|GRANTWAY
EN

Enhanced security of, and combating the frauds on, identity management and identity and travel documents

European Comission

Share
Favorite
Feedback
Summary
30 June 2022
23 November 2022
-
-
-
For profit
Not for profit (incl. NGOs)
Public sector
R&D and Higher Education
Afghanistan
Albania
Algeria
Angola
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bangladesh
Belarus
Belgium
Belize
Benin
Bhutan
Bolivia
Bonaire
Bosnia and Herzegovina
Botswana
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Central African Republic
Chad
Colombia
Comoros
Costa Rica
Croatia
Cuba
Curaçao
Cyprus
Czechia
Democratic Republic of the Congo
Denmark
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Faroe Islands
Fiji
Finland
France
French Polynesia
French Southern and Antarctic Territories
Gabon
Gambia
Georgia
Georgia
Germany
Ghana
Greece
Greenland
Grenada
Guatemala
Guinea
Guinea-Bissau
Guyana
Haiti
Honduras
Hungary
Iceland
Indonesia
Iran
Iraq
Ireland
Israel
Italy
Jamaica
Jordan
Kazakhstan
Kenya
Kiribati
Kosovo
Kyrgyzstan
Laos
Latvia
Lebanon
Lesotho
Liberia
Libya
Lithuania
Luxembourg
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Mauritania
Mauritius
Micronesia
Moldova
Mongolia
Montenegro
Morocco
Mozambique
Myanmar
Namibia
Nepal
Netherlands
New Caledonia
Nicaragua
Niger
Nigeria
North Korea
North Macedonia
Norway
Pakistan
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Poland
Portugal
Republic of Côte d'Ivoire
Republic of the Congo
Romania
Rwanda
Saba
Saint Barthélemy
Saint Lucia
Saint Vincent and the Grenadines
Samoa
Sao Tome and Principe
Senegal
Serbia
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
Somalia
South Africa
South Sudan
Spain
Sri Lanka
St. Eustatius
St. Pierre and Miquelon
Sudan
Suriname
Sweden
Syria
Tajikistan
Tanzania
Thailand
Togo
Tonga
Tunisia
Turkey
Turkmenistan
Tuvalu
Uganda
UK
Ukraine
Uzbekistan
Vanuatu
Venezuela
Vietnam
Wallis and Futuna
Yemen
Zambia
Zimbabwe
Research, Development and Innovation Engineering and Technology
Overview

ExpectedOutcome :

Projects are expected to contribute to some or all of the following expected outcomes:

  • Improved capabilities of border management and law enforcement practitioners to identify citizens and the use of identity and travel documents and credentials in the context of border and police checks, for a better, more reliable and more secure experience for citizens and security practitioners, including in connection to optimised e-Government settings;
  • Improved capabilities of border management and law enforcement practitioners to defend identity and document/credential management against attacks to their security and attempts to falsify biometrics, identity thefts and online frauds;
  • Improved knowledge for European approaches to future identity management systems and document and credential security, building on and integrating with existing tools and respecting the privacy of European citizens. Scope :

Research will build capabilities to prevent, detect and respond to challenges to the security and reliability of identity management and identity and travel documents, in the context of border and police checks. Research should also address solutions for integrated secure identity creation, protection and management in the context of future increasingly “digitalised” borders; and contribute to improve the performance and the comfort of the border and police checks experience for both security authorities’ operators and the users.

New challenges for secure identity management and secure identity and travel documents could emerge in the coming years and decades. Solutions will hence have to enable new capabilities while at the same time ensuring both privacy and security of identity and identity documents. Future electronic identification systems will have to safeguard key parameters of identity management, such as security, efficiency, user friendliness, trust, privacy and protection of data. Electronic identifications (eIDs) can be carried on mobile devices, to respond to security requirements, ease of use and range of applications. In addition, it is necessary to ensure the reliability and link among the information contained on identity supports and their owner, to avoid the possibility of having authentic documents with false information. Research can focus on security and privacy enhancing features in new eID ecosystems and/or on innovative identity lifecycle processes.

Areas of research could include exploring solutions against morphing attacks to the security of identity and travel documents, including robust algorithms to detect morphing, as well as against other possible future attempts and techniques to falsify biometrics; methods to validate and verify identity at borders or police checks; or advanced and privacy-enhanced technologies for the security of identity, breeder and travel documents. Research should explore novel solutions for document verification and fraud detection, including Manipulation Attack Detection (MAD) and Presentation Attack Detection (PAD) at border checks.

The proposed solutions should act not only at technological level, but should also propose new approaches to the traditional central authority architecture. The solutions should take into account the management of sensitive information and include an assessment of legal and ethical issues.

Solutions have the potential to contribute to future evolutions of European identity strategies based on eIDAS (Electronic Identification, Authentication and Trust Services), and could explore synergies with tools offered by the eIDAS Regulation.

Research proposals should consider, build on if appropriate and not duplicate previous research, including but not limiting to research by other Framework Programmes projects such as those on capabilities for document security, as well as EU studies on potential applications of technologies to the improvement of border management capabilities.

Specific Topic Conditions :

Activities are expected to achieve TRL 7-8 by the end of the project – see General Annex B.

Cross-cutting Priorities :

Digital Agenda Artificial Intelligence

Eligibility

General conditions

  1. Admissibility conditions: described in Annex A and Annex E of the Horizon Europe Work Programme General Annexes

Proposal page limits and layout: described in Part B of the Application Form available in the Submission System

  1. Eligible countries: described in Annex B of the Work Programme General Annexes

A number of non-EU/non-Associated Countries that are not automatically eligible for funding have made specific provisions for making funding available for their participants in Horizon Europe projects. See the information in the Horizon Europe Programme Guide .

3 . Other eligibility conditions: described in Annex B of the Work Programme General Annexes

The following additional eligibility conditions apply:

This topic requires the active involvement , as beneficiaries, of at least 2 Border or Coast Guard Authorities and 2 Police Authorities [[In the context of this Destination, ‘Police Authorities’ means public authorities explicitly designated by national law, or other entities legally mandated by the competent national authority, for the prevention, detection and/or investigation of terrorist offences or other criminal offences, specifically excluding police academies, forensic institutes, training facilities as well as border and customs authorities.]], from at least 3 different EU Member States or Associated countries. For these participants, applicants must fill in the table “Eligibility information about practitioners” in the application form with all the requested information, following the template provided in the submission IT tool.

Some activities, resulting from this topic, may involve using classified background and/or producing of security sensitive results (EUCI and SEN). Please refer to the related provisions in section B Security — EU classified and sensitive information of the General Annexes.

  1. Financial and operational capacity and exclusion: described in Annex C of the Work Programme General Annexes

  2. Evaluation and award:

  • Award criteria, scoring and thresholds are described in Annex D of the Work Programme General Annexes

  • Submission and evaluation processes are described in Annex F of the Work Programme General Annexes and the Online Manual

  • Indicative timeline for evaluation and grant agreement: described in Annex F of the Work Programme General Annexes

  1. Legal and financial set-up of the grants: described in Annex G of the Work Programme General Annexes

Specific conditions

  1. Specific conditions: described in the [specific topic of the Work Programme]

Documents

Call documents:

Standard application form — call-specific application form is available in the Submission System

Standard application form (HE RIA, IA)

Standard application form (HE CSA)

Standard application form (HE PCP)

Standard evaluation form — will be used with the necessary adaptations

Standard evaluation form (HE RIA, IA)

Standard evaluation form (HE CSA)

Standard evaluation form (HE PCP PPI)

MGA

HE General MGA v1.0

Call-specific instructions

Template for Security & eligibility conditions in Horizon Europe

Additional documents:

HE Main Work Programme 2021–2022 – 1. General Introduction

HE Main Work Programme 2021–2022 – 6. Civil Security for Society

HE Main Work Programme 2021–2022 – 13. General Annexes

HE Programme Guide

EU Financial Regulation

Rules for Legal Entity Validation, LEAR Appointment and Financial Capacity Assessment

EU Grants AGA — Annotated Model Grant Agreement

Funding & Tenders Portal Online Manual

Funding & Tenders Portal Terms and Conditions

Funding & Tenders Portal Privacy Statement

Learn more or apply
All information about this funding has been collected from and belongs to the funding organization
20 April 2023