Abstract

Abstract The biometric device and subsystem represent only a part of a complete security solution. System designers who are considering the use of this novel approach to authentication need to consider how its use will impact the other components. In addition, new threats and vulnerabilities may be introduced —especially if such devices are viewed as simple replacements of existing methods. Each domain of application will present its own challenges, but there are a number of common concerns which the prudent designer should address.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.