{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Solution to Attack 2 - •The sensor acquires the...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
Solution to Attack 2: Eliminate Replay  Rathaet al. 2001 (1) •A challenge-responsebased system guarantees that image is really coming from  the fingerprint sensor (i.e., the attacker has not bypassed the sensor): •Server generates a pseudo-random challengeafter transaction gets initiated by  the client •Secure server sends the challenge to intelligent sensor
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: •The sensor acquires the fingerprint image and computes the responseto the challenge •The challenge can be the checksum of a segment of the image, a set of samples from the image, etc. •The response and the sensed image are sent to the server •The validity of response/image pairis checked...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online