Identity Verification in Passport Issuance

Similar documents
Recommended Practice 1701 l

BIOMETRICS - WHY NOW?

EVIDENCE OF IDENTIFICATION

Biometrics: primed for business use

Policy Framework for the Regional Biometric Data Exchange Solution

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD)

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

Government of Pakistan NADRA Headquarters, Islamabad

A unique digital identity from birth and for a lifetime Civil registration as the foundation for digital identification systems

LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY. Presented By: Cristian Morosan - University of Houston

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

Canada s FASTER-PrivBio Project Biometrics at the Virtual Border to enhance security and facilitation

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

Biometrics from a legal perspective dr. Ronald Leenes

Achieving Interoperability

CPSC 467b: Cryptography and Computer Security

Ad-Hoc Query on identity documents issued by EU Member States. Requested by EE EMN NCP on 2 nd June Compilation produced on 9 th August 2010

THE KEYLESS SOCIETY. Reading Practice

Mauritania integrated epassport Project. JW ter Hennepe Sales Manager Morpho. October 10, 2012 Montreal

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER

Compendium of Good Practices in Identity Management

MACHINE READABLE TRAVEL DOCUMENTS (MRTDs)

REPORT 2015/168 INTERNAL AUDIT DIVISION. Audit of the operations in Thailand for the Office of the United Nations High Commissioner for Refugees

Case Study. MegaMatcher Accelerator

BIOMETRICS 101. Facial Recognition in Oregon

IOM, Migration, ID Management and the Responsible Use of Biometrics: Tools for Migration and Border Management

Policy Framework for the Regional Biometric Data Exchange Solution

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD)

International Biometrics & Identification Association

CORPORATE HEADQUARTERS

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference

Establishing Identity for International Protection: Challenges and Practices National contribution from the United Kingdom

EMN FOCUSSED STUDY Establishing Identity for International Protection: Challenges and Practices. National Contribution from Sweden

October 2015 Issue No: 2.4. Good Practice Guide No. 45 Identity Proofing and Verification of an Individual

BIOMETRIC RESIDENCE PERMITS General Information for Applicants, Employers and Sponsors

AGENDA. Focal Ideas A systemic approach. The enrolment The deliverance The control. Needs & Challenges Conclusion Look ahead

The Angola National ID Card

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?

DHS Biometrics Strategic Framework

Fragomen Privacy Notice

What is US-VISIT? United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Biometric Services

REVISOR PMM/NB A

Research Article. ISSN (Print)

SECURE REMOTE VOTER REGISTRATION

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:

Integrated Population Register. a key pillar in a holistic approach to citizen identification

Guidance Notes for the DBS Documentary Evidence Sheet

Biometrics Strategy Better public services Maintaining public trust. June 2018

Introduction-cont Pattern classification

Checklist for Conforming Laws Related to Remote Online Notarization ( RON )

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

International Journal of Research and Review E-ISSN: ; P-ISSN:

TWELFTH SESSION OF THE FACILITATION DIVISION THE MALAYSIAN ELECTRONIC PASSPORT

BEST PRACTICES WORKSHOP ON TRAVEL DOCUMENT SECURITY ORGANIZED BY THE OAS/CICTE AND ICAO SAN SALVADOR, EL SALVADOR JUNE 9-11, 2008

EU Information Systems

Privacy Impact Assessment Update for the. E-Verify RIDE. DHS/USCIS/PIA-030(b) May 6, 2011

E-gate case study: The German EasyPASS Project

4 REGISTRATION IN EMERGENCIES

5/6/2009. E toll Database. Census Database. Database. Database. Consumer Balance and Bill Subscriptions. Mobile Connections.

Global Identity Verification & Migration Mobility Control

Biometrics Technology for Human Recognition

Tanzania s Digital ID Ecosystem Roadmap: A vision for integration and enhanced service delivery

Supreme Court of Florida

STRATEGIES AND USEFULNESS OF ID-e (DNI-e) Benito Fernández Fernández, Head secretary at CNP Identification Department.

VISION IAS

Opinion 3/2012 on developments in biometric technologies

ONE ID Identity Assurance Standard

Global Entry Program. Information Guide

BIOMETRICS IN A HUMANITARIAN CONTEXT

6. Presentation of Pakistan. Economic Cooperation Organization - ECO. Syed Mushabir Hussain, 15th April, Registration initiatives

Immigration: Globalization. Immigration Practice Group Lex Mundi March 4-7, Rome, Italy

COUNCIL OF THE EUROPEAN UNION. Brussels, 11 November /04 LIMITE VISA 203 COMIX 684 NOTE

Application for Airport AOA Identification Media

APPRENTICE PERMIT APPLICATION. Sex--Male Female Birthday Social Security #

INF 10 eborders Security and Faciliation. Gemalto Government Programs Ion Otazua Gemalto

Occupational License Application

Singapore's Automated Clearance using Biometrics

The National Identification System (NIDS) Version: Modification: Author: Date: 1.1 Prepared FAQs NIDS Project Team November 15/11/2017

NIDS FAQS. The facts you need to know

Border Management and Visa Management

UNITED STATES DEPARTMENT OF JUSTICE EXECUTIVE OFFICE FOR IMMIGRATION REVIEW BOARD OF IMMIGRATION APPEALS FALLS CHURCH, VIRGINIA

Ad-Hoc Query on Implementation of Council Regulation 380/2008. Requested by FI EMN NCP on 10 th September 2009

Supreme Court Verdict on Aadhaar - I

How biometrics can improve the targeting of social protection. What we do. How we do it.

SUMMARY INTRODUCTION. xiii

ID ACCESS BADGE APPLICATION FOR AOA and NON-SIDA

Government Programs. ICAO REGIONAL SEMINAR ON MRTDs, BIOMETRICS AND BORDER SECURITY RIO DE JANEIRO, BRAZIL, APRIL 2012

Right to Review Process

The Philippine Department of Foreign Affairs began the issuance of the Philippine epassport (electronic passport) on 11 Aug 2009.

ID4D IDENTIFICATION FOR DEVELOPMENT

Question & Answer May 27, 2008

Einsatz von Fingerabdrücken im Europäischen Visumverfahren. Bundesverwaltungsamt (BVA) Bundesamt für Sicherheit in der Informationstechnik (BSI)

The Upcoming International Biometric Vocabulary Standard

ID4D. Country Diagnostic: Liberia. Public Disclosure Authorized. Public Disclosure Authorized. Public Disclosure Authorized

REAL ID ACT STATE IMPLEMENTATION RECOMMENDATIONS

Public Consultation on the Smart Borders Package

Transcription:

Identity Verification in Passport Issuance and dcivil ilregistration i The importance of context and continuity of identity Mr Ross Greenwood Principal Identity Matters Consulting 1

PURPOSE To invite a claim to a set of identity attributes and identity related attributes to enable an assessment of the claimed identity to a level of assurance sufficient to allow a passport/driver s licence/identity card to be issued having regard to security, efficiency i and client impact outcomes. 2

VERIFICATION OF CLAIMS It is up to the service provider to verify the citizen s claimed identity by checks of: what they have (ie credentials and tokens that show biographical and/or biometric i matching the identity being claimed); and what they know (ie verifiable information currently and/or previously associated with the identity being claimed); and who they are (ie biometric identifiers). 3

EFFICIENT/EFFECTIVE VERIFICATION OF CLAIMS It is up to the service provider to verify the claimed identity by checks of: what they have (ie credentials and tokens that show biographical Database validation, and/or PKI checks biometric for epassports, matching the identity being forensic examination. claimed); and what they know (ie verifiable information currently Interview and/or and previously supporting documentation. associated with the identity being claimed); and who they are (ie biometric identifiers). Automated biometric comparisons of fingerprints, face and iris images and voice prints. 4

THE ASSOCIATION CHALLENGE Why checks of what applicants have and who they are may not always be enough. Identity Attributes: Biographic Name Date of Birth Place of Birth Gender Nationality Identity Related Attributes Place Time Transactional Behaviour Identity Attributes: Biometric Markers Face Fingerprints Iris Voice Year 0 - enrol Year 10 1 st renewal Year 20 2 nd renewal Identity Timeline 5

Our biological identity is immutable. In contrast, the identity attributes and identity related attributes we use to support a claim to an identity are mutable. Identity verification is a complex task, within a complex system that is subject to error and fraud. Assessment of identity is inherently probabilistic and can t be determinative. The identity verification challenge is to reliably and accurately associate biographic and biometric identity attributes with each other and with the identity related attributes that help establish a credible context and continuity for the identity being claimed. Identity verification must in addition be able to be undertaken over time, in different places, and in different transactional contexts. 6

Our biological identity is immutable. In contrast, the identity attributes and identity related attributes we use to support a claim to an identity are mutable. Identity verification is a complex task, within a complex system that is subject to error and fraud. Assessment of identity is inherently probabilistic and can t be determinative. The identity verification challenge is to reliably and accurately associate biographic and biometric identity attributes with each other and with the identity related attributes that help establish a credible context and continuity for the identity being claimed. Identity verification must in addition be able to be undertaken over time, in different places, and in different transactional contexts. 7

association gone wrong 8

Step 1 Collect Step 2 Collate Step 3 Assess Identity Attributes Biographic o Family name o Given name o Date of birth o Place of birth o Gender o Nationality I Context of claim to identity? pattern analysis is transaction dependent Biometric o Face o Fingers o Iris o Voice Identity related Attributes associate attributes & compare toprioridentity identity claims Place o Address o Telephone # o IP address Time Transactions II Continuity of claim to identity? Frequency of token re issue Verification thresholds for transactions 9

Identifying suitable datasets and private sector identity verification partners Datasets that: include identity and identity related attributes; are transacted regularly and frequently; have explicit or implicit revalidation of identity or identity related attributes; have extensive coverage; have a geo-spatial nexus to the service being delivered; and incorporate time stamping features Banking (via credit checking agencies = data aggregators) Telecommunication i providers Utilities t Airline loyalty programs Social media 10

Identity Attributes: Biographic Name Date of Birth Place of Birth Gender Nationality Identity Related Attributes Place Time Transactional Behaviour Identity Attributes: Biometric Markers Face Fingerprints Ii Iris Voice Year 0 - enrol Year 10 1 st renewal Year 20 2 nd renewal Identity Timeline 11

There are no silver bullets in identity management: Improved enrolment practice is necessary but not sufficient. Improved document security is necessary but not sufficient. Improved application of biometric comparisons is necessary but not sufficient. Improved verification to establish context and continuity of identity is necessary but not sufficient. and our citizens need to be assured that achieving better identity security will not come at the cost of efficient delivery of services, their customer experience and their right to privacy. 12