CSC Proprietary Data Border Control System. CSC Proprietary Data AGENDA Context, Digital Trust and Unified Entitlement Mgmt Project & System overview.

Slides:



Advertisements
Similar presentations
HiPath SIcurity Card Manager Smartcard Management and Personalization System Sales Presentation.
Advertisements

Integrated Healthcare Management system. Standards based design. [ Supports HXP (Health Exchange Protocol) a standard in exchanging health care data ]
NexSentry Imaging Solutions
The detection and prevention of ID Fraud
© Daon Confidential Strategies for Implementing National Identity Systems Nov 28 th 2007 Leo Ring Vice President, Daon.
DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
1. Documents types Visas (ID-2) ICAO standard passports (ID-3) ID cards and driving licences (ID-1) Travel and identity documents.
LeadManager™- Internet Marketing Lead Management Solution May, 2009.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Commercial Data Processing Lesson 2: The Data Processing Cycle.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
1 MRTD Programme: Consolidating Comprehensive Security and Enhancing Facilitation Mauricio Siciliano Mauricio Siciliano ICAO MRTD Programme ICAO/McGill.
1 Automatic Border Passage at Amsterdam Airport Schiphol ACM ICPC, November 16th 2002 Art de Blaauw, manager projects.
2-Jun-15 1 ACCESSING ON LINE SERVICES PROTECTED BY THE ITALIAN EID GIOVANNI MANCA National Center for Information technology in Public Administration (CNIPA)
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
BioSec Biometrics & Security IST © 2005 BIOSEC Consortium 1February 2005 BioSec Biometrics & Security Orestes SanchezBioSec Coordinator Telefónica.
Corporate Overview.
1 Preview of the self service airport R edesign P assenger P rocess (RPP) Club of Amsterdam, 1 Maart 2006.
Stephen S. Yau CSE , Fall Security Strategies.
1 1 New Zealand’s Experience in Implementing API in a ‘Visa Free’ Environment Advance Passenger Screening Presentation to : APEC Business Mobility Group.
Christophe Fiessinger & Jan Kalis Senior Technical Product Manager Microsoft Corporation Session Code: OFS214.
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
Relgo Networks, Inc. Jubilee Hills, Hyderabad Realty Enterprise Resource Planning (ERP)
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
1 Customs 2 Customs Connectivity : an African Success Story Anton Eccles Solutions Architect eTradex (Pty) Ltd May 2015.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
AGENDA Welcome and introductions Brief introduction to PSI Mobile Technical Overview Demonstration Q and A Next Actions.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
TOPPHONEBELGIUM.BE THE PIN CODE DATABASE. TOPPHONEBELGIUM.BE INTRODUCTION TO THE COMPANY TOP PHONE Active in telecom since 1996 Based in Antwerpen but.
OCLC Online Computer Library Center CONTENTdm ® Digital Collection Management Software Ron Gardner, OCLC Digital Services Consultant ICOLC Meeting April.
1 Simplifying the Business  INTERNATIONAL AIR TRANSPORT ASSOCIATION 2010 IATA Passenger Experience Airport Forum Bucharest, 17 November, 2010.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
New Technologies and Travel Documents ICAO 12 th Meeting of the Facilitation Division Cairo March 23, 2004.
X-Road – Estonian Interoperability Platform
Utilities, Customers & SMS Rudi Leitner. Who in this room has a mobile phone? Who in this room has ever sent a text (SMS) message?
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
RacWEB Conference, E-CUSTOMS INITIATIVES IN WESTERN BALKAN COUNTRIES Viktor Hristov.
Symbol Technologies Security Forum - Airline Security
Ivo Rosol, OKsystem Middleware.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
1 1 Aeronautical Information Services Brief to AIXM User Group 27 February 2007.
Novell Compliance Management Platform Update CMP & CMP Extension for SAP Environments Leo Castro Product Marketing Manager Patrick Gookin.
Network security Product Group 2 McAfee Network Security Platform.
Biometrics Authentication Technology
1 The Future Trend of Airport Passenger Services Greater convenience, speed and control for passengers Simplifying the Business  International Air Transport.
THE MALAYSIAN ELECTRONIC PASSPORT
AADHAR TECHNOLOGY Gurneet Kaur, Nitin Mangal. What is Aadhar?  Unique Identification Number linked to a person’s demographic and biometric information.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IS3220 Information Technology Infrastructure Security
EC-NetAX Supervision EC-BOSAX Web Building Controllers
Information Systems Design and Development Security Precautions Computing Science.
Education Solution.
THE MALAYSIAN ELECTRONIC PASSPORT
PLM, Document and Workflow Management
Guide to Access Control Systems
Ian Ramsey C of E School GCSE ICT On the move Final steps.
ABOUT ME MY NAME IS DIOSDADO MACASAET OR DON
Biometric technology.
Enterprise Program Management Office
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
e-Invoicing – e-Ordering 20/11/2008
AIMS Equipment & Automation monitoring solution
Integrated Program Management
Presentation transcript:

CSC Proprietary Data Border Control System

CSC Proprietary Data AGENDA Context, Digital Trust and Unified Entitlement Mgmt Project & System overview Border Control Business Process System Operation & Architecture Application Interface Landside Airport System Live Demo Acknowledgments Questions & Answers - References

CSC Proprietary Data DIGITAL TRUST is how we “shake hands with the digital Enterprise.” IDENTITY: WHO ARE YOU REALLY ?? IP VALUE: Originality, Authenticity Integrity, access-usage-rights

CSC Proprietary Data CONTEXT Business requirement coming from the European Union Legal Framework control extra-Schengen immigration at the whole Schengen perimeter, and not only at the single National border Immigrants are free to travel without further control once entered into the Schengen area with a valid document and visa Several millions of passengers to be managed Immigrant flow statistics

CSC Proprietary Data DIGITAL TRUST Identity and Intellectual Property

CSC Proprietary Data UNIFIED ENTITLEMENT MANAGEMENT (UEnM) BIS CoE

CSC Proprietary Data PROJECT OVERVIEW CSC COMMITMENT VISION & STRATEGY –an end-to-end approach, from the solution concept and architecture design to the technology selection and implementation SYSTEM INTEGRATION PROJECT –automatic control against counterfeit documents –automatic acquisition of traveler's data (prevention + statistics) –verification of personal ID through biometrics (i.e. fingerprint and photo verification); –check immigrants’ admissibility to the National and European territory on several external databases –quickly share fraud attempts among all the National borders –automate all the back-office workflow –design, procure and deploy the technical infrastructure –Project Management SYSTEM MANAGEMENT & SUPPORT –specialized support on document templates

CSC Proprietary Data SYSTEM OVERVIEW 3M e-Passport Reader –3 wavelength optical scanning (Vis, IR, UV) –High resolution (400 dpi) –Integrated contact (smart-card) & contact-less (RFID) chip reader –Low acquisition time (3 sec) –High score at world interoperability contest (98%) live finger print reader –IAFIS Image Quality compliant –Scan area 1”x1”, 500 dpi COGENT fingerprint verification library ENABLING TECHNOLOGY

CSC Proprietary Data BUSINESS PROCESS Security elements verification OCR Recognition & data verification ICAO data verification 3 wavelenght features Exploitation (VIS, UV, IR) Electronic data Extraction & verification Data digital signature verification C DOCUMENT FOCUS

CSC Proprietary Data BUSINESS PROCESS Biometric data Verification (next iris) Police Operator Focuses on Immigrant behavior P PERSON FOCUS Local Biometric data Verification (FP, Photo) National admissibility check Schengen admissibility check Remote Biometric data Verification

CSC Proprietary Data BUSINESS PROCESS Frauds news Broadcast Real time share Doc Analysis Experience share National Borders Statistics Other Government Systems connection Templates, Procedures & SW updates Border Post Time Performance (10 sec typ) Immigrant Flows statistics Back-office Automation (incl. doc. hand-over) Stand-alone & Mobile Capability Never stops G ORGANIZATION FOCUS BORDER POLICE

CSC Proprietary Data SYSTEM OPERATION BORDER GATE LOCAL LAYOUT DB WAN GO STOP 1. DOCUMENT VERIFICATION 2. ADMISSIBILITY CHECK REQUEST CENTRAL LAYOUT DB DEFINITION & TUNING OFFICE NATIONAL DB SCHENGEN DB DIGITAL CERTIFICATES BACK OFFICE WORKFLOW TRANSIT LOG BORDER CONTROL SYSTEM FLOW

CSC Proprietary Data THE APPLICATION INTERFACE Automatic Template association Personal Data read and compared Document Image (Visible light) Doc. Images (Vis, IR, UV) with zooming Electronic photo ICAO checkdigit verification Finger-print verification request Self explaining icons Automatic control result tree view Admissibility check request Final Police operator decision Passenger hand-over to back-office News & Broadcast Help on-line Admissibility check result details Security elements details

CSC Proprietary Data THE APPLICATION - details Document’s Images C DOCUMENT FOCUS

CSC Proprietary Data Patterns Match THE APPLICATION - details C DOCUMENT FOCUS

CSC Proprietary Data Visual Analysis THE APPLICATION - details C DOCUMENT FOCUS

CSC Proprietary Data Data Field Control THE APPLICATION - details CP DOCUMENT & PERSON FOCUS Photo match

CSC Proprietary Data Fingerprint verification THE APPLICATION - details P PERSON FOCUS

CSC Proprietary Data Admissibility Verification THE APPLICATION - details P PERSON FOCUS

CSC Proprietary Data Knowledge Base Page THE APPLICATION - details G ORGANIZATION FOCUS

CSC Proprietary Data Slide 21 SYSTEM DESIGN & ARCHITECTURE Firewalls INFRASTRUCTURE Designed for Performance –Fully scalable –Load Balanced –Smart Client Designed for Security –HTTPS –Server Certificate & Encoded Transmission Protocols Designed as Service Oriented

CSC Proprietary Data UP TO DATE TECHNOLOGY A Smart Client… Only One Entry Point for Every User Profile Extremely Rich & Friendly User Experience Local Resources Access (scanner, devices, …) Fast & Responsive Supports heavy graphic elaboration Load Available disconnected (near the plane, on board, …) …Service Oriented Architecture Flexibility Architecture & Engineered Coding Made Simple & Uniform Easy Developing & Maintenance with Low Costs of Implementing New Features Global Communities architecture and design practices Goals

CSC Proprietary Data UP TO DATE TECHNOLOGY A Simple, Smart Deployment Engine Goals The Device Facade Layer Integration of Multiple Devices (Image scanner, Fingerprint scanner, RFID & Smart Card readers) Integration of New Device in Days not in Weeks Transparent to the Application Layer Simple Customization of the System to Achieve new Business Domains Goals Client Gets All Updates at Same Time On Connecting One Process And Technique To Deploy All Changes Transparent for User Client Always Auto-Updated Deploying Without Administration Privileges Respecting The Architecture Practice & Communication Protocol Simple to Understand & Maintain

CSC Proprietary Data VALUE FOR THE USER Enabling electronic ID technology, RFID & SmartCard Help to detect and block counterfeit documents Increase Person & Document security check Reduced time for each control: the Police operator focus on the person and his behavior Reduce queue for passenger control Transit of every extra-Schengen passenger traced on the National security database Statistics of immigration flows Ready to integrate new devices for mobile use, new algorithms, scanning devices and biometric technologies Almost real-time share of the counterfeit “lesson learned” … …… …….. Which is the value ?

CSC Proprietary Data VALUE FOR THE USER …… this is DIGITAL TRUST …. ……. enhancing value while reducing risk exposure ! Which is the value ?

CSC Proprietary Data FURTHER DEVELOPMENT Goes to check-in, gets boarding pass and leaves fingerprints STOP / GO CHECK-IN SECURE AREA GATE BORDER CONTROL SYSTEM WAN GO STOP SHOPPING AREA BOARDING GATE Goes thru RX control DOCUMENT VERIFICATION ADMISSIBILITY CHECK REQUEST LANDSIDE AIRPORT SYSTEM INTEGRATION

CSC Proprietary Data BORDER AND IMMIGRATION SOLUTIONS (BIS CoE) A CSC Center of Excellence develop CSC intellectual property for large-scale management of personally identifying information and entitlements, consolidates the practical experience gained by providing solutions to Government clients in a variety of Countries. Border & Immigration Solutions Contact –Tim Ruggles, Director –Center of Excellence – Border and Immigration Solutions Center of Excellence

CSC Proprietary Data ACKNOWLEDGMENTS Alberto Buonocore Project Manager Luca Bovenzi SW Architect The Border Control System was developed in a project which won the 2007 CSC Award for Technical Excellence among over 75 candidates from all over the Company. Thanks to the whole team (L.Bovenzi, G.Ingoglia, G.Bernabei, F.Spampinato, S.Cortellessa, E.De Bardi, P.Mussotto, I.Barilari, S.Di Ruscio) Contacts