1 Preview of the self service airport R edesign P assenger P rocess (RPP) Club of Amsterdam, 1 Maart 2006.

Slides:



Advertisements
Similar presentations
12 November 2002Digital Identity Forum – London Biometrics and ID Bill Perry Independent Consultant Phone:
Advertisements

BIOMETRIC VOTING SYSTEM
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Security of eGovernment, European Parliament, Brussels 2013 Max Snijder, Linda Kool, Geert Munnichs L Kool | 1 19 February 2013 Findings from the ePassport.
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
1 Automatic Border Passage at Amsterdam Airport Schiphol ACM ICPC, November 16th 2002 Art de Blaauw, manager projects.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Biometrics Technology Jie Meng. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
PALM VEIN TECHNOLOGY.
Biometrics and Authentication Shivani Kirubanandan.
 Provides mode of transportation for many (e.g. travelling, business trip, etc)  Cheaper and faster comparing to travelling by land or sea  So why.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
© LogicaCMG All rights reserved 1 Biometrics in aviation Arnoud van Zuijlen Business Development Manager e-Identity Solutions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
P O L I C E D E P A R T M E N T  Biometric passport – Passport Act – Issuing a biometric passport – Development project  Biometric Passport To Biometric.
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
Karthiknathan Srinivasan Sanchit Aggarwal
BornholmsTrafikken April 2004 Peter Havskov Christensen, M.Sc.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
CSC Proprietary Data Border Control System. CSC Proprietary Data AGENDA Context, Digital Trust and Unified Entitlement Mgmt Project & System overview.
Neuromuscular Engineering 11 Neuromuscular Engineering & Technology BioMetrics SECURE AREA VETTING AND ACCESS CONTROL.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
The Biometric Applications Commissioner Balancing Security and Facilitating Procedures at Border Crossings Frontex, October 2013 Biometric Applications.
5th Annual International Public Sector Reform Symposium: New Models of Service Delivery for the 21st Century Ian Neill, e-Borders programme, UKBA Wednesday.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
SPT - the way travel should be!. Current Environment  Check-in, security and border clearance processes are resource intensive  High staff costs, cumbersome.
Narita International Airport Corporation All Rights Reserved. “e-check-in” Trial ( e-passport trial ) “e-check-in” Trial ( e-passport trial ) Yoshihiro.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
BUS2302 Information Technology and the Business Student Group 2 Biometrics March 28, 2013.
AirGuard Know who you’re flying with. AirGuard Know who you’re flying with Click Here.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
THE MALAYSIAN ELECTRONIC PASSPORT
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
ATM WITH AN EYE. An automated teller machine (ATM) or automatic banking machine (ABM) is a computerised telecommunications device that provides the clients.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Biometrics Seminar Report on Submitted by : Shikha Bundiwale EE 4 th year (0903EE081050) Submitted to: Lect. Rupali mam EE DEPARTMENT.
THE MALAYSIAN ELECTRONIC PASSPORT
Authentication.
Biometrics.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Ian Ramsey C of E School GCSE ICT On the move Final steps.
Biometrics.
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
Automated Border Control
Presentation transcript:

1 Preview of the self service airport R edesign P assenger P rocess (RPP) Club of Amsterdam, 1 Maart 2006

2 Content  What is realized already  Privium Program  Staff access  Automated border for new electronic passports  The future of Schiphol airport  Redesign Passenger Process (RPP)  The vision for 2010  Blueprint & design  Questions

3 The “PRIVIUM” program Privium border Frequent Flyer Program –Almost members, –Front parking, fast check-in and fast border –New features in the near future

4 The “PRIVIUM” border Automated Border control –Never a queue, easy to realize next installation, –Membership and valid passport open 1st door, –Border police system and iris-match the 2nd door, –Left and right iris pattern on contact chip, – border crossing last year and increasing, –Average passing time 12 seconds, –Rejection rate less then 1.5%. Privium border

5 Schiphol staff badge Staff on Schiphol airport –Almost staff badges exchanged, –About with biometric template. Staff access

6 Staff access control solution –Improved accuracy verification, less security FTE, –Authorization open 1st door, –Authenticate card, data, eye –Iris and weight verification open 2nd door, –Iris pattern on contact less chip, –1100 access points, 10% with biometrics, – accesses per day, 40% with biometrics, –Average time approx. 8 seconds, –Rejection rate less then 1%. Staff access point Staff access

7 User perspective Choose biometric –Stability means long validity –Contact less hygiene and quick –Pattern (finger, iris) –Geometry (face, hand) “I4V” concept –One user action, all checks –Open gates within sight –Less time in case of fall-back –Smart indication and controls Closed environment

8 Respect for privacy Verification to a token –No storage of template in databases or systems Only conscious capture possible – No long distance or unconscious recognition Protected against identity theft –No skimming possibility, –Encrypted storage of data on the token, –Encrypted communication to authentic systems, –Use of non hackable private keys (no public part). Closed environment

9 1st test = 200 airport personnel –ID-1 card with 2 fingerprint images, –Two step read-procedure (visual -> chip), –4 months test. 2nd test = 500 KLM-pilots –Both ID-1 and ID-3 passports, –Including Schengen authorisation, –Chip reading inside the man-trap, –18 months test. Our common use test-projects ICAO compliant

10 Data Structure Privium card Staff badge E-Passport Inside the cards

11 Based on knowledge and experience, Schiphol airport continues to develop high-end security automated airport processes….. …. the program is called Redesign Passenger Process The Future RPP ©2005

12 Vision Passenger process RPP ©2005

13 FRONTDOOR = Passage in departure hall Location of the passages BACKDOOR = To boardingarea ON COURSE RPP ©2005

14 Impression of the Frontdoor VH1 RPP ©2005

15 Impression of the Backdoor RPP ©2005

16 Thanks for your time and attention. Marcel van Beek Amsterdam Airport Schiphol Program manager passenger proces Phone: Mail: