Research Article

Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

Table 4

Transaction policies for verification for each mobile device. Policies are given by the manufacturer and cannot be changed by the evaluator.

Mobile deviceAllowed failed attemptsPolicy

MD15Waits for 30 seconds, can do attack again
MD23Asks for PIN
MD35Waits for 30 seconds, can do attack again
MD45Waits for 30 seconds, can do attack again
MD55Waits for 30 seconds, can do attack again