End-to-end security with advanced biometrics technology



Similar documents
End-to-end security with advanced biometrics technology

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise

Coesys Border Management

PRIME IDENTITY MANAGEMENT CORE

Coesys Border Management

BALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION

Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013

The Leading Provider of Identity Solutions and Services in the U.S.

Examples of Large Scale Biometrics Systems:

THE LEADING EDGE OF BORDER SECURITY

Veridos Protects Identities. The expert for worldwide government solutions

Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Complete. security. begins with 3M

IDENTIFICATION Morpho Driver s license Solution for governments and road traffic authorities

SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS

Statewatch Briefing ID Cards in the EU: Current state of play

Best Solutions for Biometrics and eid

CYBERSECURITY. Global cybersecurity capabilities for a digital transformation with confidence. Delivering Transformation. Together.

International Civil Aviation Organization ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE

IDENTITY SOLUTIONS FOR A BETTER WORLD

POSITION PAPER. The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND

Discover Germany s Electronic Passport

Application of Biometric Technology Solutions to Enhance Security

Delivering peace of mind in outsourcing

FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and ID verification.

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

Preventing fraud in epassports and eids

Biocryptology is an encryption-based. entry to a network or the Internet that. are vulnerable to third parties through

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS

De-duplication The Complexity in the Unique ID context

Cyber Security Recommendations October 29, 2002

Modular biometric architecture with secunet biomiddle

FEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS

How To Get Smart Cards From Atos

Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board

ROADMAP TOWARDS A VISA-FREE REGIME WITH TURKEY

Defending the Internet of Things

Strengthen security with intelligent identity and access management

IBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking

Best Practices for the Use of RF-Enabled Technology in Identity Management. January Developed by: Smart Card Alliance Identity Council

Secure egovernment Where convenience meets security.

CYBER SECURITY Audit, Test & Compliance

Final (RUSSIA-EU VISA DIALOGUE) GENERAL FRAMEWORK

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

INTERNET DATA SAFE SOLUTIONS TURNKEY AND CUSTOM MADE

Electronic machine-readable travel documents (emrtds) The importance of digital certificates

Surveillance and Security Systems

Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

SURVEILLANCE ENHANCED FACE RECOGNITION

W.A.R.N. Passive Biometric ID Card Solution

Borders, Immigration and Identity Action Plan. Using the National Identity Scheme to strengthen our borders and enforce compliance within the UK

Biometrics and Cyber Security

one admin. one tool. Providing instant access to hundreds of industry leading verification tools.

IDaaS: Managed Credentials for Local & State Emergency Responders

ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents

Biometrics for Public Sector Applications

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

CoSign by ARX for PIV Cards

W H I T E PA P E R. Cloud Migration Methodology -Janaki Jayachandran (Director of Technology) a t t e n t i o n. a l w a y s.

How To Use Ncr Aptra Clear

Fighting Identity Fraud with Data Mining. Groundbreaking means to prevent fraud in identity management solutions

SMART CITY. The interconnected city: improving the quality of life of citizens

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

PrivyLink Cryptographic Key Server *

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

What is Security Intelligence?

future data and infrastructure

/ transport Supervision at The Heart of Transport Network Security

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Complying with PCI Data Security

Digital signature and e-government: legal framework and opportunities. Raúl Rubio Baker & McKenzie

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics

TOURISM INNOVATIVE PAYMENT SOLUTIONS. Efficient, flexible, worldwide and secure

<cloud> Secure Hosting Services

An introduction to Cryptosoft

DOBUS And SBL Cloud Services Brochure

Internet Governance and Cybersecurity Patrick Curry MACCSA

Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare

How To Create Trust Online

Transcription:

www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology

Challenges and opportunities New environment With the explosion in personal mobility and growing migratory flows, governments face the major challenge of implementing secure identification systems based on advanced technologies such as biometrics while complying with the latest standards of identity assurance and privacy protection. Secure ID documents are needed to identify travellers, curb illegal immigration and fight terrorism, but ID management programmes can also simplify relations between citizens and the state, bringing access to elections, employment and social services. A more interconnected world is inevitably more complex and more vulnerable. With the growing volume of global trade and travel, government and international agencies have to respond to the proliferation of new types of risks and threats, such as illegal immigration, cybercrime and terrorism. Organisations such as the ICAO and ISO are developing international standards for travel documents including passports, visas and resident permits. The new standards define security features, electronic components and biometric data formats to ensure the interoperability that is a basic requirement in a more connected world. Governments rebuilding their institutions after conflicts or major disasters see identity management programmes as an opportunity to prepare for the future by issuing new ID documents and developing their identity databases. Over 4 billion airline passenger movements annually New types of threats: illegal immigration, organised crime, cybercrime, terrorism Electronic document market growth forecast: 31.2% (CAGR from 2008 to 2015) Annual growth in identity fraud: 300% 300 million electronic passports issued worldwide in less than 10 years Worldwide biometrics market growth forecast: 25.5% (CAGR from 2008 to 2015) Emergence of global standards/ regulations (ISO, ICAO, EU, etc.) At the same time, governments have a duty to protect the privacy of their citizens by guaranteeing the security of the systems used to issue and control a whole range of documents including national identity cards, e-id cards, voter registration cards, passports, e-passports, visas and driving licences. In addition, since ID documents are increasingly used to bring citizens access to basic rights and services (elections, employment, banking, etc.), identity management programmes have come to play a critical role in social and economic development. Because security is only as strong as the weakest link in the system, a holistic, end-to-end approach represents the only effective response to the challenge of secure identity management. 2_Identity management Identity management_3

Preregistration management Turnkey identity management solutions Data acquisition & enrolment TAME3S City hall & decentralised centres Thales harnesses the latest advances in smartcards, biometrics, cryptography and information systems to meet customers growing security requirements while protecting the privacy of new ID document holders and providing access to numerous travel-related and e-government applications. workflow management TIDMS Centralised back-office Multimodal biometric identification TAMMIS Centralised back-office Secured document production TI2S Back-office & decentralised centres Border crossing & identity controls TBCS City hall & border entrypoint External legacy systems The Thales approach to identity management is an end-to-end solution. The solution encompasses everything from collection of biometric data from individual citizens (enrolment) through to the creation and management of secure ID systems, databases, production and personalisation of secure documents, and access control systems to authenticate document users as part of border control solutions. Drawing on its experience as a systems architect and integrator, Thales works with its customers to tailor each solution to a specific set of requirements, defining an open architecture that can incorporate legacy systems and is fully scalable to accommodate future growth and technology insertion. With its extensive in-country operations and a global partnership network, Thales is the local trusted partner of choice for ID management programmes worldwide. Enrolment The Thales Automated Secured Modular Enrolment Solution & Services (TAME3S) is an integrated solution combining conventional enrolment with digital capture of biometric data. TAME3S guarantees complete biometrics acquisition (face, 10 fingerprints, signature) thanks to an ergonomic console and an intuitive enrolment process which ensure realtime quality control of results at each capture. Biometric identification The Thales Automated Multi Modal Identification System (TAMMIS) is an enhanced biometric system based on the Thales AFIS 1 and designed around an open and configurable architecture to manage different population groups, with biometric features (fingerprint, face, iris) supported by multiple applications. With its unique biometrics workflow management feature, TAMMIS can be implemented in any business process and easily integrated or interfaced with other systems. Document production Thales s graphical and electronic personalisation solutions handle multiple secure document types and manage all associated subsystems. As a global security expert, Thales secures the ID document during the personalisation phase, archives production data and guarantees traceability. Thales secure ID document solutions include TI2S, a multilayer composite card. This new-generation card includes an electronic chip and a colour photograph of the card holder, and has a lifetime of 10 years. Control and delivery Thales provides fixed and mobile solutions to verify identities automatically both at border checkpoints and in-country. As well as checking the match between the document and the bearer, Thales secure authentication solutions also cross-check bearers with watch lists and stolen document reports. The Thales Border Control System (TBCS) can be used under any circumstances to verify and validate traveller movements into and out of the territory. Thales provides and manages a secure framework and trusted infrastructure, integrating legacy systems and new hardware and software components as required. The Thales IDentity workflow Management System (TIDMS) can be customised and finetuned to fit customer use cases. 4_Identity management 1 Automated Fingerprint Identification System Identity management_5

World leader in critical IT systems Thales has drawn on its experience as a systems integrator for military and public safety organisations to become one of the world leaders in end-to-end critical information systems security and management for government agencies. Today, secure ID solutions rely on robust IT expertise covering overall system architecture, deployment constraints and specific hosting components. Why Thales? A world leader in defence & security markets More than 250 million secure ID documents produced by Thales systems to date Recognised expertise in secure identity document and civil biometrics Extensive experience in document design to fight counterfeiting and falsification Secure IT hosting Designed for secure, mission-critical applications, Thales s hosting and operational datacentres guarantee the highest level of security, availability, reliability and integrity. End-to-end security Thales guarantees its customers endto-end security solutions including systemlevel and operational security, security of supply, operational and network security, and secure Key Management Infrastructures (KMI). Cybersecurity Thales offers a broad array of cybersecurity solutions for critical information and communication systems, ranging from security consulting and secure architecture implementation to network encryption equipment and security appliances for information systems, as well as full installation, maintenance and local support services. Unique track record, with over 30 years of experience in integrated identity management programmes worldwide Thales ID document production and control systems in operation in over 25 countries Full compliance with intern ational standards Capacity to integrate off-the-shelf products and/or proprietary solutions 6_Identity management Identity management_7

Thales Communications & Security 20-22 rue Grange Dame Rose - 78141 Vélizy-Villacoublay - +33(0)1 73 32 00 00