You are here: Resources > FIDIS Deliverables > HighTechID > D3.10: Biometrics in identity management > 

D3.10: Biometrics in identity management

Advantages and needs for biometrics  Title:
BINDING BETWEEN PHYSICAL AND DIGITAL WORLD
 Negative identity verification

 

Binding between physical and digital world

A token (possession) or a secret (knowledge) as traditional factors for authentication have a common problem: is its user the legitimate user or has the token be stolen and is being used by an unauthorised person? To secure the binding between a token and an authorised user, knowledge as an additional factor of authentication (e.g. in the SecureID systems by RSA Inc.) or a facial image (photo, e.g. in paper based travel documents) can be added.  

In this context biometrics can be used instead or in addition to knowledge or printed photos on ID documents to secure the binding between a physical person and a token. This could be applied not only to Type I government controlled ID models, but also to the Type II access model, the Type III mixed model and the Type IV b convenience model. 

At that point, however, one should question which functionality of biometrics shall be deployed in order to meet the proportionality criterion. To improve the security by deployment of biometrics, the security can in most cases already be improved considerably by applying the verification mode of biometrics in combination with a token. Biometrics will than be used for verification purposes. This is especially valid for the biometric Type II access model for securing access to online systems (see above, section ), even if the biometrics in that model are used in an environment where there is no supervision (e.g., web access at home for financial services). The use of biometrics for identification purposes through deployment of that biometric in combination with a token for a 1:N comparison locally in a Type II model does not add much to the security for that application, while the central storage of the biometric which is needed for the 1:N check contains considerable risks for the person involved (such as the loss of control over the use of the biometrics - see also above). The use of biometrics in combination with a token for identification could for that reason be considered disproportionate. This problem becomes void if one assumes that the biometric is stored in a secured token, which cannot be easily counterfeited or hacked.

Decisions of DPAs in some countries seem to follow that approach. The DPA in France has issued on 27th April 2006 a ‘single authorisation’ decision in which it allows the use of fingerprints to the extent the fingerprint of employees is verified with the template stored on the card for access control, without central storage.

 

Advantages and needs for biometrics  20071228_fidis_deliverable_wp3_10_V1.0.final.sxw  Negative identity verification
24 / 40