Xiaomi Pocophone F1 128Gb+6Gb Dual LTE Руководство по эксплуатации онлайн [114/118] 775101

Xiaomi Pocophone F1 128Gb+6Gb Dual LTE Руководство по эксплуатации онлайн [114/118] 775101
[C-3-3] MUST not replace any of the existing authentication methods (PIN,pattern,
password) implemented and provided in AOSP.
[C-3-4] MUST be disabled when the Device Policy Controller (DPC) application has set the
password quality policy via the DevicePolicyManager.setPasswordQuality() method with a more
restrictive quality constant than PASSWORD_QUALITY_SOMETHING .
If device implementations add or modify the authentication methods to unlock the lock screen if
based on a physical token or the location, then for such an authentication method to be treated as a
secure way to lock the screen, they:
[C-4-1] MUST have a fall-back mechanism to use one of the primary authentication
methods which is based on a known secret and meets the requirements to be treated as a
secure lock screen.
[C-4-2] MUST be disabled and only allow the primary authentication to unlock the screen
when the Device Policy Controller (DPC) application has set the policy with either the
DevicePolicyManager.setKeyguardDisabledFeatures(KEYGUARD_DISABLE_TRUST_AGENTS)
method or the DevicePolicyManager.setPasswordQuality() method with a more restrictive quality
constant than PASSWORD_QUALITY_UNSPECIFIED .
[C-4-3] The user MUST be challenged for the primary authentication (e.g.PIN, pattern,
password) at least once every 72 hours or less.
If device implementations add or modify the authentication methods to unlock the lock screen based
on biometrics, then for such an authentication method to be treated as a secure way to lock the
screen, they:
[C-5-1] MUST have a fall-back mechanism to use one of the primary authentication
methods which is based on a known secret and meets the requirements to be treated as a
secure lock screen.
[C-5-2] MUST be disabled and only allow the primary authentication to unlock the screen
when the Device Policy Controller (DPC) application has set the keguard feature policy by
calling the method
DevicePolicyManager.setKeyguardDisabledFeatures(KEYGUARD_DISABLE_FINGERPRINT) .
[C-5-3] MUST have a false acceptance rate that is equal or stronger than what is required
for a fingerprint sensor as described in section 7.3.10, or otherwise MUST be disabled and
only allow the primary authentication to unlock the screen when the Device Policy
Controller (DPC) application has set the password quality policy via the
DevicePolicyManager.setPasswordQuality() method with a more restrictive quality constant than
PASSWORD_QUALITY_BIOMETRIC_WEAK .
[C-5-4] The user MUST be challenged for the primary authentication (e.g.PIN, pattern,
password) at least once every 72 hours or less.
If device implementations add or modify the authentication methods to unlock the lock screen and if
such an authentication method will be used to unlock the keyguard, but will not be treated as a
secure lock screen, then they:
[C-6-1] MUST return false for both the KeyguardManager.isKeyguardSecure() and the
KeyguardManager.isDeviceSecure() methods.
[C-6-2] MUST be disabled when the Device Policy Controller (DPC) application has set the
password quality policy via the DevicePolicyManager.setPasswordQuality() method with a more
restrictive quality constant than PASSWORD_QUALITY_UNSPECIFIED .
[C-6-3] MUST NOT reset the password expiration timers set by
DevicePolicyManager.setPasswordExpirationTimeout() .
[C-6-4] MUST NOT authenticate access to keystores if the application has called
Page 114 of 118

Содержание

Похожие устройства

Скачать