More Related Content Similar to Using biometric technology to facilitate airport security - November 2015 (20) Using biometric technology to facilitate airport security - November 20151. © 2014 Rockwell Collins. All rights reserved.
Using Biometric Technology to
Facilitate Security
2. © 2014 Rockwell Collins.
All rights reserved.
Use of Biometrics in Airport Security
• Biometrics are most widely
used in securing border/entry
control
• Aid to government officials
• Supervision of multiple
kiosks / gates
• Principle aim is to enhance
passenger throughput
3. © 2014 Rockwell Collins.
All rights reserved.
• Based upon comparison of captured
biometric against a previously registered
token.
• Normally the passport picture, but can
include alternates such as iris or fingerprint
in “known traveller” programmes
• Provides identity verification service:
– RED Definitely not a match
– GREEN Definitely a match
– AMBER Uncertain
• Biometrics useful at confirmation of
definitive results
4. © 2014 Rockwell Collins.
All rights reserved.
Application to the Outbound Journey
• To enhance the passenger
experience and support self
service, biometrics are now
being employed in the
outbound journey.
• Verification at self service
points, ensures that identity
is maintained
• Eliminates further manual
checks for vast majority
5. © 2014 Rockwell Collins.
All rights reserved.
System Requirements
• Performance:
– Minimise times for successful
enrolments and verifications
• Passenger experience:
– Instructions - remove glasses etc.
– Implementation of exception processes
• Data protection issues to overcome
• Be highly configurable:
– Alternate biometric
technologies
– Selected flights or routes
– Implemented without
impacting the airlines systems
• Security:
– Zero false accepts, minimal
false rejects
6. © 2014 Rockwell Collins.
All rights reserved.
Enabling Identity Management Throughout the
Airport
7. © 2014 Rockwell Collins.
All rights reserved.
Consequences of Invalid Identity Verification
Different uses have different consequences
• Border Control:
– Consequence of failure is critical
• Systems tuned to Zero false acceptance
• Passenger Facilitation:
– Can result in poor passenger service
– Used to enhance passenger experience whilst maintaining security
– Maximum benefit when integrated with government control
systems, watch lists and travel document verification systems (visa
checks)
8. © 2014 Rockwell Collins.
All rights reserved.
Traveller Clearance
8
Airport Business
Rules &
Orchestration
Infinity
Risk
Assessment
Document
Verification
Travel Rules
System
3rd Country
Clearance
eVisa
AQQ
Watch list Interpol
SLTP Interpol
Abuser &
Victims
……Document
Templates
ICAO PKD
Border
Management
ESB
Airline
DCS
AODB /
FIDS
BCBP / Passport scan
API Data
Airport /
Airline
Government
Biometric Identity
Verification
9. © 2014 Rockwell Collins.
All rights reserved.
Validation Certainty
• Question of certainty:
– Improve the process due to consistency
– Allows humans to focus on what they are best at
• Resolving issues from uncertain results
• Differing approaches of 1 to 1 and 1 to many
matching will have differing levels of certainty
• 1 to 1
– A single enrolment is compared to live images to
answer the question:
“is this the same person that I have seen
before”
• 1 to Many
– A live image is compared to a gallery of images
to answer the question:
“Have I seen this person before”
10. © 2014 Rockwell Collins.
All rights reserved.
Application to Staff Access
• Current use cases are looking at
passenger identity management
• Same technology can be applied
to staff airside access controls.
– Applies the same standard to
staff access control as to
passengers
• Permanent biometric data can
be captured and stored,
enabling total automated
identity checks. The airport ID
pass database can be integrated
as a data source
• Already used in a number of
office facilities to control access
11. © 2014 Rockwell Collins.
All rights reserved.
Data Sharing
• Outcome of a recent FTE* Think Tank was
that data sharing in all its forms is a
mandatory requirement
Security cannot improve without data
sharing
* Future Travel Experience
• How do we share and make use of common
data / identity / security information
between airports, airlines, governmental
agencies
Improved Security Data sharing
• Can these be incorporated
with government backed on-
line security initiatives
• Ultimate need is for a single
token that can be made
available to all
12. © 2014 Rockwell Collins.
All rights reserved.
Result - Improved Security
• Extends and enhances manned
checkpoints:
– Improves Security as machine is
consistent and high quality
• Facilitates unsupervised identity checks:
– Validates identity document ownership
– Enables fully automated and unmanned
Self Service Check-in, Self Service Bag
Drop, Self Boarding gates by ensuring
identity is maintained
• Registered Traveller Authentication
• Prevents boarding pass swaps
13. © 2014 Rockwell Collins.
All rights reserved.
But …..
Sharing data between all parties is a
fundamental requirement
14. © 2014 Rockwell Collins.
All rights reserved.
© 2014 Rockwell Collins.
All rights reserved.
Thank You
For more information please visit
http://rockwellcollins.com/arinc/airports
and download our white paper:
Assessment of 1-to-Many matching in the airport
departure process
tony.chapman@arinc.com
tony.chapman@rockwellcollins.com