Modular biometric architecture with secunet biomiddle
|
|
|
- Margery Payne
- 10 years ago
- Views:
Transcription
1 Version 2.1 Modular biometric architecture with secunet biomiddle White Paper Version 2.0, 25/03/10 secunet Security Networks AG
2 Copyright 2010 by secunet Security Networks AG This document is for information purposes. It is permitted to print it out and save it in full, unmodified form. Additional publishing, printing and copying or saving in any form whatsoever, in whole or in part, is permitted only with the prior written consent of secunet Security Networks AG. In addition to explanations, assessments and our own surveys, this document contains descriptions of manufactured products, interfaces and concepts which are based on the corresponding publications of the particular manufacturer. The replication of common names, trade names, trademarks, etc., even without special labelling, does not justify the assumption that such names should, in the sense of trademark and brand protection legislation, be regarded as unused and therefore usable by anyone. All brands and product names are trade names or registered trademarks of the particular trademark owner. This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. ( This product includes cryptographic software written by Eric Young This product includes software written by Tim Hudson Part of the software embedded in this product is gsoap software. Portions created by gsoap are Copyright (C) Robert A. van Engelen, Genivia inc. All Rights Reserved. THE SOFTWARE IN THIS PRODUCT WAS IN PART PROVIDED BY GENIVIA INC AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 2 White Paper Version 2.0, 25/03/10
3 Contents Contents Requirements of biometric architectures Challenge: biometric interoperability Biometric data formats Biometric functions Access to electronic IDs Performance characteristics of secunet biomiddle Architecture of secunet biomiddle Advantages of solutions with secunet biomiddle Modularity and exchangeability Security of investment Integration of biometrics as high-level functionality Technical freedom at application level Case studies using secunet biomiddle An organisation's office for issuing ID cards The problem Solution strategy Implementation Verification of electronic travel documents The problem Solution strategy Implementation Automated Border Crossing System The problem Solution strategy Implementation Identification for entering a safety zone The problem Solution strategy Implementation Summary of performance features...20
4 Requirements of biometric architectures 1 Requirements of biometric architectures The structure of biometric systems or their integration in existing environments presents both opportunities and risks. Because of the highly dynamic nature of biometrics and short innovation cycles, under certain circumstances a solution may no longer satisfy the requirements of the latest state of the art or of changing requirements, even after a short period. For example, a new hardware generation can provide vastly improved acquisition, in terms of time or quality, or a new comparative biometric algorithm can achieve a much better recognition performance. In order to achieve an adaptable and thus investment-safe solution, care should be taken, right from the beginning, to achieve a modular and standards-oriented architectural concept. For this, secunet biomiddle provides the best possible basis, because of its modular structure and the consistent application of international standards. It functions as middleware between client applications and the biometric technologies on the market. The functional scope extends from optical and electronic reading of biometric data in the identity documents through the traditional biometric functions for capturing, quality assessment, verification and identification right up to the connection with complex background systems such as fingerprint databases (AFIS systems) or authorisation systems. What is decisive is that secunet biomiddle does not itself implement any biometric processing but always integrates those from suitable manufacturers via standards-compliant interfaces. The complexity of the existing standards and also of the associated manufactured components is reduced from the applications point of view by secunet biomiddle, with all the functions being provided via a service-oriented interface (SOAP). This also makes technological freedom and scalability possible for client applications, which can be written in any programming language. 4 White Paper Version 2.0, 25/03/10
5 Challenge: biometric interoperability 2 Challenge: biometric interoperability In the field of biometrics there is a series of international standards which are meant to guarantee interoperability of data and systems. In practice, these standards are thoroughly interwoven, which considerably increases the complexity of working with them. 2.1 Biometric data formats The format in accordance with ISO/IEC is the main one used for encoding biometric data. The standard contains several parts which are each limited to a specific biometric feature. Another important standard for exchanging biometric data is Standard ISO/IEC 19785, which specifies the CBEFF format (Common Biometrics Exchange File-Format). The standard permits various characteristics, the "patron formats", to be defined. The format used in the smartcard area under ISO/IEC and the BIR format under ISO/IEC (BioAPI 2.0) are the most important patron formats in practical use. In the context of electronic passports, the International Civil Aviation Organisation (ICAO) has defined the logical data structure (LDS), which describes the encoding of biometric data on the passports. The encoding of fingerprint images on electronic passports is a good example of how the various standards interact. Within an LDS structure is a CBEFF structure in accordance with ISO and , which in turn contains one or more data records in accordance with ISO There are one or more fingerprint images in these data records which are compressed and then coded in WSQ (wavelet scalar quantisation) data format. Fig. 2-1: encoding of fingerprints on identity documents (simplified) secunet biomiddle provides complete flexibility in the use of these data formats. If an application using secunet biomiddle would like to display only these data, it can White Paper Version 2.0, 25/03/10 5
6 Challenge: biometric interoperability request the fingerprint images in a commonly-used format - BMP or JPEG for example. If, however, it requires the information as complete LDS encoding, secunet biomiddle delivers the data in that format. 2.2 Biometric functions Standard ISO/IEC (BioAPI 2.0) defines an architecture for biometric systems, for interoperability of systems and processes. Moreover, it defines the interface for applications and biometric service providers (BSP), which are integrated in the BioAPI-specified architecture (BioAPI framework) via a plug-in mechanism. The functions defined by BioAPI 2.0 cover the complete range of biometric operations (enrolment, verification and identification) and are, nevertheless, open to new technologies. In the standard, there is no commitment to certain data formats, encodings or biometric processes. The actual implementation of the biometric functionality occurs via the associated providers. They are available as a dynamic library and are loaded to the environment at the time of operation. BioAPI 2.0 defines various categories of BSPs such as, for example, BSPs for capturing biometric data and BSPs for verification purposes. It is established for each category, which functions must be provided by the appropriate dynamic library of a BSP. The functions provided by a BioAPI 2.0 BSP are on a high level. The standard must not, therefore, be regarded as a driver interface for biometric sensors". For the use of a BioAPI 2.0 BSP, a standard-specified framework is necessary, which integrates and manages the various BSPs. secunet biomiddle contains such a framework and thus implements a well-defined, open, modular and transparent overall architecture. It makes it possible to add or exchange external components compatible with BioAPI 2.0, directly and without the effort of integration. That means, for example, that it is possible to switch in actual operation from a fingerprint scanner to an alternative source. 2.3 Access to electronic IDs With the introduction of electronic passports, the topic of identity checking has taken on a close association with biometric processes, in the mandatory sphere. The holder's biometric characteristics are saved in the new identity documents and must be read from the document for identity checks based on it. In addition to the protocols for access via RFID and communication via the chip, a series of epassport-specific security mechanisms, such as Basic Access Control or Extended Access Control, are necessary. To access the passport, secunet biomiddle uses the epassportapi, which is used in the Golden Reader Tool of the German Federal 6 White Paper Version 2.0, 25/03/10
7 Challenge: biometric interoperability Office for Information Security (BSI). At international level, the latter is used as a reference application for reading passports and is used by many manufacturers as proof of interoperability. White Paper Version 2.0, 25/03/10 7
8 Performance characteristics of secunet biomiddle 3 Performance characteristics of secunet biomiddle 3.1 Architecture of secunet biomiddle secunet biomiddle's architecture contains four different modules which combine and make available the functions of a particular topic. Fig. 3-1: secunet biomiddle The Document Check Module is used to read and check identity documents. The epassportapi is integrated as a standardised interface for reading the electronic contents. Using Basic Access Control (BAC), Active Authentication (AA) and Extended Access Control (EAC), it supports all the existing security mechanisms for electronic passports. Depending on the power of the reader used, machine readable zone (MRZ), infrared (IR) image, ultraviolet (UV) image, visible image and cropped facial image may be read as optical data. The Acquisition & Matching Engine enables standardised access to all biometric sensors and algorithms, which are BioAPI 2.0-compatible and thus provide a suitable BSP. Based on them, this module allows any biometric operations to be performed, such as recording the live image of a person, enrolment, verification and identification of people. These functions are provided generically for the various biometric technologies, such as face, fingerprint and iris recognition. 8 White Paper Version 2.0, 25/03/10
9 Performance characteristics of secunet biomiddle The Quality Assurance Module tests, with respect to their quality, whether biometric data are suitable for biometric comparisons and/or fulfil international requirements (ICAO requirements for photographs, for example). In a similar way to the BioAPI approach, suitable evaluation algorithms are connected via QA providers. During the process, secunet biomiddle can connect one or more suitable QA providers. The Background Interface Module is used to connect external systems. Communication with the background systems can thus occur in any way you like, via protocols such as SMTP, ODBC, HTTP or SOAP, for example. Communication with databases such as Oracle, MySQL, PostgreSQL or MS SQL is also possible. In this case, too, an approach comparable with BioAPI has been chosen, in order to connect the functionality necessary in individual cases to secunet biomiddle via provider modules. As a central entity, the Control Unit starts and initialises all the modules. It manages the services provided and processes the clients requests. The latter are transferred to the modules responsible. To guarantee maximal flexibility and platform independence, the interface for the applications is based on SOAP (Simple Object Access Protocol). 3.2 Advantages of solutions with secunet biomiddle On the introduction of biometrics, a business must commit itself very early, regarding the most diverse points. Important questions are, for example, which biometric process should be used, which scanner technology is best suited to the particular purpose or which verification algorithm achieves the best results. For the reasons mentioned above, however, exchangeability and migration capability are highly significant for biometrics. Such flexibility can be achieved by secunet biomiddle. The advantages of secunet biomiddle are summarised below Modularity and exchangeability secunet biomiddle is subdivided into various functional modules running on the biomiddle server. The advantage of distributing the functions over various modules is that the requirements of various use case scenarios can be fulfilled. secunet biomiddle s modularity means that distributed environments are not a problem. As a result of secunet biomiddle's technical openness, many different devices may be addressed. Sensors and card readers are integrated by a standardised interface. This guarantees an exchange of devices, irrespective of manufacturer. secunet biomiddle also makes it possible to operate several different devices. The appropriate sensors may thus always be used, depending on the environment (e.g. interior as against exterior usage). There is the additional possibility of using secunet biomiddle to implement multimodal biometric systems (the combined use of White Paper Version 2.0, 25/03/10 9
10 Performance characteristics of secunet biomiddle various biometric characteristics). This can increase a system's recognition performance considerably Security of investment The biometric market has been operating for years with short innovation and product cycles. Accordingly, performance improvements, new technologies and supplementary methods are already to be expected for medium-term. New requirements of biometric applications will also appear. As a result of the modular structure and the observance of the relevant standards, an application based on secunet biomiddle can react to such changes with comparatively little effort. The use of this open biometric platform thus achieves security of investment Integration of biometrics as high-level functionality The development of applications with the use of secunet biomiddle operates only at a higher level. Addressing individual sensors or algorithms no longer occurs during implementation and is taken over by secunet biomiddle. The complex, devicespecific interfaces are abstracted and their functions are provided for the application in unified form, irrespective of manufacturer Technical freedom at application level Applications use secunet biomiddle via a SOAP interface. This has the advantage that the application itself may be written in any programming language. This simplifies enormously the integration of biometric functions in existing solutions and also makes it possible for biometric functions to be provided as central services. Thus it is possible to achieve, for example, a central, resource-intensive comparative service, used by many slim applications. This approach also allows an application to use several biomiddle entities distributed within the infrastructure. In this way, all desired requirements may be implemented in the best possible way, with respect to performance, scalability or availability. 10 White Paper Version 2.0, 25/03/10
11 Case studies using secunet biomiddle 4 Case studies using secunet biomiddle secunet biomiddle may be used in various scenarios. Shown here are some case studies involving the implementation of secunet biomiddle. 4.1 An organisation's office for issuing ID cards The problem In the future, the ID cards issued by an organisation should also contain the owner's stored biometric characteristics. For all the new ID cards, a photo of the face should be saved. For employees who have access to special safety areas, fingerprints should also be saved. For enrolment, there should be quality assurance of biometric data, in order to achieve the best possible recognition performance. An office which has been active for years in the area of application and issuance of ID cards must be extended to include biometric process facilities Solution strategy The existing application for registering employee data, programmed in Java, is highly complex and cannot be replaced by a standard application because it is integrated with the personnel data system and other special applications. The acquisition of biometric data should be integrated in the application, instead. After acquisition, the biometric data are transferred to the card production system Implementation secunet biomiddle is used for implementing all new biometric-relevant functions. Since the existing acquisition application is programmed in Java, Apache Axis ( is used for the SOAP implementation. The necessary Java classes are automatically created by Axis from the WSDL (web service definition language) file provided by secunet biomiddle. Using those classes, the functions provided by secunet biomiddle may be addressed directly. An external production system takes over personalisation of the new biometric ID cards. For this purpose, the biometric data are encoded in the format required for saving to the card and saved temporarily, separately from the remaining data, in a local database until the card is issued. The data are encoded and transferred to the production system by a background interface provider connected to secunet biomiddle. White Paper Version 2.0, 25/03/10 11
12 Case studies using secunet biomiddle Fig. 4-1: Generating source code secunet biomiddle is installed on the issuing office's system. In the process, the following modules are connected to biomiddle for the enrolment: a BSP for capturing a full face shot with a digital camera, a BSP for capturing a fingerprint with a sensor, a BSP for comparing fingerprints a quality provider for checking face images, a quality provider for checking fingerprints and a background interface provider for communicating the data to a production system. 12 White Paper Version 2.0, 25/03/10
13 Case studies using secunet biomiddle Capture BSP Face Capture BSP Finger Matching BSP Finger QA-Provider Finger QA-Provider Face BI-Provider Fig. 4-2: secunet biomiddle setup for ID card application The following acquisition process is integrated in the existing application: 1. After the cardholder s usual data has been entered, his/her face is captured by a digital camera. To do this, the application accesses the BSP's biomiddle capture function. To capture the image, using the camera's live image, the latter displays a dialogue on the user interface and automatically captures the photograph as soon as a face has been recognised. 2. The application transfers the recorded image to Quality Testing. To do this, it accesses the biomiddle checkquality function for the provider responsible. If the result is negative, step 1 is repeated. 3. If it is a person for whom fingerprints should be taken, the capture function of the fingerprint BSP is accessed three times, with the same finger being recorded each time. This is done in order to achieve the best possible image of the finger. 4. After the recording, all the fingerprints are compared and individually qualitytested. The application uses the verifymatch function for the biometric comparison. It then evaluates the results and decides on one of the three images. White Paper Version 2.0, 25/03/10 13
14 Case studies using secunet biomiddle 5. In order to biometrically authenticate the person further in the event of subsequent injury, steps 3 and 4 are performed again, using a second finger from the other hand. 6. After the acquisition application has recorded all the biometric data, it transfers them to the production system. For this purpose, it uses the biomiddle externalstorageoperation function. The latter encodes the data in the target format and saves them in the production system. 7. The passport is produced independently of the acquisition application and secunet biomiddle. 4.2 Verification of electronic travel documents The problem In accordance with the international standards for passports, the electronic data are saved in protected form in the passport. Within a border control process, this data shall be verified. Therefore an existing border control application is required to be extended Solution strategy The biometric data are read from the passport and verified by secunet biomiddle and submitted to a border control application. The latter visualises the results to the border control officer Implementation secunet biomiddle is installed at the border control station with the following components: - document check module with epassportapi and opassportapi for the passport reader and - a Background Interface provider to access the national Public Key Directory (N-PKD). 14 White Paper Version 2.0, 25/03/10
15 Case studies using secunet biomiddle epassport API opassport API BI-Provider Fig. 4-3: secunet biomiddle setup for border control The process for the biometric border check control is as follows: 1. The border control application is registered for the communication with secunet biomiddle, as soon as a new document has been placed on the passport reader. For this purpose it calls the biomiddle registernewdocumentsubscription function and passes the URL on which it wishes to receive the messages. It then opens the port specified in the URL and waits for messages. 2. As soon as a new document has been placed on it, secunet biomiddle informs all registered applications. Thus the notifynewdocument message is sent. 3. The border control application queries biomiddle for the machine readable zone of the newly-available passport. To do this, it accesses the getmrz function. By means of the MRZ, the application decides whether biometric data should be read from the passport. White Paper Version 2.0, 25/03/10 15
16 Case studies using secunet biomiddle 4. If an electronic document is detected, the application reads datagroup 1 and 2 from the passport. It uses the functions getelectronicpassportcount and getdatagroup to do this. 5. To retrieve the necessary CSCA certificate from the public key directory, the application asks for the search parameters by calling the function getmissingcertinfo and delivers them through the function externalretrievaloperation to the BI provider. As result the corresponding CSCA certificate is returned. 6. To get the results of the electronic security checks, the application calls the functions checkdatagroup, checkpassiveauth and getprotocolstatus. 7. All results are visualized to the border control officer. 4.3 Automated Border Crossing System The problem The border crossing of travelers is intended to be automated by using an Automated Border Crossing system (ABC system). The system shall perform all regular security checks done at the regular border control desks, supplemented by a biometric verification of the travelers face. The target user group is based on all citizens within the Schengen area Solution strategy After the travel document is put on the reader, it s optic and electronic security features are checked. The facial image is read from the passport and delivered to a process control application. The latter takes a live image of the face and transfers the data to biomiddle for biometric comparison. In parallel, external databases are queried whether the passport has been reported as stolen or whether the traveller is on a watch list. If all security checks are successful, the traveller is allowed to cross the border Implementation The execution of security checks and the delivery of information to a monitoring station is implemented by a Process Control Application. Within the ABC system, secunet biomiddle is installed with the following modules: - document check module with epassportapi and opassportapi for the passport reader, 16 White Paper Version 2.0, 25/03/10
17 Case studies using secunet biomiddle - a BSP for capturing a facial image by the capture unit of the ABC system, - a BSP for comparing facial images, - a Background Interface provider to query for stolen documents and wanted people, and - a Background Interface provider to access the national Public Key Directory (N-PKD). Process Control Application registernewdocumentsubscription notifynewdocument getmrz... capture verifymatch externalretrievaloperation BioMiddle Document Check Acquisition & Matching Engine Quality Assurance Background Interface BioAPI 2.0 Framework epassport API opassport API Capture BSP Face Matching BSP Face BI-Provider BI-Provider Fig. 4-4: secunet biomiddle setup for ABC systems The workflow of the automated border crossing process is as follows: N-PKD SIS, The Process Control Application is registered with secunet biomiddle and verifies the electronic security features in the same way as described in chapter 4.2. White Paper Version 2.0, 25/03/10 17
18 Case studies using secunet biomiddle 2. Additionally, the Process Control Application retrieves the result of the optic security check by calling the function getopticalsecuritystatus. 3. To query for stolen passports or wanted people, the application transfers the MRZ data to the respective BI-provider by calling the function externalretrievaloperation. 4. The application reads the facial image from the passport and also takes a live picture of the person. For this, it uses the biomiddle getelectronicimage and capture functions. 5. Using the verifymatch function, the application transfers the biometric data for comparison and processes the result. 6. In case all security checks are successful, the Process Control Application opens the door of the ABC system and the traveler is allowed to pass. 4.4 Identification for entering a safety zone The problem A building's safety zone should be equipped with biometric entry control. The fingerprint is intended as a biometric characteristic. The reference data are stored in a central authorisation system Solution strategy The entry control is operated by a central application. It uses secunet biomiddle to record the fingerprint and for the identification of the person in the central authorisation system. There are basically two variants for carrying out the identification: 1. If the authorisation system provides an interface in accordance with BioAPI 2.0, the identification can be done by a BSP. 2. If the authorisation system is not BioAPI 2.0-compatible, a connection can be established via biomiddle's background interface. The latter variant is considered in greater detail below Implementation The following components are connected to secunet biomiddle: 18 White Paper Version 2.0, 25/03/10
19 Case studies using secunet biomiddle - a BSP for capturing a fingerprint with a sensor and - a background interface provider for communicating with the central authorisation system. Application Door control capture externalbiometricoperation secunet biomiddle Document Check Acquisition & Matching Engine Quality Assurance Background Interface BioAPI 2.0 Framework Capture BSP Finger BI-Provider Fig. 4-5: secunet biomiddle setup for entry control The following procedure is implemented: Central authorisation system 1. The control application captures a fingerprint. To do this, it uses the capture function. 2. The captured fingerprint is sent to the central authorisation system. It uses secunet biomiddle's externalbiometricoperation function. The result of the function is the authorisation system's answer. It contains information as to whether the person has been identified and has authority to enter the safety area. 3. The control application operates the entrance door and allows this person to enter. White Paper Version 2.0, 25/03/10 19
20 Summary of performance features 5 Summary of performance features Performance feature Support Document check support for RFID PC/SC readers support for full-page readers providing MRZ optical image data electronic security mechanisms face image data formats data formats for fingerprints (various manufacturers) VIS, UV, IR and cropping BAC, AA, CA, TA and EAC DG2, ISO , JPEG, JPEG2000, BMP, PNG, etc. DG3, ISO /4, JPEG, WSQ, BMP, PNG, etc. Acquisition & Matching Engine recording biometric data template creation biometric data comparison identification biometric characteristics data formats any (face, finger, iris, etc.) ISO 19794, WSQ, JPEG, JPEG2000, BMP, PNG, etc. Quality Assurance quality assessment according to threshold value detailed test results - in XML 20 White Paper Version 2.0, 25/03/10
21 Summary of performance features Background Interface saving biometric data loading biometric data biometric operations via third-party systems status and validity test General Information supported operating systems memory requirement SSL support possible programming languages at application level Windows XP, Windows Vista, Windows 7 and Linux < 500 kb C/C++, Java, C#, Perl, etc. secunet Security Networks AG Kronprinzenstraße Essen Tel.: Fax: [email protected] White Paper Version 2.0, 25/03/10 21
Biometrics for Public Sector Applications
Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach
Conformance test specification for BSI-TR 03121 Biometrics for public sector applications
Technical Guideline TR-03122-1 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik
Best Solutions for Biometrics and eid
Best Solutions for Biometrics and eid In times of virtual communication even a person s identity is converted into an electronic form with the help of biometrics and then organised through intricate technical
Biometrics for public sector applications
Technical Guideline TR-03121-1 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63, 53133 Bonn, Germany Email:
How To Use The Programs Of Ancient.Org
Oracle s PeopleSoft Enterprise Campus Solutions 9.0 Feature Pack 2: Electronic Payment Integration November 2009 Campus Solutions 9.0 Feature Pack 2: Electronic Payment Integration Copyright 2009, Oracle.
Oracle s PeopleSoft 9.0 Recruiting and Admissions Changes and Updates for CS Bundle #38
Oracle s PeopleSoft 9.0 Recruiting and Admissions Changes and Updates for CS Bundle #38 July 2015 Changes and Updates for CS Bundle #38 Copyright 2015, Oracle. All rights reserved. The Programs (which
Oracle s PeopleSoft 9.0 Recruiting and Admissions Changes and Updates for CS Bundle #31
Oracle s PeopleSoft 9.0 Recruiting and Admissions Changes and Updates for CS Bundle #31 October 2013 Changes and Updates for CS Bundle #31 Copyright 2013, Oracle. All rights reserved. The Programs (which
Full page passport/document reader Regula model 70X4M
Full page passport/document reader Regula model 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses
Implementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
Biometrics for public sector applications
Technical Guideline TR-03121-2 Biometrics for public sector applications Part 2: Software Architecture Version 3.0 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63, 53133 Bonn, Germany
HIGHSEC eid App Administration User Manual
HIGHSEC eid App Administration User Manual Contents 1 Introduction... 3 2 Application overview... 3 3 Managing HIGHSEC eid App... 3 3.1 Deleting card pairings... 4 4 Inspecting smart card contents... 5
Novell Nsure Audit 1.0.3. Novell Nsure Audit 1.0.3 Administration Guide. novdocx (ENU) 01 February 2006. www.novell.com ADMINISTRATION GUIDE
Novell Nsure Audit 1.0.3 Administration Guide Novell Nsure Audit 1.0.3 July 18, 2006 ADMINISTRATION GUIDE www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to
PeopleSoft Red Paper Series. E-Learning. By: Gregory Sandford, Benjamin Harr, Leo Popov May 2006
PeopleSoft Red Paper Series E-Learning By: Gregory Sandford, Benjamin Harr, Leo Popov May 2006 E-Learning Copyright 2006, Oracle. All rights reserved. The Programs (which include both the software and
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Revised October 25, 2007 These standards can be obtained (for a fee) at ANSI s estandards Store: http://webstore.ansi.org/
NetVault : SmartDisk v1.0.1 Release Notes Contents
NetVault : SmartDisk v1.0.1 Release Notes Contents Release Information Documentation for NetVault: SmartDisk New Features Known Issues Faults Fixed Third-Party Licenses Release Information Release Version:
PeopleSoft Enterprise 8.9 MP1 Financial Aid Updates to Financial Aid for CS Bundle 4 Regulatory Release 3 2006-2007
PeopleSoft Enterprise 8.9 MP1 Financial Aid Updates to Financial Aid for CS Bundle 4 Regulatory Release 3 2006-2007 May 2006 Updates to Financial Aid for CS Bundle 4 Regulatory Release 3 2006-2007 Copyright
Apache Software Foundation This product includes software developed by the Apache Software Foundation (http://www.apache.org)
Apache Software Foundation This product includes software developed by the Apache Software Foundation (http://www.apache.org) FutureScale, Inc. PureMVC PureMVC AS3 Utility Startup Manager Copyright (c)
Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
Enterprise Manager to Enterprise Console upgrade guide. Sophos Enterprise Manager version 4.7 Sophos Enterprise Console version 4.7.
Enterprise Manager to Enterprise Console upgrade guide Sophos Enterprise Manager version 4.7 Sophos Enterprise Console version 4.7.1 Document date: July 2011 Contents 1 About this guide...3 2 What are
Preventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise
w w w. t h a l e s g r o u p. c o m SECURE IDENTITY MANAGEMENT Globally recognised identity management expertise Integrated identity management solutions As a global technology leader for the Aerospace
Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
CA DLP. Release Notes for Advanced Encryption. r12.0
CA DLP Release Notes for Advanced Encryption r12.0 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes
Release Notes for CounterPath X-Lite 4 for Windows Version 4.8
CounterPath Corporation Suite 300, Bentall One Centre 505 Burrard Street Box 95 Vancouver BC V7X 1M3 Canada Telephone: +1.604.320.3344 www.counterpath.com Release Notes for CounterPath X-Lite 4 for Windows
Statewatch Briefing ID Cards in the EU: Current state of play
Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled
End-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory
End-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
ID Document Scanning and Biometric Solutions
ID Document Scanning and Biometric Solutions PRODUCT CATALOGUE Contents ID DOCUMENT SCANNING & BIOMETRIC SOLUTIONS Advanced ID document reading solutions Typical applications ID document scanning process
Release Notes for. CounterPath Bria iphone Edition CounterPath Bria ipad Edition Version 3.1.0
CounterPath Corporation Suite 300, Bentall One Centre 505 Burrard Street Box 95 Vancouver BC V7X 1M3 Canada V6B1R8 Telephone: +1.604.320.3344 www.counterpath.com Release Notes for CounterPath Bria iphone
Simba ODBC Driver with SQL Connector for Apache Cassandra
Simba ODBC Driver with SQL Connector for Apache Cassandra Installation and Configuration Guide May 7, 2013 Simba Technologies Inc. Copyright 2012-2013 Simba Technologies Inc. All Rights Reserved. Information
MOBILE IDENTIFICATION:
MOBILE IDENTIFICATION: FROM FUNCTIONAL REQUIREMENTS, TO TESTING FOR INTEROPERABILITY AND SECURITY Antonia Rana*, Alessandro Alessandroni** *Joint Research Centre, **DigitPA EUR 25037 EN - 2011 The mission
Installation Guide Supplement
Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,
Oracle Plug-in for Windows Agent 7.1 User Guide
Oracle Plug-in for Windows Agent 7.1 User Guide Revision: This manual has been updated for Version 7.1 for Windows (November 2012). Software Version: 7.10 for Windows 1997-2012 The software manufacturer
Architecting the Future of Big Data
Hive ODBC Driver User Guide Revised: October 1, 2012 2012 Hortonworks Inc. All Rights Reserved. Parts of this Program and Documentation include proprietary software and content that is copyrighted and
JP1/Automatic Job Management System 3 - Definition Assistant Description, Operator's Guide and Reference
JP1 Version 11 JP1/Automatic Job Management System 3 - Definition Assistant Description, Operator's Guide and Reference 3021-3-B25(E) Notices Relevant program products For details about the applicable
Information about the European Union is available on the Internet. It can be accessed through the Europa server ( www.europa.eu).
European Agency for the Management of Operational Cooperation at the External Bo of the Member States of the European Union Best Practice Guidelines on the Design, Deployment and Operation of Automated
Electronic machine-readable travel documents (emrtds) The importance of digital certificates
Electronic machine-readable travel documents (emrtds) The importance of digital certificates Superior security Electronic machine-readable travel documents (emrtds) are well-known for their good security.
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
SimbaEngine SDK 9.5. OLE DB Implementation Guide. Simba Technologies Inc.
9.5 Simba Technologies Inc. May 2015 Copyright 2015 Simba Technologies Inc. All Rights Reserved. Information in this document is subject to change without notice. Companies, names and data used in examples
MegaMatcher Case Study
MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated
Avaya VPN Client Software Release 10.06 (build 022)
Avaya VPN Client Software Release 10.06 (build 022) 1. Release Summary Release Date: June 22 nd, 2012 Purpose: Software major release to include new features and address customer requests and software
Security whitepaper. CloudAnywhere. http://www.cloudiway.com
Security whitepaper CloudAnywhere http://www.cloudiway.com @Copyright 2011 CLOUDIWAY. All right reserved. Use of any CLOUDIWAY solution is governed by the license agreement included in your original contract.
IDENTIKEY Server Windows Installation Guide 3.2
IDENTIKEY Server Windows Installation Guide 3.2 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
EVault Software Oracle Plug-In for Windows Agent 6.85 User Guide
EVault Software Oracle Plug-In for Windows Agent 6.85 User Guide Revision: This manual has been updated for Version 6.85 for Windows (August 2011). Software Version: 6.85 for Windows 1997-2011 i365 Inc.
R&S TSMW Radio Network Analyzer Open Source Acknowledgment
Radio Network Analyzer Open Source Acknowledgment (;Úà@2) 1176.8216.02 03 Test & Measurement Open Source Acknowledgment Contents Contents 1 Introduction... 3 1.1 Disclaimer... 3 1.2 How to obtain the source
Discover Germany s Electronic Passport
Discover Germany s Electronic Passport Starting 1 Nov. 2007 E-Passport 2nd Generation www.epass.de 1 Introducing Germany s e-passport If you want to know why there are electronic passports and how to recognize
Minor corrective content service pack to address customer and software issues. * This release is no longer available.
Avaya VPN Client Software Release 10.06_301 1. Release Summary Release Date July 10 th, 2013 Release Version 10.06_301 Prior Release 10.06_300 (Jun 14 th, 2013) Minor corrective content service pack to
FortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide
FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide February 5, 2015 Revision 1 Copyright 2015 Fortinet, Inc. All rights reserved.
Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014
Radia Cloud For the Windows operating systems Software Version: 9.10 User Guide Document Release Date: June 2014 Software Release Date: June 2014 Legal Notices Warranty The only warranties for products
FAQs Electronic residence permit
FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit
Using SNMP with OnGuard
Advanced Installation Topics Chapter 8: Using SNMP with OnGuard SNMP (Simple Network Management Protocol) is used primarily for managing and monitoring devices on a network. This is achieved through the
Notification messages
AXIS P8221 Network I/O Audio Module TECHNICAL NOTE Notification messages How to integrate AXIS P8221 Updated: August 19, 2011 Rev: 1.1 TABLE OF CONTENTS 1 INTRODUCTION 3 1.1 HTTP and TCP 3 1.2 VAPIX 3
EVault Endpoint Protection 7.0 Single Sign-On Configuration
Revision: This manual has been provided for Version 7.0 (July 2014). Software Version: 7.0 2014 EVault Inc. EVault, A Seagate Company, makes no representations or warranties with respect to the contents
1. Install the SOAP Toolkit 3.0 on your computer. This is freely available from msdn.microsoft.com.
MyDelivery Source Code Version 0.9.31 June 2010 The MyDelivery source code was created by the United States National Library of Medicine except for portions that were privately created and permission granted
Setting Up an AS4 System
INT0697_150625 Setting up an AS4 system V1r0 1 Setting Up an AS4 System 2 Version 1r0 ENTSOG AISBL; Av. de Cortenbergh 100, 1000-Brussels; Tel: +32 2 894 5100; Fax: +32 2 894 5101; [email protected], www.entsog.eu,
Open EMS Suite. O&M Agent. Functional Overview Version 1.2. Nokia Siemens Networks 1 (18)
Open EMS Suite O&M Agent Functional Overview Version 1.2 Nokia Siemens Networks 1 (18) O&M Agent The information in this document is subject to change without notice and describes only the product defined
Credential and Workflow Design with TruCredential. DataCard Corporation. All rights reserved.
Credential and Workflow Design with TruCredential 1 AGENDA About Entrust Datacard TruCredential Overview Credential Design Basics Credential and Workflow Design with TruCredential 2 ABOUT ENTRUST DATACARD
Establishing and Managing the Schengen Masterlist of CSCAs
Establishing and Managing the Schengen Masterlist of CSCAs Big City 21/04/2015 European Commission Directorate-General HOME Unit B3 Information Systems for Borders and Security [email protected]
DigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and
BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS
BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS BIMS BIOMETRIC DATA ACQUISITION BIMS Biometric Data Acquisition is an application for persons biographical and biometrical data collection in real time or from
Sophos Enterprise Console quick startup guide. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console quick startup guide Product version: 5.1 Document date: June 2012 Contents 1 About this guide...3 2 What do I install?...3 3 What are the key steps?...3 4 Check the system requirements...4
About Contract Management
Contract Management System Architecture Data Sheet June 2015 About Contract Management Oracle Primavera Contract Management is a multi-user, multi-project Web-based application that manages all aspects
Stronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSO using OpenSSO Enterprise and BiObex TM Ramesh Nagappan Sun Microsystems, Burlington, MA [email protected] http://www.coresecuritypatterns.com/blogs Setting
EVault Software Microsoft SharePoint 2010/2013 Backup and Restore Guide 7.22
EVault Software Microsoft SharePoint 2010/2013 Backup and Restore Guide 7.22 Copyright SharePoint Backup and Restore Guide 7.22 Revision: This manual has been created for Version 7.22 (June 2013). Software
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach
Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach Ruchir Choudhry [email protected]; Abstract. J2EE based Web applications have largely spread over our multiple
Introduction to OpenCV for Tegra. Shalini Gupta, Nvidia
Introduction to OpenCV for Tegra Shalini Gupta, Nvidia Computer Vision = Mobile differentiator Applications Smart photography Augmented reality, gesture recognition, visual search Vehicle safety Lucky
Biometrics for payments. The use of biometrics in banking
Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,
European Electronic Identity Practices Country Update of Portugal
European Electronic Identity Practices Country Update of Portugal Speaker: Anabela Pedroso [email protected] Date: 3 November 2006 1. Status of National legislation on eid Are eid specific regulations
Integrated Citrix Servers
Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights
IDENTIKEY Server Windows Installation Guide 3.1
IDENTIKEY Server Windows Installation Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
D3.4.1: Data Fusion Tools
COMPETITIVINESS AND INNOVATION FRAMEWORK PROGRAMME CIP-ICT-PSP-2013-7 Pilot Type B WP3 Service platform integration and deployment in cloud infrastructure D3.4.1: Data Fusion Tools Deliverable Lead: NETCAD
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Identikey Server Performance and Deployment Guide 3.1
Identikey Server Performance and Deployment Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is'
Document Capture and Distribution
Document Capture and Distribution WHITE PAPER SmarThru TM Workflow 2 Document Capture and Distribution Introduction This white paper describes the design and the features used by the Samsung SmarThru TM
ANZ TRANSACTIVE MOBILE for ipad
ANZ TRANSACTIVE MOBILE for ipad SIMPLIFYING AND CONNECTING YOUR TRANSACTION BANKING ACROSS AUSTRALIA AND NEW ZEALAND QUICK REFERENCE GUIDE May 2014 GETTING STARTED Please ensure your ANZ Transactive Administrator
Siebel Installation Guide for UNIX. Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014
Siebel Installation Guide for UNIX Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014 Copyright 2005, 2014 Oracle and/or its affiliates. All rights reserved. This software and related documentation
Installation and Configuration Guide Simba Technologies Inc.
Simba Microsoft SQL Server ODBC Installation and Configuration Guide Simba Technologies Inc. September 10, 2015 Copyright 2015 Simba Technologies Inc. All Rights Reserved. Information in this document
Port Following. Port Following. Feature Description
Feature Description VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered
Cisco Physical Access Manager
Data Sheet Cisco Physical Access Manager 1.4.1 Cisco Physical Access Manager is the management application for the Cisco Physical Access Control solution. Cisco Physical Access Manager (Figure 1) is used
JD Edwards World Invoice Formatting Guide. Version A9.2
JD Edwards World Invoice Formatting Guide Version A9.2 Revised May 4, 2011 Copyright Notice Copyright 2010, Oracle. All rights reserved. Trademark Notice Oracle is a registered trademark of Oracle Corporation
Quest Collaboration Services 3.6.1. How it Works Guide
Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
System Requirements and Platform Support Guide
Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
Transaction Vault Credit Card Driver for 3700 POS
Restaurant Enterprise Series Transaction Vault Credit Card Driver for 3700 POS April 3, 2013 *******************Important******************* When upgrading the Transaction Vault Credit Card Driver from
http://support.oracle.com/
Contract Management System Architecture Data Sheet October 2012 Legal Notices Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle
Dell One Identity Manager 7.0. Help Desk Module Administration Guide
Dell 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure
Product Testing Programs
Catalog of USG Product Programs Version 1.0 November 15, 2010 NSTC Subcommittee on s and Identity Management 1. Introduction This Catalog of USG Product Programs (Catalog) supplements the Registry of USG,
Siebel Installation Guide for Microsoft Windows. Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014
Siebel Installation Guide for Microsoft Windows Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014 Copyright 2005, 2014 Oracle and/or its affiliates. All rights reserved. This software and
Keep Out of My Passport: Access Control Mechanisms in E-passports
Keep Out of My Passport: Access Control Mechanisms in E-passports Ivo Pooters June 15, 2008 Abstract Nowadays, over 40 different countries issue biometric passports to increase security on there borders.
Big Brother Professional Edition Windows Client Getting Started Guide. Version 4.60
Big Brother Professional Edition Windows Client Getting Started Guide Version 4.60 Copyright Quest Software, Inc. 2002 2011. All rights reserved. This guide contains proprietary information, which is protected
Adobe Connect Collaboration SDK Third Party Notices and/or Additional Terms and Conditions
Adobe Connect Collaboration SDK Third Party Notices and/or Additional Terms and Conditions The contents of this file are subject to the Netscape Public License Version 1.1 (the "License"); you may not
W.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
