Download Area


The section contains downloadable resources such as TG deliverables, conference presentations and ERNCIP Office documents. The list is presents the most recent uploaded documents first.

Applied Biometrics for the security of Critical Infrastructure

pdf

Biometrics, surveillance and privacy

Wed, 2017-02-08

Abstract

There are a number of issues associated with privacy and biometrics that will need to be addressed for successful and responsible implementation of biometric technology. This report will articulate these issues, explore their impact and identify any activity needed to address them.

pdf

Summary of Applied Biometrics TG Activities: October 2015 to August 2016

Tue, 2016-11-08

Abstract

This report has been generated by the ERNCIP Thematic Group: applied biometrics for security of critical infrastructures.
Biometrics allows for the automated identification of individuals based on their biological and behavioural characteristics and provides the promise of the unique identification or classification of individuals interacting with critical infrastructures. The Thematic Group was established to provide a forum for experts to drive the direction of standards development and generate advice to aid critical infrastructure stakeholders to understand and use biometrics successfully.
This report outlines the work of the Thematic Group between October 2015 and August 2016.

pdf

Summary of the activities of the ERNCIP Applied Biometrics for security of CI Thematic Group

Sun, 2015-07-05

Abstract

Biometric identity technology, such as fingerprint, iris or face recognition, is foreseen to become more and more common for access control to critical infrastructure and for travel documents. Test and evaluation presents challenges of scale because the required correct identification rates are often high and the acceptable false alarm rate low, so very many test data records must be run to determine the performance.

pdf

The Application of Biometrics in Critical Infrastructures Operations: Guidance for Security Managers

Sun, 2015-07-05

Abstract

Biometric technologies have advanced considerably over the past decade, and have paved the way for more widespread use by governments, commercial enterprises and, more recently, by the consumer through the introduction of sensors and apps on mobile phones. This report provides introductory information about the application of these technologies to achieve secure recognition of individuals by organisations which form part of critical infrastructures in the EU. As a specific example, it offers guidance about the implementation of physical access control systems using biometric technologies. It is principally addressed at managers and security officers within these organisations. With the information in this report, managers and officers should be in a better position to discuss their specific requirements with technology suppliers, specialist systems integrators and consultants – and therefore lead to applications which are more secure without compromising on their usability. The report emphasises the importance of considering the effectiveness of the entire application – and not just focussing on the performance of the biometric subsystem. Note that the representation of specific devices does not imply any recommendation by the authors or the European Commission.

pdf

Experiences from Large Scale Testing of Systems using Biometric Technologies

Thu, 2015-05-07

Abstract

The intended readership of this paper is organizations looking to implement very large scale identification systems (e.g. national scale systems which may run to many millions of individuals). Many of the lessons and issues identified will also be useful for organizations looking to develop more general systems based on biometric technology. This paper describes a systematic approach to testing based on lessons learnt from a case study of large scale testing of biometric systems. This approach will enable the performance of the proposed biometric matching system to be characterized to ensure that it is ‘fit for purpose’ and that the benefits outlined in justifying the system can be met.