Home
Security Target (ST)
Contents
1. Figure 3 TOE and its connections to the environment from User manual 2 4 2 Logical boundary and features The simplified model of a biometric verification system and its boundaries has been taken from BVMPP Figure 1 and annotated with this TOEs boundaries and internal design structure Management from network Success _Claiened ID Faduro Sensor subsystem TOE Boundary TOE boundary ST Figure 4 TOE logical boundary and subsystems This TOE includes the capture device the fingerprint sensor into its boundary as part of the sensor subsystem Compared to the minimum TOE boundary of the PP this TOE additionally includes the local database holding the user IDs and corresponding fingerprint templates Having the database inside the TOE allows it to perform its functionality without the need of an external database The TOE does allow management access via the network to this database for centralized enrolment and other management tasks This functionality is outside the scope of the evaluation as it is performed over the network a trusted secure interface see objectives for the environment and because the enrolment functionality is also outside the scope of the evaluation The TOE includes auditing functionality which operates stand alone In the networked solution can also be retrieved via the network interface for convenient audit review but this is outside the scope of the evaluation Followin
2. 5 2 4 OE FALLBACK A fall back mechanism for the biometric verification system must be available that reaches at least the same level of security as the biometric verification system does This fall back system can be used in cases where an authorized user is rejected by the biometric verification system False Rejection 5 2 5 OE PHYSICAL The environment must physically protect the TOE and its components against unauthorized access or destruction Only authorized users should have access to the TOE and its public external interfaces the display the keyboard the smartcard reader and the fingerprint sensor Only authorized administrators should have access to the TOE s internals and restricted interfaces as described in OE ENVIRONMENT 5 2 6 OE TRUSTED_USERS It is assumed that the environment protects the TOE sufficiently to prevent an attacker from presenting an imitated finger to the fingerprint sensor or to re use the latent image on the fingerprint sensor surface sufficient to withstand a real attacker up to moderate attack potential who uses a large amount of biometric characteristics and who really wants to get unauthorized access to the portal 5 3 Security objectives rationale The following shows that the complete security problem definition SPD with all threats OSPs and assumptions is covered in the objectives SPD Rationale A ADMINISTRATION OE ADMINISTRATION is a direct one to one implementation of the assump
3. e Clear memory In order to protect against attacks on the raw fingerprint image data of the offered fingerprint the sensor subsystem alone handles this data hence its inclusion in the scope of the sensor module The main subsystem does not access this data on the sensor subsystem After the acquisition of the image extraction and comparator actions the fingerprint image data is therefore not accessible after deallocation Biometric reference data must be stored in the database for use in the system and is therefore exempt of this requirement e Audit Audit events are generated by the main subsystem and stored in its memory It can be read via the management interface and the network interface but this audit reviewing functionality is not in the scope of the evaluation e Capture device the fingerprint sensor is part of the sensor subsystem It captures the fingerprint using a capacitive sensor array as described in the ADV evidence e Database Included in the TOE is the database used by the TOE to store the fingerprint reference of a user together with the user ID Some security related components functions and interfaces of the TOE environment should be considered here outside the scope of the evaluation e Policy management Access control The result of the fingerprint verification process i e the Comparator is passed on to the policy manager of the environment This component is responsible for checking the user s rights and op
4. Not relevant No management possible FIA_AFL 1 actions to be taken in event of an authentication failure Not relevant No management possible FIA_UAU 2 management of authentication data by an administrator Not applicable Note that there are enrolment and user management functions available under the administrator menu and via the network interface but this management is not claimed and outside the scope of this evaluation consistent with the objective for the environment OE ENROLL OE ENVIRONMENT and OE ADMINISTRATION FIA_UAU 2 management of user identities Enrolling creates user identities and deletion of profiles deletes them However this functionality is outside the scope of this evaluation see directly above FIA_UID 2 managing groups of users There are no groups of users except the hardcoded notions of users and administrators described in the FIA_UAU and FIA_UID requirements No management is possible FMT_MOF 1 group of roles There are no groups of roles FMT_MTD 1 managing the group of users that are part of arole There is no group management of this kind in the evaluated functionality Users are assigned implicitly to the user role by enrolling them for biometric verification and for administrator role by setting the password However this functionality is outside the scope of this evaluation see also above FMT_SMR
5. basic detailed not specified assignment other specifically defined auditable events or none Assignment to None of assignment other audit relevant information then refined away completely Also refined PP ST to ST 7 2 2 FDP_RIP 2 Full residual information protection 7 2 2 1 FDP_RIP 2 1 The TSF shall ensure that any previous information content of a resource containing the fingerprint image is made unavailable upon the deallocation of the resource from all objects 7 2 3 FIA_AFL 1 1 Authentication failure handling for users accounts 7 2 3 1 FIA_AFL 1 1 1 The TSF shall detect when 3 unsuccessful authentication attempts occur related to the biometric verification of one or more users 7 2 3 2 FIA_AFL 1 2 1 When the defined number of unsuccessful authentication attempts has been met the TSF shall disable the biometric verification for the corresponding user account for at least 10 minutes and generate an audit event 7 2 4 FIA_AFL 1 2 Authentication failure handling for administrators accounts 7 2 4 1 FIA_AFL 1 1 2 The TSF shall detect when 3 unsuccessful authentication attempts occur related to the authentication of one or more administrators accounts 7 2 4 2 FIA_AFL 1 2 2 When the defined number of unsuccessful authentication attempts has been met the TSF shall disable the verification for the corresponding administrator account for at least 10 minutes and ge
6. unavailable upon the deallocation of the resource from all objects The sensor subsystem holds the relevant resources the biometric parameters of the offered fingerprint The sensor subsystems has functions that indirectly could lead to access this offered fingerprint but only the main subsystem can access this interface see security architecture and design documentation The main subsystem does not call these functions Hence the main subsystem does not access to the relevant resources at all including at deallocation As the main subsystem is the only access to this interface the main subsystem does not perform the functions and the bypass tampering is not possible see security architecture the access to the resources is available after deallocation FIA_AFL 1 1 The TSF shall detect when 3 The main subsystem enforces the access control unsuccessful authentication including the trial limit by storing the current amount attempts occur related to the of unsuccessful authentication attempts with the biometric verification of one or identity and increasing this after an unsuccessful more users attempt Met the TSF shall disable the If the unsuccessful authentication attempts are met or biometric verification for the surpassed the main subsystem will not allow further corresponding user access unless the administrator has allowed access FIA_AFL 1 2 An unsuccessful authentication The administrativ
7. TSF rather a potential usage pattern outside the scope of the evaluation FIA_UAU 2 1 Biometric verification User verification is done by fingerprint verification which is obviously a biometrical verification mechanism Before allowing any other TSF mediated actions Only after successful authentication will the TSF perform the requested action Application note The security relevant error rate for the biometric verification functions is the FAR False Acceptance Rate i e allowing an imposter to enter when he should be rejected The verification is performed in the sensor subsystem The sensor subsystem is configured by the developer to secure Ox51 mode as part of the production In secure Ox51 mode the fingerprint matching has a FAR of at least 1 100 000 UniFinger SFM Series Packet Protocol Manual section Security This by several orders exceeds the FAR of at least 1 100 considered acceptable by the biometrical evaluation methodology BEM table 11 SOF basic is appropriate for enhanced basic attack potential for EAL2 FIA_UAU 2 2 Non biometric verification The password entry is a clear non biometric verification mechanism Before allowing any other TSF mediated actions Only after successful authentication will the TSF perform the requested action as described in User manual Application note The functionality is considered here as a prim
8. a real attacker up to moderate attack potential who uses a large amount of biometric characteristics and who really wants to get unauthorized access to the portal 4 4 Threats 4 4 1 T BRUTEFORCE An attacker may perform a brute force attack in order to get verified by the TOE using the identity of another user In this way the attacker is trying to get access to the assets residing in the environment that should be protected with the support of the TOE This threat considers as threat agent a not really hostile user who just tries to get verified with a wrong claimed identity a few times The motivation of such a user is usually just curiosity He does not need specific knowledge about the TOE to perform this attack 4 4 2 T MODIFY_ASSETS An attacker may try to modify secondary assets like biometric references or other security relevant system configuration data Such attacks could compromise the integrity of the user security attributes resulting in an incorrect result that might give unauthorized access to the portal This threat covers a number of distinct types of attacks e An attacker may attempt to modify the threshold level used by the biometric system to authenticate users If the attacker is able to change the threshold for one or more authorised users the ability to verify the user s will be compromised and he may succeed in gaining access to the portal or an authorised user may be denied entry to the portal e Anattacke
9. generates an audit event which again is available via these administrator interfaces terminal FIA_AFL 1 2 reaching of the The main subsystem detects the reaching of the threshold for threshold disables the access according to the SFR and the creates the audit event unsuccessful J thenticati The audit event is available for review via the attempts and administrator interfaces via the display and via the the actions network e g disabling of a terminal taken subsequent if The administrator can re enable the access using the appropriate main subsystem via the administrator interfaces At this restoration to point the TOE generates an audit event which again is the normal available via these administrator interfaces state e g re enabling of a terminal FIA_ATD 1 No auditable N A events foreseen FIA_UAU 2 1 All use of the At authentication successful or unsuccessful an audit authentication event is generated mechanism The audit event is available for review via the administrator interfaces via the display and via the network FIA_UAU 2 2 All use of the At authentication successful or unsuccessful an audit authentication event is generated mechanism The audit event is available for review via the administrator interfaces via the display and via the network FIA_UAU 5 The result of The biometric authentication is audited as described in each act
10. indicates assignment e Iteration operation are identified with a number inside parentheses e g 1 7 1 1 FAU_GEN 1 Audit data generation 7 1 1 1 FAU_GEN 1 1 The TSF shall be able to generate an audit record of the following auditable events a None b All auditable events for the basic level of audit and c None 7 1 1 2 FAU_GEN 1 2 The TSF shall record within each audit record at least the following information a Date and time of the event type of event subject identity if applicable and the outcome success or failure of the event and b For each audit event type based on the auditable event definitions of the functional components included in the ST Remark to application note on page 27 of BVMPP No additional reactive capabilities are provided by the TOE and accordingly the SFRs are not extended 7 2 FAU_GEN 2 User identity association 7 2 1 1 FAU_GEN 2 1 For audit events resulting from actions of identified users the TSF shall be able to associate each auditable event with the identity of the user that caused the event gt Refinement of Start up and shutdown of the audit functions to make clear that the audit functions cannot actually start or shutdown they are always available hence the audit event never occur This is a stronger requirement then allowing the start up and shutdown of the audit functions therefore it is a valid refinement 3 selection choose one of minimum
11. of enrolled users whereby integrity and authenticity are ensured e The environment ensures a secure communication of security relevant data from and to the TOE e It is assumed that the environment provides a functionality to review the audit information of the TOE and to ensure that only authorized administrators have access to the audit logs e Itis assumed that the TOE environment is free of viruses trojans and malicious software 4 3 4 A FALLBACK It is assumed that a fall back mechanism for the biometric verification system is available that reaches at least the same level of security as the biometric verification system does This fall back system is used in cases where an authorized user is rejected by the biometric verification system False Rejection 4 3 5 A PHYSICAL It is assumed that the environment physically protects the TOE and its components against unauthorized access or destruction Only authorized users have access to the TOE and its public external interfaces the display the keyboard the smartcard reader and the fingerprint sensor Only authorized administrators have access to the TOE s internals and restricted interfaces as described in ALENVIRONMENT 4 3 6 A TRUSTED_USERS It is assumed that the environment protects the TOE sufficiently to prevent an attacker from presenting an imitated finger to the fingerprint sensor or to re use the latent image on the fingerprint sensor surface sufficient to withstand
12. scope for this evaluation as the environment must provide physical protection of that interface OE PHYSICAL logical protection OE ENVIRONMENT and safe usage from the administrators OE ADMINISTRATION Therefore any access from the network side is trusted to be authorized management by the administrators outside the scope of this requirement None All other management functionality both functional and potentially security impacting is under the administrator menu as described directly above FMT_MTD 3 Only secure values for During enrolment the sensor subsystem generates the biometric reference records fingerprint reference used to verify against The sensor subsystem will return a failure to enrol if the value is insecure i e if no fingerprint template can be made that will allow the set FAR to be met FMT_SMF 1 Unlock blocked user or When user is being blocked after 3 unsuccessful administrator account authentication attempts the TOE system access will be blocked Admin can unblock user by re enabling access to system in menu 4 Password Setting where Access Blocked is set to OFF see User guidance If administrator account is being blocked after 3 unsuccessful authentication no possbility to unblocked the access to TOE system manually The main subsytem will unblock the access to TOE system automatically after 10 minutes FIA_AFL 1 Threshold for unsuccessful authentication attempts
13. 1 User TOE administrator The TSF associates the roles with the users by their identification authentication mechanism see FIA_UAU and FIA_UID None N A Application note more complex roles N A there are no more complex roles 9 References Biometric performance testing 19795 ISO IEC 19795 Bi i f i and reporting Part 1 Principles and framework security Evaluation of Biometrics 19792 ISO IEC 19792 S ity Evaluati f Bi i 3rd Committee Draft BEM Biometrics Evaluation Methodology Supplement Version 1 0 August 2002 rotection Profile for Biometric Verification BVMPP P ion Profile for Bi ic Verificati Mechanisms BVMPP version 1 3 2008 08 07 ommon Criteria for Information Technology CC C Criteria for Inf ion Technol Security Evaluation e Part 1 Introduction and general model dated July 2009 version 3 1 R3 e Part 2 Security functional requirements dated July 2009 version 3 1 R3 e Part 3 Security assurance requirements dated July 2009 version 3 1 R3 CEM Common Evaluation Methodology for Information Technology Security Evaluation Methodology dated July 2009 version 3 1 R3
14. 1 ST introduction 1 1 ST reference Title Security Target for E Jari version 4 0 Version V0 24 Date 2010 12 03 Author Neural 1 2 TOE reference The TOE E Jari version 4 0 is identified by the combination of its hardware and its software identifiers The software identifier of the TOE is E Jari version 4 0 The hardware identifier of the TOE is NM4000 The TOE should be verified as follows As shown in the picture at power up the TOE displays the software identifier in the top line of the LCD display The hardware identifier can be found in the top right Both must match to the identifiers above or it is not the evaluated version Figure 1 TOE identifiers 1 3 ST Overview The scope of this Security Target is to describe the functionality of a biometric verification fingerprint system in terms of CC and to define functional and assurance requirements for this system In this context the major scope of a biometric verification system is to verify or reject the claimed identity of a human being using unique characteristics of his body his fingerprint Please note that inside this Security Target the enrolment and the identification process of a biometric system see also the section Description of biometric processes are not considered Chapter TOE boundary gives a more detailed overview about the design of the TOE and its boundaries 2 TOE Overview 2 1 TOE Type and major functio
15. AU 5 defines that the TOE has a different authentication mechanism for administrators beside the biometric verification process e FIA_UAU 7 ensures that no harmful authentication feedback is given to a potential attacker e FIA_UID 2 1 states that the each user has to be identified before performing any action e FMT_MTD 3 assures that only secure values are accepted for TSF data that is used by the biometric verification process 7 4 2 4 O AUTH_ADMIN e FIA_ATD 1 defines the user attributes that are also used for the authentication of an administrator e FIA_UAU 2 2 states that administrators have to be successfully authenticated before performing any action e FIA_UAU 5 defines that the TOE has a different authentication mechanism for administrators beside the biometric verification process e FIA_UID 2 2 states that administrators have to be identified before performing any action 7 4 2 5 O RESIDUAL e This objective is completely covered by FDP_RIP 2 as directly follows 7 4 3 Security Assurance Requirements rationale The assurance level EAL1 has been chosen as it offers the appropriate assurance for the TOE in its market Note that it is not in conformance to BVMPP which requires EAL2 7 5 Dependencies of assurance components The dependencies of the assurance requirements taken from EAL1 are fulfilled automatically 8 TOE Summary Specification 8 1 Implementation of the SFRs The below table is an excerpt of the SFR tracin
16. CD 1 ASE_INT 1 ASE_OBJ 1 ASE_REQ 1 ASE_TSS 1 ATE_IND 1 and AVA_VAN 1 7 4 Security Requirements rationale All open operations in the security requirements have been performed as indicated in the chapter Security Requirements All dependencies had already been satisfied or justified as shown below SFR Dependencies Fulfilled by FAU_GEN 1 FPT_STM 1 See 7 4 1 1 Justification for missing dependencies FAU_GEN 2 FAU_GEN 1 FIA_UID 1 FAU_GEN 1 FIA_UID 1 FDP_RIP 2 z FIA_AFL 1 1 FIA_UAU 1 FIA_UAU 2 1 FIA_AFL 1 2 FIA_UAU 1 FIA_UAU 2 2 FIA_ATD 1 FIA_UAU 2 1 FIA_UID 1 FIA_UID 2 1 Tassignment the authorised identified roles 4 Tassignment additional roles or none FIA_UAU 2 2 FIA_UID 1 FIA_UID 2 2 FIA_UAU 5 FIA_UAU 7 FIA_UAU 1 FIA_UAU 2 FIA_UID 2 1 3 FIA_UID 2 2 FMT_MOF 1 FMT_SMR 1 FMT_SMF 1 FMT_SMR 1 FMT_SMF 1 FMT_MTD 1 FMT_SMR 1 FMT_SMF 1 FMT_SMR 1 FMT_SMF 1 FMT_MTD 3 FMT_MTD 1 FMT_MTD 1 FMT_SMF 1 FMT_SMR 1 FIA_UID 1 FIA_UID 2 1 and FIA_UID 2 2 7 4 1 1 Justification for missing dependencies The functional component FAU_GEN 1 has an identified dependency on FPT_STM 1 This dependency is not satisfied by any TOE functional requirement as the functionality of reliable time stamps is provided by the TOE environment see OE ENVIRONMENT 7 4 2 Security Functional Requirements rationale See below
17. all be authenticated using the biometric verification mechanism FIA_UAU 2 1 e administrators shall be authenticated using the non biometric verification mechanism FIA_UAU 2 2 e None 7 2 9 FIA_UAU 7 Protected authentication feedback 7 2 9 1 FIA_UAU 7 1 The TSF shall provide no messages to the user while the biometric authentication is in progress 7 2 10 FIA_UID 2 1 User identification before any action 7 2 10 1 FIA_UID 2 1 1 For biometric verification the TSF shall require each user to be successfully identified before allowing any other TSF mediated actions on behalf of that user 7 2 11 FIA_UID 2 2 User identification before any action 7 2 11 1 FIA_UID 2 1 2 For non biometric verification the TSF shall require each user to be successfully identified before allowing any other TSF mediated actions on behalf of that user 7 2 12 FMT_MOF 1 Management of security function behaviour 7 2 12 1 FMT_MOF 1 1 The TSF shall restrict the ability to determine the behaviour of disable enable modify the behaviour of the functions assignment list of multiple authentication mechanisms assignment rules describing how the multiple authentication mechanisms provide authentication aa assignment other rules describing how the multiple authentication mechanisms provide authentication or none 8 Tassignment list of feedback Refinement to make the differences between the two identification mechan
18. anage the TOE 5 1 3 O BIO_VERIFICATION The TOE shall provide a biometric verification mechanism to ensure access to a portal with an adequate reliability The TOE shall ensure that only suitable biometric references i e records that have been created by the TOE itself or biometric references coming from a trustworthy source and following a standardised format are processed The TOE shall meet national and or international criteria for its security relevant error rates 5 1 4 O AUTH_ADMIN The TOE shall provide a mechanism to authenticate an administrator with other means than the biometric verification process This authentication process may be realized via a user name password or asmartcard pin based mechanism 5 1 5 O RESIDUAL The TOE shall ensure that no residual or unprotected fingerprint image data remains after operations are completed 5 2 Security objectives for the operational environment The reader is reminded that all the below objectives for environments must be implemented in the environment or the TOE cannot be trusted to protect against the threats or implement the organisational security policies 5 2 1 OE ADMINISTRATION It has to be ensured that the TOE administrator is well trained and non hostile He has to read the guidance documentation carefully completely understand and apply it The TOE administrator shall be responsible to accompany the TOE installation and oversees the biometric system requirements regard
19. and not considered further Proper strength of the complete mechanism against attacks is documented by the developer in the evaluation evidence of the security architecture and assessed by the evaluators during the AVA evaluation activities 5 Security Objectives 5 1 Security Objectives for the TOE 5 1 1 O AUDIT_REACTION The TOE shall ensure that all users can be held accountable for their security relevant actions In this context the TOE shall log all security relevant events and react in order to keep the TOE ina secure state The TOE shall specifically but not exclusively audit and react to e An unusual high amount of unsuccessful verification attempts against the same or different user identities via the biometric authentication mechanism could be caused by a brute force attack In this case the system should block any further verification attempts for a specified time and should inform an administrator e Unsuccessful authentication attempts to one or more administrator account s may be caused by an attack The TOE should lock the authentication mechanism if a configurable number of unsuccessful authentication attempts has been reached In the context of this functionality it is to mind that no feedback information is provided which may assist an impostor in gaining access 5 1 2 O ROLES The TOE shall restrict its management functionality to authenticated and authorised TOE administrators Other users are not allowed to m
20. ary objective of the TOE and fully implemented by the TOE FIA_UAU 5 Biometric verification mechanism The fingerprint verification mechanism delivered by the sensor subsystem is a clear biometrical mechanism Non biometrical mechanism The password mechanism is a clear non biometrical mechanism Users authenticated using biometric verification As described in FIA_ATD 1 verification by fingerprint is the authentication method for the user role Administrators authenticated using the non biometric verification As described in FIA_ATD 1 verification by password is the authentication method for the administrator role None N A FIA_UAU 7 no message to the to the user while a biometric authentication is in progress No feedback is given to the user until the biometric authentication is successful or failed User manual FIA_UID 2 1 For biometric verification user identified In the evaluated configuration the TOE identifies the user by the ID number from the smartcard offered Based on the ID number the user s fingerprint template is retrieved for comparison Successful comparison means successful identification and authorization required for further actions see also FIA_UAU 2 1 FIA_UID 2 2 For non biometric verification user identified The password mechanism used for non biometrical verification of the administrators is bo
21. biometric reference considering possible physiology changes Only an administrator should be allowed to start the enrolment process He has to observe the whole process to ensure a correct enrolment Furthermore the administrator has to ensure that the user claims his correct identity to the system during the enrolment process e Biometric Verification The verification process is the major functionality of a biometric system in context of this PP Its objective is to verify or refuse a claimed identity of a user Therefore the user has to claim an identity to the system The system gets the biometric reference associated with this identity from the database and captures the biometric characteristic of the user If the Biometric Live Record BLR that is extracted from the characteristic and the biometric reference from the database are similar enough the claimed identity of the user is verified Otherwise or if no biometric reference was found for the user the claimed identity is refused The matching component of a biometric system that decides whether a biometric reference and BLR are similar enough usually uses a threshold value for this decision that can be configured by an administrator If the matcher finds that the BLR and the biometric reference are more similar than demanded by the threshold it returns successful verification otherwise failed verification e Biometric Identification The objective of a biometric identification process i
22. c system 37 assignment user security attributes as described in FIA_ATD 1 the role is not configurable This is repeated here for clarity 38 assignment other attributes or none 3 Refinement of TOE administrators the TOE does not allow changes of such parameters or attributes at all only enrollment and deletion of users which is out the scope of the evaluation As the new requirement is more restrictive then the old it is a valid refinement gt assignment list of TSF data 1 Tassignment list of other TSF data or none i assignment list of management functions to be provided by the TSF 3 Tassignment list of other management functions to be provided by the TSF or none With respect to the application note on page 32 of BVMPP the reader is referred to the chapter TOE Summary Specification where for all the suggestions of the application note are also considered under the SFR FMT_FMF 1 7 2 16 FMT_SMR 1 Security roles 7 2 16 1 FMT_SMR 1 1 The TSF shall maintain the roles e user e TOE administrator e none 7 2 16 2 FMT_SMR 1 2 The TSF shall be able to associate users with roles With respect to the application note on page 33 of BVMPP the concepts of users and administrators matches that of the TOE No further restructuring of the roles is useful 7 3 Assurance requirements The TOE conforms to EAL1 which consists of ADV_FSP 1 AGD_OPE 1 AGD_PRE 1 ALC_CMC 1 ALC_CMS 1 ASE_CCL 1 ASE_E
23. e accounts are accessed via a attempts occur related to the password as described in the guidance and FSP User authentication of one or more Manual administrator accounts Met the TSF shall disable the The administrative access is not available for 10 minutes verification for the when the lockout occurs The time is enforced by the corresponding administrator main subsystem going in a loop for 10 minutes locking account for at least 10 minutes out all access administrative and user Application note parallel The password lockout mechanism is enforced in the attacks individual TOEs not in a centralized location The analysis in the security architecture takes this into account and shows the strength against parallel brute force attacks also FIA_ATD 1 User ID A user is identified by his user id Biometric reference Associated to the user id is the fingerprint reference data Role The TSF assigns the role based on the identification method The user role is assigned to users who identified with the biometric verification mechanism The administrator role is assigned to users identifying using the password mechanism Note that the product also allows time based access control which could be used to make a distinction between users for example allowing access only during office hours to normal employees and 24h access to system administrators but this is not considered to be a role distinction of the
24. ee also earlier remarks on OSP ERROR and the TOE overview 7 2 7 FIA_UAU 2 2 User authentication before any action 7 2 7 1 FIA_UAU 2 1 2 For non biometric verification the TSF shall require each user to be successfully authenticated before allowing any other TSF mediated actions on behalf of that user Remark about application note on page 30 of BVMPP This ST follows the same guidelines 17 Tassignment list of other actions 18 r assignment list of actions 1 Refinement of user ID or name the TOE only uses user IDs not user names n Although the TOE does associate roles to users it does so based on the method used for identification authentication the user role is assigned to users successfully authenticated using the biometrical mechanism and the administrator role is assigned to users successfully authenticated using the password mechanism 1 assignment other attributes or none 22 A Refinement 23 Refinement added the FAR explicitly to address the application note The FAR of 1 100 000 is much lower then the rate demanded by OSP ERROR which is 1 100 Refinement 7 2 8 FIA UAU 5 Multiple authentication mechanisms 7 2 8 1 FIA_UAU 5 1 The TSF shall provide e q biometric verification mechanism and e anon biometric verification mechanism to support user authentication 7 2 8 2 FIA_UAU 5 2 The TSF shall authenticate any user s claimed identity according to the following rules e users sh
25. ening the portal if the user has sufficient privileges and was successfully verified by the TOE and is therewith realizing an access control mechanism for the portal A common deployment of the TOE is to have the simple policy that successfully verified users are granted entry by opening the portal i e the door e Portal The physical or logical point beyond which information or assets are protected by a biometric system is controlled by the TOE environment policy management which gets the verification results verification failed or successful related to the user identity from the TOE In the common deployment of the TOE the portal is the electronic lock of a door e Auditing The environment may provide additional audit functionalities and has to provide a mechanism for audit review of the TOE audit logs The developer of the TOE has complementary network software to provide this functionality but this is outside the scope of this evaluation e Transmission Storage The environment cares for a secure communication and storing where security relevant data is transferred to or from the TOE This especially applies to the network connection and the connection to the portal 3 Conformance Claims 3 1 CC Conformance Claims This ST and TOE claim conformance to Version 3 1 R3 of Common Criteria CC This ST and TOE are conformant to part 2 and 3 of CC no extended components have been defined 3 2 PP Conformance Claims This ST and TOE c
26. f the main subsystem the administrators can identify by them using the PIN pad and authenticate by entering the correct PIN themselves Only after successful identification and authentication will the main subsystem allow access to the administration functionality described directly below as Configure This way it is ensured that only authenticated administrators are allowed to configure any of the security relevant settings of the TOE e Configure Using the PIN pad and display of the main subsystem the administrator can set the TOE parameters both security relevant and non security relevant The threshold setting for the comparator component as well as the auditable events are fixed to a secure value to avoid potential mistakes in configuration e Comparator also called Matcher The sensor subsystem compares the enrolled fingerprint reference retrieved via GetRef with the offered fingerprint s feature vector from Extraction The sensor module internally verifies the two within a threshold that provides a False Acceptance Rate FAR of more than 1 100 and provides a fail success value to the main subsystem The main system optionally can perform time based access control but this is not in the scope of the evaluation The result is provided to the environment and an audit event is generated An Exact match comparison does not result in a positive verification as it may be a replay attempt and should be recorded in the audit log
27. for a mapping of the objectives for the TOE to the SFRs 7 4 2 1 0 AUDIT_REACTION e FAU_GEN 1 defines that the TOE has to capture all the events as required by O AUDIT_REACTION and e FAU_GEN 2 ensures that events can be traced back to the identity of a user if the event was caused by a user e FIA_AFL 1 1 ensures that reaching a threshold of unsuccessful authentication attempts for the biometric authentication mechanism is recognized to be a security relevant state e FIA_AFL 1 2 ensures that reaching a threshold of unsuccessful authentication attempts for the authentication mechanism for the administrator is recognized to be a security relevant state 7 4 2 2 O ROLES e FIA_ATD 1 defines that the role of a user is a user attribute e FMT_MOF 1 limits the ability to modify the behaviour of audit functions and other relevant functions to administrators e FMT_MTD 1 restricts the ability to control the relevant settings of the TOE to administrators e FMT_SMF 1 defines that the TOE has to provide some specific management functions to control the security relevant attributes and e FMT_SMR 1 ensures that the TOE maintains roles and that each user can be associated with a role 7 4 2 3 O BIO_VERIFICATION e FIA_ATD 1 defines the user attributes that are also used for the biometric verification e FIA_UAU 2 1 states that each user has to be successfully authenticated by the biometric mechanism before performing any action e FIA_U
28. for potential parallel attacks and balancing this against practical availability 1 per 10 minuts per device is a good balance Remark on the application note on page 29 of BMVPP The TOE can be used in a stand alone situation and a network connected situation In both cases parallel attacks on the either authentication mechanism are possible The minimum of 10 minutes provides sufficient protection Note that the TOE will disable verification for all user accounts when 10 user accounts have been locked requiring the administrator to unlock user verification This is a specific case of the at least 10 minutes lockout and therefore not explicitly defined in the SFR The AVA evaluation activities by the evaluator will verify this is within the attack potential Therefore this application note has been taken into account 7 2 5 FIA_ATD 1 User attribute definition 7 2 5 1 FIA_ATD 1 1 The TSF shall maintain the following list of security attributes belonging to individual users e user ID e biometric reference e role e none 7 2 6 FIA_UAU 2 1 User authentication before any action 7 2 6 1 FIA_UAU 2 1 1 For biometric verification t he TSF shall require each user to be successfully authenticated before allowing any other TSF mediated actions on behalf of that user with a False Acceptance Rate FAR of 1 100 or better Remark about application note on page 29 of BVMPP The FAR has been addressed on the above SFR S
29. fy the assets As the administrators are trusted OE ADMINISTRATION they are not the attackers Therefore attackers cannot change these parameters OSP ERROR O BIO_VERIFICATION describes that the TOE follows the FAR required OSP USERLIMIT O AUDIT_REACTION describes that there are brute force limitations on the biometric and non biometric authentications as further described above in the rationale for T BRUTEFORCE 6 Extended Component definition This ST does not use any extended functional or assurance components 7 Security Requirements This chapter describes the security functional and the assurance requirements which have to be fulfilled by the TOE All are drawn from BVMPP and the operations are indicated relative to that PP using the standard notation method 7 1 Security Functional Requirements for the TOE The following are the Security Functional Requirements for this TOE The notation method of BVMPP is followed The following notations are used e Refinement operation denoted by bold text is used to add details to a requirement and thus further restricts a requirement e Selection operation denoted by underlined text is used to select one or more options provided by the CC in stating a requirement e Assignment operation denoted by italicised text is used to assign a specific value to an unspecified parameter such as the length of a password Showing the value in square brackets
30. g describes the functionality and general design of the TOE with respect to the terms of BVMPP e Get ID The user s claimed identity is retrieved by reading the smartcard offered in the field of the contactless smartcard reader part of the main subsystem Note that product allows entry of the normal user ID via the PIN pad but this is outside the scope of the evaluation The main subsystem also provides the PIN pad display and status LEDs as the user visible interface as well as audio feedback e GetRef The main subsystem is responsible for getting the stored already enrolled fingerprint reference related to a claimed user s identity e Extraction The sensor subsystem extracts the feature vector from the fingerprint sensor image This feature vector allows robust and efficient verification in the checking phase and effectively compressed the large sensor image to a much smaller feature vector e Check The integrity and authenticity of the fingerprint sensor image is ensured by including the sensor into the physical and logical boundary of the TOE The integrity and authenticity of the stored fingerprint reference is also ensured by including the database into the physical and logical boundary of the TOE The quality check on the live fingerprint offered is performed during the sensor module s processing of the fingerprint sensor image Insufficient quality will lead to a rejection in the verification e AuthAdmin Using the PIN pad o
31. g provided in the ADV evaluation evidence and shows per SFR for all the relevant details in the SFR how the TOE meets each of these details This form allows for better performance of the ASE_TSS 1 and ADV tasks at the cost of slightly reduced readability SFR SFR detail Rationale FAU_GEN 1 Start up and shutdown of audit The audit functions are always on and cannot be functions shutdown For auditable events to occur the TOE must be powered on and initialized see also the security architecture description section secure initialization at which point the audit functions are also on as they are performed as part of the operation All auditable events for basic See per auditable event below level of audit FAU_GEN 1 No auditable N A events foreseen FAU_GEN 2 No auditable N A events foreseen FIA_AFL 1 1 reaching of the The main subsystem detects the reaching of the threshold for the unsuccessful authentication attempts and the actions e g disabling of a terminal taken threshold disables the access according to the SFR and creates the audit event The audit event is available for review via the administrator interfaces via the display and via the network subsequent if appropriate restoration to the normal state e g re enabling of a The administrator can re enable the access using the main subsystem via the administrator interfaces At this point the TOE
32. ing the TOE as well as the TOE settings and requirements 5 2 2 OE ENROLMENT The enrolment must already be already performed and therefore the biometric reference for each authorized user is assumed to be given The generated reference is of sufficient quality and is linked to the correct user Additionally it is assumed that all biometric references are stored in a way that ensures the authenticity and integrity of this data 5 2 3 OE ENVIRONMENT The environment must ensure that necessary TOE operating equipment and adequate infrastructure is available e g operating system database LAN public telephone and guardian Specifically the following things must be ensured e The direct environment of the TOE must support the functionality of the biometric system e g integration with the building s physical structure and door locks audit functionality e All environmental factors must be appropriate with respect to the used fingerprint sensor e The TOE environment must provide a database for the biometric reference of enrolled users whereby integrity and authenticity are ensured e The environment must ensure a secure communication of security relevant data from and to the TOE e The environment must provide a functionality to review the audit information of the TOE and to ensure that only authorized administrators have access to the audit logs e The TOE environment must be free of viruses trojans and malicious software
33. isms biometric and non biometric explicit 30 Refinement to make the differences between the two identification mechanisms biometric and non biometric explicit e Audit mechanism e None To no one 7 2 13 FMT_MTD 1 Management of TSF data 7 2 13 1 FMT_MTD 1 1 The TSF shall restrict the ability to change default query modify delete clear the e The FAR e The user security attributes governing the role e none To no one 7 2 14 FMT_MTD 3 Secure TSF data 7 2 14 1 FMT_MTD 3 1 The TSF shall ensure that only secure values are accepted for e biometric reference records e none 7 2 15 FMT_SMF 1 Specification of Management Functions 7 2 15 1 FMT_SMF 1 1 The TSF shall be capable of performing the following management functions e unlock a blocked user or administrator account e none 31 selection determine the behaviour of disable enable modify the behaviour of assignment other functions or none 33 Refinement of TOE administrators the TOE allows no changes to the audit mechanism not even by the TOE administrators As this is a more secure situation this is a valid refinement selection change_default query modify delete clear assignment other operations P assignment other operations or none was assigned none and then refined away for better readability a assignment list of security parameters which control the performance of the biometri
34. ivated mechanism together with the final decision FIA_UAU 2 1 the non biometric as FIA_UAU 2 2 The decision between the two mechanisms is represented in the audit event type In both cases the result of the authentication is audited also FIA_UAU 7 No auditable N A events foreseen FIA_UID 2 1 All use of the The smartcard identity value is audited as part of the user audit event for FIA_UAU 2 1 identification mechanism including the user identity provided FIA_UID 2 2 All use of the The PIN pad entered identity value is audited as part of user the audit event for FIA_UAU 2 2 identification mechanism including the user identity provided FMT_MOF 1 All As stated in the FMT_MOF 1 no changes to the audit modifications mechanism or other behaviours of the functions of the in the TSF are possible hence this audit functionality is behaviour of implemented by not having the cause of the auditable the functions event in the TSF FMT_MTD 1_ All As stated in the FMT_MTD 1 no changes to the TSF modifications data are possible hence this audit functionality is to the values implemented by not having the cause of the auditable of TSF data event FMT_MTD 3 All rejected An insufficient quality fingerprint scan does not have values of TSF any data that can be stored as part of the audit event data after all the sensor subsystem was not able to get the image in the first ti
35. laim no conformance to a PP This ST is based on BVMPP refers to it and its application notes is however not conformant to it the BVMPP additionally has the SFR FPT_RPL 1 and the assurance level EAL2 Note that this is not a composed TOE 3 2 1 TOE Type conformance rationale Not applicable 3 2 2 Security Problem Definition rationale Not applicable 3 2 3 Security Objectives rationale Not applicable 3 3 Further Package Claims This ST and TOE claim conformance to assurance package EAL1 as defined in Common Criteria Part 3 EAL1 consists of ADV_FSP 1 AGD_OPE 1 AGD_PRE 1 ALC_CMC 1 ALC_CMS 1 ASE_CCL 1 ASE_ECD 1 ASE_INT 1 ASE_OBJ 1 ASE_REQ 1 ASE_TSS 1 ATE_IND 1 and AVA_VAN 1 4 Security Problem Definition 4 1 External entities The following external entities interact with the TOE TOE administrator The TOE administrator is authorised to perform the administrative TOE operations and able to use the administrative functions of the TOE The administrator is also responsible for the installation and maintenance of the TOE Depending on the concrete implementation of a TOE there may be more than one administrator and also more than one administrative role User A person who wants access to the portal which is protected by a biometric system Authorised user An enrolled user with an assigned identity Unauthorised user A not enrolled user Attacker An attacker is any individual who is attemp
36. me Hence this audit functionality is implemented by not having the cause of the auditable event FMT_SMF 1 Use of the See FIA_AFL 1 1 management functions FMT_SMR 1 modifications Adding the normal users is done with the enrolment to the group of mechanism out of the evaluated scope by the users that are part of a role BVMPP Removal of users biometric access control is implemented by the main subsystems using the administrative interfaces this results in an audit event There is no management of the administrators only the change of the administrator password This is an auditable event None N A Date and time of the event The main subsystem contains a real time clock that allows tagging of all audit events with the date and time Audit data can be read using the display in administrator mode of via the network interface type of event The type of event is logged also subject identity if applicable The user ID is logged as part of the audit events Outcome success or failure of the event None The outcome is logged as part of the audit events N A FAU_GEN 2 For audit events resulting from actions of identified users the TSF shall be able to associate each auditable event with the identity of the user that caused the event Users are identified by their user ID FDP_RIP 2 Any previous information content of a resource is made
37. nality Consistent with BVMPP this ST describes a biometric fingerprint system that operates ina verification mode only the system verifies whether for a specific user ID the fingerprint offered matches the fingerprint stored for that and only that user commonly referred to as 1 1 matching Biometric Identification commonly referred to as 1 N matching is not addressed by this Security Target Although the product in general can perform biometric identification this is not the evaluated functionality of the TOE Furthermore the enrolment process is out of scope of this Security target and it is assumed that all authorized users have been enrolled Last but not least this biometric fingerprint verification system aims to verify the identity of a user in a group of authorized users for the purpose of controlling access to a portal typically a door inside an environment protected with guards and CCTV Such a portal can be a physical or logical point beyond which information or assets are protected by the biometric system With failed verification the portal stays closed for the user Only after successful verification the portal will be opened Therefore such a portal requires one of two states after biometric verification failed or successful authentication of the user The final decision on the claimed identity of the user resulting from a biometric probabilistic message into a boolean value is considered to be part of the TOE Eve
38. nerate an audit event 7 Refinement to explicitly state the sensitive information to be protected the fingerprint image 8 selection allocation of the resource to deallocation of the resource from Assignment of 3 3 to the acceptable range in an administrator configurable positive within assignment range of acceptable values is refined away to a clear statement that at every 3 unsuccessful authentication attempt this requirement applies 10 selection met surpassed 1 Refinement to clearly integrate the unlocking mechanism For sufficient protection against brute force attacks up to AVA_VAN 2 level administrator account authentication attempts must be rate limited to 1 per 10 seconds Compensating for potential parallel attacks and balancing this against practical availability 1 per 10 minuts per device is a good balance 12 Tassignment list of other actions assignment list of actions Assignment of 3 3 to the acceptable range in an administrator configurable positive within assignment range of acceptable values is refined away to a clear statement that at every 3 unsuccessful authentication attempt this requirement applies Tselection met surpassed 1 Refinement to clearly integrate the unlocking mechanism For sufficient protection against brute force attacks up to AVA_VAN 2 level administrator account authentication attempts must be rate limited to 1 per 10 seconds Compensating
39. r may attempt to modify the biometric authentication data the Biometric Reference Record of an authorised user with the aim of enabling an attacker to masquerade as the authorised user and gain access to the portal Alternatively an authorised user may be denied access to the portal The attacker may be able to insert a new biometric reference containing biometric data belonging to an attacker with the aim of enabling the impostor to gain access to the portal This kind of attack presupposes that the attacker has further knowledge about the TOE and maybe special equipment 4 5 OSPs 4 5 1 OSP ERROR The TOE shall meet recognised national and or international criteria for its security relevant error rates e g False Accept Rate FAR and False Rejection Rate FRR 4 5 2 OSP USERLIMIT Impostors must be prevented from gaining access to the portal by making repeated verification attempts using one or more claimed user IDs Therefore the TOE shall be able to limit the maximum number of unsuccessful verification attempts The ISO standard 19795 defines the FAR FRR and the Common Criteria Biometric Evaluation Manual supplement BEM table 11 defines the acceptable limits The BEM states that the acceptable worst case FAR for SOF Basic i e Enhanced Basic attack potential in CCv3 1 is 1 100 The TOE meets this requirement Other rates are according to the BEM and the author s opinion not relevant for the security of the TOE at hand
40. rything beyond the portal and the control of the portal itself i e which users have access to the portal is out of the scope of the TOE Beside the biometric verification process the system has a mechanism to identify and authenticate an administrator of the system with other means than the biometric mechanism and to limit the access to administrative functions This is used to limit the ability to change security relevant settings of the biometric functionality to an authorized administrator 2 2 Description of biometric processes taken verbatim from BVMPP The core functionality of biometric systems can be divided into three processes e Enrolment Usually the enrolment process is the first contact of a user with a biometric system This process is necessary because a biometric verification system has to learn to verify the identity of each user based on their biometric characteristic During the enrolment process the system captures the biometric characteristic of a user and extracts the features it is working with This feature vector is then combined with the identity of the user to a biometric reference and stored in a database The quality of the biometric reference has to be assured and quality proofed In the case of inadequate biometric characteristics or lower reference quality the person to be enrolled has to repeat the process or is not possible to be enrolled Additionally it is useful to be able to update a user
41. s quite similar to a verification process However in contrast to a verification process there is no claimed identity for the user The system directly captures the biometric characteristic of a user and compares it to all biometric references in the database If at least one biometric reference is found to be similar enough the system returns this as the found and verified identity of the user Biometric identification systems introduce many additional issues in the context of security evaluations The possibility to find more than one biometric reference that matches or the higher error rates of those systems are only two of them 1 As mentioned before Within the PP used it is assumed that the enrolment process for all users has already been performed Please note that the biometric system as defined in this ST only offers a process for biometric verification 2 3 TOE configuration and TOE environment Consistent to BVMPP see there for the generic description The TOE can be used in both stand alone or network integrated solutions with the same configuration of the TOE In both situations the network interface is considered to be trusted by the device and any unauthorized access by physical or logical means should be protected against by the user as described later in the objectives for the environment The network interface allows centralized enrolment but enrolment functionality is outside the scope of evaluation The TOE contain
42. s the fingerprint sensor needed to acquire the fingerprint For the sensor to operate reliably the TOE must be installed in a way that it is sheltered from the weather Besides the environment conditions the TOE requires power and a physical protection for it to operate according to the claimed functionality For the exact requirements the reader is referred to the installation manual 2 4 TOE boundary 2 4 1 Physical boundary and features The TOE physically consists out of e Hardware and firmware NM4000 including the firmware See TOE Reference for exact list and the unique reference e Software None server software for network connected situation is out of scope for the evaluation e Guidance o Installation manual o User manual Network Speaker 6 0 Power Indicater LCD Fingerprint Sensor Keypad Network Port Connectors Back Figure 2 Physical scope and interfaces from User manual The TOE is able to run stand alone for which it needs to be connected physically to the environment for power and output of the result typically by opening an electronic lock In the optional network connected situation the TOE additionally needs to be connected to the network for the network features to work The following figure shows the typical physical deployment of the TOE and its connections Spin Rei ay ri 12VOC 7Ah e Bacup Battery EM com gt O Oya i CLEC TROMAGIETIC LOCK
43. th the identification and the authentication mechanism Only after successful identification and authorization required for further actions see also FIA_UAU 2 2 FMT_MOF 1 Restrict audit mechanism The audit mechanism cannot be disabled or enabled nor can its behaviour be modified the TOE simply does not offer these functions not even to the administrators The audit data can be observed and deleted function 6 under the administrator menu see User guidance but only to the administrators Note that the administrator can also change the network settings and could potentially set it to non functional parameters However the administrators are trusted OE ADMINISTRATION and the logging facility to the central network is not a claimed security functionality FMT_MTD 1 Restrict ability to security parameters which control the biometric system Configuration of the biometrical parameters such as FAR and FRR is not possible at all there simply is no interface so this is also not possible to the administrators Restrict ability to User security attributes There are no ways to change the user security attributes except for the enrolment and deletion of users which is functionality that is out of scope Note that all the management functions accessed on the TOE are restricted to the administrator see FIA_UAU 2 2 FIA_UID 2 2 Management via the network interface is considered out of
44. ting to subvert the operation of the biometric system The intention may be to gain unauthorized access to the assets protected by the portal 4 2 Assets The following assets are defined 4 2 1 Primary assets The primary assets which are protected against unauthorised access do not belong to the TOE itself The portal in the environment permits access only after successful authentication as a result of the biometric verification The primary assets either physical or logical systems are behind that portal 4 2 2 Secondary assets Assets i e TSF data which are generated by the TOE itself e g passwords to protect security relevant TOE settings and biometric references are e Biometric Reference Record BRR This object includes the enrolled biometric data linked with the identity of a user It is produced during the enrolment process and assumed to be given and quality checked e Biometric Live Record BLR This record includes the live actual biometric data actual biometric characteristic and claimed user identity to be verified against the biometric reference e The claimed identity of a user e Security relevant system configuration data This type of assets specifically includes the threshold level that is used by the TOE for the authentication of users e User related security attributes and authentication data for non biometric authentication 4 3 Assumptions The reader is reminded that all the below assumptions m
45. tion A ENROLMENT OE ENROLMENT is a direct one to one implementation of the assumption A ENVIRONMENT OE ENVIRONMENT is a direct one to one implementation of the assumption A FALLBACK OE FALLBACK is a direct one to one implementation of the assumption A PHYSICAL OE PHYSICAL is a direct one to one implementation of the assumption A TRUSTED_USERS OE TRUSTED_USERS is a direct one to one implementation of the assumption T BRUTEFORCE O AUDIT_REACTION describes that the TOE detects and reacts to brute force attacks for biometric authentications for users at thresholds offering sufficient protection considering the false acceptance rates FAR described in the O BIO_VERIFICATION Attacking via the residual finger print data temporarily stored in the fingerprint sensor would allow better than brute force attacks so the TOE is must protect this information too The environment keeps attackers from the TOE OE PHYSICAL and the users are not attackers either OE TRUSTED_USERS Still access to the residual finger print data could be possible and must be protected against O RESIDUAL O AUDIT_REACTION also describes that the TOE detects and reacts to brute force attacks for the non biometric authentication for administrators T MODIFY_ASSETS O ROLES describes that the TOE distinguishes between users and administrators O AUTH_ADMIN describes that only the administrators can modi
46. ust hold or the TOE cannot be trusted to protect against the threats or implement the organisational security policies 4 3 1 A ADMINISTRATION The TOE administrator is well trained and non hostile He reads the guidance documentation carefully completely understands and applies it The TOE administrator is responsible to accompany the TOE installation and oversees the biometric system requirements regarding the TOE as well as the TOE settings and requirements 4 3 2 A LENROLMENT The enrolment is assumed to be already performed and therefore the biometric reference for each authorized user is assumed to be given The generated reference is of sufficient quality and is linked to the correct user Additionally it is assumed that all biometric references are stored in a way that ensures the authenticity and integrity of this data 4 3 3 A LENVIRONMENT It is assumed that necessary TOE operating equipment and adequate infrastructure is available e g operating system database LAN public telephone and guardian Specifically the following things are assumed e It is assumed that the direct environment of the TOE supports the functionality of the biometric system e g integration with the building s physical structure and door locks audit functionality e It is assumed that all environmental factors are appropriate with respect to the used fingerprint sensor e The TOE environment provides a database for the biometric reference
Download Pdf Manuals
Related Search
Related Contents
shRNA expression Cloning Kit Genius GS-850 Samsung NV3 Brugervejledning User`s Manual - Extech Instruments User Guide - Performance Audio 取扱説明書 - e Alpine TDM-7582 Car Stereo System User Manual SERVICE MANUAL - Komatsu Forklift USA, Inc. v3.1 Copyright © All rights reserved.
Failed to retrieve file