NBN ISO/IEC 30107-3:2023

Information technology — Biometric presentation attack detection — Part 3: Testing and reporting (ISO/IEC 30107-3:2023)

ACTIVE

About this standard

Languages
English
Type
NBN
Standards committee
ISO/IEC JTC 1/SC 37 (Biometrics)
Status
ACTIVE
Publication date
12 April 2023
ICS Code
35.240.15 (Identification cards. Chip cards. Biometrics)
Withdrawn Date
Price
€ 166,00

Summary

< p class=" MsoBodyText" style=" mso-layout-grid-align: none text-autospace: none " > < span lang=" EN-GB" style=" mso-bidi-font-size: 12.0pt " > This document establishes:< / span>


< p class=" ListContinue1" style=" tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm mso-layout-grid-align: none text-autospace: none " > < span lang=" EN-GB" style=" mso-bidi-font-size: 12.0pt " > —< span style=" mso-tab-count: 1 " >     < / span> principles and methods for the performance assessment of presentation attack detection (PAD) mechanisms < / span>


< p class=" ListContinue1" style=" tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm mso-layout-grid-align: none text-autospace: none " > < span lang=" EN-GB" style=" mso-bidi-font-size: 12.0pt " > —< span style=" mso-tab-count: 1 " >     < / span> reporting of testing results from evaluations of PAD mechanisms and< / span>


< p class=" ListContinue1" style=" tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm mso-layout-grid-align: none text-autospace: none " > < span lang=" EN-GB" style=" mso-bidi-font-size: 12.0pt " > —< span style=" mso-tab-count: 1 " >     < / span> a classification of known attack types (< span class=" citeapp" > < span style=" color: black mso-color-alt: windowtext border: none " > < span style=" border: none " > Annex A< / span> < / span> < / span> < / span> < span lang=" EN-GB" > ).< / span>


< p class=" MsoBodyText" style=" mso-layout-grid-align: none text-autospace: none " > < span lang=" EN-GB" style=" mso-bidi-font-size: 12.0pt " > Outside the scope are:< / span>


< p class=" ListContinue1" style=" tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm mso-layout-grid-align: none text-autospace: none " > < span lang=" EN-GB" style=" mso-bidi-font-size: 12.0pt " > —< span style=" mso-tab-count: 1 " >     < / span> standardization of specific PAD mechanisms < / span>


< p class=" ListContinue1" style=" tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm mso-layout-grid-align: none text-autospace: none " > < span lang=" EN-GB" style=" mso-bidi-font-size: 12.0pt " > —< span style=" mso-tab-count: 1 " >     < / span> detailed information about countermeasures (i.e. anti-spoofing techniques), algorithms or sensors and< / span>


< p class=" ListContinue1" style=" tab-stops: 19.85pt 39.7pt 59.55pt 79.4pt 99.25pt 119.05pt 138.9pt 158.75pt 178.6pt 7.0cm mso-layout-grid-align: none text-autospace: none " > < span lang=" EN-GB" style=" mso-bidi-font-size: 12.0pt " > —< span style=" mso-tab-count: 1 " >     < / span> overall system-level security or vulnerability assessment.< / span>


< p class=" MsoBodyText" style=" mso-layout-grid-align: none text-autospace: none " > < span lang=" EN-GB" style=" mso-bidi-font-size: 12.0pt " > The attacks considered in this document take place at the biometric capture device during presentation. Any other attacks are considered outside the scope of this document.< / span>