Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
D3.1: Overview on IMS.
D3.2: A study on PKI and biometrics.
D3.3: Study on Mobile Identity Management.
D3.5: Workshop on ID-Documents.
D3.6: Study on ID Documents.
D3.7: A Structured Collection on RFID Literature.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
D3.10: Biometrics in identity management.
D3.11: Report on the Maintenance of the IMS Database.
D3.15: Report on the Maintenance of the ISM Database.
D3.17: Identity Management Systems – recent developments.
D12.1: Integrated Workshop on Emerging AmI Technologies.
D12.2: Study on Emerging AmI Technologies.
D12.3: A Holistic Privacy Framework for RFID Applications.
D12.4: Integrated Workshop on Emerging AmI.
D12.5: Use cases and scenarios of emerging technologies.
D12.6: A Study on ICT Implants.
D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
D12.10: Normality Mining: Results from a Tracking Study.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
D3.10: Biometrics in identity management
Table Of Content
- Executive Summary
- Introduction
- Overview of the document
- Review of previous
- FIDIS findings on biometrics
- Biometrics in identity management and the authentication process: basic concepts and major distinctions
- Facts and findings on biometric systems
- Definitions and state of the art in biometrics
- Definitions of biometric terms
- Reference model of a biometric system
- Quality factors of biometric systems
- Biometric system errors
- Valuation of a biometric system in identity management
- Legal treatment and regulations of biometrics
- Standards and regulations
- Situation in some selected countries
- Regulation for biometrics as a primary key for interoperability ?
- Control schemes within biometric systems
- Classification of biometric systems
- Advantages and Disadvantages of the different control models
- Overview
- of different types of biometric applications
- Security and privacy aspects of biometrics
- Security aspects of a biometric system
- Proportionality and Revocability
- Revocability
- Proportionality
- Privacy problems
- Direct identify ability, link ability and profiling
- Additional and in some cases health related information in biometrics
- Advantages and needs for biometrics
- Binding between physical and digital world
- Negative identity verification
- Biometrics as a privacy guard
- Forensics with biometric methods
- Convenience
- Recommendations and guidelines
- Best practice: some examples
- The integration of biometrics in electronic documents issued by the government
- Identity documents and issues
- Integrating biometrics in identity documents
- Match-on-card
- System-on-card
- User Side Identity Management System – encapsulated biometrics
- Drawbacks of traditional centralised biometric system architecture
- User-side biometric process for added robustness
- Future areas of research
- Conclusions
- Bibliography
- Annex 1: Acronyms and Glossary
- Annex 2: Characteristics of the different control schemes