I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
184<br />
Currently, Belgium’s ID uses a PIN, and biometrics could be introduced with Match-on-Card. With such a system, any<br />
third-party organization can ask the card for the identity of the cardholder using a simple Application Programming<br />
Interface and reusing the tokens provided by the government. And registered traveller cards issued by an airport and<br />
accepted by other airports throughout the world could benefit from a Match-on-Card based card that could be used for<br />
check-in, security access, boarding and baggage control, as long as there is trust established between the issuing and<br />
the accepting authority.<br />
In the health care sector, which often involves both public and private partners, there is a growing trend towards issuing smart<br />
cards to patients so they can enjoy more convenient and secure access to services. Security could be further improved by the<br />
addition of Match-on-Card, ensuring that only those entitled to treatment receive it.<br />
MOC can also be performed with multiple biometric traits, enlarging the potential application fi elds and scaling diff erent<br />
strengths of the identifi cation systems.<br />
8.3.1.2 Portable devices for identity verifi cation<br />
Usage for proactive border control<br />
The success of biometrics at border control will depend largely on the method of implementation. The face has been chosen<br />
by the ICAO and EU as the primary biometric identifi er. But face recognition is currently one of the less accurate biometric<br />
technologies. It suff ers from technical diffi culties with uncontrolled lighting and it therefore may be necessary to install the<br />
face recognition readers in booths where lighting conditions are carefully controlled. Measures, such as this one, may lead to<br />
improvements in accuracy but also to an increase in costs.<br />
Multimodal systems are those which combine more than one biometric identifi er. As we already mentioned, it is currently<br />
planned to use face and fi ngerprints in EU border control systems as EAC becomes more and more widely used. Research<br />
initiatives have been launched on the application of multimodal biometrics in mobile communications (e.g. mobile telephones<br />
and other devices). However researchers need more test data and there is still much work to be done.<br />
How to manage certifi cates?<br />
Managing certifi cates in a mobile environment is very complex. But it is very important to investigate the possible solutions<br />
as most of the data stored in the electronic documents will soon require a certifi cate infrastructure to be read (with the<br />
generalization of EAC). So we need to fi nd solutions to the following issues:<br />
How to allow a constant access to the database of certifi cates with embedded devices<br />
How to make diff erent public keys, issued by all Member States, available for all fi xed and/or mobile receivers in the whole<br />
Schengen area<br />
By what means does the software “know” what certifi cate to ask for from the server?<br />
What are the means of conservation (even temporarily) of certifi cates in embedded devices?<br />
Usage in situations of crisis<br />
The challenge, in a situation of crisis, is to collect the maximum amount of data from victims as the set-up of victims’ lists is<br />
essential to manage the rescue eff ort. The collection of information has to be done effi ciently even though a lot of victims may<br />
be unconscious or shocked by the disaster and most of them will have lost their identity documents.<br />
Therefore, it is crucial to use, not only alphanumerical data as is primarily the case today, but also data collected from all kind<br />
of sensors, like biometric data (face, DNA, fi ngerprint or reader to assess (like mobile phones), as well. The system should then<br />
be able to identify the victims using limited information from one or more of these sources.<br />
A legal aspect of this challenge is also to create circumstance mechanisms that bypass privacy protection for the purpose of victim<br />
identifi cation (it is not yet the case for post-mortem identifi cation, but is should also be the case for ante-mortem identifi cation).<br />
The need for more resistant sensors/capture devices is also very important to be able to improve crisis management. Most of<br />
the current portable devices are not resistant enough to be used in harsh conditions.<br />
<strong>ESRIF</strong> FINAL REPORT - PART 2 • Working Group: Identifi cation of People and Assets