×
Informējam, ka Sistēma pielāgota darbam ar interneta pārlūkprogrammu Internet Explorer (8. un jaunākām versijām) un Mozilla Firefox (3.6 un jaunākām versijām).
Izmantojot citu interneta pārlūkprogrammu, brīdinām, ka Sistēmas funkcionalitāte var tikt traucēta.
Projekta Nr. ISO/IEC 30107-3:2023
Nosaukums <p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">This document establishes:</span></p>
<p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;"> </span>principles and methods for the performance assessment of presentation attack detection (PAD) mechanisms;</span></p>
<p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;"> </span>reporting of testing results from evaluations of PAD mechanisms; and</span></p>
<p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;"> </span>a classification of known attack types (<span class="citeapp"><span style="color: black; mso-color-alt: windowtext; border: none;"><span style="border: none;">Annex A</span></span></span></span><span lang="EN-GB">).</span></p>
<p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">Outside the scope are:</span></p>
<p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;"> </span>standardization of specific PAD mechanisms;</span></p>
<p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;"> </span>detailed information about countermeasures (i.e. anti-spoofing techniques), algorithms or sensors; and</span></p>
<p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;"> </span>overall system-level security or vulnerability assessment.</span></p>
<p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">The attacks considered in this document take place at the biometric capture device during presentation. Any other attacks are considered outside the scope of this document.</span></p>
Reģistrācijas numurs (WIID) 79520
Darbības sfēra <p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">This document establishes:</span></p>
<p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;"> </span>principles and methods for the performance assessment of presentation attack detection (PAD) mechanisms;</span></p>
<p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;"> </span>reporting of testing results from evaluations of PAD mechanisms; and</span></p>
<p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;"> </span>a classification of known attack types (<span class="citeapp"><span style="color: black; mso-color-alt: windowtext; border: none;"><span style="border: none;">Annex A</span></span></span></span><span lang="EN-GB">).</span></p>
<p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">Outside the scope are:</span></p>
<p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;"> </span>standardization of specific PAD mechanisms;</span></p>
<p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;"> </span>detailed information about countermeasures (i.e. anti-spoofing techniques), algorithms or sensors; and</span></p>
<p class="ListContinue1" style="tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm; mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">—<span style="mso-tab-count: 1;"> </span>overall system-level security or vulnerability assessment.</span></p>
<p class="MsoBodyText" style="mso-layout-grid-align: none; text-autospace: none;"><span lang="EN-GB" style="mso-bidi-font-size: 12.0pt;">The attacks considered in this document take place at the biometric capture device during presentation. Any other attacks are considered outside the scope of this document.</span></p>
Statuss Standarts spēkā
ICS grupa 35.240.15