CSC Proprietary Data Border Control System
CSC Proprietary Data AGENDA Context, Digital Trust and Unified Entitlement Mgmt Project & System overview Border Control Business Process System Operation & Architecture Application Interface Landside Airport System Live Demo Acknowledgments Questions & Answers - References
CSC Proprietary Data DIGITAL TRUST is how we “shake hands with the digital Enterprise.” IDENTITY: WHO ARE YOU REALLY ?? IP VALUE: Originality, Authenticity Integrity, access-usage-rights
CSC Proprietary Data CONTEXT Business requirement coming from the European Union Legal Framework control extra-Schengen immigration at the whole Schengen perimeter, and not only at the single National border Immigrants are free to travel without further control once entered into the Schengen area with a valid document and visa Several millions of passengers to be managed Immigrant flow statistics
CSC Proprietary Data DIGITAL TRUST Identity and Intellectual Property
CSC Proprietary Data UNIFIED ENTITLEMENT MANAGEMENT (UEnM) BIS CoE
CSC Proprietary Data PROJECT OVERVIEW CSC COMMITMENT VISION & STRATEGY –an end-to-end approach, from the solution concept and architecture design to the technology selection and implementation SYSTEM INTEGRATION PROJECT –automatic control against counterfeit documents –automatic acquisition of traveler's data (prevention + statistics) –verification of personal ID through biometrics (i.e. fingerprint and photo verification); –check immigrants’ admissibility to the National and European territory on several external databases –quickly share fraud attempts among all the National borders –automate all the back-office workflow –design, procure and deploy the technical infrastructure –Project Management SYSTEM MANAGEMENT & SUPPORT –specialized support on document templates
CSC Proprietary Data SYSTEM OVERVIEW 3M e-Passport Reader –3 wavelength optical scanning (Vis, IR, UV) –High resolution (400 dpi) –Integrated contact (smart-card) & contact-less (RFID) chip reader –Low acquisition time (3 sec) –High score at world interoperability contest (98%) live finger print reader –IAFIS Image Quality compliant –Scan area 1”x1”, 500 dpi COGENT fingerprint verification library ENABLING TECHNOLOGY
CSC Proprietary Data BUSINESS PROCESS Security elements verification OCR Recognition & data verification ICAO data verification 3 wavelenght features Exploitation (VIS, UV, IR) Electronic data Extraction & verification Data digital signature verification C DOCUMENT FOCUS
CSC Proprietary Data BUSINESS PROCESS Biometric data Verification (next iris) Police Operator Focuses on Immigrant behavior P PERSON FOCUS Local Biometric data Verification (FP, Photo) National admissibility check Schengen admissibility check Remote Biometric data Verification
CSC Proprietary Data BUSINESS PROCESS Frauds news Broadcast Real time share Doc Analysis Experience share National Borders Statistics Other Government Systems connection Templates, Procedures & SW updates Border Post Time Performance (10 sec typ) Immigrant Flows statistics Back-office Automation (incl. doc. hand-over) Stand-alone & Mobile Capability Never stops G ORGANIZATION FOCUS BORDER POLICE
CSC Proprietary Data SYSTEM OPERATION BORDER GATE LOCAL LAYOUT DB WAN GO STOP 1. DOCUMENT VERIFICATION 2. ADMISSIBILITY CHECK REQUEST CENTRAL LAYOUT DB DEFINITION & TUNING OFFICE NATIONAL DB SCHENGEN DB DIGITAL CERTIFICATES BACK OFFICE WORKFLOW TRANSIT LOG BORDER CONTROL SYSTEM FLOW
CSC Proprietary Data THE APPLICATION INTERFACE Automatic Template association Personal Data read and compared Document Image (Visible light) Doc. Images (Vis, IR, UV) with zooming Electronic photo ICAO checkdigit verification Finger-print verification request Self explaining icons Automatic control result tree view Admissibility check request Final Police operator decision Passenger hand-over to back-office News & Broadcast Help on-line Admissibility check result details Security elements details
CSC Proprietary Data THE APPLICATION - details Document’s Images C DOCUMENT FOCUS
CSC Proprietary Data Patterns Match THE APPLICATION - details C DOCUMENT FOCUS
CSC Proprietary Data Visual Analysis THE APPLICATION - details C DOCUMENT FOCUS
CSC Proprietary Data Data Field Control THE APPLICATION - details CP DOCUMENT & PERSON FOCUS Photo match
CSC Proprietary Data Fingerprint verification THE APPLICATION - details P PERSON FOCUS
CSC Proprietary Data Admissibility Verification THE APPLICATION - details P PERSON FOCUS
CSC Proprietary Data Knowledge Base Page THE APPLICATION - details G ORGANIZATION FOCUS
CSC Proprietary Data Slide 21 SYSTEM DESIGN & ARCHITECTURE Firewalls INFRASTRUCTURE Designed for Performance –Fully scalable –Load Balanced –Smart Client Designed for Security –HTTPS –Server Certificate & Encoded Transmission Protocols Designed as Service Oriented
CSC Proprietary Data UP TO DATE TECHNOLOGY A Smart Client… Only One Entry Point for Every User Profile Extremely Rich & Friendly User Experience Local Resources Access (scanner, devices, …) Fast & Responsive Supports heavy graphic elaboration Load Available disconnected (near the plane, on board, …) …Service Oriented Architecture Flexibility Architecture & Engineered Coding Made Simple & Uniform Easy Developing & Maintenance with Low Costs of Implementing New Features Global Communities architecture and design practices Goals
CSC Proprietary Data UP TO DATE TECHNOLOGY A Simple, Smart Deployment Engine Goals The Device Facade Layer Integration of Multiple Devices (Image scanner, Fingerprint scanner, RFID & Smart Card readers) Integration of New Device in Days not in Weeks Transparent to the Application Layer Simple Customization of the System to Achieve new Business Domains Goals Client Gets All Updates at Same Time On Connecting One Process And Technique To Deploy All Changes Transparent for User Client Always Auto-Updated Deploying Without Administration Privileges Respecting The Architecture Practice & Communication Protocol Simple to Understand & Maintain
CSC Proprietary Data VALUE FOR THE USER Enabling electronic ID technology, RFID & SmartCard Help to detect and block counterfeit documents Increase Person & Document security check Reduced time for each control: the Police operator focus on the person and his behavior Reduce queue for passenger control Transit of every extra-Schengen passenger traced on the National security database Statistics of immigration flows Ready to integrate new devices for mobile use, new algorithms, scanning devices and biometric technologies Almost real-time share of the counterfeit “lesson learned” … …… …….. Which is the value ?
CSC Proprietary Data VALUE FOR THE USER …… this is DIGITAL TRUST …. ……. enhancing value while reducing risk exposure ! Which is the value ?
CSC Proprietary Data FURTHER DEVELOPMENT Goes to check-in, gets boarding pass and leaves fingerprints STOP / GO CHECK-IN SECURE AREA GATE BORDER CONTROL SYSTEM WAN GO STOP SHOPPING AREA BOARDING GATE Goes thru RX control DOCUMENT VERIFICATION ADMISSIBILITY CHECK REQUEST LANDSIDE AIRPORT SYSTEM INTEGRATION
CSC Proprietary Data BORDER AND IMMIGRATION SOLUTIONS (BIS CoE) A CSC Center of Excellence develop CSC intellectual property for large-scale management of personally identifying information and entitlements, consolidates the practical experience gained by providing solutions to Government clients in a variety of Countries. Border & Immigration Solutions Contact –Tim Ruggles, Director –Center of Excellence – Border and Immigration Solutions Center of Excellence
CSC Proprietary Data ACKNOWLEDGMENTS Alberto Buonocore Project Manager Luca Bovenzi SW Architect The Border Control System was developed in a project which won the 2007 CSC Award for Technical Excellence among over 75 candidates from all over the Company. Thanks to the whole team (L.Bovenzi, G.Ingoglia, G.Bernabei, F.Spampinato, S.Cortellessa, E.De Bardi, P.Mussotto, I.Barilari, S.Di Ruscio) Contacts