Biometrics and Smart Cards in Identity Management

  • Bart JacobsEmail author
  • Erik Poll
Part of the Information Technology and Law Series book series (ITLS, volume 20)


The introduction of the electronic passport by governments around the world marks a major step in the use of biometrics. In fact, the electronic passport, or e-passport for short, combines the use of three important technologies for identification: biometrics, smart cards and radio frequency identification (RFID). Smart cards—increasingly often RFID-enabled—are already commonplace in our everyday lives, and the use of biometrics is expected to grow significantly. Apart from being a potential user of these technologies for e-government services, the government also plays an important role as facilitator and regulator of these technologies.


Smart Card Biometric System False Match International Civil Aviation Organization Biometric Information 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



Active authentication


Basic access control


Extended access control


Europay, mastercard and visa


Electronic product codes


International civil aviation organization


Machine-readable zone


Personal identity verification


Radio frequency identification


Secure-signature-creation device


User iDentifier


  1. Anderson R, Bond M, Murdoch S (2006) Chip and spin. Comput Secur J 22(4):1–6. Google Scholar
  2. Batina L et al (2010) Developing efficient blinded attribute certificates on smart cards via pairings. In: Gollmann D, Lanet J-L (eds) Smart card research and advanced application conference (CARDIS 2010), number 6035. Lecture notes in computer science. Springer, Berlin, pp 209–222Google Scholar
  3. Brands S (2000) Rethinking public key infrastructures and digital certificates: building in privacy. MIT. Freely available via
  4. BSI (2006) Advanced security mechanisms for machine readable travel documents—extended access control (EAC). Technical report TR-03110. Federal Office for Information Security (BSI)Google Scholar
  5. BSI (2008) Messung de Abstrahleigenschaften von RFID-Systemen (MARS) Specifications. 1: Teilbericht zu den Möglichkeiten des passiven Mitlesens einer RFID-Kommunikation. Technical report. Federal Office for Information Security (BSI)Google Scholar
  6. CEN (2004) Guide on the use of electronic signatures—part 1: legal and technical aspects.
  7. Chaum D (1985) Blind signatures for untraceable payments. In: Chaum D, Rivest RL, Sherman AT (eds) Advances in cryptology: proceedings of crypto’82. Plenum Press, New York, pp 199–203Google Scholar
  8. Chaum D, Fiat A, Naor M (1988) Untraceable electronic cash. In: Goldwasser S (ed) CRYPTO 1988, number 403. Lecture notes in computer science. Springer, Berlin, pp 319–327Google Scholar
  9. EC (1999) Directive 1999/93/EC of the European parliament and of the council of december 1999 on a community framework for electronic signaturesGoogle Scholar
  10. ENISA (2009) Privacy features of European eID card specifications. Technical report, European Network and Information Security Agency (ENISA)Google Scholar
  11. Hancke G (2006) Practical attacks on proximity identification systems. In: IEEE symposium on security and privacy (S and P’06). IEEE, pp 328–333Google Scholar
  12. Hoepman J-H et al (2006) Crossing borders: security and privacy issues of the European e-passport. In: IWSEC 2006: Advances in information and computer security, number 4266. Lecture notes in computer science. Springer, Kyoto, pp 152–167Google Scholar
  13. ICAO (2007) Supplement to Doc 9303, Version 6 (Final). Technical report, ICAO.
  14. Kfir Z, Wool A (2005) Picking virtual pockets using relay attacks on contactless smartcard systems. In: First international conference on security and privacy for emerging areas in communications networks (SECURECOMM’05). IEEEGoogle Scholar
  15. Koscher K et al (2009) EPC RFID Tags in Security applications: passport cards, enhanced drivers licenses, and beyond. In: ACM conference on computer and communications security. ACM, pp 33–42Google Scholar
  16. MBKZ (2005) Evaluatierapport biometrieproef 2b or not 2b. Technical report, ministry of the interior and kingdom relationsGoogle Scholar
  17. Monnerat J, Vaudenay S, Vuagnoux M (2007) About machine-readable travel documents. In: RFID security, pp 15–18Google Scholar
  18. Richter H, Mostowski W, Poll E (2008) Fingerprinting passports. In: NLUUG spring conference on security, pp 21–30Google Scholar
  19. Thalheim L, Krissler J, Ziegler PM (2002) Körperkontrolle—biometrische zugangssicherungen auf die probe gestellt. C’t magazin, p 114. English translation, entitled ‘body check: biometrics defeated’ by RW Smith, available at,2845,13919,00.asp
  20. TI (2003) Radio Frequency identification systems HF antenna design notes. Technical report 11-08-26-003, Texas instrumentsGoogle Scholar
  21. van der Putte T, Keuning J (2000) Biometrical fingerprint recognition: don’t get your fingers burned. In: Domingo-Ferrer J, Chan D, Watson A (eds) Proceedings of the fourth working conference on smart card research and advanced applications (CARDIS 2000) IFIP Conference Proceedings Vol 180. Kluwer, Bristol, pp 289–306Google Scholar
  22. van Dijk D-J, Oostdijk M (2009) Using the ePassport for online authentication. Technical report TI/RS/2009/002, Telematica InstituteGoogle Scholar
  23. Wilson C, Garris M, Watson C (2004) Matching performance for the US-VISIT IDENT system using flat fingerprints. Technical Report NISTIR 7110. National Institute of Standards and Technology (NIST)Google Scholar

Copyright information

© T.M.C. ASSER PRESS, The Hague, The Netherlands, and the authors 2011 2011

Authors and Affiliations

  1. 1.Institute for Computing and Information SciencesRadboud UniversityNijmegenThe Netherlands

Personalised recommendations