I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
274<br />
Weight / Cost<br />
Estimate (small2-<br />
5€; med 10-25€;<br />
large 30-40€)<br />
Cluster Timeline<br />
(short-midlong-term)<br />
From WG What? Why? How? Key link<br />
elements<br />
running<br />
No.<br />
5<br />
long term med<br />
5<br />
3.11; 3.12;<br />
space weather,<br />
survey/tracking and space-imaging solutions through inorbit<br />
demonstration via dedicated missions<br />
The study and prediction of space weather by integration<br />
of data resulting from multiple satellites,<br />
detectors and forecasting systems is a key element in this<br />
respect.<br />
• Development of secure biometric acquisition systems.<br />
4<br />
knowledge of the population of space objects<br />
and debries, the space environment and<br />
existing threats/risks.<br />
The exposure of space components to the<br />
harsh conditions of space environment is a<br />
major concern for their performances and<br />
reliability<br />
Biometric technology can provide a very solid<br />
basis to manage people's identity. To get the<br />
69 7-space Space environment and<br />
Space Weather<br />
med<br />
short to mid<br />
term<br />
§ 3.1, 3.3, 3.9,<br />
3.10 & 4.2.4 part<br />
1 ; § 4.1.2. part 2<br />
(WG8) final<br />
report<br />
full benefit of this technology, several topics • Improved accuracy (FAR, FRR) of basic modalities.<br />
must be improved: - accuracy (very low false • Efficient methods/tools for fusion of modalities.<br />
acceptance and false reject rates); - robustness • Robustness to spoofing attacks (liveless/ motion<br />
to spoofing attacks; - speed (fast processing of detection,..).<br />
EAC data on travel documents); - quality and • Fast equipment to process ID control from documents<br />
ease of use of biometric acquisition<br />
(including EAC data processing).<br />
mechanisms, in particular for enrolment<br />
• Improved biometric acquisition device and procedures.<br />
70 8 Improved performances of<br />
biometric technologies<br />
applied to identity<br />
management<br />
<strong>ESRIF</strong> FINAL REPORT - ANNEX II<br />
processing<br />
short term med<br />
4<br />
• Development of new and innovative biometric sensors<br />
able to operate in the critical conditions that are typically<br />
found in a disaster scenes.<br />
• Evaluation of performance and robustness of countermeasures<br />
related to internal and external attacks and, if<br />
required, to profiling.<br />
• User behaviour and postural recognition, promoting<br />
“person identification” beyond biometric traits and<br />
avoiding identity theft.<br />
• Acquisition devices and systems certification.<br />
• Create biometric model specific for a usage.<br />
• Investigate multi-biometric traits application benefits<br />
and increased performances.<br />
• Define common procedures for ID check with mobile<br />
devices, including interoperability requirements.<br />
§ 3.9 part 1 ; §<br />
4.2.2 part 2<br />
(WG8) final<br />
report<br />
Mobile Identity Devices A growing number of situations require the<br />
capability to control identity on the field, such<br />
as border control, police controls, or for the<br />
management of victims after a catastrophic<br />
event. New generations of mobile devices are<br />
71 8<br />
short term large<br />
4<br />
§ 3.10, 4.2.4 part<br />
1 ; § 4.2.1 part 2<br />
(WG8) final<br />
report<br />
• Develop new generation of mobile equipment: privacy<br />
by design, multi-modalities, accurate, fast, highly<br />
secured, easy of use.<br />
• Harmonize national legislation between all <strong>European</strong><br />
Member States for all applications where eID is<br />
mandatory (travel, e-Services, Driving license, eHealth,<br />
…).<br />
• Development of agreed processes and standards.<br />
needed for this purpose.<br />
Identity theft is a major current problem in the<br />
world, impacting millions of people and<br />
undermining global and financial security. No<br />
coherent approach to address this threat is<br />
currently in place. It requires a concerted effort<br />
72 8 Protection against Identity<br />
Theft and frauds in both<br />
physical and virtual worlds