FIDO Biometric Certification Program

FIDO Alliance
FIDO AllianceFIDO Alliance
All Rights Reserved | FIDO Alliance | Copyright 2018
FIDO Biometric
Certification Program
All Rights Reserved | FIDO Alliance | Copyright 20182
CERTIFICATION GOALS
• Enable implementations to be identified as officially
FIDO certified
• Ensure interoperability between FIDO officially
recognized implementations
• Promote the adoption of the FIDO ecosystem
• Provide RPs with the ability to assess performance
requirements for user authenticators
• Provide the industry at large with a testing baseline
for biometric component performance
FIDO Alliance | All Rights Reserved | Copyright 20183
FIDO CERTIFICATION PURPOSE
The FIDO Biometric Certification
Program is intended to certify biometric
components and/or subsystems and is
independent from Authenticator
Certification Program
All Rights Reserved | FIDO Alliance | Copyright 20184
TESTING STEP 1: BIOMETRIC SUBCOMPONENT
FIDO Alliance | All Rights Reserved | Copyright 20185
ALLOWED INTEGRATION DOCUMENT
• Developed by vendor and submitted to lab
• Used to document changes necessary to accommodate integration with
authenticator
• Must include explanation of software changes which accommodate
hardware changes
All Rights Reserved | FIDO Alliance | Copyright 20186
TESTING STEP 2: AUTHENTICATOR
All Rights Reserved | FIDO Alliance | Copyright 20187
AUTHENTICATOR CERTIFICATION
Using a Certified Biometric Subcomponent:
• Optional for Authenticators using a Biometric at L1-L2.
• The Security Requirements enforce Biometric Certification of the
biometric at L3 and higher when a biometric is used in the
authenticator.
• Once L2+ is finalized Biometric Certification will also be required
• Results in a “FIDO Certified” Authenticator
FIDO Alliance | All Rights Reserved | Copyright 20188
BIOMETRIC DEFINITIONS
• False Accept Rate (FAR): The proportion of verification transactions with
wrongful claims of identity that are incorrectly confirmed
• False Reject Rate (FRR): The proportion of verification transactions with
truthful claims of identity that are incorrectly denied
• Impostor Attack Presentation Match Rate (IAPMR): Proportion of
presentation attacks in which the target reference is matched
FIDO Alliance | All Rights Reserved | Copyright 20189
BIOMETRIC PERFORMANCE LEVELS
• Biometric Requirements:
• False Accept Rate (FAR): SHALL meet the requirement of less than 1:10,000 for the
upper bound of a 80% confidence interval. FAR is measured at the transaction
level.
• False Reject Rate (FRR): SHALL meet the requirement of less than 3:100 for the
upper bound of a 80% confidence interval. FRR is measured at the transaction
level.
• Presentation Attack Detection: SHALL be performed by the FIDO-accredited
independent testing laboratory on the TOE provided by vendor. The evaluation
measures the Impostor Attack Presentation Match Rate for each presentation
attack type, as defined in ISO 30107 Part 3.
NOTE: FIDO-accredited independent testing laboratory performs live subject scenario testing on the TOE provided by vendor
using a combination of on-line/off-line testing, as well as presentation attack testing, based on ISO 19795-1 and ISO 30107-3.
FIDO Alliance | All Rights Reserved | Copyright 201810
SELF-ATTESTATION - OPTIONAL
• Biometric Requirements:
• False Accept Rate (FAR): The vendor SHALL attest to an FAR of [1:25,000 or
1:50,000 or 1:75,000 or 1:100,000] at an FRR of 3% or less.
• False Reject Rate (FRR): The vendor SHALL attest to an FRR at no greater than 3%
as measured when determining the self-attested FAR. In other words, self
attestation for FRR is only possible when self attesting for FAR.
NOTE: Self-attestation for FAR and FRR shall be supported by test data and
documented in a report submitted to lab from vendor.
All Rights Reserved | FIDO Alliance | Copyright 201811
GETTING STARTED – BIOMETRIC CERTIFICATION
Apply for Biometric component certification
• Request an account: https://fidoalliance.org/certification/certification-
account-request/
Select an Accredited Biometric Lab and agree to terms for testing
• Biometric Accredited Lab list:
https://fidoalliance.org/fido-accredited-biometric-laboratories/
Biometric
Testing
Laboratory
Report
Certification
Request
Certification
Issuance
(recommended)
Authenticator
Certification
FIDO Alliance | All Rights Reserved | Copyright 201812
CERTIFICATION PROCESS OVERVIEW
All Rights Reserved | FIDO Alliance | Copyright 201813
Connect with FIDO
fidoalliance.org
1 of 13

Recommended

Orion Context Broker 20220301 by
Orion Context Broker 20220301Orion Context Broker 20220301
Orion Context Broker 20220301Fermin Galan
143 views98 slides
API Security Fundamentals by
API Security FundamentalsAPI Security Fundamentals
API Security FundamentalsJosé Haro Peralta
348 views40 slides
What is self-sovereign identity (SSI)? by
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?Evernym
1.2K views44 slides
Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -... by
Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...
Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...Amazon Web Services
6.4K views47 slides
FIWARE Identity Management and Access Control by
FIWARE Identity Management and Access ControlFIWARE Identity Management and Access Control
FIWARE Identity Management and Access ControlFIWARE
61 views38 slides
FIWARE Training: FIWARE Training: i4Trust Marketplace by
FIWARE Training: FIWARE Training: i4Trust MarketplaceFIWARE Training: FIWARE Training: i4Trust Marketplace
FIWARE Training: FIWARE Training: i4Trust MarketplaceFIWARE
656 views29 slides

More Related Content

What's hot

Stateless authentication with OAuth 2 and JWT - JavaZone 2015 by
Stateless authentication with OAuth 2 and JWT - JavaZone 2015Stateless authentication with OAuth 2 and JWT - JavaZone 2015
Stateless authentication with OAuth 2 and JWT - JavaZone 2015Alvaro Sanchez-Mariscal
28.3K views81 slides
FIWARE Training: Identity Management and Access Control by
FIWARE Training: Identity Management and Access ControlFIWARE Training: Identity Management and Access Control
FIWARE Training: Identity Management and Access ControlFIWARE
111 views39 slides
Fido Technical Overview by
Fido Technical OverviewFido Technical Overview
Fido Technical OverviewFIDO Alliance
1.9K views27 slides
Airodump ng [aircrack-ng] by
Airodump ng [aircrack-ng]Airodump ng [aircrack-ng]
Airodump ng [aircrack-ng]nazrinzaidi
6.5K views6 slides
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで - by
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -Naoto Miyachi
1.7K views56 slides
Session 2 - NGSI-LD primer & Smart Data Models | Train the Trainers Program by
Session 2 - NGSI-LD primer & Smart Data Models | Train the Trainers ProgramSession 2 - NGSI-LD primer & Smart Data Models | Train the Trainers Program
Session 2 - NGSI-LD primer & Smart Data Models | Train the Trainers ProgramFIWARE
301 views75 slides

What's hot(20)

Stateless authentication with OAuth 2 and JWT - JavaZone 2015 by Alvaro Sanchez-Mariscal
Stateless authentication with OAuth 2 and JWT - JavaZone 2015Stateless authentication with OAuth 2 and JWT - JavaZone 2015
Stateless authentication with OAuth 2 and JWT - JavaZone 2015
FIWARE Training: Identity Management and Access Control by FIWARE
FIWARE Training: Identity Management and Access ControlFIWARE Training: Identity Management and Access Control
FIWARE Training: Identity Management and Access Control
FIWARE111 views
Fido Technical Overview by FIDO Alliance
Fido Technical OverviewFido Technical Overview
Fido Technical Overview
FIDO Alliance1.9K views
Airodump ng [aircrack-ng] by nazrinzaidi
Airodump ng [aircrack-ng]Airodump ng [aircrack-ng]
Airodump ng [aircrack-ng]
nazrinzaidi6.5K views
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで - by Naoto Miyachi
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
Naoto Miyachi1.7K views
Session 2 - NGSI-LD primer & Smart Data Models | Train the Trainers Program by FIWARE
Session 2 - NGSI-LD primer & Smart Data Models | Train the Trainers ProgramSession 2 - NGSI-LD primer & Smart Data Models | Train the Trainers Program
Session 2 - NGSI-LD primer & Smart Data Models | Train the Trainers Program
FIWARE301 views
REST API Design & Development by Ashok Pundit
REST API Design & DevelopmentREST API Design & Development
REST API Design & Development
Ashok Pundit1.2K views
Introduction to Self Sovereign Identity - IIW October 2019 by Heather Vescent
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019
Heather Vescent996 views
Api application programming interface by Mohit Bishnoi
Api application programming interfaceApi application programming interface
Api application programming interface
Mohit Bishnoi585 views
OAuth - Don’t Throw the Baby Out with the Bathwater by Apigee | Google Cloud
OAuth - Don’t Throw the Baby Out with the Bathwater OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater
Apigee | Google Cloud13.4K views
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove... by SSIMeetup
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
SSIMeetup11.8K views
FIWARE Training: JSON-LD and NGSI-LD by FIWARE
FIWARE Training: JSON-LD and NGSI-LDFIWARE Training: JSON-LD and NGSI-LD
FIWARE Training: JSON-LD and NGSI-LD
FIWARE609 views
Gateway/APIC security by Shiu-Fun Poon
Gateway/APIC securityGateway/APIC security
Gateway/APIC security
Shiu-Fun Poon1.9K views
Git/Github & Salesforce by Gordon Bockus
Git/Github & Salesforce Git/Github & Salesforce
Git/Github & Salesforce
Gordon Bockus373 views
Draft: building secure applications with keycloak (oidc/jwt) by Abhishek Koserwal
Draft: building secure applications with keycloak (oidc/jwt)Draft: building secure applications with keycloak (oidc/jwt)
Draft: building secure applications with keycloak (oidc/jwt)
Abhishek Koserwal1.3K views

Similar to FIDO Biometric Certification Program

FIDO Certification Program Updates by
FIDO Certification Program UpdatesFIDO Certification Program Updates
FIDO Certification Program UpdatesFIDO Alliance
420 views30 slides
FIDO Certified Program: The Value of Certification by
FIDO Certified Program: The Value of Certification FIDO Certified Program: The Value of Certification
FIDO Certified Program: The Value of Certification FIDO Alliance
1.7K views26 slides
The Value of FIDO Certification by
The Value of FIDO CertificationThe Value of FIDO Certification
The Value of FIDO CertificationFIDO Alliance
77.3K views29 slides
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance by
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO Alliance
2.7K views32 slides
Technical Considerations for Deploying FIDO Authentication by
Technical Considerations for Deploying FIDO Authentication Technical Considerations for Deploying FIDO Authentication
Technical Considerations for Deploying FIDO Authentication FIDO Alliance
1.3K views30 slides
FIDO: The Value of Certification by
FIDO: The Value of CertificationFIDO: The Value of Certification
FIDO: The Value of CertificationFIDO Alliance
446 views29 slides

Similar to FIDO Biometric Certification Program(20)

FIDO Certification Program Updates by FIDO Alliance
FIDO Certification Program UpdatesFIDO Certification Program Updates
FIDO Certification Program Updates
FIDO Alliance420 views
FIDO Certified Program: The Value of Certification by FIDO Alliance
FIDO Certified Program: The Value of Certification FIDO Certified Program: The Value of Certification
FIDO Certified Program: The Value of Certification
FIDO Alliance1.7K views
The Value of FIDO Certification by FIDO Alliance
The Value of FIDO CertificationThe Value of FIDO Certification
The Value of FIDO Certification
FIDO Alliance77.3K views
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance by FIDO Alliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO Alliance2.7K views
Technical Considerations for Deploying FIDO Authentication by FIDO Alliance
Technical Considerations for Deploying FIDO Authentication Technical Considerations for Deploying FIDO Authentication
Technical Considerations for Deploying FIDO Authentication
FIDO Alliance1.3K views
FIDO: The Value of Certification by FIDO Alliance
FIDO: The Value of CertificationFIDO: The Value of Certification
FIDO: The Value of Certification
FIDO Alliance446 views
Overview of FIDO Security Requirements and Certifications by FIDO Alliance
Overview of FIDO Security Requirements and CertificationsOverview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and Certifications
FIDO Alliance1.4K views
Integrating FIDO Authentication & Federation Protocols by FIDO Alliance
Integrating FIDO Authentication & Federation ProtocolsIntegrating FIDO Authentication & Federation Protocols
Integrating FIDO Authentication & Federation Protocols
FIDO Alliance15K views
Beyond Passwords: FIDO & the Future of Consumer Authentication by FIDO Alliance
Beyond Passwords: FIDO & the Future of Consumer AuthenticationBeyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer Authentication
FIDO Alliance762 views
FIDO Authentication Technical Overview by FIDO Alliance
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
FIDO Alliance448 views
FIDO Authentication Technical Overview by FIDO Alliance
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
FIDO Alliance4.1K views
FIDO Specifications Tutorial by FIDO Alliance
FIDO Specifications TutorialFIDO Specifications Tutorial
FIDO Specifications Tutorial
FIDO Alliance1.3K views
FIDO And the Future of User Authentication by FIDO Alliance
FIDO And the Future of User AuthenticationFIDO And the Future of User Authentication
FIDO And the Future of User Authentication
FIDO Alliance1.8K views
Technical Principles of FIDO Authentication by FIDO Alliance
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
FIDO Alliance2.5K views
Technical Principles of FIDO Authentication by FIDO Alliance
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
FIDO Alliance2.6K views
Javelin Research's State of Strong Authentication 2019 Report Webinar by FIDO Alliance
Javelin Research's State of Strong Authentication 2019 Report Webinar Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar
FIDO Alliance5.3K views
FIDO Alliance Vision and Status by FIDO Alliance
FIDO Alliance Vision and StatusFIDO Alliance Vision and Status
FIDO Alliance Vision and Status
FIDO Alliance309 views

More from FIDO Alliance

FIDO Alliance: Welcome and FIDO Update.pptx by
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance
839 views19 slides
IBM: Hey FIDO, Meet Passkey!.pptx by
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxFIDO Alliance
897 views17 slides
OTIS: Our Journey to Passwordless.pptx by
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxFIDO Alliance
591 views13 slides
FIDO Workshop-Demo Breakdown.pptx by
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Alliance
653 views19 slides
CISA: #MoreThanAPassword.pptx by
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxFIDO Alliance
461 views14 slides
FIDO Authentication: Unphishable MFA for All by
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Alliance
512 views20 slides

More from FIDO Alliance(20)

FIDO Alliance: Welcome and FIDO Update.pptx by FIDO Alliance
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance839 views
IBM: Hey FIDO, Meet Passkey!.pptx by FIDO Alliance
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
FIDO Alliance897 views
OTIS: Our Journey to Passwordless.pptx by FIDO Alliance
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
FIDO Alliance591 views
FIDO Workshop-Demo Breakdown.pptx by FIDO Alliance
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
FIDO Alliance653 views
CISA: #MoreThanAPassword.pptx by FIDO Alliance
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
FIDO Alliance461 views
FIDO Authentication: Unphishable MFA for All by FIDO Alliance
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
FIDO Alliance512 views
Introducing FIDO Device Onboard (FDO) by FIDO Alliance
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
FIDO Alliance2.3K views
FIDO Alliance Webinar: Catch Up WIth FIDO by FIDO Alliance
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance1.1K views
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com by FIDO Alliance
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
FIDO Alliance3K views
新しい認証技術FIDOの最新動向 by FIDO Alliance
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
FIDO Alliance1.5K views
日立PBI技術を用いた「デバイスフリーリモートワーク」構想 by FIDO Alliance
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
FIDO Alliance1.3K views
Introduction to FIDO and eIDAS Services by FIDO Alliance
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
FIDO Alliance1.5K views
富士通の生体認証ソリューションと提案 by FIDO Alliance
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
FIDO Alliance1.4K views
テレワーク本格導入におけるID認証考察 by FIDO Alliance
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
FIDO Alliance1.2K views
「開けゴマ!」からYubiKeyへ by FIDO Alliance
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
FIDO Alliance1.3K views
YubiOnが目指す未来 by FIDO Alliance
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来
FIDO Alliance374 views
FIDO2導入してみたを考えてみた by FIDO Alliance
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
FIDO Alliance1.5K views
中小企業によるFIDO導入事例 by FIDO Alliance
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
FIDO Alliance1.3K views
VPNはもう卒業!FIDO2認証で次世代リモートアクセス by FIDO Alliance
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
FIDO Alliance1.7K views
CloudGate UNOで安全便利なパスワードレスリモートワーク by FIDO Alliance
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
FIDO Alliance951 views

Recently uploaded

Ransomware is Knocking your Door_Final.pdf by
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
59 views46 slides
HTTP headers that make your website go faster - devs.gent November 2023 by
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023Thijs Feryn
22 views151 slides
The Research Portal of Catalonia: Growing more (information) & more (services) by
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)CSUC - Consorci de Serveis Universitaris de Catalunya
80 views25 slides
6g - REPORT.pdf by
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdfLiveplex
10 views23 slides
Serverless computing with Google Cloud (2023-24) by
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)wesley chun
11 views33 slides
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院IttrainingIttraining
58 views8 slides

Recently uploaded(20)

HTTP headers that make your website go faster - devs.gent November 2023 by Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn22 views
6g - REPORT.pdf by Liveplex
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdf
Liveplex10 views
Serverless computing with Google Cloud (2023-24) by wesley chun
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)
wesley chun11 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2218 views
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10300 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker40 views
Powerful Google developer tools for immediate impact! (2023-24) by wesley chun
Powerful Google developer tools for immediate impact! (2023-24)Powerful Google developer tools for immediate impact! (2023-24)
Powerful Google developer tools for immediate impact! (2023-24)
wesley chun10 views
Piloting & Scaling Successfully With Microsoft Viva by Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software280 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma39 views

FIDO Biometric Certification Program

  • 1. All Rights Reserved | FIDO Alliance | Copyright 2018 FIDO Biometric Certification Program
  • 2. All Rights Reserved | FIDO Alliance | Copyright 20182 CERTIFICATION GOALS • Enable implementations to be identified as officially FIDO certified • Ensure interoperability between FIDO officially recognized implementations • Promote the adoption of the FIDO ecosystem • Provide RPs with the ability to assess performance requirements for user authenticators • Provide the industry at large with a testing baseline for biometric component performance
  • 3. FIDO Alliance | All Rights Reserved | Copyright 20183 FIDO CERTIFICATION PURPOSE The FIDO Biometric Certification Program is intended to certify biometric components and/or subsystems and is independent from Authenticator Certification Program
  • 4. All Rights Reserved | FIDO Alliance | Copyright 20184 TESTING STEP 1: BIOMETRIC SUBCOMPONENT
  • 5. FIDO Alliance | All Rights Reserved | Copyright 20185 ALLOWED INTEGRATION DOCUMENT • Developed by vendor and submitted to lab • Used to document changes necessary to accommodate integration with authenticator • Must include explanation of software changes which accommodate hardware changes
  • 6. All Rights Reserved | FIDO Alliance | Copyright 20186 TESTING STEP 2: AUTHENTICATOR
  • 7. All Rights Reserved | FIDO Alliance | Copyright 20187 AUTHENTICATOR CERTIFICATION Using a Certified Biometric Subcomponent: • Optional for Authenticators using a Biometric at L1-L2. • The Security Requirements enforce Biometric Certification of the biometric at L3 and higher when a biometric is used in the authenticator. • Once L2+ is finalized Biometric Certification will also be required • Results in a “FIDO Certified” Authenticator
  • 8. FIDO Alliance | All Rights Reserved | Copyright 20188 BIOMETRIC DEFINITIONS • False Accept Rate (FAR): The proportion of verification transactions with wrongful claims of identity that are incorrectly confirmed • False Reject Rate (FRR): The proportion of verification transactions with truthful claims of identity that are incorrectly denied • Impostor Attack Presentation Match Rate (IAPMR): Proportion of presentation attacks in which the target reference is matched
  • 9. FIDO Alliance | All Rights Reserved | Copyright 20189 BIOMETRIC PERFORMANCE LEVELS • Biometric Requirements: • False Accept Rate (FAR): SHALL meet the requirement of less than 1:10,000 for the upper bound of a 80% confidence interval. FAR is measured at the transaction level. • False Reject Rate (FRR): SHALL meet the requirement of less than 3:100 for the upper bound of a 80% confidence interval. FRR is measured at the transaction level. • Presentation Attack Detection: SHALL be performed by the FIDO-accredited independent testing laboratory on the TOE provided by vendor. The evaluation measures the Impostor Attack Presentation Match Rate for each presentation attack type, as defined in ISO 30107 Part 3. NOTE: FIDO-accredited independent testing laboratory performs live subject scenario testing on the TOE provided by vendor using a combination of on-line/off-line testing, as well as presentation attack testing, based on ISO 19795-1 and ISO 30107-3.
  • 10. FIDO Alliance | All Rights Reserved | Copyright 201810 SELF-ATTESTATION - OPTIONAL • Biometric Requirements: • False Accept Rate (FAR): The vendor SHALL attest to an FAR of [1:25,000 or 1:50,000 or 1:75,000 or 1:100,000] at an FRR of 3% or less. • False Reject Rate (FRR): The vendor SHALL attest to an FRR at no greater than 3% as measured when determining the self-attested FAR. In other words, self attestation for FRR is only possible when self attesting for FAR. NOTE: Self-attestation for FAR and FRR shall be supported by test data and documented in a report submitted to lab from vendor.
  • 11. All Rights Reserved | FIDO Alliance | Copyright 201811 GETTING STARTED – BIOMETRIC CERTIFICATION Apply for Biometric component certification • Request an account: https://fidoalliance.org/certification/certification- account-request/ Select an Accredited Biometric Lab and agree to terms for testing • Biometric Accredited Lab list: https://fidoalliance.org/fido-accredited-biometric-laboratories/
  • 13. All Rights Reserved | FIDO Alliance | Copyright 201813 Connect with FIDO fidoalliance.org