SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 1
About MCS
MCS Microsystems Sdn Bhd is a Malaysian Multimedia Super Corridor (MSC) status IT security
technology provider established since 1998. Our solutions are centred around smartcard
technologies and our success stories include the world’s first electronic passport launched by the
Malaysian government in 1998, and “MyKAD” the world’s first multi-applications national ID
smartcard launched in 2001. Since then, MCS have expanded into bespoke software, equipment and
services for Trusted ID applications, some in collaboration with complementary technology partners
who are best-in-class to deliver leading edge designs.
To highlight, we have experience in immigration border control, biometrics, RFID tags, self-service
gates and kiosks, distributed ledger technology, to name a few.
The Covid-19 pandemic has changed the way we travel. With closed borders and cancelled flights,
travel literally came to a virtual standstill, especially after the United Nations' World Tourism
Organisation mandated global destinations to implement travel restrictions at the peak of the
pandemic. The World Travel and Tourism Council has developed an extensive range of protocols to
cover the new normal, for providers as diverse as airlines, shops, hotels and restaurants. It is likely
that some of today’s changes are here to stay.
The airport security and related solutions and services presented here are based on the principles of:
ONE ID
Between the Covid-19 pandemic and the expected high passenger volume when it ends, the IATA
One ID concept could immensely improve the passengers’ experience and cater for their health and
safety while enhancing the border, aviation and airport infrastructure security.
In order to achieve this in the most effective, efficient and secure manner, the following four
elements need to be in place:
• a trusted, digital identity;
• an identity management platform;
Malaysian
Managed
Developed for the
Malaysian
environment to be
managed by local
experts and
organisations.
M Convergence
Compatible
Community
Existing and future
requirements of
the Airlines –
Airport –
Immigration –
Regulator –
Retailers
community are
taken into account.
C Security
Standard
Comply with IATA
Recommended
Practices and
international
standards
S
CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 2
• identity verification through biometric recognition; and
• a trust framework.
Our ONE ID total solution realises all four elements in a single, complete system that leverages on the
following technologies working in harmony:
• User registration via ICAO e-passports, national ID smartcards and the forthcoming Digital ID.
• Facial, fingerprint, iris and/or finger vein multi-modal biometrics enrolment and
identification system, including 1-to-1 and 1-to-N matching capabilities.
• Self-service kiosks, security and border control gates, and video wall displays.
• Passenger, personnel and asset track-and-trace management.
• Distributed ledger (blockchain) technology customised for private organisations servicing
larger communities.
• Artificial intelligence (AI) with deep learning algorithms to achieve system objectives.
The ONE ID platform enables centralized management of passenger information and automated
processes from check-in to boarding in real time, as illustrated in Figure 1. It has been designed to be
an integral part of the airport management system and allows for customization.
Figure 1: ONE ID passenger experience and tokenization.
As for the Digital ID, upon arrival at the airport and successful registration of his identity document,
biometrics and boarding pass, each passenger will be represented by an ID Token on the ONE ID
platform. Subsequently, he would need only to have his registered biometrics scanned at each
touchpoint on his way through the airport, and would not need to present a variety of documents.
Figure 2 illustrates the token generation process for a passenger, its usage and storage, and
eventually its disposal when the passenger departs from the airport. Alternatively, instead of
disposing it, the token may be stored for future visits of the passenger, if permitted by privacy laws.
A similar workflow for airport personnel, airline crew and ground staff, authorities and the rest are
available for the purpose of access control within the airport, including airside and landside.
CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 3
Figure 2: ONE ID token generation process.
The use of a trusted, Digital ID will not only facilitate real progress in terms of speed and ease of
identity authentication and verification, it will also allow passengers to assert their identity online
and in off-airport situations, thereby opening the possibility to move more processes off-airport and
have passengers arriving at the airport “ready to fly”.
Several key features of the ONE ID platform:
• High-speed processing to handle heavy loads during peak hours.
• Secure structure provides reliable operation with remarkable functions.
• Application Management for each step of the process.
• Data analysis upon error, on risks and usage patterns, and load forecast.
• Real-time monitoring and remote access to monitor and manage the connected equipment,
such as kiosks, gates and displays.
• Compliance with IATA, ACI and other international standards.
• Common interfaces are structured for easy integration with external systems.
Collaboration and Trust
The One ID concept relies entirely on a collaborative approach between stakeholders. In order for
this to work, an environment needs to be created in which they can store, share, reuse and amend
passenger information in a collaborative and trusted manner – managing a data envelope that
follows that passenger throughout the journey.
In order for stakeholders to trust one another, trust the data, and co-operate on a common platform,
a trust framework will have to be established among them. Such trust frameworks can exist at the
level of a local air travel ecosystem – for instance an airport plus a number of airlines and control
authorities.
To establish such a trust framework, we leveraged upon distributed ledger (blockchain) technology.
The Distributed Ledger is a system of recording information (transactions) in a way that makes it
difficult or impossible to change, hack, or cheat the system. This technology increases transparency
of transactions, as everybody on the network has a copy of the ledger.
Blockchain enables individuals and companies to verify their identities without having to store this
data on a database. This prevents massive data theft of user identities. Quick verification of
individuals and their Digital IDs using QR Code at front-end interfaces is made available to users,
CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 4
under a process patented under WIPO patent number WO 2017/136879 Al as well as in the US
Patent No: US 10,972,281 B2.
MCS’ customisable, private blockchain is based on an Ethereum fork - Proof of Authority (POA). The
Ethereum blockchain is the largest blockchain in the world after Bitcoin. It is a fully open-source
blockchain, thus there is no dependency on any major corporation, which means we can easily
develop and deploy blockchain-based applications in the future.
Furthermore, Proof of Authority (PoA) is a reputation-based consensus algorithm that introduces a
practical and efficient solution for blockchain networks (especially the private ones). The PoA
consensus algorithm leverages the value of identities, which means that block validators are not
staking coins but their own reputation instead. Therefore, PoA blockchains are secured by the
validating nodes that are arbitrarily selected as trustworthy entities.
The Proof of Authority model relies on a limited number of block validators and this is what makes it
a highly scalable system. Blocks and transactions are verified by pre-approved participants, who act
as moderators of the system. The Proof of Authority model enables companies to maintain their
privacy while availing the benefits of blockchain technology.
CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 5
Figure 3: Conceptual representation of PoA-based blockchain.
Master of Ceremony (MOC)
Validator Nodes
Archive Nodes
Users and smart contracts
initiate transactions, which are
submitted to the network on
an ongoing basis.
A peer-to-peer network of
approved validators continually
receives transaction requests
for inclusion in the next block.
An algorithm assigns
one validator node as
primary.
The primary validator node
assembles transactions into a
block and confirms its validity.
The remaining validator
network confirms the
primary node’s block.
With consensus achieved,
the blockchain is updated
with a new block.
CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 6
Automated Biometrics Identification System
Biometrics is a very important component to the successful implementation of a secured credential.
Biometrics can authenticate that the person matches the identity carried within the credential with
great accuracy.
The Face Recognition Algorithm core technology is an AI-based face recognition solution with
excellent standard of recognition capability and context awareness function on the basis of a high
level of accuracy. It is the best AI face recognition solution for live video stream and developed for
accurate and fast face recognition. Its implementation at various airports confirms that the
algorithm:
• reduces failure and confirms identity effectively;
• detects and recognizes millions of people in real time;
• handles difficult circumstances such as moving face, difficult angle and lighting and partially
covered face, etc.
In addition to the facial image being the primary biometrics used by human personnel for
identification purpose, ICAO e-passport standard specifies fingerprint and iris biometrics which are
compatible with electronic identification. Meanwhile, a technique for highly accurate finger vein
authentication using the visible-light cameras typically built into mobile devices are being developed.
Contactless verification methods – facial, iris and finger vein biometrics – are favoured in the current
times.
Figure 4: Finger vein authentication technology.
The function of the Automated Biometric Identification System (ABIS) is to identify a person based on
available biometric images or templates. The subject is compared against the entire set or a subset of
biometrics data stored in the database. The reasons for doing this are to:
• Prevent issuance of multiple IDs to the same person.
• Cross-check individuals against suspect watch lists.
For increased security, a combination of biometrics, also called multimodal biometrics, provides
greater accuracy and more flexibility than a single biometric. it has a fusion technique to integrate
the information from two different authentication systems. The fusion can be done at any of the
following levels:
• During feature extraction.
• During comparison of live samples with stored biometric templates.
• During decision making.
CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 7
The multimodal biometric systems that integrate or fuse the information at initial stage are
considered to be more effective than the systems which integrate the information at the later stages.
The obvious reason to this is, the early stage contains more accurate information than the matching
scores of the comparison modules.
Health Passport
Of relevance to the airport environment, MCS is building a Cloud service that combines leading-edge
technologies to enable users, organisations and governments to minimise the risk of infections from
physical interactions. The secure Travel / Work Health Passport Service uses Covid-19 detection
tools, real-time Covid-19 testing and self-assessment mobile application, and on-site indoor and
outdoor mobile laboratories.
The Health Passport Service does not discriminate against different test methods and supports both
conventional RT-PCR test and new breathalyzer tests. The Health Passport Service provides a
common interface for connecting to external parties, such as test laboratories, vaccination
administration centres and clinics.
The Health Passport Service implements a customisable, distributed ledger to record what happens
at various touchpoints between users and other actors in the system. Parties at designated
checkpoints throughout the system are obligated to upload user interactions, test reports, and
vaccination records, and such events must be added to the ledger by authorised personnel. Persons
under quarantine and those under surveillance would check-in through their mobile application for
authorities to track their whereabouts.
A secured QR Code is attached to each test or vaccination report to simplify third-party verification,
as illustrated in Figure 5. During inspection, a quick scan of the QR Code would download the ID, test
or vaccination status, and blockchain transaction ID, for further verification.
Figure 5: Test and vaccination reports with secured QR Code.
CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 8
Figure 6: Health Passport System workflow.
Track-and-Trace with Distributed Ledger Technology
The airport environment provides for a strong incentive to implement an automated track-and-trace
system for the transfer of luggage between the airport and airlines, and movement of assets within
the organisation, or when shared with another organisation.
The first key element is to tag the items which identify them according to the following information:
• Item type, category, make and/or model
• Item serial number
• Date of tagging
• ID of relevant organisation, handler or passenger
• Other relevant information depending on use-case
For item tagging, barcode and RFID technologies are available.
The second key element is to record each transfer of the assets on a distributed ledger, customised
for track-and-trace application. Parties at designated touchpoints throughout the airport are
CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 9
obligated to report the progress of the tracked items and such events must be added to the
distributed ledger by authorised personnel. This ensures that every record is presented as is and
cannot be altered, is stored for perpetuity, and is available for outside scrutiny.
Common Use Self-Service System (CUSS)
Common Use Self-Service or CUSS platform is a system that contains a shared kiosk that provides
airport check-in for passengers, and eliminates the need for ground staff. Like other common use
systems, several airlines can use CUSS on a single terminal. At an airport, platform providers offer the
CUSS kiosk, and application providers share it to run their kiosk applications on.
Our CUSS products extend beyond Self-service Kiosk to include Single-Door Autogate and Double-
Door Autogate. They form touchpoints throughout the airport where individuals are tracked,
especially the location of passengers as they progressed from check-in to boarding.
Figure 7: Self-service kiosks, single- and double-door autogates.
The components of the CUSS Platform are:
• Kiosk hardware and peripheral
• Kiosk Management System
• CUSS Application Software and Server
• CUSS Platform software
• Communications network
In their latest upgrade, the CUSS solutions are designed to maximise user hygiene by leveraging on
contactless and touchless technologies to avoid physical interaction or exchange documents with
officers. In addition to touchless biometrics that allows walkthrough user experience, the cameras
with built-in thermal scanners enable:
• Real-time access control by detecting elevated body temperature and triggering an alert for
high temperature.
• Automatically classifies and saves separate dataset (face image, body temperature and
access log) for personnel with fever.
• Temperature profile of individual passengers displayed on a live monitor.
• Alert when an individual whose body temperature exceeds 37.3°C is detected.
• Can also be programmed to inform staff of any passengers who are not wearing a mask.
The technology roadmap towards hygienic solutions will see CUSS solutions with:
• Eye tracking
CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 10
• Voice activation
• Health history questionnaire
• Touchless screen with gesture and motion detection
Figure 8: Example screenshots of kiosk application.
European Entry/Exit System (EES) Standard
In 2016, the European Commission has adopted a Communication on Stronger and Smarter
Information Systems for Borders and Security, dubbed the European Entry/Exit System (EES)
regulation, setting out options on how existing and future information systems could enhance both
external border management and internal security in the EU. With this principle in mind, our CUSS
equipment is designed to speed-up, facilitate and reinforce border check procedures for travellers.
The CUSS equipment will modernise external border management by improving the quality and
efficiency of controls and support the increasing numbers of travellers entering and exiting Malaysia.
Several improvements to current inspection procedures are:
• Collection of e-passport and biometrics data
• Abolishment of passport stamps
• Reliance on CUSS kiosks, e-gate and Automated Border Control (ABC) System
• Background checks of travellers prior to border crossing
Other key features of the CUSS equipment:
• Process certified to IATA’s CUSS standards
• User interface for web development environment
• Linkage to airlines’ DCS
• Printer modules compatible with ARINC devices
• Customized API for the client airline
• Certified by ARINC and SITA to IATA CUSS specification
• Compatible with European Entry/Exit System regulation for immigration control
AI Video Surveillance
As threats to aviation become increasingly sophisticated, we must strive to enhance and develop
aviation security capabilities. Our answer is the AI Video Surveillance system that monitors every
video stream, identify anomalies and generate alerts, at all times. This removes the low-level
mundane tasks to machine and leaves the high-order intelligent tasks of analysing suspicious scenes
and decision making to the human supervisors.
The AI Video Surveillance System employs CCTV surveillance cameras equipped with AI deep learning
based facial recognition technology that could enhance security within various environments, by
CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 11
analysing biometrics, audio, movement, entrance detection, etc. It scans people walking through
open areas and automatically analyse data for threats, including:
• Tracking pathogen transmission path
• Tracking people of interest
• Identifying unattended goods
• Identifying abnormal behaviours
The AI video data analysis algorithm is designed to perform:
• Foreground detection
• Object detection and tracking
• Object classification
• Event detection
Figure 9: AI Video Surveillance System.
CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 12
Contents
About MCS..........................................................................................................................................1
ONE ID................................................................................................................................................1
Collaboration and Trust ......................................................................................................................3
Automated Biometrics Identification System ......................................................................................6
Health Passport ..................................................................................................................................7
Track-and-Trace with Distributed Ledger Technology..........................................................................8
Common Use Self-Service System (CUSS)............................................................................................9
AI Video Surveillance ........................................................................................................................10

Mais conteúdo relacionado

Mais procurados

Axiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityAxiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityVikram Sareen
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreindragantiSaiHiranma
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
 
Smart OpenID & Mobile Network Security
Smart OpenID & Mobile Network SecuritySmart OpenID & Mobile Network Security
Smart OpenID & Mobile Network SecurityAndreas Leicher
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...IRJET Journal
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™M2SYS Technology
 
Survey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In MalaysiaSurvey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In MalaysiaFICO
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to SolusSolus
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 
Mobile Authentication - Onboarding, best practices & anti-patterns
Mobile Authentication - Onboarding, best practices & anti-patternsMobile Authentication - Onboarding, best practices & anti-patterns
Mobile Authentication - Onboarding, best practices & anti-patternsPieter Ennes
 
Chapter 6 remote customer onboarding
Chapter 6   remote customer onboardingChapter 6   remote customer onboarding
Chapter 6 remote customer onboardingQuan Risk
 
Web Authn & Security Keys: Unlocking the Key to Authentication
Web Authn & Security Keys: Unlocking the Key to AuthenticationWeb Authn & Security Keys: Unlocking the Key to Authentication
Web Authn & Security Keys: Unlocking the Key to AuthenticationFIDO Alliance
 
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System IJECEIAES
 

Mais procurados (19)

Axiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityAxiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identity
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
ConfidentID_broc
ConfidentID_brocConfidentID_broc
ConfidentID_broc
 
Identity and Mobility in a Digital World
Identity and Mobility in a Digital WorldIdentity and Mobility in a Digital World
Identity and Mobility in a Digital World
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Smart OpenID & Mobile Network Security
Smart OpenID & Mobile Network SecuritySmart OpenID & Mobile Network Security
Smart OpenID & Mobile Network Security
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™Secure Authentication for Mobile Banking Customers with mVerify™
Secure Authentication for Mobile Banking Customers with mVerify™
 
Currency
CurrencyCurrency
Currency
 
Survey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In MalaysiaSurvey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In Malaysia
 
raonsecure_en_min
raonsecure_en_minraonsecure_en_min
raonsecure_en_min
 
S K Sinha
S K SinhaS K Sinha
S K Sinha
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
Mobile Authentication - Onboarding, best practices & anti-patterns
Mobile Authentication - Onboarding, best practices & anti-patternsMobile Authentication - Onboarding, best practices & anti-patterns
Mobile Authentication - Onboarding, best practices & anti-patterns
 
Chapter 6 remote customer onboarding
Chapter 6   remote customer onboardingChapter 6   remote customer onboarding
Chapter 6 remote customer onboarding
 
Web Authn & Security Keys: Unlocking the Key to Authentication
Web Authn & Security Keys: Unlocking the Key to AuthenticationWeb Authn & Security Keys: Unlocking the Key to Authentication
Web Authn & Security Keys: Unlocking the Key to Authentication
 
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
 
Estonian Experience electronicID, mobileID
Estonian Experience electronicID, mobileIDEstonian Experience electronicID, mobileID
Estonian Experience electronicID, mobileID
 

Semelhante a General discussion paper for airports

Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:DelightClear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:DelightInteractiveNEC
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET Journal
 
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.IRJET Journal
 
Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Ivona M
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...ijiert bestjournal
 
The future of identity verification predictions and trends in blockchain tech...
The future of identity verification predictions and trends in blockchain tech...The future of identity verification predictions and trends in blockchain tech...
The future of identity verification predictions and trends in blockchain tech...Techgropse Pvt.Ltd.
 
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...cscpconf
 
Preventing forged and fabricated academic credentials using cryptography and ...
Preventing forged and fabricated academic credentials using cryptography and ...Preventing forged and fabricated academic credentials using cryptography and ...
Preventing forged and fabricated academic credentials using cryptography and ...IJCSEA Journal
 
Airport turnstile - Mairsturnstile.com
Airport turnstile - Mairsturnstile.comAirport turnstile - Mairsturnstile.com
Airport turnstile - Mairsturnstile.comwww.mairsturnstile.com
 
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature  (e-Sign) Cloud Network & eCommerce ApplicationControls for Digital Signature  (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce ApplicationMufaddal Nullwala
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_enAlix Murphy
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxITIO Innovex
 
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעפתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעZeev Shetach
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationeSAT Publishing House
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationeSAT Journals
 
IDenTrip - Seamless Airtravel with Biometric Identity
IDenTrip - Seamless Airtravel with Biometric IdentityIDenTrip - Seamless Airtravel with Biometric Identity
IDenTrip - Seamless Airtravel with Biometric IdentityBiocube Technologies Inc.
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTURohit Verma
 
Digital Certificate Verification using Blockchain
Digital Certificate Verification using BlockchainDigital Certificate Verification using Blockchain
Digital Certificate Verification using BlockchainIRJET Journal
 

Semelhante a General discussion paper for airports (20)

Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:DelightClear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
 
Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
 
The future of identity verification predictions and trends in blockchain tech...
The future of identity verification predictions and trends in blockchain tech...The future of identity verification predictions and trends in blockchain tech...
The future of identity verification predictions and trends in blockchain tech...
 
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
 
Preventing forged and fabricated academic credentials using cryptography and ...
Preventing forged and fabricated academic credentials using cryptography and ...Preventing forged and fabricated academic credentials using cryptography and ...
Preventing forged and fabricated academic credentials using cryptography and ...
 
Airport turnstile - Mairsturnstile.com
Airport turnstile - Mairsturnstile.comAirport turnstile - Mairsturnstile.com
Airport turnstile - Mairsturnstile.com
 
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature  (e-Sign) Cloud Network & eCommerce ApplicationControls for Digital Signature  (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעפתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
 
IDenTrip - Seamless Airtravel with Biometric Identity
IDenTrip - Seamless Airtravel with Biometric IdentityIDenTrip - Seamless Airtravel with Biometric Identity
IDenTrip - Seamless Airtravel with Biometric Identity
 
Use case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTUUse case of block chain unit 4 AKTU
Use case of block chain unit 4 AKTU
 
Digital Certificate Verification using Blockchain
Digital Certificate Verification using BlockchainDigital Certificate Verification using Blockchain
Digital Certificate Verification using Blockchain
 

Último

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000dlhescort
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Sheetaleventcompany
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...lizamodels9
 

Último (20)

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 

General discussion paper for airports

  • 1. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 1 About MCS MCS Microsystems Sdn Bhd is a Malaysian Multimedia Super Corridor (MSC) status IT security technology provider established since 1998. Our solutions are centred around smartcard technologies and our success stories include the world’s first electronic passport launched by the Malaysian government in 1998, and “MyKAD” the world’s first multi-applications national ID smartcard launched in 2001. Since then, MCS have expanded into bespoke software, equipment and services for Trusted ID applications, some in collaboration with complementary technology partners who are best-in-class to deliver leading edge designs. To highlight, we have experience in immigration border control, biometrics, RFID tags, self-service gates and kiosks, distributed ledger technology, to name a few. The Covid-19 pandemic has changed the way we travel. With closed borders and cancelled flights, travel literally came to a virtual standstill, especially after the United Nations' World Tourism Organisation mandated global destinations to implement travel restrictions at the peak of the pandemic. The World Travel and Tourism Council has developed an extensive range of protocols to cover the new normal, for providers as diverse as airlines, shops, hotels and restaurants. It is likely that some of today’s changes are here to stay. The airport security and related solutions and services presented here are based on the principles of: ONE ID Between the Covid-19 pandemic and the expected high passenger volume when it ends, the IATA One ID concept could immensely improve the passengers’ experience and cater for their health and safety while enhancing the border, aviation and airport infrastructure security. In order to achieve this in the most effective, efficient and secure manner, the following four elements need to be in place: • a trusted, digital identity; • an identity management platform; Malaysian Managed Developed for the Malaysian environment to be managed by local experts and organisations. M Convergence Compatible Community Existing and future requirements of the Airlines – Airport – Immigration – Regulator – Retailers community are taken into account. C Security Standard Comply with IATA Recommended Practices and international standards S
  • 2. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 2 • identity verification through biometric recognition; and • a trust framework. Our ONE ID total solution realises all four elements in a single, complete system that leverages on the following technologies working in harmony: • User registration via ICAO e-passports, national ID smartcards and the forthcoming Digital ID. • Facial, fingerprint, iris and/or finger vein multi-modal biometrics enrolment and identification system, including 1-to-1 and 1-to-N matching capabilities. • Self-service kiosks, security and border control gates, and video wall displays. • Passenger, personnel and asset track-and-trace management. • Distributed ledger (blockchain) technology customised for private organisations servicing larger communities. • Artificial intelligence (AI) with deep learning algorithms to achieve system objectives. The ONE ID platform enables centralized management of passenger information and automated processes from check-in to boarding in real time, as illustrated in Figure 1. It has been designed to be an integral part of the airport management system and allows for customization. Figure 1: ONE ID passenger experience and tokenization. As for the Digital ID, upon arrival at the airport and successful registration of his identity document, biometrics and boarding pass, each passenger will be represented by an ID Token on the ONE ID platform. Subsequently, he would need only to have his registered biometrics scanned at each touchpoint on his way through the airport, and would not need to present a variety of documents. Figure 2 illustrates the token generation process for a passenger, its usage and storage, and eventually its disposal when the passenger departs from the airport. Alternatively, instead of disposing it, the token may be stored for future visits of the passenger, if permitted by privacy laws. A similar workflow for airport personnel, airline crew and ground staff, authorities and the rest are available for the purpose of access control within the airport, including airside and landside.
  • 3. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 3 Figure 2: ONE ID token generation process. The use of a trusted, Digital ID will not only facilitate real progress in terms of speed and ease of identity authentication and verification, it will also allow passengers to assert their identity online and in off-airport situations, thereby opening the possibility to move more processes off-airport and have passengers arriving at the airport “ready to fly”. Several key features of the ONE ID platform: • High-speed processing to handle heavy loads during peak hours. • Secure structure provides reliable operation with remarkable functions. • Application Management for each step of the process. • Data analysis upon error, on risks and usage patterns, and load forecast. • Real-time monitoring and remote access to monitor and manage the connected equipment, such as kiosks, gates and displays. • Compliance with IATA, ACI and other international standards. • Common interfaces are structured for easy integration with external systems. Collaboration and Trust The One ID concept relies entirely on a collaborative approach between stakeholders. In order for this to work, an environment needs to be created in which they can store, share, reuse and amend passenger information in a collaborative and trusted manner – managing a data envelope that follows that passenger throughout the journey. In order for stakeholders to trust one another, trust the data, and co-operate on a common platform, a trust framework will have to be established among them. Such trust frameworks can exist at the level of a local air travel ecosystem – for instance an airport plus a number of airlines and control authorities. To establish such a trust framework, we leveraged upon distributed ledger (blockchain) technology. The Distributed Ledger is a system of recording information (transactions) in a way that makes it difficult or impossible to change, hack, or cheat the system. This technology increases transparency of transactions, as everybody on the network has a copy of the ledger. Blockchain enables individuals and companies to verify their identities without having to store this data on a database. This prevents massive data theft of user identities. Quick verification of individuals and their Digital IDs using QR Code at front-end interfaces is made available to users,
  • 4. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 4 under a process patented under WIPO patent number WO 2017/136879 Al as well as in the US Patent No: US 10,972,281 B2. MCS’ customisable, private blockchain is based on an Ethereum fork - Proof of Authority (POA). The Ethereum blockchain is the largest blockchain in the world after Bitcoin. It is a fully open-source blockchain, thus there is no dependency on any major corporation, which means we can easily develop and deploy blockchain-based applications in the future. Furthermore, Proof of Authority (PoA) is a reputation-based consensus algorithm that introduces a practical and efficient solution for blockchain networks (especially the private ones). The PoA consensus algorithm leverages the value of identities, which means that block validators are not staking coins but their own reputation instead. Therefore, PoA blockchains are secured by the validating nodes that are arbitrarily selected as trustworthy entities. The Proof of Authority model relies on a limited number of block validators and this is what makes it a highly scalable system. Blocks and transactions are verified by pre-approved participants, who act as moderators of the system. The Proof of Authority model enables companies to maintain their privacy while availing the benefits of blockchain technology.
  • 5. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 5 Figure 3: Conceptual representation of PoA-based blockchain. Master of Ceremony (MOC) Validator Nodes Archive Nodes Users and smart contracts initiate transactions, which are submitted to the network on an ongoing basis. A peer-to-peer network of approved validators continually receives transaction requests for inclusion in the next block. An algorithm assigns one validator node as primary. The primary validator node assembles transactions into a block and confirms its validity. The remaining validator network confirms the primary node’s block. With consensus achieved, the blockchain is updated with a new block.
  • 6. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 6 Automated Biometrics Identification System Biometrics is a very important component to the successful implementation of a secured credential. Biometrics can authenticate that the person matches the identity carried within the credential with great accuracy. The Face Recognition Algorithm core technology is an AI-based face recognition solution with excellent standard of recognition capability and context awareness function on the basis of a high level of accuracy. It is the best AI face recognition solution for live video stream and developed for accurate and fast face recognition. Its implementation at various airports confirms that the algorithm: • reduces failure and confirms identity effectively; • detects and recognizes millions of people in real time; • handles difficult circumstances such as moving face, difficult angle and lighting and partially covered face, etc. In addition to the facial image being the primary biometrics used by human personnel for identification purpose, ICAO e-passport standard specifies fingerprint and iris biometrics which are compatible with electronic identification. Meanwhile, a technique for highly accurate finger vein authentication using the visible-light cameras typically built into mobile devices are being developed. Contactless verification methods – facial, iris and finger vein biometrics – are favoured in the current times. Figure 4: Finger vein authentication technology. The function of the Automated Biometric Identification System (ABIS) is to identify a person based on available biometric images or templates. The subject is compared against the entire set or a subset of biometrics data stored in the database. The reasons for doing this are to: • Prevent issuance of multiple IDs to the same person. • Cross-check individuals against suspect watch lists. For increased security, a combination of biometrics, also called multimodal biometrics, provides greater accuracy and more flexibility than a single biometric. it has a fusion technique to integrate the information from two different authentication systems. The fusion can be done at any of the following levels: • During feature extraction. • During comparison of live samples with stored biometric templates. • During decision making.
  • 7. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 7 The multimodal biometric systems that integrate or fuse the information at initial stage are considered to be more effective than the systems which integrate the information at the later stages. The obvious reason to this is, the early stage contains more accurate information than the matching scores of the comparison modules. Health Passport Of relevance to the airport environment, MCS is building a Cloud service that combines leading-edge technologies to enable users, organisations and governments to minimise the risk of infections from physical interactions. The secure Travel / Work Health Passport Service uses Covid-19 detection tools, real-time Covid-19 testing and self-assessment mobile application, and on-site indoor and outdoor mobile laboratories. The Health Passport Service does not discriminate against different test methods and supports both conventional RT-PCR test and new breathalyzer tests. The Health Passport Service provides a common interface for connecting to external parties, such as test laboratories, vaccination administration centres and clinics. The Health Passport Service implements a customisable, distributed ledger to record what happens at various touchpoints between users and other actors in the system. Parties at designated checkpoints throughout the system are obligated to upload user interactions, test reports, and vaccination records, and such events must be added to the ledger by authorised personnel. Persons under quarantine and those under surveillance would check-in through their mobile application for authorities to track their whereabouts. A secured QR Code is attached to each test or vaccination report to simplify third-party verification, as illustrated in Figure 5. During inspection, a quick scan of the QR Code would download the ID, test or vaccination status, and blockchain transaction ID, for further verification. Figure 5: Test and vaccination reports with secured QR Code.
  • 8. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 8 Figure 6: Health Passport System workflow. Track-and-Trace with Distributed Ledger Technology The airport environment provides for a strong incentive to implement an automated track-and-trace system for the transfer of luggage between the airport and airlines, and movement of assets within the organisation, or when shared with another organisation. The first key element is to tag the items which identify them according to the following information: • Item type, category, make and/or model • Item serial number • Date of tagging • ID of relevant organisation, handler or passenger • Other relevant information depending on use-case For item tagging, barcode and RFID technologies are available. The second key element is to record each transfer of the assets on a distributed ledger, customised for track-and-trace application. Parties at designated touchpoints throughout the airport are
  • 9. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 9 obligated to report the progress of the tracked items and such events must be added to the distributed ledger by authorised personnel. This ensures that every record is presented as is and cannot be altered, is stored for perpetuity, and is available for outside scrutiny. Common Use Self-Service System (CUSS) Common Use Self-Service or CUSS platform is a system that contains a shared kiosk that provides airport check-in for passengers, and eliminates the need for ground staff. Like other common use systems, several airlines can use CUSS on a single terminal. At an airport, platform providers offer the CUSS kiosk, and application providers share it to run their kiosk applications on. Our CUSS products extend beyond Self-service Kiosk to include Single-Door Autogate and Double- Door Autogate. They form touchpoints throughout the airport where individuals are tracked, especially the location of passengers as they progressed from check-in to boarding. Figure 7: Self-service kiosks, single- and double-door autogates. The components of the CUSS Platform are: • Kiosk hardware and peripheral • Kiosk Management System • CUSS Application Software and Server • CUSS Platform software • Communications network In their latest upgrade, the CUSS solutions are designed to maximise user hygiene by leveraging on contactless and touchless technologies to avoid physical interaction or exchange documents with officers. In addition to touchless biometrics that allows walkthrough user experience, the cameras with built-in thermal scanners enable: • Real-time access control by detecting elevated body temperature and triggering an alert for high temperature. • Automatically classifies and saves separate dataset (face image, body temperature and access log) for personnel with fever. • Temperature profile of individual passengers displayed on a live monitor. • Alert when an individual whose body temperature exceeds 37.3°C is detected. • Can also be programmed to inform staff of any passengers who are not wearing a mask. The technology roadmap towards hygienic solutions will see CUSS solutions with: • Eye tracking
  • 10. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 10 • Voice activation • Health history questionnaire • Touchless screen with gesture and motion detection Figure 8: Example screenshots of kiosk application. European Entry/Exit System (EES) Standard In 2016, the European Commission has adopted a Communication on Stronger and Smarter Information Systems for Borders and Security, dubbed the European Entry/Exit System (EES) regulation, setting out options on how existing and future information systems could enhance both external border management and internal security in the EU. With this principle in mind, our CUSS equipment is designed to speed-up, facilitate and reinforce border check procedures for travellers. The CUSS equipment will modernise external border management by improving the quality and efficiency of controls and support the increasing numbers of travellers entering and exiting Malaysia. Several improvements to current inspection procedures are: • Collection of e-passport and biometrics data • Abolishment of passport stamps • Reliance on CUSS kiosks, e-gate and Automated Border Control (ABC) System • Background checks of travellers prior to border crossing Other key features of the CUSS equipment: • Process certified to IATA’s CUSS standards • User interface for web development environment • Linkage to airlines’ DCS • Printer modules compatible with ARINC devices • Customized API for the client airline • Certified by ARINC and SITA to IATA CUSS specification • Compatible with European Entry/Exit System regulation for immigration control AI Video Surveillance As threats to aviation become increasingly sophisticated, we must strive to enhance and develop aviation security capabilities. Our answer is the AI Video Surveillance system that monitors every video stream, identify anomalies and generate alerts, at all times. This removes the low-level mundane tasks to machine and leaves the high-order intelligent tasks of analysing suspicious scenes and decision making to the human supervisors. The AI Video Surveillance System employs CCTV surveillance cameras equipped with AI deep learning based facial recognition technology that could enhance security within various environments, by
  • 11. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 11 analysing biometrics, audio, movement, entrance detection, etc. It scans people walking through open areas and automatically analyse data for threats, including: • Tracking pathogen transmission path • Tracking people of interest • Identifying unattended goods • Identifying abnormal behaviours The AI video data analysis algorithm is designed to perform: • Foreground detection • Object detection and tracking • Object classification • Event detection Figure 9: AI Video Surveillance System.
  • 12. CONFIDENTIAL. MCS MICROSYSTEMS SDN BHD. 12 Contents About MCS..........................................................................................................................................1 ONE ID................................................................................................................................................1 Collaboration and Trust ......................................................................................................................3 Automated Biometrics Identification System ......................................................................................6 Health Passport ..................................................................................................................................7 Track-and-Trace with Distributed Ledger Technology..........................................................................8 Common Use Self-Service System (CUSS)............................................................................................9 AI Video Surveillance ........................................................................................................................10