Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Page Properties
idmeeting-status-metadata

Quorum

Status
colourGreen
titlequorate

Notes-Status

Status
colourBlue
titledraftingReady for review

Approved-Link

Info

The meeting status metadata table is used for summary reports - copy the status macros from the table in these instructions:

Quorum:

Status
colourGreen
titlequorate
Status
colourYellow
titlenot quorate

Notes-Status:

Status
titledrafting
Status
colourBlue
titleReady for review
Status
colourGreen
titleapproved

Approved-Link: Insert a link to the Meeting Notes page holding the approval decision for this notes page

...

Voter

Organization

Presence

Ajay Amlani

iProov

Andrew Hughes

FaceTec, Inc.

Present

Ashok Singal

Demystify Biometrics

Chris LaBarbera

Verizon

Denny Prvu

RBC Royal Bank of Canada

Iain Corby

SafetyTech Limited

Jay Meier

FaceTec, Inc.

Present

Jim Pasquale

Chasm Crossing Solutions

Present

Jordan Burris

Socure

Justin Byrd

N/A

Present

Maxine Most

Acuity Market Intelligence

Present

Mike Magrath

Easy Dynamics

Present

Peter Davis

Airside Mobile, Inc

Present

Sean Lanzner

iProov

Present

Terry Brenner

FIDO Alliance

...

Alec Laws

Participant

Organization

Presence

Adam Bradley

Mastercard

Adrian Slade

n/a

Alastair Treharne

Beruku Identity Limited

IDENTOS

Anand Kumar

SecureKloud Technologies, Inc.

Becky Burgess

N/A

Brad Head

ZED werks Inc.

Brandon Gutierrez

Equifax

Chris Tyghe

Interac

Christopher Olsen

N/A

Present

Dan Bachenheimer

Accenture

Present

Dawid Jacobs

DAL Identity

Gene Dimira

n/a

Hannah Sutor

n/a

Heather Vescent

n/a

Isha Chhatwal

n/a

James Monaghan

n/a

JS Bruneau

N/A

Julian White

Beruku

Kevin Faragher 

Interac

Kim Duffy

n/a

Leonardo Maldonado

GSE

Lorrayne Auld

n/a

Martin George

N/APresent

Michael Choudoin

N/A

Present

Michael Engle

1Kosmos

Noreen Whysel

N/A

Paul Grassi

FIDO Alliance

Paul Paray

Artswap, LLC

Present

Pieter Van Iperen

N/A

Sarath Laufer

Au10tix

Scott Jones

CLEAR

Srdjan Manojlovic

Interac

Stephane Asselin

N/A

Present

Stephanie Schuckers

Clarkson University

Stephen Vitka

N/A

Thanos Vrachnos

SpearIT

Tom Maduri

Bell Canada

Present

Uttam Reddi

Aware Corp

Vincent Brousseau

Desjardins Group

Zarrak Khan

N/A

Present

Guests

Participant

Organization

Presence

Kay Chopard

Kantara

Present

Quorum determination

Meeting is quorate when 50% + 1 of voting participants attend

...

\uD83D\uDDE3 Discussion topics

Time

Item

Presenter

Notes

Biometric inputs

Mike Chaudoin

  • Looked back at Biometric standards for ideas

    • ISO 30107-3 presentation attack detection - this is the typical system-architecture diagram that biometric folks are familiar with

image-20240228-170829.pngImage Added

  • Discussion about how to bring the diagram into the discussion - so that we can speak to the biometrics-oriented audiences

  • Dan: there might be arrows missing if we overlay the IDPV flows and consider deepfakes - e.g. during enrollment, capture of the reference may go via the signal processor box into the data storage box.

  • Jay: where do injection attacks happen in this diagram?

    • Dan: for image processing, injections happen at #2 before templatization

  • Mike notes that this diagram was originally created for the fingerprint

  • Stephanie has an updated diagram that addresses deepfakes

image-20240228-172844.pngImage Added

  • Joey: points out that the new world is both the biometric sampling and also now reference document modifications

    • Synthetically generated ID Documents should be in scope

  • Sean: a big part of the threat is the ability to scale the attacks - important considerations

  • Andrew: points out that we have to address physical document fakes during the transition towards digital ID documents (10-15 years)

  •  Mike and Joey to work on updating the architecture diagram for the world of deepfakes - use it to point back into our other content work
  • This content area fits into “attack vectors”

    • Volunteers: Max, Dan

    • Need to add in new boxes for how images are brought into the reference database - e.g. morph image attacks

What to do with Heather’s content topics?

Jay

  • Discussion about how the “hacker motivations” topic areas should be handled

    • An option to merge into other content areas - e.g. who is a target/is vulnerable

    • Look for opportunities to include “motivations” into the other topic areas

A Book with content on cyber-crime motives: https://www.goodreads.com/book/show/38502106-industry-of-anonymity

Next week topic

Dawid: To present on forensics

Joey: to demonstrate live injection of deepfake into Zoom call

Places to follow

✅ Open Action items

  •  
Info

Action items may be created inline on any page. This block shows all open action items from all meeting notes.

...