Down-link (reader/card) threats
D1. (S1/S2) Modification of authentication decision.
D2. (S3/S4) Interception of fingerprint features.
D3. (S3/S4) Manipulation of fingerprint features.
Possible countermeasures: encryption (D2) and MAC (D1 & D3).
Previous slide
Next slide
Back to first slide
View graphic version