{"id":515220,"date":"2024-11-05T14:34:09","date_gmt":"2024-11-05T14:34:09","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/can-csa-iso-iec-30107-318\/"},"modified":"2024-11-05T14:34:09","modified_gmt":"2024-11-05T14:34:09","slug":"can-csa-iso-iec-30107-318","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/csa\/can-csa-iso-iec-30107-318\/","title":{"rendered":"CAN\/CSA-ISO\/IEC 30107-3:18"},"content":{"rendered":"

CSA Preface<\/strong><\/p>\n

<\/p>\n

Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO\/IEC Joint Technical Committee 1 on Information Technology (ISO\/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).<\/p>\n

<\/p>\n

Scope<\/strong><\/p>\n

<\/p>\n

This document establishes:<\/p>\n

<\/p>\n

\u2014 principles and methods for performance assessment of presentation attack detection mechanisms;<\/p>\n

<\/p>\n

\u2014 reporting of testing results from evaluations of presentation attack detection mechanisms;<\/p>\n

<\/p>\n

\u2014 a classification of known attack types (in an informative annex).<\/p>\n

<\/p>\n

Outside the scope are:<\/p>\n

<\/p>\n

\u2014 standardization of specific PAD mechanisms;<\/p>\n

<\/p>\n

\u2014 detailed information about countermeasures (i.e. anti-spoofing techniques), algorithms, or sensors;<\/p>\n

<\/p>\n

\u2014 overall system-level security or vulnerability assessment.<\/p>\n

<\/p>\n

The attacks considered in this document take place at the sensor during presentation. Any other attacks are considered outside the scope of this document.<\/p>\n","protected":false},"excerpt":{"rendered":"

Information technology \u2014 Biometric presentation attack detection \u2014 Part 3: Testing and reporting<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
CSA<\/b><\/a><\/td>\n2018<\/td>\n53<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":515232,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[693,2674],"product_tag":[],"class_list":{"0":"post-515220","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-240-15","7":"product_cat-csa","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/515220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/515232"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=515220"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=515220"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=515220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}