SlideShare a Scribd company logo
1 of 14
Download to read offline
© 2014 Rockwell Collins. All rights reserved.
Using Biometric Technology to
Facilitate Security
© 2014 Rockwell Collins.
All rights reserved.
Use of Biometrics in Airport Security
•  Biometrics are most widely
used in securing border/entry
control
•  Aid to government officials
•  Supervision of multiple
kiosks / gates
•  Principle aim is to enhance
passenger throughput
© 2014 Rockwell Collins.
All rights reserved.
•  Based upon comparison of captured
biometric against a previously registered
token.
•  Normally the passport picture, but can
include alternates such as iris or fingerprint
in “known traveller” programmes
•  Provides identity verification service:
–  RED Definitely not a match
–  GREEN Definitely a match
–  AMBER Uncertain
•  Biometrics useful at confirmation of
definitive results
© 2014 Rockwell Collins.
All rights reserved.
Application to the Outbound Journey
•  To enhance the passenger
experience and support self
service, biometrics are now
being employed in the
outbound journey.
•  Verification at self service
points, ensures that identity
is maintained
•  Eliminates further manual
checks for vast majority
© 2014 Rockwell Collins.
All rights reserved.
System Requirements
•  Performance:
–  Minimise times for successful
enrolments and verifications
•  Passenger experience:
–  Instructions - remove glasses etc.
–  Implementation of exception processes
•  Data protection issues to overcome
•  Be highly configurable:
–  Alternate biometric
technologies
–  Selected flights or routes
–  Implemented without
impacting the airlines systems
•  Security:
–  Zero false accepts, minimal
false rejects
© 2014 Rockwell Collins.
All rights reserved.
Enabling Identity Management Throughout the
Airport
© 2014 Rockwell Collins.
All rights reserved.
Consequences of Invalid Identity Verification
Different uses have different consequences
•  Border Control:
–  Consequence of failure is critical
•  Systems tuned to Zero false acceptance
•  Passenger Facilitation:
–  Can result in poor passenger service
–  Used to enhance passenger experience whilst maintaining security
–  Maximum benefit when integrated with government control
systems, watch lists and travel document verification systems (visa
checks)
© 2014 Rockwell Collins.
All rights reserved.
Traveller Clearance
8
Airport Business
Rules &
Orchestration
Infinity
Risk
Assessment
Document
Verification
Travel Rules
System
3rd Country
Clearance
eVisa
AQQ
Watch list Interpol
SLTP Interpol
Abuser &
Victims
……Document
Templates
ICAO PKD
Border
Management
ESB
Airline
DCS
AODB /
FIDS
BCBP / Passport scan
API Data
Airport /
Airline
Government
Biometric Identity
Verification
© 2014 Rockwell Collins.
All rights reserved.
Validation Certainty
•  Question of certainty:
–  Improve the process due to consistency
–  Allows humans to focus on what they are best at
•  Resolving issues from uncertain results
•  Differing approaches of 1 to 1 and 1 to many
matching will have differing levels of certainty
•  1 to 1
–  A single enrolment is compared to live images to
answer the question:
“is this the same person that I have seen
before”
•  1 to Many
–  A live image is compared to a gallery of images
to answer the question:
“Have I seen this person before”
© 2014 Rockwell Collins.
All rights reserved.
Application to Staff Access
•  Current use cases are looking at
passenger identity management
•  Same technology can be applied
to staff airside access controls.
–  Applies the same standard to
staff access control as to
passengers
•  Permanent biometric data can
be captured and stored,
enabling total automated
identity checks. The airport ID
pass database can be integrated
as a data source
•  Already used in a number of
office facilities to control access
© 2014 Rockwell Collins.
All rights reserved.
Data Sharing
•  Outcome of a recent FTE* Think Tank was
that data sharing in all its forms is a
mandatory requirement
Security cannot improve without data
sharing
* Future Travel Experience
•  How do we share and make use of common
data / identity / security information
between airports, airlines, governmental
agencies
Improved Security Data sharing
•  Can these be incorporated
with government backed on-
line security initiatives
•  Ultimate need is for a single
token that can be made
available to all
© 2014 Rockwell Collins.
All rights reserved.
Result - Improved Security
•  Extends and enhances manned
checkpoints:
–  Improves Security as machine is
consistent and high quality
•  Facilitates unsupervised identity checks:
–  Validates identity document ownership
–  Enables fully automated and unmanned
Self Service Check-in, Self Service Bag
Drop, Self Boarding gates by ensuring
identity is maintained
•  Registered Traveller Authentication
•  Prevents boarding pass swaps
© 2014 Rockwell Collins.
All rights reserved.
But …..
Sharing data between all parties is a
fundamental requirement
© 2014 Rockwell Collins.
All rights reserved.
© 2014 Rockwell Collins.
All rights reserved.
Thank You
For more information please visit
http://rockwellcollins.com/arinc/airports
and download our white paper:
Assessment of 1-to-Many matching in the airport
departure process
tony.chapman@arinc.com
tony.chapman@rockwellcollins.com

More Related Content

What's hot

1 Tan Ibm Vienna (Ica)
1 Tan Ibm Vienna (Ica)1 Tan Ibm Vienna (Ica)
1 Tan Ibm Vienna (Ica)
ronald2505
 
Applications of face recognition system
Applications of face recognition systemApplications of face recognition system
Applications of face recognition system
AVNISH KUMAR
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
Sarvani Mallipeddi
 
Applications of image recognition
Applications of image recognitionApplications of image recognition
Applications of image recognition
AVNISH KUMAR
 
I C T Security Measures
I C T   Security  MeasuresI C T   Security  Measures
I C T Security Measures
anasz
 

What's hot (18)

palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
1 Tan Ibm Vienna (Ica)
1 Tan Ibm Vienna (Ica)1 Tan Ibm Vienna (Ica)
1 Tan Ibm Vienna (Ica)
 
Airline security new
Airline security newAirline security new
Airline security new
 
Applications of face recognition system
Applications of face recognition systemApplications of face recognition system
Applications of face recognition system
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
 
Applications of image recognition
Applications of image recognitionApplications of image recognition
Applications of image recognition
 
RFID based Airport Management
RFID based Airport Management RFID based Airport Management
RFID based Airport Management
 
I C T Security Measures
I C T   Security  MeasuresI C T   Security  Measures
I C T Security Measures
 
Biometrics
BiometricsBiometrics
Biometrics
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 
Airport check in process improvement
Airport check in process improvementAirport check in process improvement
Airport check in process improvement
 
25 Biometrics Terms You Should Know
25 Biometrics Terms You Should Know25 Biometrics Terms You Should Know
25 Biometrics Terms You Should Know
 
Biometrics application
Biometrics applicationBiometrics application
Biometrics application
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 

Viewers also liked

INFORMATION SYSTEM SECURITY
INFORMATION SYSTEM SECURITYINFORMATION SYSTEM SECURITY
INFORMATION SYSTEM SECURITY
Collen Tshebo
 
Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
International Center for Biometric Research
 
DATABASE DESIGN(COLLEN TSHEBO)
DATABASE DESIGN(COLLEN TSHEBO)DATABASE DESIGN(COLLEN TSHEBO)
DATABASE DESIGN(COLLEN TSHEBO)
Collen Tshebo
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
mmubashirkhan
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
'Atikah Khalil
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
M2SYS Technology
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
syamil91
 

Viewers also liked (18)

Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometric
BiometricBiometric
Biometric
 
INFORMATION SYSTEM SECURITY
INFORMATION SYSTEM SECURITYINFORMATION SYSTEM SECURITY
INFORMATION SYSTEM SECURITY
 
Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
 
Explosive Detection System
Explosive Detection System Explosive Detection System
Explosive Detection System
 
DATABASE DESIGN(COLLEN TSHEBO)
DATABASE DESIGN(COLLEN TSHEBO)DATABASE DESIGN(COLLEN TSHEBO)
DATABASE DESIGN(COLLEN TSHEBO)
 
Biometric Technology And The Strategy Behind
Biometric Technology And The Strategy BehindBiometric Technology And The Strategy Behind
Biometric Technology And The Strategy Behind
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
 
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS  An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 

Similar to Using biometric technology to facilitate airport security - November 2015

Mobile NFC @ Airlines
Mobile NFC @ AirlinesMobile NFC @ Airlines
Mobile NFC @ Airlines
Hatem Kameli
 
Strategies for Airline Business
Strategies for Airline BusinessStrategies for Airline Business
Strategies for Airline Business
Kiran Babu Alapati
 
Securing e-Government Web Portal Access Using Enhanced Authentication System
Securing e-Government Web Portal Access Using Enhanced Authentication SystemSecuring e-Government Web Portal Access Using Enhanced Authentication System
Securing e-Government Web Portal Access Using Enhanced Authentication System
Hamdi Jaber
 
BIOMETRICS 2012 - London 2012
BIOMETRICS 2012 - London 2012BIOMETRICS 2012 - London 2012
BIOMETRICS 2012 - London 2012
augmentiq
 

Similar to Using biometric technology to facilitate airport security - November 2015 (20)

IDenTrip - Seamless Airtravel with Biometric Identity
IDenTrip - Seamless Airtravel with Biometric IdentityIDenTrip - Seamless Airtravel with Biometric Identity
IDenTrip - Seamless Airtravel with Biometric Identity
 
The capacity for innovation: Maurice Jenkins, Division Director, Information ...
The capacity for innovation: Maurice Jenkins, Division Director, Information ...The capacity for innovation: Maurice Jenkins, Division Director, Information ...
The capacity for innovation: Maurice Jenkins, Division Director, Information ...
 
Mobile NFC @ Airlines
Mobile NFC @ AirlinesMobile NFC @ Airlines
Mobile NFC @ Airlines
 
Passenger and Airport Collaboration through Technology (PACT)
Passenger and Airport Collaboration through Technology (PACT)Passenger and Airport Collaboration through Technology (PACT)
Passenger and Airport Collaboration through Technology (PACT)
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym Webinar
 
truMe - Global Digital Identity and Access Management
truMe - Global Digital Identity and Access ManagementtruMe - Global Digital Identity and Access Management
truMe - Global Digital Identity and Access Management
 
How can airports get to know their passengers - and should they try?
How can airports get to know their passengers - and should they try?How can airports get to know their passengers - and should they try?
How can airports get to know their passengers - and should they try?
 
Strategies for Airline Business
Strategies for Airline BusinessStrategies for Airline Business
Strategies for Airline Business
 
karsof systems e-visa
karsof systems e-visakarsof systems e-visa
karsof systems e-visa
 
Catering for smarter travelers: Paul Behan, Director, Passenger IATA
Catering for smarter travelers:  Paul Behan, Director, Passenger IATACatering for smarter travelers:  Paul Behan, Director, Passenger IATA
Catering for smarter travelers: Paul Behan, Director, Passenger IATA
 
The use of data and technology in cargo risk management
The use of data and technology in cargo risk managementThe use of data and technology in cargo risk management
The use of data and technology in cargo risk management
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
Smart Cities 2015_Gautam Nanda
Smart Cities 2015_Gautam NandaSmart Cities 2015_Gautam Nanda
Smart Cities 2015_Gautam Nanda
 
COVID green label
COVID green labelCOVID green label
COVID green label
 
Securing e-Government Web Portal Access Using Enhanced Authentication System
Securing e-Government Web Portal Access Using Enhanced Authentication SystemSecuring e-Government Web Portal Access Using Enhanced Authentication System
Securing e-Government Web Portal Access Using Enhanced Authentication System
 
BIOMETRICS 2012 - London 2012
BIOMETRICS 2012 - London 2012BIOMETRICS 2012 - London 2012
BIOMETRICS 2012 - London 2012
 
Defining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access NetworksDefining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access Networks
 
IoT at Airports is Really Taking Off
IoT at Airports is Really Taking OffIoT at Airports is Really Taking Off
IoT at Airports is Really Taking Off
 
Ixs traffic management system power show
Ixs traffic management system power showIxs traffic management system power show
Ixs traffic management system power show
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Using biometric technology to facilitate airport security - November 2015

  • 1. © 2014 Rockwell Collins. All rights reserved. Using Biometric Technology to Facilitate Security
  • 2. © 2014 Rockwell Collins. All rights reserved. Use of Biometrics in Airport Security •  Biometrics are most widely used in securing border/entry control •  Aid to government officials •  Supervision of multiple kiosks / gates •  Principle aim is to enhance passenger throughput
  • 3. © 2014 Rockwell Collins. All rights reserved. •  Based upon comparison of captured biometric against a previously registered token. •  Normally the passport picture, but can include alternates such as iris or fingerprint in “known traveller” programmes •  Provides identity verification service: –  RED Definitely not a match –  GREEN Definitely a match –  AMBER Uncertain •  Biometrics useful at confirmation of definitive results
  • 4. © 2014 Rockwell Collins. All rights reserved. Application to the Outbound Journey •  To enhance the passenger experience and support self service, biometrics are now being employed in the outbound journey. •  Verification at self service points, ensures that identity is maintained •  Eliminates further manual checks for vast majority
  • 5. © 2014 Rockwell Collins. All rights reserved. System Requirements •  Performance: –  Minimise times for successful enrolments and verifications •  Passenger experience: –  Instructions - remove glasses etc. –  Implementation of exception processes •  Data protection issues to overcome •  Be highly configurable: –  Alternate biometric technologies –  Selected flights or routes –  Implemented without impacting the airlines systems •  Security: –  Zero false accepts, minimal false rejects
  • 6. © 2014 Rockwell Collins. All rights reserved. Enabling Identity Management Throughout the Airport
  • 7. © 2014 Rockwell Collins. All rights reserved. Consequences of Invalid Identity Verification Different uses have different consequences •  Border Control: –  Consequence of failure is critical •  Systems tuned to Zero false acceptance •  Passenger Facilitation: –  Can result in poor passenger service –  Used to enhance passenger experience whilst maintaining security –  Maximum benefit when integrated with government control systems, watch lists and travel document verification systems (visa checks)
  • 8. © 2014 Rockwell Collins. All rights reserved. Traveller Clearance 8 Airport Business Rules & Orchestration Infinity Risk Assessment Document Verification Travel Rules System 3rd Country Clearance eVisa AQQ Watch list Interpol SLTP Interpol Abuser & Victims ……Document Templates ICAO PKD Border Management ESB Airline DCS AODB / FIDS BCBP / Passport scan API Data Airport / Airline Government Biometric Identity Verification
  • 9. © 2014 Rockwell Collins. All rights reserved. Validation Certainty •  Question of certainty: –  Improve the process due to consistency –  Allows humans to focus on what they are best at •  Resolving issues from uncertain results •  Differing approaches of 1 to 1 and 1 to many matching will have differing levels of certainty •  1 to 1 –  A single enrolment is compared to live images to answer the question: “is this the same person that I have seen before” •  1 to Many –  A live image is compared to a gallery of images to answer the question: “Have I seen this person before”
  • 10. © 2014 Rockwell Collins. All rights reserved. Application to Staff Access •  Current use cases are looking at passenger identity management •  Same technology can be applied to staff airside access controls. –  Applies the same standard to staff access control as to passengers •  Permanent biometric data can be captured and stored, enabling total automated identity checks. The airport ID pass database can be integrated as a data source •  Already used in a number of office facilities to control access
  • 11. © 2014 Rockwell Collins. All rights reserved. Data Sharing •  Outcome of a recent FTE* Think Tank was that data sharing in all its forms is a mandatory requirement Security cannot improve without data sharing * Future Travel Experience •  How do we share and make use of common data / identity / security information between airports, airlines, governmental agencies Improved Security Data sharing •  Can these be incorporated with government backed on- line security initiatives •  Ultimate need is for a single token that can be made available to all
  • 12. © 2014 Rockwell Collins. All rights reserved. Result - Improved Security •  Extends and enhances manned checkpoints: –  Improves Security as machine is consistent and high quality •  Facilitates unsupervised identity checks: –  Validates identity document ownership –  Enables fully automated and unmanned Self Service Check-in, Self Service Bag Drop, Self Boarding gates by ensuring identity is maintained •  Registered Traveller Authentication •  Prevents boarding pass swaps
  • 13. © 2014 Rockwell Collins. All rights reserved. But ….. Sharing data between all parties is a fundamental requirement
  • 14. © 2014 Rockwell Collins. All rights reserved. © 2014 Rockwell Collins. All rights reserved. Thank You For more information please visit http://rockwellcollins.com/arinc/airports and download our white paper: Assessment of 1-to-Many matching in the airport departure process tony.chapman@arinc.com tony.chapman@rockwellcollins.com