The Cyber-Spy.Com Usenet Archive Feeds Directly
From The Open And Publicly Available Newsgroup
This Group And Thousands Of Others Are Available
On Most IS NNTP News Servers On Port 119.
Cyber-Spy.Com Is NOT Responsible For Any Topic,
Opinions Or Content Posted To This Or Any Other
Newsgroup. This Web Archive Of The Newsgroup And
Posts Are For Informational Purposes Only.
Date: Fri, 03 Jan 2003 00:10:03 +0100
From: Rene Tschaggelar
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.0.1) Gecko/20020823 Netscape/7.0
X-Accept-Language: en-us, en, de-ch
Subject: Re: Biometric fingerprint sensors
References: <firstname.lastname@example.org> <email@example.com> <3h1R9.3610$T41.13574@amstwist00> <3E14A406.firstname.lastname@example.org>
X-Abuse-Report: Send abuse reports to email@example.com
Organization: http://www.TeraNews.com - FREE NNTP Access
> Rene Tschaggelar wrote:
>>> They produce some kind of image that is evaluated by the host system.
>>> Why put an expensive CPU in the reader?
>> Simple reasons :
>> the software is safe in an embedded device, add data security and
>> fear of tampering.
> OTOH sending a 'yes or no' signal across the cable would be very
> interesting. Replace device with a 'yes' switch and enter :)
There are those that have access to the hardware and others that
do not. It can be considered, those with access to the hardware
can open the door for example anyway. The whole looks different
when you want to handle credit card data. Then even those having
access to the hardware, eg service technicians, should not be
allowed to tamper the data. Have the comm encrypted in that case.
>> You don't give 10 years of software development away in a dll.
> THAT is a good reason. But I think usually cost wins. At least, one of
> the tested devices showed a fingerprint on the computer screen. But
> maybe that's optional, and teh interpretation / finding of minutes is
> done in firmware.
Cost wins, perhaps.
That again is a matter of the application. There is not always
a PC sitting idle. A DSP on the other hand is to be purchased for
a few $ at high quantities.
>> When transmitting the image of a fingerprint, that could be listenen at,
>> especially when it is stored on a server, and subsequently reconstructed
>> from silicon. Therefore only a template that contains the relevant
>> information in some code is leaving the reader. It has to be made sure
>> no fingerprint can be reconstructed from the template.
> This is HARD, as a fingerprint can change a tiny bit, and the comparison
> should still work. No way a standard hash is going to work... thus the
> data will likely be more meaningful than that, and obscured or
> encrypted. Or is there a much better way?
The comparison algorithm is at least as complicated as the recognition
algorithm. And the result is certainly not a yes/no, but some
statistical data, such as 15 minutiaes found with a match of 85% or
alike. Then the application can decide whether False Rejects or False
Accepts should be preferred. That again is a matter of the application.
Ing.Buero R.Tschaggelar - http://www.ibrtses.com
& commercial newsgroups - http://www.talkto.net
Go Back To The Cyber-Spy.Com
Usenet Web Archive Index Of
The sci.electronics.design Newsgroup