Solution to Attack 2 - The sensor acquires the fingerprint...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
Solution to Attack 2: Eliminate Replay  Rathaet al. 2001 (1) •A challenge-responsebased system guarantees that image is really coming from  the fingerprint sensor (i.e., the attacker has not bypassed the sensor): •Server generates a pseudo-random challengeafter transaction gets initiated by  the client •Secure server sends the challenge to intelligent sensor
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: The sensor acquires the fingerprint image and computes the responseto the challenge The challenge can be the checksum of a segment of the image, a set of samples from the image, etc. The response and the sensed image are sent to the server The validity of response/image pairis checked...
View Full Document

This document was uploaded on 11/03/2011 for the course BIOLOGY BSC1105 at Broward College.

Ask a homework question - tutors are online