Projekta Nr.ISO/IEC 30107-3:2023
Nosaukums<p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">This document establishes:</span></p> <p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;">    </span>principles and methods for the performance assessment of presentation attack detection (PAD) mechanisms;</span></p> <p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;">    </span>reporting of testing results from evaluations of PAD mechanisms; and</span></p> <p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;">    </span>a classification of known attack types (<span class="citeapp"><span style="color: black; mso-color-alt: windowtext; border: none;"><span style="border: none;">Annex A</span></span></span></span><span lang="EN-GB">).</span></p> <p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">Outside the scope are:</span></p> <p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;">    </span>standardization of specific PAD mechanisms;</span></p> <p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;">    </span>detailed information about countermeasures (i.e. anti-spoofing techniques), algorithms or sensors; and</span></p> <p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;">    </span>overall system-level security or vulnerability assessment.</span></p> <p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">The attacks considered in this document take place at the biometric capture device during presentation. Any other attacks are considered outside the scope of this document.</span></p>
Reģistrācijas numurs (WIID)79520
Darbības sfēra<p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">This document establishes:</span></p> <p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;">    </span>principles and methods for the performance assessment of presentation attack detection (PAD) mechanisms;</span></p> <p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;">    </span>reporting of testing results from evaluations of PAD mechanisms; and</span></p> <p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;">    </span>a classification of known attack types (<span class="citeapp"><span style="color: black; mso-color-alt: windowtext; border: none;"><span style="border: none;">Annex A</span></span></span></span><span lang="EN-GB">).</span></p> <p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">Outside the scope are:</span></p> <p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;">    </span>standardization of specific PAD mechanisms;</span></p> <p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;">    </span>detailed information about countermeasures (i.e. anti-spoofing techniques), algorithms or sensors; and</span></p> <p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;">    </span>overall system-level security or vulnerability assessment.</span></p> <p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">The attacks considered in this document take place at the biometric capture device during presentation. Any other attacks are considered outside the scope of this document.</span></p>
StatussStandarts spēkā
ICS grupa35.240.15