Electronic identification and trust services (including e-signature)

Available (29)

Showing 13 - 24 per page



Standard for Biometric Liveness Detection

A biometric lifeless attack is one of the indispensable issues within biometric authentication. There are three major components in liveness detection systems: lifeless attack presentation, liveness detection, and lifeless attack instruments. The lifeless attack presentation is divided into artifact presentation and human-based presentation. The liveness detection method includes subject-based and scenario-based solutions, as well as other attributes such as decision elements, detection patterns, and implementations. The lifeless attack instrument is specified from aspects such as production elements, production types of artifacts, efficacy, etc. This document establishes terms and definitions in the field of biometric liveness detection and identifies characterizations of lifeless attack and liveness detection methods, with analysis on lifeless attack instruments. In addition, this document specifies the liveness detection process, implementation model, and metrics.

IEEE 2790-2020

Clinical IoT Data and Device Interoperability

The IEEE Standards Association (IEEE SA) pre-standards workstream for Clinical Internet of Things (IoT) data validation and interoperability with blockchain was initiated to determine if a viable standards framework could be established to enable the validation of data generated from a clinical-grade IoT device and shared through the interoperability of blockchain technology. Participants in the workstream were gathered from an IEEE SA workshop held at Johns Hopkins University in Rockville, Maryland in April 2018, and grew to include their network of healthcare and Health-IT ecosystem players, as well as participants in prior IEEE SA efforts in related areas. The workstream commenced in August 2018 and completed in February 2019. Participants in this pre-standards workstream who are the authors of this paper are listed in Appendix A. The pre-standards workstream led to the recommendation of the development of an IEEE SA Standards effort on Clinical IoT data and device interoperability with TIPPSS-Trust, Identity, Privacy, Protection, Safety and Security-in connected healthcare to improve data sharing and healthcare outcomes. The pre-standards workstream team decided that blockchain is not necessary for clinical IoT data and device interoperability and validation, nor does it necessarily meet the robust TIPPSS needs in connected healthcare. The workstream recommendation includes a draft TIPPSS Architectural Framework for Clinical IoT data validation & interoperability, which could include digital ledger technology but does not need to do so. The resulting IEEE Standards Association P2733 working group to develop a standard for Clinical IoT Data and Device Interoperability with TIPPSS kick off meeting is scheduled for July 17, 2019, sponsored by the IEEE SA Engineering in Medicine and Biology Society (EMBS).

IEEE P2733

IEEE Standard for Biometric Open Protocol

Identity assertion, role gathering, multilevel access control, assurance, and auditing are provided by the Biometric Open Protocol Standard (BOPS). An implementation of the BOPS III spec is described, which includes both the software running on the client device as well as the server. Pluggable components are allowed to replace existing components' functionality, accepting integration into current operating environments in a short period of time. A “point-and-cut” mechanism to add the appropriate security to both development and production systems is offered through the BOPS implementation functionality. Homomorphic encryption and a tremendous simplification of the API are also described.

IEEE 2410-2019

Standard for Human Augmentation: Identity

This standard specifies the requirements and methods for verifying the identity of a person equipped with human augmentation technologies. Human augmentation, also known as human enhancement, refers to technologies that add to the human body and enhance human productivity or capability. Recent advancements in many technical areas have led to a large variety of implants, wearables and other technologies that could be classified as human augmentation.

IEEE P2049.3

Standard for Authentication in a Multi-server Environment

The standard describes an authentication scheme including the following features: 1) User needs single unique login credentials to logon to multi-Server setup 2) It offers a two-factor authentication scheme comprising of password as one and the soft token/hardware token as the second factor for authentication 3) The scheme does not require a password table to be maintained at the server 4) The scheme resists various known authentication related attacks

IEEE P2989

Debora Comparin

Fellow's country
Impact on SMEs (7th Open Call)
This standard responds to some requirements outlined in the European Union eIDAS2 regulation and will be implemented by European SMEs and societies active in the EU digital ID wallet ecosystem regulated by eIDAS.
Impact on society (7th Open Call)
The primary gap being addressed is the lack of standardized interfaces for Authentic Sources in the European Digital Identity (EUDI) ecosystem. Despite the legal requirement set out in eIDAS 2.0 (Article 45e) for Authentic Sources to provide such interfaces, there is currently no available specification that defines how these interfaces should be designed or implemented. This gap has been officially recognized in the CEN TC224 WG20 “European Digital Identity Wallets Standards Gap Analysis” and significantly impedes interoperability across Member States.

This fellowship contributes to the enhancement of the ITU-T X.1281 standard, the project supports the creation of secure, trusted, and interoperable mechanisms for verifying attributes from Authentic Sources. This is crucial for the deployment of the EUDI Wallet, a flagship initiative under the Digital Single Market strategy aiming to be available to all EU citizens and residents by 2026.
The key challenges are related to:
Interoperability: The lack of standardization leads to fragmented implementations across Member States, impeding seamless cross-border operations.
Security and Trust: Verifying sensitive personal attributes (like diplomas or driving licenses) requires secure, privacy-preserving, and auditable mechanisms that are hard to implement consistently without a shared standard.
Legal and Technical Fragmentation: Authentic Sources vary widely across jurisdictions in terms of legal frameworks, data models, and technical capacities. A harmonized standard must respect these national differences while ensuring a unified operational framework at the EU level.
Open Call
Organisation type
Organization
Secure Identity Alliance
Portrait Picture
Debora Comparin
Proposal Title (7th Open Call)
Developing Standardized Interfaces for Authentic Sources in the European Digital Identity Ecosystem
Standards Development Organisation
StandICT.eu Year
2026

Markus Sabadello

Description of Activities

The standards I am dealing with are the W3C Verifiable Credential Data Model (VCDM) 2.0 in conjunction with the W3C Verifiable Credential Data Integrity 1.0 specification for securing VCs. The contribution of this project will be a specification for a new W3C VC Data Integrity suite, i.e. a mechanism for securing Verifiable Credentials (VCs). 

Fellow's country
Impact on SMEs (4th Open Call)
There will also be various opportunities for SMEs to participate in a European digital identity ecosystem, for example by providing software and consulting services.
Impact on society (4th Open Call)
In the coming years, the eIDAS 2.0 regulation and associated EU Digital Identity Wallet will become available to all EU citizens and are expected to have a major impact on various parts of our (digital) societies.
Open Call
Organisation type
Organization
CTO, Danube Tech GmbH
Portrait Picture
sabadello
Proposal Title (4th Open Call)
Write a specification for a W3C VC Data Integrity suite that is compliant with JAdES
Standards Development Organisation
StandICT.eu Year
2026
Year

Iain Corby

Description of Activities

In the framework of this fellowship, I contribute to several different standardisation activities, including: addressing minor edits to IEEE 2089.1 and developing a Certification Scheme with IEEE, applying to IEEE CTSoc/ETSC to form a study group to develop a PAR on Parental Consent, participation in BSI IST/33/5 and ISO/IEC JTC1 SC27 WG5 re ISO 27566 Parts 1, 2 and 3, ETSI STF 681 Age Verification Expert Member.

Fellow's country
Impact on SMEs (4th Open Call)
There is an urgent need which standards can be addressed in Europe. The ISO is working in parallel on 27566, to which I also contribute, but that is still at the working draft stage and is only a framework, not a best practice guide. Standards for AV and parental consent are also needed in North America, India, Australia. Indonesia, Oman and Canada, amongst others, due to new legislation.
Impact on society (4th Open Call)
Europe is legislating at pace to create legal demands for online age assurance (verification and estimation) but standards are falling behind. There is an urgent need which standards can be addressed in Europe.
Open Call
Organisation type
Organization
Director, SafetyTech Limited
Portrait Picture
corby
Proposal Title (4th Open Call)
Participation in standards development for Online Age Assurance ISO/IEEE/BSI/CEN-CENELEC
Standards Development Organisation
StandICT.eu Year
2026
Year