Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

Meeting status metadata

Quorum

NOT QUORATE

Notes-Status

DRAFTING

Approved-Link

The meeting status metadata table is used for summary reports - copy the status macros from the table in these instructions:

Quorum: QUORATE NOT QUORATE

Notes-Status: DRAFTING READY FOR REVIEW APPROVED

Approved-Link: Insert a link to the Meeting Notes page holding the approval decision for this notes page

Agenda

  • Call meeting to order

  • Roll call & determination of voting participant quorum

  • Agenda bashing

  • Approval of previous minutes

  • Announcements

  • Main discussion items (see table below)

  • AOB

  • Adjourn meeting

\uD83D\uDC65 Attendees

Voting participants

Voter

Organization

Presence

Ajay Amlani

iProov

Andrew Hughes

FaceTec, Inc.

Present

Ashok Singal

Demystify Biometrics

Chris LaBarbera

Verizon

Denny Prvu

RBC Royal Bank of Canada

Iain Corby

SafetyTech Limited

Jay Meier

FaceTec, Inc.

Present

Jim Pasquale

Chasm Crossing Solutions

Present

Jordan Burris

Socure

Justin Byrd

N/A

Present

Maxine Most

Acuity Market Intelligence

Present

Mike Magrath

Easy Dynamics

Present

Peter Davis

Airside Mobile, Inc

Present

Sean Lanzner

iProov

Present

Terry Brenner

FIDO Alliance

Non-Voting Participants

Participant

Organization

Presence

Adam Bradley

Mastercard

Adrian Slade

n/a

Alastair Treharne

Beruku Identity Limited

Alec Laws

IDENTOS

Anand Kumar

SecureKloud Technologies, Inc.

Present

Becky Burgess

N/A

Brad Head

ZED werks Inc.

Brandon Gutierrez

Equifax

Chris Tyghe

Interac

Christopher Olsen

N/A

Dan Bachenheimer

Accenture

Present

Dawid Jacobs

DAL Identity

Present

Gene Dimira

n/a

Hannah Sutor

n/a

Heather Vescent

n/a

Isha Chhatwal

n/a

James Monaghan

n/a

JS Bruneau

N/A

Julian White

Beruku

Kevin Faragher 

Interac

Kim Duffy

n/a

Leonardo Maldonado

GSE

Lorrayne Auld

n/a

Martin George

N/A

Michael Choudoin

N/A

Present

Michael Engle

1Kosmos

Present

Noreen Whysel

N/A

Paul Grassi

FIDO Alliance

Paul Paray

Artswap, LLC

Pieter Van Iperen

N/A

Present

Sarath Laufer

Au10tix

Scott Jones

CLEAR

Srdjan Manojlovic

Interac

Stephane Asselin

N/A

Stephanie Schuckers

Clarkson University

Present

Stephen Vitka

N/A

Thanos Vrachnos

SpearIT

Tom Maduri

Bell Canada

Uttam Reddi

Aware Corp

Present

Vincent Brousseau

Desjardins Group

Zarrak Khan

N/A

Guests

Participant

Organization

Presence

Kay Chopard

Kantara

Quorum determination

Meeting is quorate when 50% + 1 of voting participants attend

There are 15 voters as of 2024-02-28

Approval of Prior Minutes

Motion to approve meeting minutes listed below:

Moved by:

Seconded by:

Link to draft minutes and outcome

Discussion

\uD83D\uDDE3 Discussion topics

Time

Item

Presenter

Notes

Biometric inputs

Mike Chaudoin

  • Looked back at Biometric standards for ideas

    • ISO 30107-3 presentation attack detection - this is the typical system-architecture diagram that biometric folks are familiar with

image-20240228-170829.png

  • Discussion about how to bring the diagram into the discussion - so that we can speak to the biometrics-oriented audiences

  • Dan: there might be arrows missing if we overlay the IDPV flows and consider deepfakes - e.g. during enrollment, capture of the reference may go via the signal processor box into the data storage box.

  • Jay: where do injection attacks happen in this diagram?

    • Dan: for image processing, injections happen at #2 before templatization

  • Mike notes that this diagram was originally created for the fingerprint

  • Stephanie has an updated diagram that addresses deepfakes

image-20240228-172844.png

  • Joey: points out that the new world is both the biometric sampling and also now reference document modifications

    • Synthetically generated ID Documents should be in scope

  • Sean: a big part of the threat is the ability to scale the attacks - important considerations

  • Andrew: points out that we have to address physical document fakes during the transition towards digital ID documents (10-15 years)

  • Mike and Joey to work on updating the architecture diagram for the world of deepfakes - use it to point back into our other content work

    • This content area fits into “attack vectors”

    • Volunteers: Max, Dan

    • Need to add in new boxes for how images are brought into the reference database - e.g. morph image attacks

What to do with Heather’s content topics?

Jay

  • Discussion about how the “synthetic identity and simulated humans” and “hacker motivations” topic areas should be handled

    • Option to merge into other content areas - e.g. who is a target/is vulnerable

    • Look for opportunities to include “motivations” into the other topic areas

A Book with content on cyber-crime motives: https://www.goodreads.com/book/show/38502106-industry-of-anonymity

✅ Open Action items

  •  

Action items may be created inline on any page. This block shows all open action items from all meeting notes.

Task report

Looking good, no incomplete tasks.

⤴ Decisions

  • No labels