Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Page Properties
idmeeting-status-metadata

Quorum

Status
colourYellowGreen
titlenot quorate

Notes-Status

Status
colourBlue
titledraftingReady for review

Approved-Link

Info

The meeting status metadata table is used for summary reports - copy the status macros from the table in these instructions:

Quorum:

Status
colourGreen
titlequorate
Status
colourYellow
titlenot quorate

Notes-Status:

Status
titledrafting
Status
colourBlue
titleReady for review
Status
colourGreen
titleapproved

Approved-Link: Insert a link to the Meeting Notes page holding the approval decision for this notes page

...

IDENTOS

Participant

Organization

Presence

Adam Bradley

Mastercard

Adrian Slade

n/a

Alastair Treharne

Beruku Identity Limited

Alec Laws

Anand Kumar

SecureKloud Technologies, Inc.

Present

Becky Burgess

N/A

Brad Head

ZED werks Inc.

Brandon Gutierrez

Equifax

Chris Tyghe

Interac

Christopher Olsen

N/A

Dan Bachenheimer

Accenture

Present

Dawid Jacobs

DAL Identity

Present

Gene Dimira

n/a

Hannah Sutor

n/a

Heather Vescent

n/a

Isha Chhatwal

n/a

James Monaghan

n/a

JS Bruneau

N/A

Julian White

Beruku

Kevin Faragher 

Interac

Kim Duffy

n/a

Leonardo Maldonado

GSE

Lorrayne Auld

n/a

Martin George

N/A

Michael Choudoin

N/A

Present

Michael Engle

1Kosmos

Present

Noreen Whysel

N/A

Paul Grassi

FIDO Alliance

Paul Paray

Artswap, LLC

Pieter Van Iperen

N/A

Present

Sarath Laufer

Au10tix

Scott Jones

CLEAR

Srdjan Manojlovic

Interac

Stephane Asselin

N/A

Stephanie Schuckers

Clarkson University

Present

Stephen Vitka

N/A

Thanos Vrachnos

SpearIT

Tom Maduri

Bell Canada

Uttam Reddi

Aware Corp

PresentVincent Brousseau

Desjardins Group

Zarrak Khan

N/A

Guests

Participant

Organization

Presence

Kay Chopard

Kantara

Present

Quorum determination

Meeting is quorate when 50% + 1 of voting participants attend

...

Time

Item

Presenter

Notes

Biometric inputs

Mike Chaudoin

  • Looked back at Biometric standards for ideas

    • ISO 30107-3 presentation attack detection - this is the typical system-architecture diagram that biometric folks are familiar with

image-20240228-170829.png

  • Discussion about how to bring the diagram into the discussion - so that we can speak to the biometrics-oriented audiences

  • Dan: there might be arrows missing if we overlay the IDPV flows and consider deepfakes - e.g. during enrollment, capture of the reference may go via the signal processor box into the data storage box.

  • Jay: where do injection attacks happen in this diagram?

    • Dan: for image processing, injections happen at #2 before templatization

  • Mike notes that this diagram was originally created for the fingerprint

  • Stephanie has an updated diagram that addresses deepfakes

image-20240228-172844.png

  • Joey: points out that the new world is both the biometric sampling and also now reference document modifications

    • Synthetically generated ID Documents should be in scope

  • Sean: a big part of the threat is the ability to scale the attacks - important considerations

  • Andrew: points out that we have to address physical document fakes during the transition towards digital ID documents (10-15 years)

  •  Mike and Joey to work on updating the architecture diagram for the world of deepfakes - use it to point back into our other content work
  • This content area fits into “attack vectors”

    • Volunteers: Max, Dan

    • Need to add in new boxes for how images are brought into the reference database - e.g. morph image attacks

What to do with Heather’s content topics?

Jay

  • Discussion about how the “hacker motivations” topic areas should be handled

    • An option to merge into other content areas - e.g. who is a target/is vulnerable

    • Look for opportunities to include “motivations” into the other topic areas

A Book with content on cyber-crime motives: https://www.goodreads.com/book/show/38502106-industry-of-anonymity

Next week topic

Dawid: To present on forensics

Joey: to demonstrate live injection of deepfake into Zoom call

Places to follow

✅ Open Action items

  •  
Info

Action items may be created inline on any page. This block shows all open action items from all meeting notes.

...