Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.6: Study on ID Documents
Introduction
To describe threats that have to be taken into account when discussing security and privacy of ID documents a short and non-comprehensive overview on threats already being discussed in academic and non-academic communities is given. Basing on that overview in this chapter security and privacy aspects of four basic technologies used in ID documents are presented and discussed. This includes:
Biometrics
RFID
Chip card technology
Electronic signatures and PKI
Back-office systems are not part of this chapter, as an analysis of security and privacy issues of these systems clearly would exceed the scope of the FIDIS Network of Excellence.
Biometrics and RFID are technologies that have not been used in ID documents until recent times. In these cases the legal requirements for privacy and security are described and analysed in addition to a technical view. The reason is that the introduction of these technologies for the use in ID documents in Europe is politically very much driven by specific European Regulations and related documents. This chapter concludes with a summary and gives recommendations which users, policy makers and technicians should take into account when using current or developing future ID documents.
Denis Royer | 39 / 56 |