Research Article
Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?
Table 4
Transaction policies for verification for each mobile device. Policies are given by the manufacturer and cannot be changed by the evaluator.
| Mobile device | Allowed failed attempts | Policy |
| MD1 | 5 | Waits for 30 seconds, can do attack again | MD2 | 3 | Asks for PIN | MD3 | 5 | Waits for 30 seconds, can do attack again | MD4 | 5 | Waits for 30 seconds, can do attack again | MD5 | 5 | Waits for 30 seconds, can do attack again |
|
|