Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
General discussion paper for airports
1. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 1
About MCS
MCS Microsystems Sdn Bhd is a Malaysian Multimedia Super Corridor (MSC) status IT security
technology provider established since 1998. Our solutions are centred around smartcard
technologies and our success stories include the world’s first electronic passport launched by the
Malaysian government in 1998, and “MyKAD” the world’s first multi-applications national ID
smartcard launched in 2001. Since then, MCS have expanded into bespoke software, equipment and
services for Trusted ID applications, some in collaboration with complementary technology partners
who are best-in-class to deliver leading edge designs.
To highlight, we have experience in immigration border control, biometrics, RFID tags, self-service
gates and kiosks, distributed ledger technology, to name a few.
The Covid-19 pandemic has changed the way we travel. With closed borders and cancelled flights,
travel literally came to a virtual standstill, especially after the United Nations' World Tourism
Organisation mandated global destinations to implement travel restrictions at the peak of the
pandemic. The World Travel and Tourism Council has developed an extensive range of protocols to
cover the new normal, for providers as diverse as airlines, shops, hotels and restaurants. It is likely
that some of today’s changes are here to stay.
The airport security and related solutions and services presented here are based on the principles of:
ONE ID
Between the Covid-19 pandemic and the expected high passenger volume when it ends, the IATA
One ID concept could immensely improve the passengers’ experience and cater for their health and
safety while enhancing the border, aviation and airport infrastructure security.
In order to achieve this in the most effective, efficient and secure manner, the following four
elements need to be in place:
• a trusted, digital identity;
• an identity management platform;
Malaysian
Managed
Developed for the
Malaysian
environment to be
managed by local
experts and
organisations.
M Convergence
Compatible
Community
Existing and future
requirements of
the Airlines –
Airport –
Immigration –
Regulator –
Retailers
community are
taken into account.
C Security
Standard
Comply with IATA
Recommended
Practices and
international
standards
S
2. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 2
• identity verification through biometric recognition; and
• a trust framework.
Our ONE ID total solution realises all four elements in a single, complete system that leverages on the
following technologies working in harmony:
• User registration via ICAO e-passports, national ID smartcards and the forthcoming Digital ID.
• Facial, fingerprint, iris and/or finger vein multi-modal biometrics enrolment and
identification system, including 1-to-1 and 1-to-N matching capabilities.
• Self-service kiosks, security and border control gates, and video wall displays.
• Passenger, personnel and asset track-and-trace management.
• Distributed ledger (blockchain) technology customised for private organisations servicing
larger communities.
• Artificial intelligence (AI) with deep learning algorithms to achieve system objectives.
The ONE ID platform enables centralized management of passenger information and automated
processes from check-in to boarding in real time, as illustrated in Figure 1. It has been designed to be
an integral part of the airport management system and allows for customization.
Figure 1: ONE ID passenger experience and tokenization.
As for the Digital ID, upon arrival at the airport and successful registration of his identity document,
biometrics and boarding pass, each passenger will be represented by an ID Token on the ONE ID
platform. Subsequently, he would need only to have his registered biometrics scanned at each
touchpoint on his way through the airport, and would not need to present a variety of documents.
Figure 2 illustrates the token generation process for a passenger, its usage and storage, and
eventually its disposal when the passenger departs from the airport. Alternatively, instead of
disposing it, the token may be stored for future visits of the passenger, if permitted by privacy laws.
A similar workflow for airport personnel, airline crew and ground staff, authorities and the rest are
available for the purpose of access control within the airport, including airside and landside.
3. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 3
Figure 2: ONE ID token generation process.
The use of a trusted, Digital ID will not only facilitate real progress in terms of speed and ease of
identity authentication and verification, it will also allow passengers to assert their identity online
and in off-airport situations, thereby opening the possibility to move more processes off-airport and
have passengers arriving at the airport “ready to fly”.
Several key features of the ONE ID platform:
• High-speed processing to handle heavy loads during peak hours.
• Secure structure provides reliable operation with remarkable functions.
• Application Management for each step of the process.
• Data analysis upon error, on risks and usage patterns, and load forecast.
• Real-time monitoring and remote access to monitor and manage the connected equipment,
such as kiosks, gates and displays.
• Compliance with IATA, ACI and other international standards.
• Common interfaces are structured for easy integration with external systems.
Collaboration and Trust
The One ID concept relies entirely on a collaborative approach between stakeholders. In order for
this to work, an environment needs to be created in which they can store, share, reuse and amend
passenger information in a collaborative and trusted manner – managing a data envelope that
follows that passenger throughout the journey.
In order for stakeholders to trust one another, trust the data, and co-operate on a common platform,
a trust framework will have to be established among them. Such trust frameworks can exist at the
level of a local air travel ecosystem – for instance an airport plus a number of airlines and control
authorities.
To establish such a trust framework, we leveraged upon distributed ledger (blockchain) technology.
The Distributed Ledger is a system of recording information (transactions) in a way that makes it
difficult or impossible to change, hack, or cheat the system. This technology increases transparency
of transactions, as everybody on the network has a copy of the ledger.
Blockchain enables individuals and companies to verify their identities without having to store this
data on a database. This prevents massive data theft of user identities. Quick verification of
individuals and their Digital IDs using QR Code at front-end interfaces is made available to users,
4. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 4
under a process patented under WIPO patent number WO 2017/136879 Al as well as in the US
Patent No: US 10,972,281 B2.
MCS’ customisable, private blockchain is based on an Ethereum fork - Proof of Authority (POA). The
Ethereum blockchain is the largest blockchain in the world after Bitcoin. It is a fully open-source
blockchain, thus there is no dependency on any major corporation, which means we can easily
develop and deploy blockchain-based applications in the future.
Furthermore, Proof of Authority (PoA) is a reputation-based consensus algorithm that introduces a
practical and efficient solution for blockchain networks (especially the private ones). The PoA
consensus algorithm leverages the value of identities, which means that block validators are not
staking coins but their own reputation instead. Therefore, PoA blockchains are secured by the
validating nodes that are arbitrarily selected as trustworthy entities.
The Proof of Authority model relies on a limited number of block validators and this is what makes it
a highly scalable system. Blocks and transactions are verified by pre-approved participants, who act
as moderators of the system. The Proof of Authority model enables companies to maintain their
privacy while availing the benefits of blockchain technology.
5. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 5
Figure 3: Conceptual representation of PoA-based blockchain.
Master of Ceremony (MOC)
Validator Nodes
Archive Nodes
Users and smart contracts
initiate transactions, which are
submitted to the network on
an ongoing basis.
A peer-to-peer network of
approved validators continually
receives transaction requests
for inclusion in the next block.
An algorithm assigns
one validator node as
primary.
The primary validator node
assembles transactions into a
block and confirms its validity.
The remaining validator
network confirms the
primary node’s block.
With consensus achieved,
the blockchain is updated
with a new block.
6. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 6
Automated Biometrics Identification System
Biometrics is a very important component to the successful implementation of a secured credential.
Biometrics can authenticate that the person matches the identity carried within the credential with
great accuracy.
The Face Recognition Algorithm core technology is an AI-based face recognition solution with
excellent standard of recognition capability and context awareness function on the basis of a high
level of accuracy. It is the best AI face recognition solution for live video stream and developed for
accurate and fast face recognition. Its implementation at various airports confirms that the
algorithm:
• reduces failure and confirms identity effectively;
• detects and recognizes millions of people in real time;
• handles difficult circumstances such as moving face, difficult angle and lighting and partially
covered face, etc.
In addition to the facial image being the primary biometrics used by human personnel for
identification purpose, ICAO e-passport standard specifies fingerprint and iris biometrics which are
compatible with electronic identification. Meanwhile, a technique for highly accurate finger vein
authentication using the visible-light cameras typically built into mobile devices are being developed.
Contactless verification methods – facial, iris and finger vein biometrics – are favoured in the current
times.
Figure 4: Finger vein authentication technology.
The function of the Automated Biometric Identification System (ABIS) is to identify a person based on
available biometric images or templates. The subject is compared against the entire set or a subset of
biometrics data stored in the database. The reasons for doing this are to:
• Prevent issuance of multiple IDs to the same person.
• Cross-check individuals against suspect watch lists.
For increased security, a combination of biometrics, also called multimodal biometrics, provides
greater accuracy and more flexibility than a single biometric. it has a fusion technique to integrate
the information from two different authentication systems. The fusion can be done at any of the
following levels:
• During feature extraction.
• During comparison of live samples with stored biometric templates.
• During decision making.
7. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 7
The multimodal biometric systems that integrate or fuse the information at initial stage are
considered to be more effective than the systems which integrate the information at the later stages.
The obvious reason to this is, the early stage contains more accurate information than the matching
scores of the comparison modules.
Health Passport
Of relevance to the airport environment, MCS is building a Cloud service that combines leading-edge
technologies to enable users, organisations and governments to minimise the risk of infections from
physical interactions. The secure Travel / Work Health Passport Service uses Covid-19 detection
tools, real-time Covid-19 testing and self-assessment mobile application, and on-site indoor and
outdoor mobile laboratories.
The Health Passport Service does not discriminate against different test methods and supports both
conventional RT-PCR test and new breathalyzer tests. The Health Passport Service provides a
common interface for connecting to external parties, such as test laboratories, vaccination
administration centres and clinics.
The Health Passport Service implements a customisable, distributed ledger to record what happens
at various touchpoints between users and other actors in the system. Parties at designated
checkpoints throughout the system are obligated to upload user interactions, test reports, and
vaccination records, and such events must be added to the ledger by authorised personnel. Persons
under quarantine and those under surveillance would check-in through their mobile application for
authorities to track their whereabouts.
A secured QR Code is attached to each test or vaccination report to simplify third-party verification,
as illustrated in Figure 5. During inspection, a quick scan of the QR Code would download the ID, test
or vaccination status, and blockchain transaction ID, for further verification.
Figure 5: Test and vaccination reports with secured QR Code.
8. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 8
Figure 6: Health Passport System workflow.
Track-and-Trace with Distributed Ledger Technology
The airport environment provides for a strong incentive to implement an automated track-and-trace
system for the transfer of luggage between the airport and airlines, and movement of assets within
the organisation, or when shared with another organisation.
The first key element is to tag the items which identify them according to the following information:
• Item type, category, make and/or model
• Item serial number
• Date of tagging
• ID of relevant organisation, handler or passenger
• Other relevant information depending on use-case
For item tagging, barcode and RFID technologies are available.
The second key element is to record each transfer of the assets on a distributed ledger, customised
for track-and-trace application. Parties at designated touchpoints throughout the airport are
9. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 9
obligated to report the progress of the tracked items and such events must be added to the
distributed ledger by authorised personnel. This ensures that every record is presented as is and
cannot be altered, is stored for perpetuity, and is available for outside scrutiny.
Common Use Self-Service System (CUSS)
Common Use Self-Service or CUSS platform is a system that contains a shared kiosk that provides
airport check-in for passengers, and eliminates the need for ground staff. Like other common use
systems, several airlines can use CUSS on a single terminal. At an airport, platform providers offer the
CUSS kiosk, and application providers share it to run their kiosk applications on.
Our CUSS products extend beyond Self-service Kiosk to include Single-Door Autogate and Double-
Door Autogate. They form touchpoints throughout the airport where individuals are tracked,
especially the location of passengers as they progressed from check-in to boarding.
Figure 7: Self-service kiosks, single- and double-door autogates.
The components of the CUSS Platform are:
• Kiosk hardware and peripheral
• Kiosk Management System
• CUSS Application Software and Server
• CUSS Platform software
• Communications network
In their latest upgrade, the CUSS solutions are designed to maximise user hygiene by leveraging on
contactless and touchless technologies to avoid physical interaction or exchange documents with
officers. In addition to touchless biometrics that allows walkthrough user experience, the cameras
with built-in thermal scanners enable:
• Real-time access control by detecting elevated body temperature and triggering an alert for
high temperature.
• Automatically classifies and saves separate dataset (face image, body temperature and
access log) for personnel with fever.
• Temperature profile of individual passengers displayed on a live monitor.
• Alert when an individual whose body temperature exceeds 37.3°C is detected.
• Can also be programmed to inform staff of any passengers who are not wearing a mask.
The technology roadmap towards hygienic solutions will see CUSS solutions with:
• Eye tracking
10. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 10
• Voice activation
• Health history questionnaire
• Touchless screen with gesture and motion detection
Figure 8: Example screenshots of kiosk application.
European Entry/Exit System (EES) Standard
In 2016, the European Commission has adopted a Communication on Stronger and Smarter
Information Systems for Borders and Security, dubbed the European Entry/Exit System (EES)
regulation, setting out options on how existing and future information systems could enhance both
external border management and internal security in the EU. With this principle in mind, our CUSS
equipment is designed to speed-up, facilitate and reinforce border check procedures for travellers.
The CUSS equipment will modernise external border management by improving the quality and
efficiency of controls and support the increasing numbers of travellers entering and exiting Malaysia.
Several improvements to current inspection procedures are:
• Collection of e-passport and biometrics data
• Abolishment of passport stamps
• Reliance on CUSS kiosks, e-gate and Automated Border Control (ABC) System
• Background checks of travellers prior to border crossing
Other key features of the CUSS equipment:
• Process certified to IATA’s CUSS standards
• User interface for web development environment
• Linkage to airlines’ DCS
• Printer modules compatible with ARINC devices
• Customized API for the client airline
• Certified by ARINC and SITA to IATA CUSS specification
• Compatible with European Entry/Exit System regulation for immigration control
AI Video Surveillance
As threats to aviation become increasingly sophisticated, we must strive to enhance and develop
aviation security capabilities. Our answer is the AI Video Surveillance system that monitors every
video stream, identify anomalies and generate alerts, at all times. This removes the low-level
mundane tasks to machine and leaves the high-order intelligent tasks of analysing suspicious scenes
and decision making to the human supervisors.
The AI Video Surveillance System employs CCTV surveillance cameras equipped with AI deep learning
based facial recognition technology that could enhance security within various environments, by
11. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 11
analysing biometrics, audio, movement, entrance detection, etc. It scans people walking through
open areas and automatically analyse data for threats, including:
• Tracking pathogen transmission path
• Tracking people of interest
• Identifying unattended goods
• Identifying abnormal behaviours
The AI video data analysis algorithm is designed to perform:
• Foreground detection
• Object detection and tracking
• Object classification
• Event detection
Figure 9: AI Video Surveillance System.
12. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 12
Contents
About MCS..........................................................................................................................................1
ONE ID................................................................................................................................................1
Collaboration and Trust ......................................................................................................................3
Automated Biometrics Identification System ......................................................................................6
Health Passport ..................................................................................................................................7
Track-and-Trace with Distributed Ledger Technology..........................................................................8
Common Use Self-Service System (CUSS)............................................................................................9
AI Video Surveillance ........................................................................................................................10