Biometrics for public sector applications
|
|
|
- Norma Greene
- 10 years ago
- Views:
Transcription
1 Technical Guideline TR Biometrics for public sector applications Part 1: Framework Version 3.0
2 Bundesamt für Sicherheit in der Informationstechnik Postfach , Bonn, Germany Internet: Bundesamt für Sicherheit in der Informationstechnik 2013
3 Index of contents Index of contents 1 Introduction Motivation and Objectives of Technical Guideline Biometrics Fundamentals of this Guideline Target Audience and User Terminology Structure of TR Biometrics How to use this Technical Guideline Application Profiles Function Modules Organisation of the Function Modules Function Module classes List of abbreviations Bibliography...16 List of tables Table 5-1: Function module classes...11 List of figures Figure 3-1: Overview of the Technical Guidelines...7 Bundesamt für Sicherheit in der Informationstechnik 3
4 Inhaltsverzeichnis 1 Introduction 1.1 Motivation and Objectives of Technical Guideline Biometrics Biometric methods are used in many different areas of applications. The solutions and systems available on the market are able to serve a broad range regarding performance, security, usability and standard conformance. For public sector applications, it is necessary to define precise requirements and general conditions. Furthermore, the systems have to be defined in a way which allows for extension in future developments. The objective of this Technical Guideline (TR Biometrics) is to offer a basis for a consistent and comparable quality of public sector applications and for building a common architecture. This guideline has the following objectives: Specification of standardised quality requirements for various kinds of biometric applications, definition of standardised security requirements, support for procurement processes of the public sector, establishment of guidelines across applications (specification of requirements from enrolment to verification or identification), design of a simple and well-structured software architecture with defined interfaces to avoid proprietary systems and to establish investment security, flexibility and interoperability, establishment of a certification scheme for conformance testing, integration into the international context by adoption of established standards. 1.2 Fundamentals of this Guideline The fundamental concepts of this guideline are: Modularity The complete guideline is built from several single guideline modules. For a single application area only the respective modules have to be taken into account. This is done in order to avoid side effects between different kinds of applications which would occur due to changes of special functions. Clarity The concept of this guideline follows a well structured framework. With this framework it is easily understandable which kind of guideline modules are valid for the respective application scenario. Expandability Modularity is the key component of expandability in the scope of this guideline. This is valid regarding new applications as well as new functional units. 4 Bundesamt für Sicherheit in der Informationstechnik
5 Introduction Standard conformance The Technical Guideline takes national and international standards and guidelines into account and deploys them for governmental applications. Conformance and certification The guideline modules are designed in such a way that requirements and conditions for single functional units are clearly separated from each other. Products for single functional units are clearly defined regarding the interfaces and the range of their functionality so that they can be tested for conformance with this guideline and certified. Ability to reference The use of functional units allows to specify precise requirements for products that are used in according application scenarios. Therefore, this guideline can be used as a reference e.g. for tenders. Market orientation The definition of functional units is related to the products that can be found on the market. Requirements of the guideline can be unambiguously assigned to the respective systems and components. It should be noted that the content of this guideline is limited to the aspects of biometrics. Interfaces to further technologies (e.g. connection of optical or electronic document readers) are out of scope of this document. 1.3 Target Audience and User Audience for this guideline are institutions that are dealing with projects using biometrics in public sector applications. These include: Agencies that are issuing identity documents or visas, e.g. passport agencies of the local authorities or missions abroad of the Federal Foreign Office. Public Authorities using biometric applications for identity verification of people, e.g. the German Federal Police (Polizeien des Bundes) or the Police of the Federal States (Polizeien der Länder), the German Customs Administration (Bundeszollverwaltung) or the Federal Administrative Office (Bundesverwaltungsamt). Beside these users, this guideline also addresses vendors of biometric systems as well as integrators and application developers. 1.4 Terminology The key words MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL in this technical guideline are to be interpreted as described in [RFC2119]. Bundesamt für Sicherheit in der Informationstechnik 5
6 Inhaltsverzeichnis 2 Structure of TR Biometrics The TR Biometrics consists of the following several parts: Part 1: Framework (TR ) TR is the framework document of the guideline. It explains the concept and the relation between the different parts. Part 2: Software Architecture (TR ) In the second part of this guideline at first the Software Architecture based on the BioAPI standard (ISO/IEC ) is defined. Part 3: Application Profiles and Function Modules (TR ) In the third part, the different Applications Profiles with corresponding Function Modules are defined. These contain the detailed technical requirements for each of the components. For practical purposes, this part is split up in different volumes to serve different user groups. Additionally, the technical guideline BSI-TR Conformance Test Specification for Technical Guideline TR Biometrics for Public Sector Applications describes the requirements that are essential to declare conformance or to declare the absence of conformance. It consists of the following parts: Part 1: Framework (TR ) Part 2: Software Architecture BioAPI Conformance Testing (TR ) Part 3: Test Cases for Function Modules (TR ). 6 Bundesamt für Sicherheit in der Informationstechnik
7 3 How to use this Technical Guideline How to use this Technical Guideline This chapter gives a short overview how to read and apply this guideline step by step. Figure 3-1: Overview of the Technical Guidelines 1. The user chooses the desired Application Profile. With the help of the Application Profile the user can get a deeper insight into the application, the required software architecture components and the described functionality. TR offers further information about the software architecture component model. 2. Based on the Application Profile, the mandatory Function Modules are identified. One profile can link to several Function Modules due to different kinds of underlying biometric characteristics or the fact that different technologies (e.g. scanners or digital cameras for the digitisation of a photo) are used. Function Modules are referenced by an explicit identifier, e.g. P-FP-GID. The first part identifies the Function Module (e.g. Process), the second part represents the biometric characteristic (e.g. fingerprint), and the last part denotes a further descriptor, typically the scope (e.g. German Identity Document). Function Modules for different biometric characteristics are divided by a comma while a choice between different technologies is denoted by a slash (e.g. AH-FP-FTR, AH-PH-FBS/AH-PH- DC). Bundesamt für Sicherheit in der Informationstechnik 7
8 Inhaltsverzeichnis 3. On the basis of the identifier the according Function Module can be examined. Every Function Module provides detailed technical requirements and recommendations. 8 Bundesamt für Sicherheit in der Informationstechnik
9 Application Profiles 4 Application Profiles Different areas in which this guideline can be used are defined in separate Application Profiles. Application Profiles can have mandatory status, e.g. through published regulations and laws or by requirements given in tenders. Besides, such Application Profiles can also be considered as Best Practices. An Application Profile is described with the following items: Introduction (legal requirements) Process overview Target audience Users Technology suppliers Software Architecture Overview Relevant standards and conditions List of mandatory Function Modules Bundesamt für Sicherheit in der Informationstechnik 9
10 Inhaltsverzeichnis 5 Function Modules 5.1 Organisation of the Function Modules Specific technical requirements are structured in Function Modules. They contain detailed technical requirements for the respective component. Function Modules are aligned to the products on the market and to the targets of evaluation. Every Function Module is built of one or more sub-clauses which are assigned to unique identifiers. Within the sub-clauses requirements and recommendations are specified in detail. 5.2 Function Module classes Table 5-1 gives an overview of the different Function Module classes. Function Module class Process Acquisition Hardware Acquisition Software Biometric Image Processing Quality Assurance Compression Description The module Process describes the modality of how the different Function Modules have to be called and combined in order to achieve the objective of the Application Profile. Any deviant call of modules is specified with additional information. Devices that are used for digitising physical representable biometric characteristics are called acquisition hardware. Scanners for capturing photographs, digital cameras to capture facial images, fingerprint sensors, or signature tablets can be named as examples. Acquisition Software encapsulates all functionality regarding image processing except for biometric purposes. Therefore, this module usually contains device driver software for the Acquisition Hardware or in general software that is very close to the physical hardware. Furthermore, colour management and image enhancement mechanisms are often part of this software layer. The module Biometric Image Processing provides the extraction of all relevant biometric information from the data, which is provided by the Acquisition Hardware or the Acquisition Software layer. Thus, a proprietary data block is transformed to a digital image of a biometric characteristic. In general, specific image processing for biometrics is addressed here e.g. provision of full frontal images or segmentation of fingerprints. This module contains all kinds of mechanisms and procedures to check the quality of the biometric data or to select the best quality data out of multiple instances. Quality assurance is typically used in evaluation of an application's performance over time.. The objective of the module Compression is to keep the biometric data below a 10 Bundesamt für Sicherheit in der Informationstechnik
11 Function Modules feasible size without losing too much quality for a biometric verification or identification. Operation Within the module Operation, the working process is specified for the respective operator. User Interface The User Interface modules give requirements on visualization and user interaction. This encloses, among other things, functionality, quality assurance information, and veto messages. Reference Storage Biometric Comparison Logging Coding Evaluation The objective of this module is to store biometric data in a way that it can be used for reference purposes later on. The module Biometric Comparison encloses the mechanisms and algorithms to verify or identify an identity based on a one-to-one or one-to-many biometric comparison between reference data and a current biometric sample (usually a live presented image) no matter where the reference is stored. The module Logging contains requirements how and in which modality data has to be logged. This module contains the procedures to code logging data as well as biometric data in defined formats. Interoperability is provided by means of standard compliant coding. Methods and interfaces which are used in the scope of evaluation are the content of this module. Table 5-1: Function module classes Bundesamt für Sicherheit in der Informationstechnik 11
12
13 List of abbreviations 6 6 List of abbreviations Abbreviation Description ACQ AD AFIS AH ANSI AP APP AS BEA BioAPI BioSFPI BioSPI BIP BMS Acquisition Acquisition Device Automated Fingerprint Identification System Acquisition Hardware American National Standards Institute Application Profile Application Acquisition Software Biometric Evaluation Authority Biometric Application Programming Interface Biometric Sensor Function Provider Interface BioAPI Service Provider Interface Biometric Image Processing Biometric Matching System BMP Windows Bitmap version 3 BSI BFP BSFP BSP CMP COD Bundesamt für Sicherheit in der Informationstechnik (Federal Office for Information Security) Biometric Function Provider Biometric Sensor Function Provider Biometric Service Provider Biometric Comparison Coding Bundesamt für Sicherheit in der Informationstechnik 13
14 6 List of abbreviations COM CRM CTS DC DET eid epass EU EVA FAR FBS FM FMR FNMR FP FRR FTR GID ICAO ID JPG Compression Cross-matching Conformance test suite Digital camera Detection error trade-off Electronic identity document Electronic passport European Union Evaluation False accept rate Flat bed scanner Function Module False match rate False non-match rate Fingerprint False reject rate Frustrated total reflection German Identity Document International Civil Aviation Organization Identity JPEG JP2 JPEG 2000 LOG MF Logging Multi finger 14 Bundesamt für Sicherheit in der Informationstechnik
15 List of abbreviations 6 NCA NIST O P PG PH PT QA REF SB SDK SF TC TR UI VAPP VBIC VEIC VIC VID VIS WSQ WSQR National Central Authority National Institute of Standards and Technology Operation Process Photo Guideline ("Fotomustertafel ) Photo Photo Template ("Lichtbildschablone ) Quality Assurance Reference Storage Software based Software Development Kit Single finger Test Case Technische Richtlinie (Technical Guideline) User Interface Visa Application Visa Basic Identity Check Visa Extended Identity Check Visa Identity Check Verification Identity Document Visa Information System Wavelet Scalar Quantisation Wavelet Scalar Quantisation for reference storage Bundesamt für Sicherheit in der Informationstechnik 15
16 7 Bibliography 7 Bibliography [ANSI_NIST] [CBEFF] [EAC] ANSI/NIST-ITL , American National Standard for Information Systems Data Format for the Interchange of Fingerprint, Facial, & Scar Mark & Tattoo (SMT) Information, availble at: ISO/IEC :2006 "Information technology - Common Biometric Exchange Formats Framework - Part 1: Data element specification" Technical Guideline BSI TR-03110: Advanced Security Mechanisms for Machine Readable Travel Documents, Version 2.10, 2012 [EBTS/F] FBI Electronic Biometric Transmission Specification Version 8, Appendix F, September [EC_767_2008] [EC_296_2008] [EC_2252/2004] [EC_648_2006] Regulation (EC) No of the European Parliament and of the Council of 9 July 2008 concerning the Visa Information System (VIS) and the exchange of data between Member States on short-stay visas (VIS Regulation) Regulation (EC) No 296/2008 of the European Parliament and of the Council of 11 March 2008 amending Regulation (EC) No 562/2006 establishing a Community Code on the rules governing the movement of persons across borders (Schengen Borders Code), as regards the implementing powers conferred on the Commission Regulation (EC) No 2252/2004 of the European Parliament and of the Council of 13 December 2004 on standards for security features and biometrics in passports and travel documents issued by Member States. Commission Decision of 22 September 2006 laying down the technical specifications on the standards for biometric features related to the development of the Visa Information System [ICAO_06] ICAO Document 9303, Machine Readable Travel Documents, Part 1 Machine Readable Passports, 6th edition, 2006 [ICAO_08] [ISO_ ] [ISO_ ] ICAO Document 9303, Machine Readable Travel Documents, Part 3 Size 1 and Size 2 Machine Readable Official Travel Documents, 3rd edition, 2008 ISO/IEC :2006 Information technology Biometric application programming interface Part 1: BioAPI specification ISO/IEC :2011: Information technology Biometric application programming interface Part 4: Biometric sensor function provider interface 16 Bundesamt für Sicherheit in der Informationstechnik
17 Bibliography 7 [ISO_FACE] [ISO_FINGER] [ISO_ ] [ISO_15444] [ISO_ ] [ISO_ ] [ISO_ ] [NBIS] [NFIS] [PhotoGuide] [RFC2119] [Template] [VIS-ANSI_NIST] ISO/IEC :2005 Information technology - Biometric data interchange formats - Part 5: Face image data ISO/IEC :2005 Information technology - Biometric data interchange formats - Part 4: Finger image data ISO/IEC :1994: Information technology Digital compression and coding of continuous-tone still images: Requirements and guidelines ISO/IEC :2004 Information technology - JPEG 2000 image coding system: Core coding system ISO/IEC :2007 Information technology Common Biometric Exchange Formats Framework Part 3: Patron format specification ISO/IEC : 2007 Information technology Conformance testing for the biometric application programming interface (BioAPI) Part 1: Methods and procedures ISO/IEC : 2007 Information technology Conformance testing for the biometric application programming interface (BioAPI) Part 2: Test assertions for biometric service providers Photo guideline ("Fotomustertafel") RFC 2119: Key words for use in RFCs to Indicate Requirement Levels. Photo template ("Lichtbildschablone") VIS-ANSI/NIST, European Commission Directorate-General Justice, Freedom and Security Visa Information System NIST Description, Version 1.23, 2009 Bundesamt für Sicherheit in der Informationstechnik 17
Conformance test specification for BSI-TR 03121 Biometrics for public sector applications
Technical Guideline TR-03122-1 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik
Biometrics for public sector applications
Technical Guideline TR-03121-2 Biometrics for public sector applications Part 2: Software Architecture Version 3.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63, 53133 Bonn, Germany
Biometrics for Public Sector Applications
Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach
Best Practice Fingerprint Enrolment Standards European Visa Information System
Best Practice Fingerprint Enrolment Standards European Visa Information System Improving performance by improving fingerprint image quality Experiences from pilot project BioDEVII 1 Agenda BioDEVII Phase
Modular biometric architecture with secunet biomiddle
Version 2.1 Modular biometric architecture with secunet biomiddle White Paper Version 2.0, 25/03/10 secunet Security Networks AG Copyright 2010 by secunet Security Networks AG This document is for information
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Revised October 25, 2007 These standards can be obtained (for a fee) at ANSI s estandards Store: http://webstore.ansi.org/
Best Solutions for Biometrics and eid
Best Solutions for Biometrics and eid In times of virtual communication even a person s identity is converted into an electronic form with the help of biometrics and then organised through intricate technical
Product Testing Programs
Catalog of USG Product Programs Version 1.0 November 15, 2010 NSTC Subcommittee on s and Identity Management 1. Introduction This Catalog of USG Product Programs (Catalog) supplements the Registry of USG,
BIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW
BIOMETRICS STANDARDS AND FACE IMAGE FORMAT FOR DATA INTERCHANGE - A REVIEW Nita M. Thakare 1 and V. M. Thakare 2 1 Department Computer Science and Engg., S.S.G.M. College of Engg., Shegaon (M.S.), India
Description of Biometric Data Interchange Format Standards
Description of Biometric Data Interchange Format Standards INCITS M1 Technical Editors: Creed Jones, Colin Soutar, Jim Cambier, Michael McCabe, Paul Griffin, Rod Beatson, Samir Tamer 1 Introduction International
Preventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES
COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES BSI TR-03139 Version 2.1 27 May 2013 Foreword The present document
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
MOBILE IDENTIFICATION:
MOBILE IDENTIFICATION: FROM FUNCTIONAL REQUIREMENTS, TO TESTING FOR INTEROPERABILITY AND SECURITY Antonia Rana*, Alessandro Alessandroni** *Joint Research Centre, **DigitPA EUR 25037 EN - 2011 The mission
Fingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance
Fingerprint Scanners Comparative Analysis Based on International Biometric Standards Compliance María del Carmen Prudente-Tixteco [email protected] Linda Karina Toscano-Medina [email protected] Gualberto
Spanish Certification Body. Challenges on Biometric Vulnerability Analysis on Fingerprint Devices. New. Technical Manager September 2008
Spanish Certification Body New Challenges on Biometric Vulnerability Analysis on Fingerprint Devices Technical Manager September 2008 Contents Introduction: Biometric Technology Security Evaluation New
Biometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company
Biometric Performance Testing Methodology Standards Michael Thieme, Vice President IBG, A Novetta Solutions Company Overview Published standards In-development ISO/IEC standards Scope and status 2 Published
Department of Homeland Security
Department of Homeland Security Biometrics Overview Neal Latta US-VISIT IDENT Program Manager 1 Importance of Biometric Standards in Post 9/11 Environment Dramatic Increase in Utilization of Biometric
Spoof Detection and the Common Criteria
Spoof Detection and the Common Criteria Ralph Breithaupt (BSI) Nils Tekampe (TÜViT) Content Today s situation The BSI projects LifeFinger I & II Spoofing The definition Spoof Detection in Common Criteria
Statewatch Briefing ID Cards in the EU: Current state of play
Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled
Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token
Technical Guideline TR-03110-4 Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Part 4 Applications and Document Profiles Version 2.20 3. February 2015 History Version
Embedded and mobile fingerprint. technology. FingerCell EDK
Embedded and mobile fingerprint identification technology FingerCell EDK FingerCell EDK Embedded and mobile fingerprint identification technology Document updated on August 30, 2010 CONTENTS FingerCell Algorithm
Discover Germany s Electronic Passport
Discover Germany s Electronic Passport Starting 1 Nov. 2007 E-Passport 2nd Generation www.epass.de 1 Introducing Germany s e-passport If you want to know why there are electronic passports and how to recognize
End-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory
End-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments
Full page passport/document reader Regula model 70X4M
Full page passport/document reader Regula model 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses
Facts about the new identity card
Facts about the new identity card Contents The new identity card At a glance... 4 In detail... 6 Photographs... 8 New ID card, new possibilities...10 Special functions... 11 The online function...12 Reader
BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS
BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS BIMS BIOMETRIC DATA ACQUISITION BIMS Biometric Data Acquisition is an application for persons biographical and biometrical data collection in real time or from
Border control using biometrics in Japan. September 2008 NEC Corporation/Daon
Border control using biometrics in Japan September 2008 NEC Corporation/Daon Today s Agenda 1. Project Overview 2. Challenges and Lessons Learned 1. Project Overview Japan Biometrics Identification System
European Electronic Identity Practices Country Update of Portugal
European Electronic Identity Practices Country Update of Portugal Speaker: Anabela Pedroso [email protected] Date: 3 November 2006 1. Status of National legislation on eid Are eid specific regulations
FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and ID verification.
Discover a new conception for customer verification and electronic contract management Your benefit is our task. FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and
Implementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
Understanding The Face Image Format Standards
Understanding The Face Image Format Standards Paul Griffin, Ph.D. Chief Technology Officer Identix April 2005 Topics The Face Image Standard The Record Format Frontal Face Images Face Images and Compression
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
SWGFAST. Defining Level Three Detail
SWGFAST Defining Level Three Detail ANSI / NIST Workshop Data Format for the Interchange of Fingerprint, Facial, & Scar Mark & Tattoo (SMT) Information April 26-28,2005 28,2005 Defining Level Three Detail
Biometrics for payments. The use of biometrics in banking
Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,
Case Studies. National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system
Case Studies National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system Royal Oman Police (ROP) of the Sultanate of Oman eid Consulting for e-passport system Federal
Establishing and Managing the Schengen Masterlist of CSCAs
Establishing and Managing the Schengen Masterlist of CSCAs Big City 21/04/2015 European Commission Directorate-General HOME Unit B3 Information Systems for Borders and Security [email protected]
Electronic machine-readable travel documents (emrtds) The importance of digital certificates
Electronic machine-readable travel documents (emrtds) The importance of digital certificates Superior security Electronic machine-readable travel documents (emrtds) are well-known for their good security.
Technical Study on Smart Borders Cost Analysis. Final Report
Technical Study on Smart Borders Cost Analysis Final Report Written by PwC October 2014 EUROPEAN COMMISSION Directorate-General for Home Affairs Directorate C Schengen Unit C.3 Transeuropean Networks for
Landscape of eid in Europe in 2013
Landscape of eid in Europe in 2013 July 2013 Eurosmart White Paper Contents Executive Summary 3 1. Purpose of the document 3 2. EU regulation 3 3. EU Member States identification policies 4 3.1. National
Keywords: fingerprints, attendance, enrollment, authentication, identification
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com 94 POS Terminal
BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS
BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS USER BIOMETRIC DATA ACQUISITION OPERATOR BIOMETRIC IDENTIFICATION OPERATOR DOCUMENT VERIFICATION OPERATOR VIDEO ANALYTICS OPERATOR FINGERPRINT AND FACE EXPERTS
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
Procedure for obtaining Biometric Device Certification (Authentication)
Procedure for obtaining Biometric Device Certification (Authentication) (BDCS(A)-03-02) ISSUE 1 STQC - IT Services STQC Directorate, Department of Information Technology, Ministry of Communications & Information
SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise
w w w. t h a l e s g r o u p. c o m SECURE IDENTITY MANAGEMENT Globally recognised identity management expertise Integrated identity management solutions As a global technology leader for the Aerospace
Code of Practice on Electronic Invoicing in the EU
CEN/WS einvoicing Phase 3 Date: 2011-11 CEN Workshop AgreementTC WI Secretariat: NEN Code of Practice on Electronic Invoicing in the EU Status: for public review (23 November 2011-23 January 2012) ICS:
ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents
ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents 3 Your Personal Identity: Unique, Secure, Multifaceted Every person has individual characteristics by which
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
FAQs Electronic residence permit
FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit
Doc. Machine. authority
Doc 93033 Machine Readable Travel Documents Seventh Edition, 2015 Part 9: Deployment of Biometric Identification and Electronic Storage of Data in emrtds Approved by the Secretary General and published
MegaMatcher Case Study
MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated
Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology
MegaMattcher g Ma Case a Sttudy Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology Bangladesh selected MegaMatcher multi-biometric
ISO/IEC 24727 for secure mobile web applications
ISO/IEC 24727 for secure mobile web applications Jan Eichholz 1 Detlef Houdeau 2 Detlef Hühnlein 3 Manuel Bach 4 1 Giesecke & Devrient GmbH, [email protected] 2 Infineon Technologies AG, [email protected]
Identity Verification Program Guide
Identity Verification Program Guide The National Crime Prevention and Privacy Compact Council (Compact Council) is a15-member body of local, state, and federal governmental officials which prescribes system
Identity - Privacy - Security
Identity - Privacy - Security Systems Security Engineering and Privacy Privacy and Security Workshop 3 Nov 2006 Toronto Recent Digital FIPS Border 201 Motivation Identity Security for Security Privacy
Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the
Information about the European Union is available on the Internet. It can be accessed through the Europa server ( www.europa.eu).
European Agency for the Management of Operational Cooperation at the External Bo of the Member States of the European Union Best Practice Guidelines on the Design, Deployment and Operation of Automated
ID Document Scanning and Biometric Solutions
ID Document Scanning and Biometric Solutions PRODUCT CATALOGUE Contents ID DOCUMENT SCANNING & BIOMETRIC SOLUTIONS Advanced ID document reading solutions Typical applications ID document scanning process
Test plan for eid and esign compliant terminal software with EACv2
Technical Guideline BSI TR-03105 Part 5.3 Test plan for eid and esign compliant terminal software with EACv2 Version: 2.0 Date: 2015-05-22 Bundesamt für Sicherheit in der Informationstechnik Postfach 20
TECHNICAL SPECIFICATION
TECHNICAL SPECIFICATION IEC/TS 62443-1-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 1-1: Terminology, concepts and models INTERNATIONAL ELECTROTECHNICAL
Machine Readable Travel Documents
Doc 9303 Machine Readable Travel Documents Part 3 Machine Readable Official Travel Documents Volume 2 Specifications for Electronically Enabled MRtds with Biometric Identification Capability Approved by
Moving to the third generation of electronic passports
Moving to the third generation of electronic passports A new dimension in electronic passport security with Supplemental Access Control (SAC) > WHITE PAPER 2 Gemalto in brief Gemalto is the world leader
October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
October 2014 Issue No: 2.0 Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
POSITION PAPER. The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND
POSITION PAPER The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND Dear ACI Members and World Business Partners, With the increasing need for secure personal
De-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
FAQs - New German ID Card. General
FAQs - New German ID Card General 1) How to change from the old ID card to the new one? The new Law on Identification Cards came into effect on 1 November 2010. Since then, citizens can apply for the new
OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT
SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT Version 1.3 Crown Copyright 2015 All Rights Reserved 49358431 Page 1 of 12 About this document This document describes the features, testing and deployment
Details for the structure and content of the ETR for Site Certification. Version 1.0
Details for the structure and content of the ETR for Site Certification Version 1.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn Tel.: +49 22899 9582-111 E-Mail: [email protected]
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
MACHINE READABLE TRAVEL DOCUMENTS
MACHINE READABLE TRAVEL DOCUMENTS TECHNICAL REPORT Version 1.0 Date - April 7, 2011 Published by authority of the Secretary General ICAO/NTWG SUB-WORKING GROUP FOR NEW SPECIFICATIONS td1 CARD File Author
Common Criteria Protection Profile for Inspection Systems (IS) BSI-CC-PP-0064. Version 1.01 (15 th April 2010)
Common Criteria Protection Profile for BSI-CC-PP-0064 Version 1.01 (15 th April 2010) Federal Office for Information Security Postfach 20 03 63 53133 Bonn Phone: +49 228 99 9582-0 e-mail: [email protected]
Guidelines concerning Fingerprint Transmission
Guidelines concerning Fingerprint Transmission INTERPOL OS/FTD/IDFP 2012 INTERPOL For official use only P a g e 1 GUIDELINES FOR FINGERPRINTS TRANSMISSION Purpose of this guideline This document has been
Security Target for PalmSecure
Version 1.0 14.September 2008 BSI-DSZ-CC-0511 All Rights Reserved Copyright Fujitsu Limited 2008 this page was intentionally left blank 14.September 2008 All Rights Reserved Copyright Fujitsu Limited 2008
Best Practices in Testing and Reporting Performance of Biometric Devices. Version 2.01
NPL Report CMSC 14/02 Best Practices in Testing and Reporting Performance of Biometric Devices Version 2.01 By A. J. Mansfield, National Physical Laboratory and J. L. Wayman, San Jose State University
Smart grid cyber security certification
Smart grid cyber security certification 1 Introduction On 30th September 2014 ENISA organised a workshop where the results of the report on Smart grid security certification (to be published by end of
Technical Guideline eid-server. Part 2: Security Framework
Technical Guideline eid-server Part 2: Security Framework BSI TR-03130-2 Version 2.0.1 January 15, 2014 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0 E-Mail:
Privacy by Design The case of Automated Border Control. Authors: Pagona Tsormpatzoudi, Diana Dimitrova, Jessica Schroers and Els Kindt
Privacy by Design The case of Automated Border Control Authors: Pagona Tsormpatzoudi, Diana Dimitrova, Jessica Schroers and Els Kindt Overview: (Automated) border control; Identity management in (Automated)
Biometrics and Cyber Security
Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important
This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
Technical Guidelines RFID as Templates for the PIA- Framework
Technical Guidelines RFID as Templates for the PIA- Framework Federal Office for Information Security (BSI) Postbox 20 03 63 53133 Bonn, Germany Tel.: +49 22899 9582-0 E-Mail: [email protected] Internet:
ETSI TS 102 042: Electronic Signatures and Infrastructures (ESI): Policy
Abbreviations AIS BGBl BNetzA BSI CC CEM CSP DAR DATech DIN EAL ETR ETSI ISO IT ITSEC ITSEF ITSEM JIL PP SF SigG SigV SOF Anwendungshinweise und Interpretationen zum Schema [Guidance and Interpretations
Company Overview. Iraq: Activities & Experience
Company Overview Iraq: Activities & Experience SAFE ID Solutions AG 2009 SAFE ID Management Board Omar El Gohary Executive Vice President Operations Long year leadership and operational experience with
Self Testing and Product Qualification Processes
GlobalPlatform Self Testing and Product Qualification Processes Version 1.2.1 Public Release May 2013 Document Reference: GPC_PRO_042 Recipients of this document are invited to submit, with their comments,
Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:
Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication
Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition
Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition Revised: 02/13/2015 A. STATEMENT OF PURPOSE The purpose of this document is to outline the responsibilities
Keep Out of My Passport: Access Control Mechanisms in E-passports
Keep Out of My Passport: Access Control Mechanisms in E-passports Ivo Pooters June 15, 2008 Abstract Nowadays, over 40 different countries issue biometric passports to increase security on there borders.
Fingerprint Based Biometric Attendance System
Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id [email protected] [email protected] Contact Numbers 8097031667 9167689265
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
