REPORTS/DELIVERABLES

Public deliverables
D2.2Legal framework of biometric border control 
 The aim of D2.2 is to explore the current and proposed European legal framework regulating biometric Schengen border control in order to identify legal, privacy and data protection constraints which should be taken into account by PROTECT scenarios described in D3.1. In this Deliverable, it is assumed that the purpose of D3.1 scenarios is to “facilitate” public border control authorities to speed up their public interest missions of border control management by enrolling additional biometrics in travel documents (or smartphone apps acting as travel documents).  
D2.3Privacy impact of next-generation biometric border control 
 The aim of D2.3 is to analyse whether the PROTECT project entails a potential substantial interference into individuals’ rights to privacy and to data protection, as protected under articles 7 & 8 of the Charter of Fundamental Rights Any identified risks are subject to an impact assessment. The purpose of this Deliverable “D2.3 - Privacy impact of next-generation biometric border control” is to analyse whether, as an alternative to D3.1 scenarios, emerging biometric modalities could be processed in a “passport companion”, such as a smartphone, for “comfort and convenience purposes” of travellers, on the basis of a contract with PROTECT’s data controller and travellers’ explicit consent.
  
D2.5Societal impact report (version 1) 
 The aim of D2.5 is to identify and address the ethical and legal implications of the technical solutions being developed in the context of the PROTECT project by summarizing discussions between the project partners and exchanges with the Ethical and Legal Advisory Group (ELAG), as well as with other external experts.
  
D2.6
Societal Impact Report-Ethical and Legal Advisory Board  
 The purpose of this Deliverable is to summarise the discussions between PROTECT project partners and the Ethical and Legal Advisory Group (ELAG).  These discussions took place during the PROTECT Consortium meeting in Munich on 4th April 2019, after the PROTECT technology had been presented and demonstrated to the ELAG.
  
D3.1System requirements specification and scenarios 
 The report summarizes the work done within tasks T3.1 and T3.2, which focused on user requirement collection and scenario definition for the PROTECT system. The preliminary work required the selection of a proper methodology to be applied during the elicitation phase. For these purposes, project partners followed the BABOK v3 methodology, which has been adjusted to the specification of the research project.   
D5.1Biometric Sensor Solutions for Borders 
 This Deliverable presents a selection of individual hardware and software solutions for biometrics applicable in principle to the scenarios considered in PROTECT. Additionally, it describes the work done until the end of September 2017 to reach the defined goals of work package 5 of this project. The document presents all the considered scenarios, as well as the current work in progress concerning the different biometric modalities.  
D5.2Scenario Specific Sensor Solutions 
  This Deliverable presents a selection of individual hardware and software solutions for biometrics determined to be applied in PROTECT demonstrators . This document reports the status of the considered biometric solutions at the end of September 2017, which has been reported in Deliverable 5.1. Also described are the evaluations conducted up to February 2018, regarding the proposed biometric solutions, required to reach the defined project milestones.  
D5.3 Scenario Specific Sensor Solutions withPrivacy Enhancing Technologies  
 This deliverable represents the outcome of Task 5.6, which applies and develops privacy enhancing technology to the solutions defined for each modality in the respective scenarios described in Deliverable 5.2. A detailed analysis of security and possible impact on recognition accuracy is performed, for the application of different privacy enhancing technologies to PROTECT’s biometric modalities. The document first presents how the described and investigated biometric authentication systems (see Deliverable D5.2) will work in the scope of PROTECT. After the system description, the necessity of privacy preservation /enhancement is described. The second part of this document focuses on a detailed description of the privacy preservation/enhancement schemes, which are applied to the acquired biometric data directly in the image domain of the selected modalities (see Deliverables 5.1 and 5.2). 
  
D6.1Report on Multimodal Biometric Tool
 
  This document provides the report on Task 6.1 “Multimodal Verification Tool”. The objective of Task 6.1 is to perform biometric person identification based on fusion of multiple biometric modalities developed under WP5. The main aim of T6.1 is to develop an adaptable fusion framework, which will consider factors such as the border crossing type, traveller profile, historical data, and trends, trading off throughput versus security level. The output of this part of the work is a multimodal verification tool to be used and evaluated by border guards in different settings. This Deliverable describes the state-of-the-art multibiometric fusion technology and investigates different fusion schemes and their applicability in PROTECT. In this document the biometric recognition and the sample quality modules developed under WP5 and reported in D5.2 and D7.4, respectively, are summarized. This Deliverable only provides a brief summary on the PAD methods developed by the partners. The detailed descriptions and evaluations are reported in Deliverable 7.5 “Biometric systems vulnerability analysis”. 
  
D6.2Specification of new biometric corridor solution 
 This Deliverable establishes the specifications to build the PROTECT Biometric Capture Area solution. The document contains the description of the corridor operation on its own, and in relation to next-generation ePassport chips and mobile equipment; and how the relevant requirements from the different scenarios (established in D3.1 ‘System requirement specification and scenarios’ and D4.2 Technical requirements) are fulfilled. The list of deployed biometric modalities and the variations between the different border control scenarios is provided. The architectural description of the corridor includes the detailed floor plan, and technical details of hardware and software that will be implemented. The document serves as a basis for the demonstrators which are to be built and demonstrated at two different border crossing sites. 
  
D6.3Demonstration of new biometric corridor 
 This document reports a practical implementation of the BCA for air and sea border identity verification for travellers on foot, and land border identity verification for travellers in vehicles; such implementations constitute the first prototype for the PROTECT demonstrator for both the air/sea and land border scenarios. This document provides evidence for:
- The feasibility of the PROTECT proposed border control solution: The BCA; 
- The validation of the BCA specifications    

  
D6.4Report on improvements to electronic passports  
  The report details possible approaches to meet the objectives of the call with modified electronic passports. The objective of “…a most fluent non-intrusive control process…” is hardest to achieve without giving up any of the data protection or privacy properties of the current system. The Proximity Technology currently used in electronic passports can only be read out from a distance of approximately 5cm. Protection Against Tracking, Skimming and Eavesdropping requires the MRZ to be read from the datapage of the passport. For this the booklet has to be opened and placed on an optical scanner. Together with a reading time of 5-6 seconds this makes a real non-stop border control process impossible. The largest impact would be the introduction of secure UHF chips. However, this has major legal and ethical implications.  
D6.5Specification of new enhanced electronic passport for PROTECT 
 The aim of this report is to specify “the logical data structure 2 electronic passport application” which is used to store additional biometrics. Section 2 lists requirements from D3.1 and their impact on the specification. However, most requirements collected in Deliverable 3.1 do not relate to the electronic passport. Therefore, the major requirements are obtained from the LDS2 specification [11], and have been taken into account. Section 3 describes the data structures, especially the certificates necessary to read and write additional biometrics to the electronic passport. Section 4 describes the actual applet implementation, with details on the supported protocols and how the necessary data is stored on the security chip.
 
D6.6Demonstration of new enhanced electronic passport for PROTECT 
 Deliverable D6.6 is the “Demonstration of new enhanced electronic passport for PROTECT”. After the specification of the new enhanced electronic passport for PROTECT in D6.5 the logical data structure 2 javacard applet has been developed and tested.
  
D6.7Report on the virtualization of documents with mobile devices 
 This report analyzes the use of mobile devices as data carriers and transmitters, thereby overcoming the limitations of current electronic passports, especially when additional biometrics are used. It gives an overview of current electronic passport technology and the design objectives that lead to the current specifications and implementations. It outlines the limitations of current technology in terms of processing speed, ease of use and ability to adapt to new scenarios. Known approaches are analyzed according to their ability to overcome these limitations, and presents radical new ideas that have been developed by PROTECT. The document is the basis for Deliverable 6.8 which selects the most promising approaches and specifies the demonstrators.
  
D6.8Specification of mobile phone app acting as virtual document 
 The purpose of this report is to specify “the mobile phone app acting as virtual document”. The report shows which technical requirements are to be met in order achieve this goal. It also contains a detailed description of the applications software architecture, and interfaces to other system components and the user. The document is the base for Deliverable 6.9, which shows the described application in a demonstration.
  
D6.9Demonstrator of mobile phone app acting as a virtual document 
 Deliverable 6.9 is of the type <other> and not a report or specification. The purpose of this paper is to document the successful demonstration of the new enhanced electronic passport for PROTECT.
  
D7.1Protocols and database specifications 
 This report introduces multimodal biometrics and reviews existing multimodal databases, as background to the construction of a new database.  and collection methodology. The PROTECT Multimodal Database specifications are described, comprising the characterization of the subjects, the types of data to be collected, the data management, the schedules for data recording and the privacy and data protection measures. This Deliverable also describes the database collection methodology. In particular, it includes details of the hardware necessary for collecting each biometric trait ; the collection details; the data formats used and any other aspects specific of each trait collection. The integration of different biometric traits and the applicability of each trait in different scenarios envisaged by the PROTECT project, is also discussed.  
  
D7.2Protocols and database specifications (Database version 1) 
 This document builds upon Deliverable 7.1, and gives specific details about the biometric collections, which included unimodal databases and the PROTECT Multimodal Database. Updates to more general aspects of PROTECT biometrics integration are provided. D7.2 also contains: a brief characterization of multimodal biometrics and existing multimodal databases as an introduction to the motivation for the construction of a new database; the PROTECT Multimodal DB Database specifications and collection methodology; and the description of work regarding the benchmarking metrics.  
D7.3Protocols and database specifications (Database final version)
 
 The objective of this document is to present the database specifications underpinning the second data collection for the PROTECT Multimodal Database. The sensors and the procedures used are summarized in this document. In addition, information regarding the volunteers that provided their biometric data is also presented. The PROTECT Multimodal DB database comprises several biometric traits. These have been evaluated throughout the project to assess their applicability to the different scenarios and use cases studied. Several criteria led to the choice of this set of biometric traits with the two main aspects being the innovative aspect and the contactless use.
  
D7.4Biometric systems performance assessment (updated) 
 This document “D7.4 Biometric systems performance assessment”, is a Deliverable under work package 7. Its’ purpose is to present and describe the results obtained under Task 7.3 “Performance assessment”. This includes the performance evaluation of biometric identification sensors and algorithms that are developed under WP5 and WP6 and are based on the protocols and databases collected through T7.1, and the benchmark metrics devised through T7.2. Initially this document reports on the assessment of existing biometric sensors and algorithms provided by project partners and will later extend to the modified or new biometric algorithms generated within PROTECT.
  
D7.5Biometric systems vulnerability analysis (updated) 
 This document summarizes the outcome of Task 7.4 Vulnerability analysis. Task 7.4 aims to assess the threat of direct, sensor-level spoofing to biometric systems and then to present novel countermeasures developed under WP6. These activities require the comparison of system performance under spoofing conditions, first without and then with countermeasures, to baseline scores for standard, state-of-the-art biometric systems. The purpose of this Deliverable is to evaluate the result of the considered spoofing attacks and compare it to the baseline performance of the reference systems reported in D7.4. This document relates to the biometric database previously reported in Deliverables 7.1. 7.2 and 7.3, as well as the PAD techniques reported in Deliverable 6.1.
  
D8.1Functional identification control systems for demonstrators 
 Deliverable 8.1 is the readiness of the functional identification control systems for demonstrators. Deliverable D8.1 is of the type <other> and not a report or specification. The purpose of this paper is to document the readiness of the functional identification control systems for demonstrators.
  
D8.2 Functional Demonstrators   
  The PROTECT system aims to deliver new innovative approaches to the border control process making use of new biometric modalities, smartphones and next generation passports. The system addresses 2 border control scenarios, air/sea border and land border, with its different requirements. In the air/sea border biometric recognition “on the move” shall be achieved cutting down transaction times to a minimum. The land border scenario covers people in cars and the usability of systems in this situation. During WP8 the demonstrators for the two end user locations have been constructed. Several user and technical validations have been performed. The results have driven the modification of the demonstrators to reach to the final versions. These final versions have been successfully demonstrated at the end user sites.  
D8.3 Report on technical and user validation  
 This Deliverable is the first of three, which document the progress in technical and user validation, the applied adjustments to the system to react to the findings, and the final results from the demonstration activities. It contains a detailed view of the technical and user validation timeline. This Deliverable is based on initial low-cost prototypes, giving the partners room for adjustments without major impact on cost.  
D8.4 Technical and user validation report 2  
 This document describes the setup and tests performed in the technical and user validation sessions with stakeholders and partners. Moreover, certain topics such as ethical aspects and security are addressed in a discussion with experts. The results of the tests and discussions are documented.  
D8.5
 Technical and user validation report final  
 Two large technical and user validation sessions have been performed on the biometric corridor and several smaller test runs. After the session, two public demonstrations have been performed to gather further user feedback. It has been shown that the PROTECT setup can largely increase the traveller throughput if used with the mobile phone scenario. Throughput speeds of 1 traveller per second are possible; however the limiting factor is the separation of unrecognized travellers. If this shall be done by humans not more than 1 traveller every 5 seconds is manageable. Another solution is the installation of fast moving gates. Unfortunately these would also require a certain flow control. Participants found the solution attractive; however concerns on the security of the stored data have been mentioned. The highest throughput could be achieved with classic face recognition algorithms. The generation LDS passport scenario has been found to be inferior to existing solutions and therefore has not been considered in further demonstrations. A generation 4 passport with SUHF technology has been used instead.  
D9.1Dissemination and exploitation plan 
 The aim of this report is to present the first version of the dissemination and exploitation plan of the PROTECT project. It describes actions taken to disseminate the PROTECT project highlights, and how dissemination actions are targeted. This report discusses potential customers and alternative applications for PROTECT technology.  
D9.2Dissemination and exploitation plan 
 This report is the second (updated) version of the dissemination and exploitation plan of the PROTECT project. This document outlines the strategy to reach the largest number of public agencies, institutions, research centres, public and private companies, novel and potential partners which could use the research outcomes of this project. The report contains an updated summary of dissemination activities for the second year of the project. This includes dissemination activities  targetting specific audiences - scientific community, industry, civil society, policy makers, investors, and customers. An extensive list of published papers as well as list of conferences, workshops, meetings and other events, where PROTECT idea and results were disseminated, is presented. The project’s website and social media channels (LinkedIn, Facebook, and Twitter) with statistics of visits is also presented. Finally, the manner of execution and monitoring of the dissemination strategy, which encompasses individual partners’ dissemination strategies, is discussed.
  
 D9.3Dissemination and exploitation plan
  
  The aim of this report is to present the third (updated and final) version of the dissemination and exploitation plan of the PROTECT project. The dissemination and exploitation plan aimsto show a path to reach the largest number of public agencies, institutions, research centres, public and private companies, novel and potential partners which could use the research outcomes of this project. The report consists of two parts. The first part of the report covers dissemination activities. Since dissemination aims, tools and methods were widely discussed in the first and second versions of this deliverable, only a summary is presented here. Dissemination activities carried out to reach various audiences is reported: targeting scientific community, industry, civil society, policy makers, investors, and customers during project duration. An extensive list is presented of published papers as well as list of conferences, workshops, meetings and other events, where PROTECT idea and results were disseminated. Also described is the project’s website and social media channels (LinkedIn, Facebook, and Twitter) with statistics of visits. The first part finishes with execution and monitoring of the dissemination strategy, which embraces individual dissemination strategies, execution of dissemination plan and monitoring. The exploitation plan (Part 2) starts with brief explanation of legal boundaries. A set of exploitation tools is proposed, and potential customers of PROTECT solutions identified. A significant part of this document is focused on Main Exploitable Results (MERs). Detailed exploitation plans for each PROTECT partner, including Veridos – the main industrial partner, are also provided.  
 D9.4 Final Demonstration 1  
  The PROTECT system aims to deliver new innovative approaches to the border control process making use of the new biometric modalities, smartphones and next generation passports. The system addresses 2 border control scenarios air/sea border and land border with its different requirements. In the air/sea border biometric recognition “on the move” shall be achieved cutting down transaction times to a minimum. The land border scenario covers people in cars and the usability of systems in this situation During WP8 the demonstrators for the 2 end user locations have been constructed. Several user and technical validations have been performed. The results have been driven the modification of the demonstrators to get to the final versions. These final versions have been successfully demonstrated at the end user sites.  
 D9.5Final Demonstration 2
  
  The PROTECT system aims to deliver new innovative approaches to the border control process making use of the new biometric modalities, smartphones and next generation passports. The system addresses two border control scenarios air/sea border and land border with its different requirements. In the air/sea border biometric recognition “on the move” shall be achieved, cutting down transaction times to a minimum. This report is about the air/sea/train border scenario, where many travellers are crossing the border on foot with luggage in a short time. During WP8 the demonstrators for the two end user locations have been constructed. Several user and technical validations have been performed. The results have driven the modification of the demonstrators to get to the final versions. These final versions have been successfully demonstrated at the end user sites.