SlideShare a Scribd company logo
© 2014 Rockwell Collins. All rights reserved.
Using Biometric Technology to
Facilitate Security
© 2014 Rockwell Collins.
All rights reserved.
Use of Biometrics in Airport Security
•  Biometrics are most widely
used in securing border/entry
control
•  Aid to government officials
•  Supervision of multiple
kiosks / gates
•  Principle aim is to enhance
passenger throughput
© 2014 Rockwell Collins.
All rights reserved.
•  Based upon comparison of captured
biometric against a previously registered
token.
•  Normally the passport picture, but can
include alternates such as iris or fingerprint
in “known traveller” programmes
•  Provides identity verification service:
–  RED Definitely not a match
–  GREEN Definitely a match
–  AMBER Uncertain
•  Biometrics useful at confirmation of
definitive results
© 2014 Rockwell Collins.
All rights reserved.
Application to the Outbound Journey
•  To enhance the passenger
experience and support self
service, biometrics are now
being employed in the
outbound journey.
•  Verification at self service
points, ensures that identity
is maintained
•  Eliminates further manual
checks for vast majority
© 2014 Rockwell Collins.
All rights reserved.
System Requirements
•  Performance:
–  Minimise times for successful
enrolments and verifications
•  Passenger experience:
–  Instructions - remove glasses etc.
–  Implementation of exception processes
•  Data protection issues to overcome
•  Be highly configurable:
–  Alternate biometric
technologies
–  Selected flights or routes
–  Implemented without
impacting the airlines systems
•  Security:
–  Zero false accepts, minimal
false rejects
© 2014 Rockwell Collins.
All rights reserved.
Enabling Identity Management Throughout the
Airport
© 2014 Rockwell Collins.
All rights reserved.
Consequences of Invalid Identity Verification
Different uses have different consequences
•  Border Control:
–  Consequence of failure is critical
•  Systems tuned to Zero false acceptance
•  Passenger Facilitation:
–  Can result in poor passenger service
–  Used to enhance passenger experience whilst maintaining security
–  Maximum benefit when integrated with government control
systems, watch lists and travel document verification systems (visa
checks)
© 2014 Rockwell Collins.
All rights reserved.
Traveller Clearance
8
Airport Business
Rules &
Orchestration
Infinity
Risk
Assessment
Document
Verification
Travel Rules
System
3rd Country
Clearance
eVisa
AQQ
Watch list Interpol
SLTP Interpol
Abuser &
Victims
……Document
Templates
ICAO PKD
Border
Management
ESB
Airline
DCS
AODB /
FIDS
BCBP / Passport scan
API Data
Airport /
Airline
Government
Biometric Identity
Verification
© 2014 Rockwell Collins.
All rights reserved.
Validation Certainty
•  Question of certainty:
–  Improve the process due to consistency
–  Allows humans to focus on what they are best at
•  Resolving issues from uncertain results
•  Differing approaches of 1 to 1 and 1 to many
matching will have differing levels of certainty
•  1 to 1
–  A single enrolment is compared to live images to
answer the question:
“is this the same person that I have seen
before”
•  1 to Many
–  A live image is compared to a gallery of images
to answer the question:
“Have I seen this person before”
© 2014 Rockwell Collins.
All rights reserved.
Application to Staff Access
•  Current use cases are looking at
passenger identity management
•  Same technology can be applied
to staff airside access controls.
–  Applies the same standard to
staff access control as to
passengers
•  Permanent biometric data can
be captured and stored,
enabling total automated
identity checks. The airport ID
pass database can be integrated
as a data source
•  Already used in a number of
office facilities to control access
© 2014 Rockwell Collins.
All rights reserved.
Data Sharing
•  Outcome of a recent FTE* Think Tank was
that data sharing in all its forms is a
mandatory requirement
Security cannot improve without data
sharing
* Future Travel Experience
•  How do we share and make use of common
data / identity / security information
between airports, airlines, governmental
agencies
Improved Security Data sharing
•  Can these be incorporated
with government backed on-
line security initiatives
•  Ultimate need is for a single
token that can be made
available to all
© 2014 Rockwell Collins.
All rights reserved.
Result - Improved Security
•  Extends and enhances manned
checkpoints:
–  Improves Security as machine is
consistent and high quality
•  Facilitates unsupervised identity checks:
–  Validates identity document ownership
–  Enables fully automated and unmanned
Self Service Check-in, Self Service Bag
Drop, Self Boarding gates by ensuring
identity is maintained
•  Registered Traveller Authentication
•  Prevents boarding pass swaps
© 2014 Rockwell Collins.
All rights reserved.
But …..
Sharing data between all parties is a
fundamental requirement
© 2014 Rockwell Collins.
All rights reserved.
© 2014 Rockwell Collins.
All rights reserved.
Thank You
For more information please visit
http://rockwellcollins.com/arinc/airports
and download our white paper:
Assessment of 1-to-Many matching in the airport
departure process
tony.chapman@arinc.com
tony.chapman@rockwellcollins.com

More Related Content

What's hot

palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
Naga Dinesh
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
 
1 Tan Ibm Vienna (Ica)
1 Tan Ibm Vienna (Ica)1 Tan Ibm Vienna (Ica)
1 Tan Ibm Vienna (Ica)ronald2505
 
Applications of face recognition system
Applications of face recognition systemApplications of face recognition system
Applications of face recognition systemAVNISH KUMAR
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
Biju Patnaik University
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologySarvani Mallipeddi
 
Applications of image recognition
Applications of image recognitionApplications of image recognition
Applications of image recognitionAVNISH KUMAR
 
RFID based Airport Management
RFID based Airport Management RFID based Airport Management
RFID based Airport Management
iaitoinfotech
 
I C T Security Measures
I C T   Security  MeasuresI C T   Security  Measures
I C T Security Measuresanasz
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
ANEESH SASIDHARAN
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
Leonardo Antichi
 
Airport check in process improvement
Airport check in process improvementAirport check in process improvement
Airport check in process improvement
Harish Narayanaswamy
 
25 Biometrics Terms You Should Know
25 Biometrics Terms You Should Know25 Biometrics Terms You Should Know
25 Biometrics Terms You Should Know
mehedi76
 
Biometrics application
Biometrics applicationBiometrics application
Biometrics application
Divya Shah
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
Chitrachedu Dada Kalandar
 

What's hot (18)

palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
1 Tan Ibm Vienna (Ica)
1 Tan Ibm Vienna (Ica)1 Tan Ibm Vienna (Ica)
1 Tan Ibm Vienna (Ica)
 
Airline security new
Airline security newAirline security new
Airline security new
 
Applications of face recognition system
Applications of face recognition systemApplications of face recognition system
Applications of face recognition system
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
 
Applications of image recognition
Applications of image recognitionApplications of image recognition
Applications of image recognition
 
RFID based Airport Management
RFID based Airport Management RFID based Airport Management
RFID based Airport Management
 
I C T Security Measures
I C T   Security  MeasuresI C T   Security  Measures
I C T Security Measures
 
Biometrics
BiometricsBiometrics
Biometrics
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 
Airport check in process improvement
Airport check in process improvementAirport check in process improvement
Airport check in process improvement
 
25 Biometrics Terms You Should Know
25 Biometrics Terms You Should Know25 Biometrics Terms You Should Know
25 Biometrics Terms You Should Know
 
Biometrics application
Biometrics applicationBiometrics application
Biometrics application
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 

Viewers also liked

Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
vineeth chepuri
 
INFORMATION SYSTEM SECURITY
INFORMATION SYSTEM SECURITYINFORMATION SYSTEM SECURITY
INFORMATION SYSTEM SECURITYCollen Tshebo
 
Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
International Center for Biometric Research
 
Explosive Detection System
Explosive Detection System Explosive Detection System
Explosive Detection System
Smiths Detection
 
DATABASE DESIGN(COLLEN TSHEBO)
DATABASE DESIGN(COLLEN TSHEBO)DATABASE DESIGN(COLLEN TSHEBO)
DATABASE DESIGN(COLLEN TSHEBO)Collen Tshebo
 
Biometric Technology And The Strategy Behind
Biometric Technology And The Strategy BehindBiometric Technology And The Strategy Behind
Biometric Technology And The Strategy Behind
Star Link Communication Pvt Ltd
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
iamsanjayk
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
alaabebe
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
Star Link Communication Pvt Ltd
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
AKS Solutions (Pvt) Ltd.
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
esther_sonu
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
FaithCWorth
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication'Atikah Khalil
 
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS  An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
Animetrics
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
M2SYS Technology
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measuressyamil91
 

Viewers also liked (18)

Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometric
BiometricBiometric
Biometric
 
INFORMATION SYSTEM SECURITY
INFORMATION SYSTEM SECURITYINFORMATION SYSTEM SECURITY
INFORMATION SYSTEM SECURITY
 
Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
 
Explosive Detection System
Explosive Detection System Explosive Detection System
Explosive Detection System
 
DATABASE DESIGN(COLLEN TSHEBO)
DATABASE DESIGN(COLLEN TSHEBO)DATABASE DESIGN(COLLEN TSHEBO)
DATABASE DESIGN(COLLEN TSHEBO)
 
Biometric Technology And The Strategy Behind
Biometric Technology And The Strategy BehindBiometric Technology And The Strategy Behind
Biometric Technology And The Strategy Behind
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
 
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS  An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 

Similar to Using biometric technology to facilitate airport security - November 2015

IDenTrip - Seamless Airtravel with Biometric Identity
IDenTrip - Seamless Airtravel with Biometric IdentityIDenTrip - Seamless Airtravel with Biometric Identity
IDenTrip - Seamless Airtravel with Biometric Identity
Biocube Technologies Inc.
 
The capacity for innovation: Maurice Jenkins, Division Director, Information ...
The capacity for innovation: Maurice Jenkins, Division Director, Information ...The capacity for innovation: Maurice Jenkins, Division Director, Information ...
The capacity for innovation: Maurice Jenkins, Division Director, Information ...
SITA
 
Mobile NFC @ Airlines
Mobile NFC @ AirlinesMobile NFC @ Airlines
Mobile NFC @ AirlinesHatem Kameli
 
Passenger and Airport Collaboration through Technology (PACT)
Passenger and Airport Collaboration through Technology (PACT)Passenger and Airport Collaboration through Technology (PACT)
Passenger and Airport Collaboration through Technology (PACT)
Human Recognition Systems
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym Webinar
Evernym
 
truMe - Global Digital Identity and Access Management
truMe - Global Digital Identity and Access ManagementtruMe - Global Digital Identity and Access Management
truMe - Global Digital Identity and Access Management
Neeraj Taneja
 
How can airports get to know their passengers - and should they try?
How can airports get to know their passengers - and should they try?How can airports get to know their passengers - and should they try?
How can airports get to know their passengers - and should they try?
Human Recognition Systems
 
Strategies for Airline Business
Strategies for Airline BusinessStrategies for Airline Business
Strategies for Airline BusinessKiran Babu Alapati
 
karsof systems e-visa
karsof systems e-visakarsof systems e-visa
karsof systems e-visa
Colin Valencia
 
Catering for smarter travelers: Paul Behan, Director, Passenger IATA
Catering for smarter travelers:  Paul Behan, Director, Passenger IATACatering for smarter travelers:  Paul Behan, Director, Passenger IATA
Catering for smarter travelers: Paul Behan, Director, Passenger IATA
SITA
 
The use of data and technology in cargo risk management
The use of data and technology in cargo risk managementThe use of data and technology in cargo risk management
The use of data and technology in cargo risk management
Tristan Wiggill
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
Chas Yap
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
Rexcy
 
Smart Cities 2015_Gautam Nanda
Smart Cities 2015_Gautam NandaSmart Cities 2015_Gautam Nanda
Smart Cities 2015_Gautam Nanda
IPPAI
 
COVID green label
COVID green labelCOVID green label
COVID green label
Archna Menon
 
Securing e-Government Web Portal Access Using Enhanced Authentication System
Securing e-Government Web Portal Access Using Enhanced Authentication SystemSecuring e-Government Web Portal Access Using Enhanced Authentication System
Securing e-Government Web Portal Access Using Enhanced Authentication SystemHamdi Jaber
 
BIOMETRICS 2012 - London 2012
BIOMETRICS 2012 - London 2012BIOMETRICS 2012 - London 2012
BIOMETRICS 2012 - London 2012augmentiq
 
Defining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access NetworksDefining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access Networks
Aruba, a Hewlett Packard Enterprise company
 
Ixs traffic management system power show
Ixs traffic management system power showIxs traffic management system power show
Ixs traffic management system power show
Info Access
 

Similar to Using biometric technology to facilitate airport security - November 2015 (20)

IDenTrip - Seamless Airtravel with Biometric Identity
IDenTrip - Seamless Airtravel with Biometric IdentityIDenTrip - Seamless Airtravel with Biometric Identity
IDenTrip - Seamless Airtravel with Biometric Identity
 
The capacity for innovation: Maurice Jenkins, Division Director, Information ...
The capacity for innovation: Maurice Jenkins, Division Director, Information ...The capacity for innovation: Maurice Jenkins, Division Director, Information ...
The capacity for innovation: Maurice Jenkins, Division Director, Information ...
 
Mobile NFC @ Airlines
Mobile NFC @ AirlinesMobile NFC @ Airlines
Mobile NFC @ Airlines
 
Passenger and Airport Collaboration through Technology (PACT)
Passenger and Airport Collaboration through Technology (PACT)Passenger and Airport Collaboration through Technology (PACT)
Passenger and Airport Collaboration through Technology (PACT)
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym Webinar
 
truMe - Global Digital Identity and Access Management
truMe - Global Digital Identity and Access ManagementtruMe - Global Digital Identity and Access Management
truMe - Global Digital Identity and Access Management
 
How can airports get to know their passengers - and should they try?
How can airports get to know their passengers - and should they try?How can airports get to know their passengers - and should they try?
How can airports get to know their passengers - and should they try?
 
Strategies for Airline Business
Strategies for Airline BusinessStrategies for Airline Business
Strategies for Airline Business
 
karsof systems e-visa
karsof systems e-visakarsof systems e-visa
karsof systems e-visa
 
Catering for smarter travelers: Paul Behan, Director, Passenger IATA
Catering for smarter travelers:  Paul Behan, Director, Passenger IATACatering for smarter travelers:  Paul Behan, Director, Passenger IATA
Catering for smarter travelers: Paul Behan, Director, Passenger IATA
 
The use of data and technology in cargo risk management
The use of data and technology in cargo risk managementThe use of data and technology in cargo risk management
The use of data and technology in cargo risk management
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
Smart Cities 2015_Gautam Nanda
Smart Cities 2015_Gautam NandaSmart Cities 2015_Gautam Nanda
Smart Cities 2015_Gautam Nanda
 
COVID green label
COVID green labelCOVID green label
COVID green label
 
Securing e-Government Web Portal Access Using Enhanced Authentication System
Securing e-Government Web Portal Access Using Enhanced Authentication SystemSecuring e-Government Web Portal Access Using Enhanced Authentication System
Securing e-Government Web Portal Access Using Enhanced Authentication System
 
BIOMETRICS 2012 - London 2012
BIOMETRICS 2012 - London 2012BIOMETRICS 2012 - London 2012
BIOMETRICS 2012 - London 2012
 
Defining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access NetworksDefining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access Networks
 
IoT at Airports is Really Taking Off
IoT at Airports is Really Taking OffIoT at Airports is Really Taking Off
IoT at Airports is Really Taking Off
 
Ixs traffic management system power show
Ixs traffic management system power showIxs traffic management system power show
Ixs traffic management system power show
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Using biometric technology to facilitate airport security - November 2015

  • 1. © 2014 Rockwell Collins. All rights reserved. Using Biometric Technology to Facilitate Security
  • 2. © 2014 Rockwell Collins. All rights reserved. Use of Biometrics in Airport Security •  Biometrics are most widely used in securing border/entry control •  Aid to government officials •  Supervision of multiple kiosks / gates •  Principle aim is to enhance passenger throughput
  • 3. © 2014 Rockwell Collins. All rights reserved. •  Based upon comparison of captured biometric against a previously registered token. •  Normally the passport picture, but can include alternates such as iris or fingerprint in “known traveller” programmes •  Provides identity verification service: –  RED Definitely not a match –  GREEN Definitely a match –  AMBER Uncertain •  Biometrics useful at confirmation of definitive results
  • 4. © 2014 Rockwell Collins. All rights reserved. Application to the Outbound Journey •  To enhance the passenger experience and support self service, biometrics are now being employed in the outbound journey. •  Verification at self service points, ensures that identity is maintained •  Eliminates further manual checks for vast majority
  • 5. © 2014 Rockwell Collins. All rights reserved. System Requirements •  Performance: –  Minimise times for successful enrolments and verifications •  Passenger experience: –  Instructions - remove glasses etc. –  Implementation of exception processes •  Data protection issues to overcome •  Be highly configurable: –  Alternate biometric technologies –  Selected flights or routes –  Implemented without impacting the airlines systems •  Security: –  Zero false accepts, minimal false rejects
  • 6. © 2014 Rockwell Collins. All rights reserved. Enabling Identity Management Throughout the Airport
  • 7. © 2014 Rockwell Collins. All rights reserved. Consequences of Invalid Identity Verification Different uses have different consequences •  Border Control: –  Consequence of failure is critical •  Systems tuned to Zero false acceptance •  Passenger Facilitation: –  Can result in poor passenger service –  Used to enhance passenger experience whilst maintaining security –  Maximum benefit when integrated with government control systems, watch lists and travel document verification systems (visa checks)
  • 8. © 2014 Rockwell Collins. All rights reserved. Traveller Clearance 8 Airport Business Rules & Orchestration Infinity Risk Assessment Document Verification Travel Rules System 3rd Country Clearance eVisa AQQ Watch list Interpol SLTP Interpol Abuser & Victims ……Document Templates ICAO PKD Border Management ESB Airline DCS AODB / FIDS BCBP / Passport scan API Data Airport / Airline Government Biometric Identity Verification
  • 9. © 2014 Rockwell Collins. All rights reserved. Validation Certainty •  Question of certainty: –  Improve the process due to consistency –  Allows humans to focus on what they are best at •  Resolving issues from uncertain results •  Differing approaches of 1 to 1 and 1 to many matching will have differing levels of certainty •  1 to 1 –  A single enrolment is compared to live images to answer the question: “is this the same person that I have seen before” •  1 to Many –  A live image is compared to a gallery of images to answer the question: “Have I seen this person before”
  • 10. © 2014 Rockwell Collins. All rights reserved. Application to Staff Access •  Current use cases are looking at passenger identity management •  Same technology can be applied to staff airside access controls. –  Applies the same standard to staff access control as to passengers •  Permanent biometric data can be captured and stored, enabling total automated identity checks. The airport ID pass database can be integrated as a data source •  Already used in a number of office facilities to control access
  • 11. © 2014 Rockwell Collins. All rights reserved. Data Sharing •  Outcome of a recent FTE* Think Tank was that data sharing in all its forms is a mandatory requirement Security cannot improve without data sharing * Future Travel Experience •  How do we share and make use of common data / identity / security information between airports, airlines, governmental agencies Improved Security Data sharing •  Can these be incorporated with government backed on- line security initiatives •  Ultimate need is for a single token that can be made available to all
  • 12. © 2014 Rockwell Collins. All rights reserved. Result - Improved Security •  Extends and enhances manned checkpoints: –  Improves Security as machine is consistent and high quality •  Facilitates unsupervised identity checks: –  Validates identity document ownership –  Enables fully automated and unmanned Self Service Check-in, Self Service Bag Drop, Self Boarding gates by ensuring identity is maintained •  Registered Traveller Authentication •  Prevents boarding pass swaps
  • 13. © 2014 Rockwell Collins. All rights reserved. But ….. Sharing data between all parties is a fundamental requirement
  • 14. © 2014 Rockwell Collins. All rights reserved. © 2014 Rockwell Collins. All rights reserved. Thank You For more information please visit http://rockwellcollins.com/arinc/airports and download our white paper: Assessment of 1-to-Many matching in the airport departure process tony.chapman@arinc.com tony.chapman@rockwellcollins.com