an independent organisation to evaluate prop­
`erties of a particular product/system and if this Target of Evaluation
`complies with the criteria, the label is granted. Although an obtained
`security label does not automatically imply that the product is securcj
`it helps in product categorisation and comparison.
`In this chapter we categorise 'biometric systems according to the level
`of protection they ofier. Our classification proposal divides systems into
`four levels. We first introduce the model of a biometric system. Then ad­
`justable and/or optional parameters of biometric system아 are discussed
`and at the end four security levels are described.
`4.1 Modules of a biometric system
`Any biometric system is basically made of the following components:
`
`Figure 1. 까he model of a biometric system.
`
`1 PortaL Its purpose is to protect some assets. An example of a
`portal is the gate at an entrance of a building. If the user has been
`successfully authenticated and is authorised to access an object
`then access is granted.
`2 Central controlling unit receives the authentication request, con­
`trols the biometric authentication process and returns the result
`of user authentication.
`
`DEF-AIRE-EXTRINSICOOO00161
`
`

`

`Case 6:21-cv-01101-ADA Document 31-23 Filed 05/19/22 Page 9 of 14
`
`234
`
`Advanced Communications and Multimedia Security
`
`3 Input device. The aim of the input device is biometric data acqui­
`sition. During the acquisition process uweF힝 liveness and quality
`of the sample may be verified.
`4 Feature extraction module processes the biometric data. The out­
`put of the module is a set of extracted features suitable for the
`matching algorithm. During the feature extraction process the
`module may also evaluate quality of the i효put biometric data.
`5 Storage of biometric templates. This will typically be some kind of
`a database. Biometric templates can also be stored on a user-held
`medium (ag,? smartcard). In that case a link between the user and
`her biometric template must exist (e.g., in the form of an attribute
`certificate).
`6 The biometric matching algorithm compares the cu*ent biometric
`features with the stored template. The desired security threshold
`level may be a parameter of the matching process. In this case the
`result of the matching will be a yes/no answer. Otherwise a score
`representing the similarity between the template and the cur호ent
`biometric sample is returned. The central unit then makes the
`ye웠/go decision.
`Parameters of biometric systems
`4.2
`What does it take for one biometric system to be more secure than
`another one? What are the differences among van이塑 systems?
`
`Liveness testing: Incorporation of a liveness test makes an attack against
`the biometric system more difficult. There are various liveness
`tests offering various levels of protection. Most of the tests, how­
`ever, can be easily cheated. A combination of multiple liveness
`tests can make the system more secure.
`Tamper resistance: If the biometric system is not under constant hu­
`man supervision it has to rely on tamper resistance. Without
`tamper resistance or supervision the system can be tampered with
`and forged/replied biometric data can be injected into the system.
`
`Secure communication: Biometric system components can be either
`standalone and communicate with each other 〇히er an external in­
`secure medium or can be coupled in a tamper-resistant box. The
`communication among module다 within a tamper-resistant co히er
`need not be secured, but the communication over an insecure line
`should be authenticated and encrypted.
`
`DEF-AIRE-EXTRINSICOOO00162
`
`

`

`Case 6:21-cv-01101-ADA Document 31-23 Filed 05/19/22 Page 10 of 14
`
`Biometric Authentication — Security and Usability
`
`235
`
`Security threshold level: Lower false acceptance rate means higher
`level of security (and unfortunately, in most cases, also higher false
`rejection rate causing user frustration). A proper value must be
`set in accordance with goals of the biometric system.
`
`Eall-back mode: In some systems the biometric authentication may
`be sufficient for the user authentication. In some systems an ad­
`ditional authentication method must be used and the biometric
`authentication is only a necessary part of user authentication. Suc­
`cessful authentication using this additional method may but need
`효ot be sufficient for use하 authentication.
`Proposal of classification
`4.3
`Our proposal of classification divides biometric systems into four cat­
`egories according to the level of security they offer. The higher security
`category the higher level of protection the system offers. Which level
`to choose depends heavily on the purpose of the biometric system, its
`threats and on available funds.
`
`Level 1 f Very simple systems: Systems falling into this category
`are more or less very simple. They ofier only restricted level of
`protection and can be easily cheated. Such systems have no live­
`ness test incorporated and no part of the system has to be tamper­
`resistant. The communication among particular components need
`not be authenticated nor encrypted. Successful biometric authen­
`tication 瓦 sufficient means of authentication and after an uiisnc-
`cessfiil biometric authentication some traditional authentication
`method is of也호ed.
`Such biometric systems are subject to easy attacks such as un­
`plugging the biometric input device and mjectmg pre杭이面y eaves­
`dropped biometric data (because of no encryption or authentica­
`tion), misuse 〇호 high false acceptance rate or faked trivial copies
`of biometric characteristics.
`
`Level 2 — Simple systems: Biometric systems at level two require mu­
`tual authentication of particular compone효ts and encrypted com­
`munication. Still no liveness testing or tamper resistance is re­
`quired, The biometric authentication is suffice효t authentication.
`A traditional authentication method as a sufficient authentication
`method is ofifered only in the case of biometric system malfunction.
`Systems on level two offer a certain level of security and still re­
`main relatively cheap. Some of the easiest attack팡 are eliminatedj
`
`DEF-AIRE-EXTRINSICOOO00163
`
`

`

`Case 6:21-cv-01101-ADA Document 31-23 Filed 05/19/22 Page 11 of 14
`
`236
`
`Advanced Communications and Multimedia Security
`
`but the systems still can be tampered with or cheated with faked
`biometric characteristics.
`Level 3 - Intermediate systems: Level three systems already do have
`some kind of liveness test. Exposed components of the system
`(typically the'biometric input device) must be guarded or tamper­
`resistant against moderate attacks. The communication must be
`authenticated and e효c호ypted. The biometric authentication is suf
`ficient, and the system never offers traditional authentication as a
`sufficient authentication method.
`Such biometric systems will be able to resist moderate attacks.
`Advanced tampering methods or advanced faked biometric charac­
`teristics, however, will still be able to cheat the biometric systems.
`Level 4 - Advanced systems: For systems of level four more than
`one advanced liveness test method are required. Exposed and un­
`guarded components must 'be tamper-resistant. Such tamper re­
`sistance must be able to resist advanced tampering attacks. Com-
`mu효Nation among particular components (except within a tamper­
`resistant box) must be mutually authenticated and encrypted. Suc­
`cessful biometric authentication is necessary but not sufficient part
`of the user authentication. A supplemental traditional authentica­
`tion method must be a necessary part of the autheuticatiouj too.
`Preferably multiple biometric techniques should be hwelved in the
`biometric authentication.
`Biometric systems falling into the level four should be able to resist
`even professional and well-funded attacks. But nothing is bullet­
`proof and designing a system resistant to (for example) very well
`funded attacks of intelligence services is rather difficult.
`
`Table 1. Brief overview of classification proposal.
`
`Secure Comm.
`no
`yes
`yes
`yes
`
`IVaditional autb method
`sufficient/any time
`suSicieat/malfunction
`not su^cient
`not sufHcient/required
`
`효 〇
`
`Liveness Tamper res.
`Level
`no
`1
`no
`2
`no
`yes
`3
`moderate
`4
`multiple
`advanced
`5. CONCLUSIONS
`Let 睥 discuss where the use of biometric systems may be an advantage
`and where not. Biometrics are a great way of authenticating users. The
`user may be authenticated by a workstation during the logon, by a smart
`card to unlock the private key, by a voice verification system to confirm
`
`DEF-AIRE-EXTRINSICOOO00164
`
`

`

`Case 6:21-cv-01101-ADA Document 31-23 Filed 05/19/22 Page 12 of 14
`
`Biometric Authentication — Security and Usability
`
`237
`
`a bank transaction or by a physical access control system to open a
`door. All of these cases are typical and correct places where to deploy a
`biometric system.
`Very promising are solutions where the cryptographic functions as
`well as the biometric matching, the feature extraction and the biometric
`sensor are all integrated in one (ideally also tamper-resistant) device.
`Such d取 ice 옹 provide a very high protection of the secret/private key as
`the biometric data as well as the secret/private key wili never have to
`leave the secure device.
`We believe that biometric authentication is a good additional authen­
`tication method. Even cheap and simple biometric solutions can increase
`the overaii system security if used on top of existing traditional authen­
`tication methods.
`Biometrics can be used for dozens of applications outside the scope
`of computer security. Facial recognition systems are often deployed at
`frequently visited places to search for criminals. Fingerprint systems
`(APIS) are used to find an ofiender according to trails left on the crime
`spot. Infrared thermographs can point out people under influence of
`various drugs (different drugs react in different ways). Biometric systems
`successfully used in non-authenticating applications may but also need
`not be successfully used in authenticating applications.
`5.1 Where not to use biometrics?
`Although good for user 히ithe효tication$ biometrics cannot be used to
`authenticate computers or messages. Biometric characteristics are not
`secret and therefore they cannot be used to sign messages or encrypt
`documents. If my fingerprint is not secret there is no sense in adding it
`to documents we have written. Anyone else could do the same. Crypto­
`graphic keys derived from biometric data are nonsense, too.
`Remote biometric authentication is not trivial at all. The assump­
`tion that anyone who can provide my fingerprint can also iise my bank
`account in the horaebanking application is not a good idea. Remote
`biometric authentication requires a trusted biometric sensor. Will a
`bank trust your home biometric sensor to be sufficiently tamper resi동*
`tant and provide trustworthy liveness test? Although remote biometric
`authentication may work in the theory, few (if any) current devices are
`trustworthy e효öugh to be used for remote 'biometric authentication.
`While using biometrics as an additional authentication method does
`not weaken the security of the whole system (if users do not rely on the
`biometric component so much to ignore the traditional authentication
`method, e.g., by using simple passwords), replacing an existing system
`
`DEF-AIRE-EXTRINSICOOO00165
`
`

`

`Case 6:21-cv-01101-ADA Document 31-23 Filed 05/19/22 Page 13 of 14
`
`238
`
`Advanced Gommnnicotions md Multimedia Security
`
`with a biometric one may be more risky. Users as w인 1 as administra­
`tors and system engineers tend to overestimate security properties of
`biometric systems; such a decision must be based on and confirmed by
`a risk analysis. Particularly, reviewing the process of the biometric data
`capture and transfer is very important. Sometimes biometric authenti­
`cation system웡 replace traditional authentication systems not because of
`higher security but because of higher comfort and ease of use.
`False rqects - the unpleasant property of biometric systems caus­
`ing authorised users to be rejected - may prevent biometric systems
`to spread into some specific applications, where inability of a user to
`authenticate herself (and run 疝 action) may imply sen이甥 problems.
`
`* Different biometric samples of the same person will never be same.
`* Biometric systems make error$.
`* Biometric data are not secrete
`* The role of the input device is crucialj and this device must be
`trusted or well secured.
`* The biometric system should check user^s liveness.
`* Biometrics are ,good for user authentication. They cannot be used
`to authenticate data or computers.
`Notes
`1. There are two kinds of errors that biometric systems do: false rejeciion occurs when
`a legitimate user is rejected and false acceptance occurs when an impostor is accepted as a
`legitimate user. 햣he number of false rejections/false acceptances is usually expressed as a
`percentage from the total number of authorised/unauthorised access attempts. The equal
`error nste (ERR) is the point where FAR and FRR are equal. The ERR value as such does
`not have any practical use, but it can be used as indicator of the biometric system accuracy.
`2. Both the FAR, and FRR are functions of the threshold value and can be traded off,
`but the set of usable threshold values is limited. For example a system with the ERR of 1%
`m阿 be se¢ to operate at the FAR of 00L%? but this would imply the FRK to jump over 90
`or 95% J which would make system unusable,
`3. The FTE rate is estimated as 2% for fingerprint based systems and 1% for iris based
`systems. Real values of the FTE rate are dependent on the input device model, the enrolment
`policy and the user population.
`References
`[1] Conunon Criteria for Information T聆¢molo흥y Security Evaluation, v 2,1, 1999,
`[2] Department of Defei^e (1985)’ Trusted Computer System Evaluation Criteria.
`[3] Jain, A., B아1% R, and Pankanti S. (1999). BIOMETRICS: Personal lâeniificatwn
`in Networked Society> Kluwer Academic Publishers.
`
`DEF-AIRE-EXTRINSICOOO00166
`
`

`

`Case 6:21-cv-01101-ADA Document 31-23 Filed 05/19/22 Page 14 of 14
`
`Biometric Authentication — Security and Usability
`
`239
`
`[4] National Institute of Standards and Technology (1994 and 2001). Security Re­
`quirements for Cryptographic Modules^ FIPS PUB [枪丄/,・
`[5] Newham, E, (1995). The biometric report, SBJ Services.
`[6] Matyââ, V., Hfha, Z, (2000), Biometric Authentication Systems. Technical report,
`http://www.ecom-moaitor,com/papers/biometricsTRSOOO.pdf
`.
`[7] Mansfield, T. (2001) Biometric Product Testing 一 Fmfd Report^ National Physical
`Laboratory, 2001, http: //w«w. apl. co, uk/.
`
`DEF-AIRE-EXTRINSICOOO00167
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket