REPORTS/DELIVERABLES
Public deliverables | |||
D2.2 | Legal framework of biometric border control | ||
The aim of D2.2 is to explore the current and proposed European legal framework regulating biometric Schengen border control in order to identify legal, privacy and data protection constraints which should be taken into account by PROTECT scenarios described in D3.1. In this Deliverable, it is assumed that the purpose of D3.1 scenarios is to “facilitate” public border control authorities to speed up their public interest missions of border control management by enrolling additional biometrics in travel documents (or smartphone apps acting as travel documents). | |||
D2.3 | Privacy impact of next-generation biometric border control | ||
The aim of D2.3 is to analyse whether the PROTECT project entails a
potential substantial interference into individuals’ rights to privacy and to
data protection, as protected under articles 7 & 8 of the Charter of
Fundamental Rights Any identified risks are subject to an impact assessment. The
purpose of this Deliverable “D2.3 - Privacy impact of next-generation biometric
border control” is to analyse whether, as an alternative to D3.1 scenarios,
emerging biometric modalities could be processed in a “passport companion”,
such as a smartphone, for “comfort and convenience purposes” of travellers, on
the basis of a contract with PROTECT’s data controller and travellers’ explicit
consent. | |||
D2.5 | Societal impact report (version 1) | ||
The aim of D2.5 is to identify and address the ethical and legal
implications of the technical solutions being developed in the context of the
PROTECT project by summarizing discussions between the project partners and
exchanges with the Ethical and Legal Advisory Group (ELAG), as well as with
other external experts. | |||
D2.6 | Societal Impact Report-Ethical and Legal Advisory Board | ||
The purpose of this Deliverable is to summarise the discussions between
PROTECT project partners and the Ethical and Legal Advisory Group (ELAG).
These discussions took place during the PROTECT Consortium meeting in Munich on
4th April 2019, after the PROTECT technology had been presented and
demonstrated to the ELAG. | |||
D3.1 | System requirements specification and scenarios | ||
The report summarizes the work done within tasks T3.1 and T3.2, which focused on user requirement collection and scenario definition for the PROTECT system. The preliminary work required the selection of a proper methodology to be applied during the elicitation phase. For these purposes, project partners followed the BABOK v3 methodology, which has been adjusted to the specification of the research project. | |||
D5.1 | Biometric Sensor Solutions for Borders | ||
This Deliverable presents a selection of individual hardware and software solutions for biometrics applicable in principle to the scenarios considered in PROTECT. Additionally, it describes the work done until the end of September 2017 to reach the defined goals of work package 5 of this project. The document presents all the considered scenarios, as well as the current work in progress concerning the different biometric modalities. | |||
D5.2 | Scenario Specific Sensor Solutions | ||
This Deliverable presents a selection of individual hardware and software solutions for biometrics determined to be applied in PROTECT demonstrators . This document reports the status of the considered biometric solutions at the end of September 2017, which has been reported in Deliverable 5.1. Also described are the evaluations conducted up to February 2018, regarding the proposed biometric solutions, required to reach the defined project milestones. | |||
D5.3 | Scenario Specific Sensor Solutions withPrivacy Enhancing Technologies | ||
This deliverable represents the outcome of Task 5.6, which applies and
develops privacy enhancing technology to the solutions defined for each
modality in the respective scenarios described in Deliverable 5.2. A detailed
analysis of security and possible impact on recognition accuracy is performed, for
the application of different privacy enhancing technologies to PROTECT’s
biometric modalities. The document first presents how the described and
investigated biometric authentication systems (see Deliverable D5.2) will work
in the scope of PROTECT. After the system description, the necessity of privacy
preservation /enhancement is described. The second part of this document
focuses on a detailed description of the privacy preservation/enhancement
schemes, which are applied to the acquired biometric data directly in the image
domain of the selected modalities (see Deliverables 5.1 and 5.2). | |||
D6.1 | Report on Multimodal Biometric Tool | ||
This document provides the report on Task 6.1 “Multimodal Verification
Tool”. The objective of Task 6.1 is to perform biometric person identification
based on fusion of multiple biometric modalities developed under WP5. The main
aim of T6.1 is to develop an adaptable fusion framework, which will consider
factors such as the border crossing type, traveller profile, historical data,
and trends, trading off throughput versus security level. The output of this
part of the work is a multimodal verification tool to be used and evaluated by border guards in different settings. This Deliverable describes the
state-of-the-art multibiometric fusion technology and investigates different
fusion schemes and their applicability in PROTECT. In this document the
biometric recognition and the sample quality modules developed under WP5 and
reported in D5.2 and D7.4, respectively, are summarized. This Deliverable only
provides a brief summary on the PAD methods developed by the partners. The
detailed descriptions and evaluations are reported in Deliverable 7.5
“Biometric systems vulnerability analysis”. | |||
D6.2 | Specification of new biometric corridor solution | ||
This Deliverable establishes the specifications to build the PROTECT
Biometric Capture Area solution. The document contains the description of the
corridor operation on its own, and in relation to next-generation ePassport
chips and mobile equipment; and how the relevant requirements from the
different scenarios (established in D3.1 ‘System requirement specification and
scenarios’ and D4.2 Technical requirements) are fulfilled. The list of deployed
biometric modalities and the variations between the different border control
scenarios is provided. The architectural description of the corridor includes
the detailed floor plan, and technical details of hardware and software that
will be implemented. The document serves as a basis for the demonstrators which
are to be built and demonstrated at two different border crossing sites. | |||
D6.3 | Demonstration of new biometric corridor | ||
This document reports a practical implementation of the BCA for air and
sea border identity verification for travellers on foot, and land border
identity verification for travellers in vehicles; such implementations
constitute the first prototype for the PROTECT demonstrator for both the
air/sea and land border scenarios. This document provides evidence for: - The feasibility of the PROTECT proposed border control solution: The BCA; - The validation of the BCA specifications | |||
D6.4 | Report on improvements to electronic passports | ||
The report details possible approaches to meet the objectives of the call with modified electronic passports. The objective of “…a most fluent non-intrusive control process…” is hardest to achieve without giving up any of the data protection or privacy properties of the current system. The Proximity Technology currently used in electronic passports can only be read out from a distance of approximately 5cm. Protection Against Tracking, Skimming and Eavesdropping requires the MRZ to be read from the datapage of the passport. For this the booklet has to be opened and placed on an optical scanner. Together with a reading time of 5-6 seconds this makes a real non-stop border control process impossible. The largest impact would be the introduction of secure UHF chips. However, this has major legal and ethical implications. | |||
D6.5 | Specification of new enhanced electronic passport for PROTECT | ||
The aim of this report is to specify “the logical data structure 2
electronic passport application” which is used to store additional biometrics. Section
2 lists requirements from D3.1 and their impact on the specification. However,
most requirements collected in Deliverable 3.1 do not relate to the electronic
passport. Therefore, the major requirements are obtained from the LDS2
specification [11], and have been taken into account. Section 3 describes
the data structures, especially the certificates necessary to read and write
additional biometrics to the electronic passport. Section 4 describes the actual applet implementation, with details on the supported
protocols and how the necessary data is stored on the security chip. | |||
D6.6 | Demonstration of new enhanced electronic passport for PROTECT | ||
Deliverable D6.6 is the “Demonstration of new enhanced electronic
passport for PROTECT”. After the specification of the new enhanced electronic
passport for PROTECT in D6.5 the logical data structure 2 javacard applet has
been developed and tested. | |||
D6.7 | Report on the virtualization of documents with mobile devices | ||
This report analyzes the use of mobile devices as data carriers and
transmitters, thereby overcoming the limitations of current electronic
passports, especially when additional biometrics are used. It gives an overview
of current electronic passport technology and the design objectives that lead
to the current specifications and implementations. It outlines the limitations
of current technology in terms of processing speed, ease of use and ability to
adapt to new scenarios. Known approaches are analyzed according to their
ability to overcome these limitations, and presents radical new ideas that have
been developed by PROTECT. The document is the basis for Deliverable 6.8 which
selects the most promising approaches and specifies the demonstrators. | |||
D6.8 | Specification of mobile phone app acting as virtual document | ||
The purpose of this report is to specify “the mobile phone app acting as
virtual document”. The report shows which technical requirements are to be met
in order achieve this goal. It also contains a detailed description of the
applications software architecture, and interfaces to other system components
and the user. The document is the base for Deliverable 6.9, which shows the
described application in a demonstration. | |||
D6.9 | Demonstrator of mobile phone app acting as a virtual document | ||
Deliverable 6.9 is of the type <other> and not a report or
specification. The purpose of this paper is to document the successful
demonstration of the new enhanced electronic passport for PROTECT. | |||
D7.1 | Protocols and database specifications | ||
This report introduces multimodal biometrics and reviews existing
multimodal databases, as background to the construction of a new database. and collection methodology. The PROTECT Multimodal Database
specifications are described, comprising the characterization of the subjects,
the types of data to be collected, the data management, the schedules for data
recording and the privacy and data protection measures. This Deliverable
also describes the database collection methodology. In particular, it includes
details of the hardware necessary for collecting each biometric trait ; the
collection details; the data formats used and any other aspects specific of
each trait collection. The integration of different biometric traits and the
applicability of each trait in different scenarios envisaged by the PROTECT
project, is also discussed. | |||
D7.2 | Protocols and database specifications (Database version 1) | ||
This document builds upon Deliverable 7.1, and gives specific details about the biometric collections, which included unimodal databases and the PROTECT Multimodal Database. Updates to more general aspects of PROTECT biometrics integration are provided. D7.2 also contains: a brief characterization of multimodal biometrics and existing multimodal databases as an introduction to the motivation for the construction of a new database; the PROTECT Multimodal DB Database specifications and collection methodology; and the description of work regarding the benchmarking metrics. | |||
D7.3 | Protocols and database specifications (Database final version) | ||
The objective of this document is to present the database specifications
underpinning the second data collection for the PROTECT Multimodal Database. The sensors and the procedures used
are summarized in this document. In addition, information regarding the
volunteers that provided their biometric data is also presented. The PROTECT
Multimodal DB database comprises several biometric traits. These have
been evaluated throughout the project to assess their applicability to the
different scenarios and use cases studied. Several criteria led to the choice
of this set of biometric traits with the two main aspects being the innovative
aspect and the contactless use. | |||
D7.4 | Biometric systems performance assessment (updated) | ||
This document “D7.4 Biometric systems performance assessment”, is a Deliverable
under work package 7. Its’ purpose is to present and describe the results
obtained under Task 7.3 “Performance assessment”. This includes the performance
evaluation of biometric identification sensors and algorithms that are
developed under WP5 and WP6 and are based on the protocols and databases
collected through T7.1, and the benchmark metrics devised through
T7.2. Initially this document reports on the assessment of existing
biometric sensors and algorithms provided by project partners and will later
extend to the modified or new biometric algorithms generated within PROTECT. | |||
D7.5 | Biometric systems vulnerability analysis (updated) | ||
This document summarizes the outcome of Task 7.4 Vulnerability analysis.
Task 7.4 aims to assess the threat of direct, sensor-level spoofing to
biometric systems and then to present novel countermeasures developed under WP6. These activities require the
comparison of system performance under spoofing conditions, first without
and then with countermeasures, to baseline scores for standard,
state-of-the-art biometric systems. The purpose of this Deliverable is to
evaluate the result of the considered spoofing attacks and compare it
to the baseline performance of the reference systems reported in D7.4.
This document relates to the biometric database previously reported in
Deliverables 7.1. 7.2 and 7.3, as well as the PAD techniques reported
in Deliverable 6.1. | |||
D8.1 | Functional identification control systems for demonstrators | ||
Deliverable 8.1 is the readiness of the functional identification
control systems for demonstrators. Deliverable D8.1 is of the type
<other> and not a report or specification. The purpose of this paper is
to document the readiness of the functional identification control systems for
demonstrators. | |||
D8.2 | Functional Demonstrators | ||
The PROTECT system aims to deliver new innovative approaches to the border control process making use of new biometric modalities, smartphones and next generation passports. The system addresses 2 border control scenarios, air/sea border and land border, with its different requirements. In the air/sea border biometric recognition “on the move” shall be achieved cutting down transaction times to a minimum. The land border scenario covers people in cars and the usability of systems in this situation. During WP8 the demonstrators for the two end user locations have been constructed. Several user and technical validations have been performed. The results have driven the modification of the demonstrators to reach to the final versions. These final versions have been successfully demonstrated at the end user sites. | |||
D8.3 | Report on technical and user validation | ||
This
Deliverable is the first of three, which document the progress in technical and
user validation, the applied adjustments to the system to react to the
findings, and the final results from the demonstration activities. It contains
a detailed view of the technical and user validation timeline. This Deliverable
is based on initial low-cost prototypes, giving the partners room for
adjustments without major impact on cost. | |||
D8.4 | Technical and user validation report 2 | ||
This document describes the setup and tests
performed in the technical and user validation sessions with stakeholders and
partners. Moreover, certain topics such as ethical aspects and security are
addressed in a discussion with experts. The results of the tests and
discussions are documented. | |||
D8.5 | Technical and user validation report final | ||
Two large technical and user validation sessions have been performed on the biometric corridor and several smaller test runs. After the session, two public demonstrations have been performed to gather further user feedback. It has been shown that the PROTECT setup can largely increase the traveller throughput if used with the mobile phone scenario. Throughput speeds of 1 traveller per second are possible; however the limiting factor is the separation of unrecognized travellers. If this shall be done by humans not more than 1 traveller every 5 seconds is manageable. Another solution is the installation of fast moving gates. Unfortunately these would also require a certain flow control. Participants found the solution attractive; however concerns on the security of the stored data have been mentioned. The highest throughput could be achieved with classic face recognition algorithms. The generation LDS passport scenario has been found to be inferior to existing solutions and therefore has not been considered in further demonstrations. A generation 4 passport with SUHF technology has been used instead. | |||
D9.1 | Dissemination and exploitation plan | ||
The aim of this report is to present the first version of the dissemination and exploitation plan of the PROTECT project. It describes actions taken to disseminate the PROTECT project highlights, and how dissemination actions are targeted. This report discusses potential customers and alternative applications for PROTECT technology. | |||
D9.2 | Dissemination and exploitation plan | ||
This report is the second (updated) version of the dissemination and
exploitation plan of the PROTECT project. This document outlines the strategy to
reach the largest number of public agencies, institutions, research
centres, public and private companies, novel and potential partners which
could use the research outcomes of this project. The report contains an updated
summary of dissemination activities for the second year of the project. This
includes dissemination activities targetting specific audiences - scientific
community, industry, civil society, policy makers, investors, and customers. An
extensive list of published papers as well as list of conferences,
workshops, meetings and other events, where PROTECT idea and results
were disseminated, is presented. The project’s website and social media
channels (LinkedIn, Facebook, and Twitter) with statistics of visits is
also presented. Finally, the manner of execution and monitoring of
the dissemination strategy, which encompasses individual partners’ dissemination
strategies, is discussed. | |||
D9.3 | Dissemination and exploitation plan | ||
The aim of this report is to present the third (updated and final) version of the dissemination and exploitation plan of the PROTECT project. The dissemination and exploitation plan aimsto show a path to reach the largest number of public agencies, institutions, research centres, public and private companies, novel and potential partners which could use the research outcomes of this project. The report consists of two parts. The first part of the report covers dissemination activities. Since dissemination aims, tools and methods were widely discussed in the first and second versions of this deliverable, only a summary is presented here. Dissemination activities carried out to reach various audiences is reported: targeting scientific community, industry, civil society, policy makers, investors, and customers during project duration. An extensive list is presented of published papers as well as list of conferences, workshops, meetings and other events, where PROTECT idea and results were disseminated. Also described is the project’s website and social media channels (LinkedIn, Facebook, and Twitter) with statistics of visits. The first part finishes with execution and monitoring of the dissemination strategy, which embraces individual dissemination strategies, execution of dissemination plan and monitoring. The exploitation plan (Part 2) starts with brief explanation of legal boundaries. A set of exploitation tools is proposed, and potential customers of PROTECT solutions identified. A significant part of this document is focused on Main Exploitable Results (MERs). Detailed exploitation plans for each PROTECT partner, including Veridos – the main industrial partner, are also provided. | |||
D9.4 | Final Demonstration 1 | ||
The PROTECT system aims to deliver new innovative approaches to the border control process making use of the new biometric modalities, smartphones and next generation passports. The system addresses 2 border control scenarios air/sea border and land border with its different requirements. In the air/sea border biometric recognition “on the move” shall be achieved cutting down transaction times to a minimum. The land border scenario covers people in cars and the usability of systems in this situation During WP8 the demonstrators for the 2 end user locations have been constructed. Several user and technical validations have been performed. The results have been driven the modification of the demonstrators to get to the final versions. These final versions have been successfully demonstrated at the end user sites. | |||
D9.5 | Final Demonstration 2 | ||
The PROTECT system aims to deliver new innovative approaches to the border control process making use of the new biometric modalities, smartphones and next generation passports. The system addresses two border control scenarios air/sea border and land border with its different requirements. In the air/sea border biometric recognition “on the move” shall be achieved, cutting down transaction times to a minimum. This report is about the air/sea/train border scenario, where many travellers are crossing the border on foot with luggage in a short time. During WP8 the demonstrators for the two end user locations have been constructed. Several user and technical validations have been performed. The results have driven the modification of the demonstrators to get to the final versions. These final versions have been successfully demonstrated at the end user sites. |