Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.10: Biometrics in identity management
Most authors on biometrics agree that the legal aspects of the use of biometric data for verification and identification purposes should be further researched and, if needed, regulated. Because of the privacy and security risks, the legislator could also impose specific technical safeguards and conditions on the use of biometric applications. This is in general only partially done for the use of biometrics in specific biometric Type I governmental controlled ID model applications, such as the use of biometrics in ePassports. The imposed measures for the storage of biometrics in the RFID enabled ePassports however are still criticised as being insufficient and should therefore be further researched. Specific technical safeguards and conditions for the use of biometric data in other applications are in most countries not even regulated.
Biometric methods are still further developed and researched. For certain methods, especially face geometry measurement, impressive improvement in quality was achieved in the last two years. In addition, security and privacy protection of the implementation of certain biometric systems was improved significantly, as new methods for template protection were developed and encapsulated biometrics became available on the market. Research with the target of further improvements should (and will) be continued.
Research with respect to additional information in biometric reference data (both, raw data and templates) is needed – especially templates are mostly not investigated in this respect. Because raw data and templates can also be stolen and abused by impostors, further research is also needed on the use of uniquely encrypted templates, which, once stolen, can be revoked and replaced.
The availability of this type of research results would be very useful in the risk assessment of biometric methods (with respect to privacy also called Privacy Impact Analysis, PIA) and the assessment of proportionality of different methods for the same purpose in comparison.
36 / 40 |