Overview

active imposter acceptance


Show Summary Details

Quick Reference

This occurs when someone fools a biometric security system, for example by taking a fingerprint of a user and bypassing the entry mechanism that processes that fingerprint.

Subjects: Computing.


Reference entries

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.