Security Evaluation for Biometric Verification Product Part 2

※For the part 1, please refer to here. II. Efforts Toward Security Evaluation Using CC Various approaches to security evaluation of biometric verification products have been made up to now. The author reports on these efforts and the current situation twice, last time and this time. This time, he reports various overseas and domestic efforts related to security evaluation using CC. 1. Efforts in each country and ISO / IEC 19792 It was Great Britain that first tackled a PP development in the field of biometrics. The draft in 2001 can still be referenced on the Internet, but is incomplete.U.S. Government Biometric Verification Mode Protection Profiles were developed for Basic […]

Security Evaluation for Biometric Verification Product Part 1

I. Security Evaluation Using CC Various approaches to security evaluation of biometric verification products have been made up to now. The author reports on these efforts and current situation twice. This time security evaluation, especially the one using CC (Common Criteria) is reported. 1. Requirements for security evaluation Security evaluation is to evaluate the security of a product. The evaluation result depends on the evaluator who evaluates it. Evaluators are classified into three: product developers themselves, product procurers, and independent third parties. Evaluation by product developers has the least objectivity and evaluation by product procurers is difficult to reuse by other procurers. Evaluation by independent third parties is the most […]