23.10.2013 Views

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

184<br />

Currently, Belgium’s ID uses a PIN, and biometrics could be introduced with Match-on-Card. With such a system, any<br />

third-party organization can ask the card for the identity of the cardholder using a simple Application Programming<br />

Interface and reusing the tokens provided by the government. And registered traveller cards issued by an airport and<br />

accepted by other airports throughout the world could benefit from a Match-on-Card based card that could be used for<br />

check-in, security access, boarding and baggage control, as long as there is trust established between the issuing and<br />

the accepting authority.<br />

In the health care sector, which often involves both public and private partners, there is a growing trend towards issuing smart<br />

cards to patients so they can enjoy more convenient and secure access to services. Security could be further improved by the<br />

addition of Match-on-Card, ensuring that only those entitled to treatment receive it.<br />

MOC can also be performed with multiple biometric traits, enlarging the potential application fi elds and scaling diff erent<br />

strengths of the identifi cation systems.<br />

8.3.1.2 Portable devices for identity verifi cation<br />

Usage for proactive border control<br />

The success of biometrics at border control will depend largely on the method of implementation. The face has been chosen<br />

by the ICAO and EU as the primary biometric identifi er. But face recognition is currently one of the less accurate biometric<br />

technologies. It suff ers from technical diffi culties with uncontrolled lighting and it therefore may be necessary to install the<br />

face recognition readers in booths where lighting conditions are carefully controlled. Measures, such as this one, may lead to<br />

improvements in accuracy but also to an increase in costs.<br />

Multimodal systems are those which combine more than one biometric identifi er. As we already mentioned, it is currently<br />

planned to use face and fi ngerprints in EU border control systems as EAC becomes more and more widely used. Research<br />

initiatives have been launched on the application of multimodal biometrics in mobile communications (e.g. mobile telephones<br />

and other devices). However researchers need more test data and there is still much work to be done.<br />

How to manage certifi cates?<br />

Managing certifi cates in a mobile environment is very complex. But it is very important to investigate the possible solutions<br />

as most of the data stored in the electronic documents will soon require a certifi cate infrastructure to be read (with the<br />

generalization of EAC). So we need to fi nd solutions to the following issues:<br />

How to allow a constant access to the database of certifi cates with embedded devices<br />

How to make diff erent public keys, issued by all Member States, available for all fi xed and/or mobile receivers in the whole<br />

Schengen area<br />

By what means does the software “know” what certifi cate to ask for from the server?<br />

What are the means of conservation (even temporarily) of certifi cates in embedded devices?<br />

Usage in situations of crisis<br />

The challenge, in a situation of crisis, is to collect the maximum amount of data from victims as the set-up of victims’ lists is<br />

essential to manage the rescue eff ort. The collection of information has to be done effi ciently even though a lot of victims may<br />

be unconscious or shocked by the disaster and most of them will have lost their identity documents.<br />

Therefore, it is crucial to use, not only alphanumerical data as is primarily the case today, but also data collected from all kind<br />

of sensors, like biometric data (face, DNA, fi ngerprint or reader to assess (like mobile phones), as well. The system should then<br />

be able to identify the victims using limited information from one or more of these sources.<br />

A legal aspect of this challenge is also to create circumstance mechanisms that bypass privacy protection for the purpose of victim<br />

identifi cation (it is not yet the case for post-mortem identifi cation, but is should also be the case for ante-mortem identifi cation).<br />

The need for more resistant sensors/capture devices is also very important to be able to improve crisis management. Most of<br />

the current portable devices are not resistant enough to be used in harsh conditions.<br />

<strong>ESRIF</strong> FINAL REPORT - PART 2 • Working Group: Identifi cation of People and Assets

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!