Dear customers, all orders for hardcopy versions will be sent on 6th January 2026, we wish you a Merry Christmas and a Happy New Year

PRICES include / exclude VAT
>BSI Standards >35 INFORMATION TECHNOLOGY. OFFICE MACHINES>35.240 Applications of information technology>35.240.15 Identification cards and related devices>BS ISO/IEC 30107-4:2020 Information technology. Biometric presentation attack detection Profile for testing of mobile devices
Not available online - contact us!
immediate downloadReleased: 2020-06-17
BS ISO/IEC 30107-4:2020 Information technology. Biometric presentation attack detection Profile for testing of mobile devices

BS ISO/IEC 30107-4:2020

Information technology. Biometric presentation attack detection Profile for testing of mobile devices

CURRENCY
180 EUR
Standard number:BS ISO/IEC 30107-4:2020
Pages:22
Released:2020-06-17
ISBN:978 0 539 02159 2
Status:Standard
DESCRIPTION

BS ISO/IEC 30107-4:2020


This standard BS ISO/IEC 30107-4:2020 Information technology. Biometric presentation attack detection is classified in these ICS categories:
  • 35.240.15 Identification cards. Chip cards. Biometrics

This document is a profile that provides requirements for testing biometric presentation attack detection (PAD) mechanisms on mobile devices with local biometric recognition.

This document lists requirements from ISO/IEC 30107-3 specific to mobile devices. It also establishes new requirements not present in ISO/IEC 30107-3. For each requirement, the profile defines an Approach in Presentation Attack Detection (PAD) Testing for Mobile Devices. For some requirements, numerical values or ranges are provided in the form of best practices.

This profile is applicable to mobile devices that operate as closed systems with no access to internal results, including mobile devices with local biometric recognition as well as biometric modules for mobile devices.

Out of the scope of this document are the following:

  1. mobile devices solely with remote biometric recognition.

The attacks considered in this document take place at the sensor during the presentation and collection of the biometric characteristics. Any other attacks are outside the scope of this document.