Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.6: Study on ID Documents
Title: “D3.6 Study on ID Documents”
Author: WP3
Editors: Dr. Martin Meints (ICPP, Germany)
Marit Hansen (ICPP, Germany)
Reviewers: Jozef Vyskoc (VAF, Slovakia)
Ronald Leenes (Tilburg University)
Mark Gasson (Reading University)
Type: [Deliverable]
Date: 10.11.20
Class: [Public]
File:
Summary
|
This document gives an overview of concepts, prototypes and implementations of European ID documents including machine readable travel documents (MRTDs). Although not totally comprehensive, it summarises basic technologies that are used for ID documents such as PKI, RFID, biometrics and chip card technologies. Legal grounds for European MRTDs are described and analysed. In addition to a short overview on implementations, five good practice examples are described and discussed. Security and privacy aspects of ID documents are analysed basing on current state-of-the-art in the described basic technologies and existing implementations of ID documents. Further, critical elements of cost projections for ID documents are presented and analysed from a social perspective. |
Copyright Notice:
This document may not be copied, reproduced, or modified in whole or in part for any purpose without written permission from the FIDIS Consortium. In addition to such written permission to copy, reproduce, or modify this document in whole or part, an acknowledgement of the authors of the document and all applicable portions of the copyright notice must be clearly referenced.
The circulation of this document is restricted to the staff of the FIDIS partner organisations and the European Commission. All information contained in this document is strictly confidential and may not be divulged to third parties without the express permission of the partners.
All rights reserved.
PLEASE NOTE: This document may change without notice – Updated versions of this document can be found at the FIDIS NoE website at www.fidis.net.
Foreword
FIDIS partners from various disciplines have contributed as authors to this document. The following list names the main contributors for the chapters of this document:
Chapter | Contributor(s) |
1 (Executive Summary) | Martin Meints (ICPP), all |
2 (Introduction) | Stefan Alexander Freh (chapter 2.1, LSE), Martin Meints (chapter 2.2 and 2.3, ICPP) |
3 (Basic Technologies for ID Documents) | Marcel Jacomet (chapter 3.2, AXSionics), Mark Gasson (chapter 3.3, Reading University), Günter Karjoth (chapter 3.3, IBM ZRL), Stefan Alexander Freh (chapter 3.7, LSE), Martin Meints (chapter 3.1, 3.4, 3.5, 3.6 and 3.8 ICPP) |
4 (Legal Grounds for ID Documents in Europe) | Paul De Hert, Wim Schreurs (chapter 4.1.1 to 4.1.5, VUB) Eleni Kosta (chapter 4.1.6, KU Leuven), Els Kindt, Xavier Huysmans (chapter 4.2, KU Leuven) |
5 (Leading Concepts, Prototypes and Implementations) | Claudia Diaz (chapter 5.2, KU Leuven), Marit Hansen (chapter 5.2 and 5.8, ICPP), Danny De Cock, Christopher Wolf and Bart Preneel (chapter 5.6, KU Leuven), Eleni Kosta (chapter 5.5, KU Leuven), Reshma Thomas (chapter 5.4 KU Leuven), Martin Meints (chapters 5.1, 5.2, 5.3, 5.5, 5.7, 5.8 and 5.9, ICPP) |
6 (Security and Privacy Aspects) | Els Kindt (chapter 6.3.1, KU Leuven), Andreas Pfitzmann, Sandra Steinbrecher (chapter 6.3.2, TU Dresden), Eleni Kosta (chapter 6.4.1, KU Leuven), Günter Karjoth (chapter 6.4.2, IBM ZRL) Marcel Jacomet (chapter 6.5.1, AXSionics), Marit Hansen (chapter 6.5.2, ICPP), Reshma Thomas (chapter 6.6, KU Leuven), Martin Meints (chapter 6.1, 6.2 and 6.7, ICPP) |
7 (Economic Aspects) | Ian O. Angell, Dionysios S. Demetis (LSE) |
8 (Summary, Conclusion and Outlook) | Martin Meints (ICPP), all |
Table of Contents
Denis Royer | 1 / 56 |