The core functionality of every pervasive computing device is determined by its operating system.
• The major differences of operating systems for pervasive devices from the user's point of view are the human-machine interface, and the speed with which a task can be performed.
• For pervasive devices, there will likely be no equivalent to the Windows/Intel monopoly in the near future because pervasive devices do have a wide range of usages (from mobile phones to set-top boxes) with very con-strained hardware.
Security
Issues in biometrics
Types of circumvention
o Biometrics is secure but not secret
o Permanently associated with user
o Used across multiple applications
o Can be covertly captured
o Denial of service attacks(1)
o Fake biometrics attack(2)
o Replay and Spoof attacks(3,5)
o Trojan horse attacks(4,6,7)
o Back end attacks(8)
o Collusion
o Coercion
Fingerprints
�Minutiae: Local anomalies in the ridge flow
�Pattern of minutiae are unique to each Individual
• The major differences of operating systems for pervasive devices from the user's point of view are the human-machine interface, and the speed with which a task can be performed.
• For pervasive devices, there will likely be no equivalent to the Windows/Intel monopoly in the near future because pervasive devices do have a wide range of usages (from mobile phones to set-top boxes) with very con-strained hardware.
Security
Issues in biometrics
Types of circumvention
o Biometrics is secure but not secret
o Permanently associated with user
o Used across multiple applications
o Can be covertly captured
o Denial of service attacks(1)
o Fake biometrics attack(2)
o Replay and Spoof attacks(3,5)
o Trojan horse attacks(4,6,7)
o Back end attacks(8)
o Collusion
o Coercion
Fingerprints
�Minutiae: Local anomalies in the ridge flow
�Pattern of minutiae are unique to each Individual
No comments:
Post a Comment