hehe..that's funny. I guess I could argue the various ways that biosubsystems, tolerance levels, policy, session keys, comparitive algorithms, sensory techniques based upon blood pressure/pulse, dielectric constant, etc work together, but that would be a rather lengthy email. A trip to the local library or a google search might be a better solution.
> -----Original Message----- > From: Meritt James [mailto:[EMAIL PROTECTED]] > Sent: Wednesday, May 22, 2002 3:14 PM > To: [EMAIL PROTECTED] > Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] > Subject: Re: Biometrics used for Authentication > > > Ah, an effective "self denial of service attack". How clever! > > Ken Pfeil wrote: > > > > Not always. It is entirely possible to fool the reader, but > still have the > > request fail in the biometric subsystem. > > > > > -----Original Message----- > > > From: Meritt James [mailto:[EMAIL PROTECTED]] > > > Sent: Wednesday, May 22, 2002 3:09 PM > > > To: [EMAIL PROTECTED] > > > Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] > > > Subject: Re: Biometrics used for Authentication > > > > > > > > > It is not necessary to fool "the whole package". It is only necessary > > > to fool the weakest part. Which very well may not be the reader. > > > > > > Ken Pfeil wrote: > > > > > > [snip] > > > > > > > Fooling a reader is one thing, fooling the whole package is another. > > > > > > [snip] > > > > > > -- > > > James W. Meritt CISSP, CISA > > > Booz | Allen | Hamilton > > > phone: (410) 684-6566 > > -- > James W. Meritt CISSP, CISA > Booz | Allen | Hamilton > phone: (410) 684-6566