ISSUANCE AND CIVIL REGISTRATION

Similar documents
New Age Vital Statistics Services: What They Do and Don t Do

2 3, MAY 2018 ANKARA, TURKEY

Identity Management and its impact on the Digital Economy

Topic: Birth registration as an opportunity to integrate civil registration and identity management systems

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

Biometric Recognition: How Do I Know Who You Are?

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

Authenticated Document Management System

Personal. Identity. Information

Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.

Pan-Canadian Trust Framework Overview

INNOVATIVE ADMINISTRATIVE PRACTICES H UMAN ES ERVICES D ELIVERY John Zimmerman* E XECUTIVE S UMMARY

HOW TO BUILD GEODEMOGRAPHICS FROM BIG DATA. March 2016 Graham Smith, Associate Director

ICAO. ICAO Council JTC1 ISO/IEC. Air Transport Committee SC17 TAG/MRTD WG3 ICBWG NTWG DOC ISO National Bodies.

KEY FOCUS. Mobile Solutions for. Securing the Entire Identity Trust Chain. Border Management. Solving the Challenges of Breeder Documents

Introduction to Biometrics 1

The global leader in trusted identities for an increasingly digital world. Press kit September, 28 th 2017

Innovation in the identity domain: is ICAO s TRIP prepared for innovations?

Civil Registry System National Population Register

FastPass A Harmonized Modular Reference System for Automated Border Crossing (ABC)

BIOMETRICS BY- VARTIKA PAUL 4IT55

Micro Sources of Data Aggregators

RECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA

Legal Aspects of Identity Management and Trust Services

User Awareness of Biometrics

COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL

Biometrics - A Tool in Fraud Prevention

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Metaverse. Digital Identity White Paper

HMG's Minimum Requirements for the Verification of the Identity of Individuals

MEMBERSHIP APPLICATION

Metaverse. Digital Identity White Paper

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

Workshop 19 on Security and Governance of Identity on the Internet. Presented by BCS the chartered institute for IT, UK and OpenNet, Korea.

IMPLEMENTING HSPD-12: A PROGRAM MANAGER S PERSPECTIVE

Mutual Understanding of Criminal Records Information Project (MUCRI)

V I S O c o r e I n s p e c t

Rules for Game Digital All Cash

S&T Stakeholders Conference

ENTRY CLEARANCE GUIDANCE NOTES

Applying for a National Insurance (NI) number

Experiments with An Improved Iris Segmentation Algorithm

Digitale Ausweise für physische Identifikation?

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno

PROGRAM CONCEPT NOTE Theme: Identity Ecosystems for Service Delivery

Biometric Recognition Techniques

To extend a Tier 4 visa or make a PBS Dependants visa application in the UK you must begin the process online. This guide will show you how.

First Components Ltd, Savigny Oddie Ltd, & Datum Engineering Ltd. is pleased to provide the following

Digital Identity. Workshop. Roland Berger Munich Office

ICTen - Invest in Unique ID Schemes and Link CRVS and UHC - a Focus on Concrete Steps and Capacity Building October 29-30, 2015

International Journal of Pure and Applied Mathematics

Digital Identity Innovation Canada s Opportunity to Lead the World. Digital ID and Authentication Council of Canada Pre-Budget Submission

Department for Education and Child Development School Enrolment Census Data Quality Statement

Assessing the Welfare of Farm Animals

All-in-One Scanner VF1

Dermalog Gate. The next generation gate Made in Germany. v_1.0_171012

Guide to completing the Tier 4 application form in the UK January 2017

The Role of Biometrics in Virtual Communities. and Digital Governments

Biometric Signature for Mobile Devices

IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF OHIO WESTERN DIVISION : : Plaintiff,

Rules for Game The Christmas Cracker

The progress in the use of registers and administrative records. Submitted by the Department of Statistics of the Republic of Lithuania

VISUAL ARTS COLLECTION COORDINATOR

Laser Surface Authentication TM : biometrics for documents and goods

System Audit Checklist

IRIS Recognition Using Cumulative Sum Based Change Analysis

Chen, Ph.D.) Visual Information Processing & CyberCommunications Lab. (VIP-CCL) 視覺資訊處理暨信息通訊實驗室.

Title Goes Here Algorithms for Biometric Authentication

Digital Identity Toolkit

Methodology Statement: 2011 Australian Census Demographic Variables

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY

GENEVA COMMITTEE ON DEVELOPMENT AND INTELLECTUAL PROPERTY (CDIP) Fifth Session Geneva, April 26 to 30, 2010

My fingers are all mine: Five reasons why using biometrics may not be a good idea

This Privacy Policy describes the types of personal information SF Express Co., Ltd. and

TIER 4 ONLINE ENTRY CLEARANCE APPLICATION GUIDE USE ONLY IF APPLYING OUT OF THE UK

A Field Guide to Exploring

Header. The Role of Optical Security Media in Secure Identification

International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January ISSN

Legislative and Regulatory Update. Diane Bowers, CASRO President CASRO Data Collection Conference November 19, 2009

Future of Identity in the Information Society. An FP6 Network of Excellence

Biometrics and Fingerprint Authentication Technical White Paper

Committed to crafting exceptional passports

PERFORMANCE TESTING EVALUATION REPORT OF RESULTS

Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009

Face Recognition Based Attendance System with Student Monitoring Using RFID Technology

BIOMETRIC IDENTIFICATION

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Agricultural Data Verification Protocol for the Chesapeake Bay Program Partnership

IDENTITY REPAIR IN THE GOV.UK VERIFY FEDERATION

UNFPA/WCARO Census: 2010 to 2020

Office hrs: QC: Tue, 1:40pm - 2:40pm; GC: Thur: 11:15am-11:45am.or by appointment.

application for independent writers caucus

DNA PATERNITY TESTING YOUR QUESTIONS ANSWERED. Need some advice on testing? Call us free on:

Gemalto Color Laser Shield

Volume 3, Number 3 The Researcher s Toolbox, Part II May 2011

We stand for Augmented Identity

Canada s Digital ID Future - A Federated Approach

Staffordshire Police

Little Fingers. Big Challenges.

Transcription:

IDENTITY VERIFICATION IN PASSPORT ISSUANCE AND CIVIL REGISTRATION THE IMPORTANCE OF CONTEXT AND CONTINUITY OF IDENTITY Ross Greenwood Identity Matters Consulting Australia

PURPOSE To invite a claim to a set of identity attributes and identity related attributes to enable an assessment of the claimed identity to a level of assurance sufficient to allow a passport/driver s licence/identity card to be issued having regard to security, efficiency and client impact outcomes.

VERIFICATION OF CLAIMS It is up to the service provider to verify the citizen s claimed identity by checks of: what they have (ie credentials and tokens that show biographical and/or biometric matching the identity being claimed); and what they know (ie verifiable information currently and/or previously associated with the identity i being claimed); and who they are (ie biometric identifiers).

EFFICIENT/EFFECTIVE VERIFICATION OF CLAIMS It is up to the service provider to verify the claimed identity by checks of: what they have (ie credentials and tokens that show biographical Database and/or validation, biometric PKI checks matching for epassports, the identity being claimed); and forensic examination. what they know (ie verifiable information currently and/or previously Interview and associated supporting with documentation. the identity i being claimed); and who they are (ie biometric identifiers). Automated biometric comparisons of fingerprints, face and iris images and voice prints.

THE ASSOCIATION CHALLENGE Why checks of what applicants have and who they are may not always be enough. Identity Attributes: Biographic Name Date of Birth Place of Birth Gender Nationality Identity Related Attributes Place Time Transactional Behaviour Identity Attributes: Biometric Markers Face Fingerprints Iris Voice

Our biological identity is immutable. In contrast, the identity attributes and identity related attributes we use to support a claim to an identity are mutable. Identity verification is a complex task, within a complex system that is subject to error and fraud. Assessment of identity is inherently probabilistic and can t be determinative. The identity verification challenge is to reliably and accurately associate biographic and biometric identity attributes with each other and with the identity related attributes that help establish a credible context and continuity for the identity being claimed. Identity verification must in addition be able to be undertaken over time, in different places, and in different transactional contexts.

Our biological identity is immutable. In contrast, the identity attributes and identity related attributes we use to support a claim to an identity are mutable. Identity verification is a complex task, within a complex system that is subject to error and fraud. Assessment of identity is inherently probabilistic and can t be determinative. The identity verification challenge is to reliably and accurately associate biographic and biometric identity attributes with each other and with the identity related attributes that help establish a credible context and continuity for the identity being claimed. Identity verification must in addition be able to be undertaken over time, in different places, and in different transactional contexts.

association gone wrong

An Identity Verification Model Step 1 Collect Step 2 Collate Step 3 Assess Identity Attributes Biographic o Family name o Given name o Date of birth o Place of birth o Gender o Nationality I Context of claim to identity? pattern analysis is transaction dependent Biometric o Face o Fingers o Iris o Voice Identity related Attributes associate attributes & compare toprioridentity identity claims Place o Address o Telephone # o IP address Time Transactions II Continuity of claim to identity? Frequency of token re issue Verification thresholds for transactions

Identifying suitable datasets and private sector identity verification partners Datasets that: include identity and identity related attributes; are transacted regularly and frequently; have explicit or implicit revalidation of identity or identity related attributes; have extensive coverage; have a geo-spatial nexus to the service being delivered; and incorporate time stamping features Banking (via credit checking agencies = data aggregators) Telecommunication providers Utilities Airline loyalty programs Social media

Conclusions There are no silver bullets in identity management: Improved enrolment practice is necessary but not sufficient. Improved document security is necessary but not sufficient. Improved application of biometric comparisons is necessary but not sufficient. Improved verification to establish context and continuity of identity is necessary but not sufficient. and our citizens need to be assured that achieving better identity security will not come at the cost of efficient delivery of services, their customer experience and their right to privacy.