Page Summary
-
MatcherProtectionTypes defines methods used by an authenticator to protect the matcher performing user verification.
-
Possible matcher protection types include running on the chip, in software, or within a Trusted Execution Environment (TEE).
-
These protection types are mutually exclusive in authenticator metadata.
The method used by the authenticator to protect the matcher that performs user verification. Available values are defined in Section 3.3 Matcher Protection Types.
Constant Summary
| short | MATCHER_PROTECTION_ON_CHIP | This flag should be set if the authenticator's matcher is running on the chip. |
| short | MATCHER_PROTECTION_SOFTWARE | This flag must be set if the authenticator's matcher is running in software. |
| short | MATCHER_PROTECTION_TEE | This flag should be set if the authenticator's matcher is running inside the Trusted Execution Environment. |
Inherited Method Summary
Constants
public static final short MATCHER_PROTECTION_ON_CHIP
This flag should be set if the authenticator's matcher is running on the chip. Mutually exclusive in authenticator metadata with MATCHER_PROTECTION_TEE, MATCHER_PROTECTION_SOFTWARE.
public static final short MATCHER_PROTECTION_SOFTWARE
This flag must be set if the authenticator's matcher is running in software. Exclusive in authenticator metadata with MATCHER_PROTECTION_TEE, MATCHER_PROTECTION_ON_CHIP.
public static final short MATCHER_PROTECTION_TEE
This flag should be set if the authenticator's matcher is running inside the Trusted Execution Environment. Mutually exclusive in authenticator metadata with MATCHER_PROTECTION_SOFTWARE, MATCHER_PROTECTION_ON_CHIP.