biometricITC / Administration

iTC administration Documentation
0 stars 0 forks source link

CMFA Signal verification/PAD #22

Closed woodbe closed 3 years ago

woodbe commented 3 years ago

Going through the sections in the ESR again, I am wondering about the PAD/signal verification portion and comparing it to some of the biometrics.

In the straight BIO-PPM, PAD is optional, since it is something that is difficult and likely would prevent some solutions from being able to pass, even at limited testing (which is hard to define).

But CMFA is pretty much an ongoing PAD check to verify that the person who initially authenticated is still the one in possession of the device. So the question then is whether PAD (or as named for CMFA, signal verification) is actually optional. It doesn't seem like we have any expectation that decisions would be made solely by the CMFA Engine, that most signals would go through some sort of verification (potentially everything could, with the trusted inputs being given a no-check pass to the Engine). So this would imply that the at least the verification part of impersonation would be mandatory, as opposed to optional. Checks during enrolment would seem to actually be optional since it is more about providing providing an ability to "pre-configure" part of the CMFA engine to force enrolment to be done under specific conditions.

So it would seem to me that the Attacker Access needs to be edited to include impersonation during verification through the use of the signal verification step.

n-kai commented 3 years ago

I think that it may be difficult or time consuming for lab to test all sensors to try to spoof them. Instead, PP should require CMFA to use set of sensors that can't be spoofed at the same time by an attacker with basic attack potential (and evaluators verify that it can't be done by basic attack potential referring public available information).

woodbe commented 3 years ago

Points on the call:

woodbe commented 3 years ago

I think this falls under the trust/reliability of the inputs. I do not think we need to specifically define an ESR for this, but that the definition of trust on an input will provide verification for the underlying components.

Determining current confidence should then handle any requirements needed to specify aggregate score data