SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Identix (IDNX) -- Ignore unavailable to you. Want to Upgrade?


To: R. Jaynes who wrote (12334)2/1/1999 2:09:00 PM
From: David  Read Replies (1) | Respond to of 26039
 
I saw that also, and I'm not convinced. The assumption is that someone can just pick off "in flight" an actual template and "replay" it, and I don't believe that anyone is designing systems that would allow this. For one thing, at least with IDX, a replay attack is supposedly rejected by the algorithm as phony, since no two scans will be identical. For another, there is a high level of encryption associated with these transmissions and often they will have a public key/private key protection. Finally, if someone is going after templates in a server bank of templates, they will not have an easy time (1) penetrating a protected server or (2) associating templates with specific individuals.

He also seems to wrongly imply that the specific biological pattern is what is being stored, rather than some mathematical derivative. If your mathematical derivative is stolen, you can purge it and re-enroll, and the stolen template becomes useless (or worse, a proof of fraud).

And yes, an F3 reader/reader or reader/card matching system should completely defeat any attempt to "wiretap" the actual biometric.

When I read that passage, I wondered about that guy's competence -- or at least his objectivity.