23.10.2013 Views

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

274<br />

Weight / Cost<br />

Estimate (small2-<br />

5€; med 10-25€;<br />

large 30-40€)<br />

Cluster Timeline<br />

(short-midlong-term)<br />

From WG What? Why? How? Key link<br />

elements<br />

running<br />

No.<br />

5<br />

long term med<br />

5<br />

3.11; 3.12;<br />

space weather,<br />

survey/tracking and space-imaging solutions through inorbit<br />

demonstration via dedicated missions<br />

The study and prediction of space weather by integration<br />

of data resulting from multiple satellites,<br />

detectors and forecasting systems is a key element in this<br />

respect.<br />

• Development of secure biometric acquisition systems.<br />

4<br />

knowledge of the population of space objects<br />

and debries, the space environment and<br />

existing threats/risks.<br />

The exposure of space components to the<br />

harsh conditions of space environment is a<br />

major concern for their performances and<br />

reliability<br />

Biometric technology can provide a very solid<br />

basis to manage people's identity. To get the<br />

69 7-space Space environment and<br />

Space Weather<br />

med<br />

short to mid<br />

term<br />

§ 3.1, 3.3, 3.9,<br />

3.10 & 4.2.4 part<br />

1 ; § 4.1.2. part 2<br />

(WG8) final<br />

report<br />

full benefit of this technology, several topics • Improved accuracy (FAR, FRR) of basic modalities.<br />

must be improved: - accuracy (very low false • Efficient methods/tools for fusion of modalities.<br />

acceptance and false reject rates); - robustness • Robustness to spoofing attacks (liveless/ motion<br />

to spoofing attacks; - speed (fast processing of detection,..).<br />

EAC data on travel documents); - quality and • Fast equipment to process ID control from documents<br />

ease of use of biometric acquisition<br />

(including EAC data processing).<br />

mechanisms, in particular for enrolment<br />

• Improved biometric acquisition device and procedures.<br />

70 8 Improved performances of<br />

biometric technologies<br />

applied to identity<br />

management<br />

<strong>ESRIF</strong> FINAL REPORT - ANNEX II<br />

processing<br />

short term med<br />

4<br />

• Development of new and innovative biometric sensors<br />

able to operate in the critical conditions that are typically<br />

found in a disaster scenes.<br />

• Evaluation of performance and robustness of countermeasures<br />

related to internal and external attacks and, if<br />

required, to profiling.<br />

• User behaviour and postural recognition, promoting<br />

“person identification” beyond biometric traits and<br />

avoiding identity theft.<br />

• Acquisition devices and systems certification.<br />

• Create biometric model specific for a usage.<br />

• Investigate multi-biometric traits application benefits<br />

and increased performances.<br />

• Define common procedures for ID check with mobile<br />

devices, including interoperability requirements.<br />

§ 3.9 part 1 ; §<br />

4.2.2 part 2<br />

(WG8) final<br />

report<br />

Mobile Identity Devices A growing number of situations require the<br />

capability to control identity on the field, such<br />

as border control, police controls, or for the<br />

management of victims after a catastrophic<br />

event. New generations of mobile devices are<br />

71 8<br />

short term large<br />

4<br />

§ 3.10, 4.2.4 part<br />

1 ; § 4.2.1 part 2<br />

(WG8) final<br />

report<br />

• Develop new generation of mobile equipment: privacy<br />

by design, multi-modalities, accurate, fast, highly<br />

secured, easy of use.<br />

• Harmonize national legislation between all <strong>European</strong><br />

Member States for all applications where eID is<br />

mandatory (travel, e-Services, Driving license, eHealth,<br />

…).<br />

• Development of agreed processes and standards.<br />

needed for this purpose.<br />

Identity theft is a major current problem in the<br />

world, impacting millions of people and<br />

undermining global and financial security. No<br />

coherent approach to address this threat is<br />

currently in place. It requires a concerted effort<br />

72 8 Protection against Identity<br />

Theft and frauds in both<br />

physical and virtual worlds

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!