Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.

Slides:



Advertisements
Similar presentations
© 2010 IBM Corporation Doing More with Less A Strategy for Improving Trust in Identities in an Era of Tight Budgets November 2010.
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
User Perception and Acceptance of Biometrics M. Angela Sasse Professor of Human-Centred Technology Department of Computer Science University College London,
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Secure Communication Architectures.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
© 2005 Mobile VCE Securing the Future: Device & Service Security Stephen Hope, FT R&D UK Ltd on behalf of Nigel Jefferies, Vodafone Chair.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
1 CISR-consultancy Challenges “Customer ask us what to do next” Keywords: “Customer ask us what to do next” From Policy to Practise The world is going.
BioSec Biometrics & Security IST © 2005 BIOSEC Consortium 1February 2005 BioSec Biometrics & Security Orestes SanchezBioSec Coordinator Telefónica.
Identity & Access Management DCS 861 Team2 Kirk M. Anne Carolyn Sher-Decaustis Kevin Kidder Joe Massi John Stewart.
FIT3105 Smart card based authentication and identity management Lecture 4.
SOA Security Chapter 12 SOA for Dummies. Outline User Authentication/ authorization Authenticating Software and Data Auditing and the Enterprise Service.
Ronny Depoortere January 16th, 2012 Chisinau. Identification – Business Case The ability to uniquely identify citizens and foreign residents is the corner.
Near Field Communication By Van Logan HTM 304. What is Near Field Communication Short range wireless communication technology between electronic devices.
Computer Security: Principles and Practice
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Identity Cards: Strategy, Implementation & Challenges A Melodrama in Three Parts Simon Davies Director, Privacy International Visiting Fellow, London School.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Wireless Password: ONLINE GAMING / GAMBLING KNOW - YOUR - CUSTOMER AND RISK MANAGEMENT.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Dr. Benito Nacif Electoral Council, IFE Mexico 9 September, 2010 Building Trust through an Independent Electoral Registry: the Mexican Experience.
Ronny Depoortere 19th March, 2012 Warsaw. Identification – Business Case The ability to uniquely identify citizens and foreign residents.
Introduction to ISO New and modified requirements.
WIC Client Transfers Section 1: Overview of Transfer Policies 1.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
Software engineering. What is software engineering? Software engineering is an engineering discipline which is concerned with all aspects of software.
5th Annual International Public Sector Reform Symposium: New Models of Service Delivery for the 21st Century Ian Neill, e-Borders programme, UKBA Wednesday.
Feasibility Study.
Garry Compton Manager Government Authentication ANTA Workshop 05/08/03 Canberra, Australia An update on Commonwealth Authentication.
Employment Eligibility Verification The I-9 Form Bluefield State College New River Community & Technical College.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Biometrics Authentication Technology
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
AUDIT IN COMPUTERIZED ENVIRONMENT
© Experian Limited All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Intelligence Reform: The Process Begins National Association for Public Health Statistics and Information Systems June 7, 2005.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
National Enrolment Service (NES) Overview October 2015 – June 2016.
Biometric for Network Security. Finger Biometrics.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 I-9 Completion for People Managers Hiring Manager Training Version January 2016.
DATA COLLECTION AND RECORD MANAGEMENT PRESENTED BY: MRS OLUWAFOLAKEMI A. AJAYI DEPUTY BURSAR UNIVERSITY OF IBADAN 5 TH APRIL 2016.
Problem being addressed –Fraudsters file in advance of the actual taxpayer resulting in lost government dollars ($5.2M in payments to fraudulent identities.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Cyber Security Means Locking the Front Door Too: Use High-Assurance Identity Management to Control Access to the Federal Bridge.
Chapter 7. Identifying Assets and Activities to Be Protected
Internal Control Principles
Chapter 1- Introduction
National Electoral Register
Application for the birth certificate
Unique Identification Number Project
Summary Physical Access & Time and Attendance PC/Network Access
EMV® 3-D Secure - High Level Overview
Frequently asked questions about software engineering
Getting Started Basic Paperwork I-9 W-4 Direct deposit
Security in Networking
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Welcome To Money pad November 23, 2018 Sample footer.
Legal Framework for Civil Registration, Vital Statistics
Regional Initiatives – South Asia Civil Registration Group (CR8)
PART 1 - Why Now Digital Change pic to a more media-like one – say microphones or TV cameras outside high court?? Could.
PLANNING A SECURE BASELINE INSTALLATION
Getting Started Basic Paperwork I-9 W-4 Direct deposit
Presentation transcript:

Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham

Headline issues Purpose of ID Card and ID database Purpose of ID Card and ID database Practical issues Practical issues –Enrolment processes –Identity verification –Limitations of Biometrics –Usability and acceptability –Social Issues –Trials Technology solutions Technology solutions –System architecture –Functionality –Cards and Tokens –Challenge processes –Registry data management –Security and data sharing Programme management Programme management

Purpose: “Reliable proof of identity ” Allowing citizens to prove their identity Allowing citizens to prove their identity Preventing terrorism and criminal activity, or at least making it harder Preventing terrorism and criminal activity, or at least making it harder Preventing illegal immigration and work Preventing illegal immigration and work Preventing access to services and payments from those not entitled (health, DWP) Preventing access to services and payments from those not entitled (health, DWP) Preventing access to post-16 education Preventing access to post-16 education Facilitating business transactions Facilitating business transactions Etc. Etc.

Enrolment processes Secure enrolment, and secure keeping of enrolment data, is crucial to validity of ID card and information from ID database Secure enrolment, and secure keeping of enrolment data, is crucial to validity of ID card and information from ID database Process of establishing ID at enrolment Process of establishing ID at enrolment –What documents or information is used? –Can staff tell whether documents are genuine? –What checking is done? –How will inconsistencies in exisiting databases be dealt with? –How long will it take to issue ID card? –Staff have to be trustworthy and reliable – how will they be vetted?

Verification processes Wide range of usage scenarios: Wide range of usage scenarios: –Bobby on the beat –Airport security –Hospitals –GP’s surgery –Bank –Library –Video hire

Technology solutions Card technologies are rapidly changing Card technologies are rapidly changing Memory devices are becoming cheaper and widely available in a wide range of formats – why use cards? Memory devices are becoming cheaper and widely available in a wide range of formats – why use cards? Wireless access gives less intrusive reading capability – proximity devices Wireless access gives less intrusive reading capability – proximity devices Network security is vital for high level of confidence in transfer of personal data Network security is vital for high level of confidence in transfer of personal data Integrity of systems implementation and operation vital for good user experience Integrity of systems implementation and operation vital for good user experience

Biometrics No single biometric on which whole population can enrol No single biometric on which whole population can enrol –Permanent and temporary problems with finger and iris recognition –What to do with people who have problem with both? –Muslim women do not have to show face on photos? Face recognition has close to 100% enrolment, but low performance in field Face recognition has close to 100% enrolment, but low performance in field –Personal and environment factors –False rejection could lead to refusal of service, or slow down service to unacceptable level

Functionality Primary functionality is to record identity information at the point of enrolement and to re-verify identity when challenged. Primary functionality is to record identity information at the point of enrolement and to re-verify identity when challenged. Other functions are: Other functions are: –Prove rights for entitlement to services (identity not essential for that at the point of service delivery, only at point of rights enrolement) –Proof of personal attributes (age, sex, address) –Proof of nationality Card information and Registry information may be necessary for all or some of these functions, depending upon data and system architecture Card information and Registry information may be necessary for all or some of these functions, depending upon data and system architecture

System and Data architecture System and Data architecture Is the register one database on one machine or is it distributed across many machines Is the register one database on one machine or is it distributed across many machines What availability of service is required when: What availability of service is required when: –A large number of concurrent users are using the system (what number is expected?) –System upgrades are necessary –Failures of components occur What range of user terminals are expected to be able to access the system – PC, Mobile phone, PDA, Internet café, Bespoke system What range of user terminals are expected to be able to access the system – PC, Mobile phone, PDA, Internet café, Bespoke system How will the design avoid the system becoming a legacy of the future How will the design avoid the system becoming a legacy of the future Why is a national system better than a set of interconnected regional systems (cf Germany) Why is a national system better than a set of interconnected regional systems (cf Germany) How is data held and how will formats be kept up to date and data re-verified in case of systems failures How is data held and how will formats be kept up to date and data re-verified in case of systems failures

Security and data sharing Quality of data – who assesses relevance Quality of data – who assesses relevance Benefits and risks – to the citizen or the government departments concerned Benefits and risks – to the citizen or the government departments concerned Who sets standards for security – CESG? Who sets standards for security – CESG? How are these aspects audited and by whom and how often How are these aspects audited and by whom and how often How is the system protected against denial of service attack How is the system protected against denial of service attack

Data checking Who does this and against what standards Who does this and against what standards When biographical footprints are in another language than English, and maybe only in handwritten form, are there enough cleared people to carry out the work to the required standard When biographical footprints are in another language than English, and maybe only in handwritten form, are there enough cleared people to carry out the work to the required standard How are illiteracy and lack of biographical footprints to be dealt with How are illiteracy and lack of biographical footprints to be dealt with

Conclusions Ownership of information that supports identity is still a subject for debate Ownership of information that supports identity is still a subject for debate Technology of biometrics still not good enough for reliable verification Technology of biometrics still not good enough for reliable verification Systems issues are complex and unresolved Systems issues are complex and unresolved Expected benefits are yet to be supported by evidence Expected benefits are yet to be supported by evidence And yet – some way of improving identification of people is vital And yet – some way of improving identification of people is vital