Enhanced security of, and combating the frauds on, identity management and identity and travel documents
European Comission
ExpectedOutcome :
Projects are expected to contribute to some or all of the following expected outcomes:
- Improved capabilities of border management and law enforcement practitioners to identify citizens and the use of identity and travel documents and credentials in the context of border and police checks, for a better, more reliable and more secure experience for citizens and security practitioners, including in connection to optimised e-Government settings;
- Improved capabilities of border management and law enforcement practitioners to defend identity and document/credential management against attacks to their security and attempts to falsify biometrics, identity thefts and online frauds;
- Improved knowledge for European approaches to future identity management systems and document and credential security, building on and integrating with existing tools and respecting the privacy of European citizens. Scope :
Research will build capabilities to prevent, detect and respond to challenges to the security and reliability of identity management and identity and travel documents, in the context of border and police checks. Research should also address solutions for integrated secure identity creation, protection and management in the context of future increasingly “digitalised” borders; and contribute to improve the performance and the comfort of the border and police checks experience for both security authorities’ operators and the users.
New challenges for secure identity management and secure identity and travel documents could emerge in the coming years and decades. Solutions will hence have to enable new capabilities while at the same time ensuring both privacy and security of identity and identity documents. Future electronic identification systems will have to safeguard key parameters of identity management, such as security, efficiency, user friendliness, trust, privacy and protection of data. Electronic identifications (eIDs) can be carried on mobile devices, to respond to security requirements, ease of use and range of applications. In addition, it is necessary to ensure the reliability and link among the information contained on identity supports and their owner, to avoid the possibility of having authentic documents with false information. Research can focus on security and privacy enhancing features in new eID ecosystems and/or on innovative identity lifecycle processes.
Areas of research could include exploring solutions against morphing attacks to the security of identity and travel documents, including robust algorithms to detect morphing, as well as against other possible future attempts and techniques to falsify biometrics; methods to validate and verify identity at borders or police checks; or advanced and privacy-enhanced technologies for the security of identity, breeder and travel documents. Research should explore novel solutions for document verification and fraud detection, including Manipulation Attack Detection (MAD) and Presentation Attack Detection (PAD) at border checks.
The proposed solutions should act not only at technological level, but should also propose new approaches to the traditional central authority architecture. The solutions should take into account the management of sensitive information and include an assessment of legal and ethical issues.
Solutions have the potential to contribute to future evolutions of European identity strategies based on eIDAS (Electronic Identification, Authentication and Trust Services), and could explore synergies with tools offered by the eIDAS Regulation.
Research proposals should consider, build on if appropriate and not duplicate previous research, including but not limiting to research by other Framework Programmes projects such as those on capabilities for document security, as well as EU studies on potential applications of technologies to the improvement of border management capabilities.
Specific Topic Conditions :
Activities are expected to achieve TRL 7-8 by the end of the project – see General Annex B.
Cross-cutting Priorities :
Digital Agenda Artificial Intelligence
General conditions
- Admissibility conditions: described in Annex A and Annex E of the Horizon Europe Work Programme General Annexes
Proposal page limits and layout: described in Part B of the Application Form available in the Submission System
- Eligible countries: described in Annex B of the Work Programme General Annexes
A number of non-EU/non-Associated Countries that are not automatically eligible for funding have made specific provisions for making funding available for their participants in Horizon Europe projects. See the information in the Horizon Europe Programme Guide .
3 . Other eligibility conditions: described in Annex B of the Work Programme General Annexes
The following additional eligibility conditions apply:
This topic requires the active involvement , as beneficiaries, of at least 2 Border or Coast Guard Authorities and 2 Police Authorities [[In the context of this Destination, ‘Police Authorities’ means public authorities explicitly designated by national law, or other entities legally mandated by the competent national authority, for the prevention, detection and/or investigation of terrorist offences or other criminal offences, specifically excluding police academies, forensic institutes, training facilities as well as border and customs authorities.]], from at least 3 different EU Member States or Associated countries. For these participants, applicants must fill in the table “Eligibility information about practitioners” in the application form with all the requested information, following the template provided in the submission IT tool.
Some activities, resulting from this topic, may involve using classified background and/or producing of security sensitive results (EUCI and SEN). Please refer to the related provisions in section B Security — EU classified and sensitive information of the General Annexes.
Financial and operational capacity and exclusion: described in Annex C of the Work Programme General Annexes
Evaluation and award:
Award criteria, scoring and thresholds are described in Annex D of the Work Programme General Annexes
Submission and evaluation processes are described in Annex F of the Work Programme General Annexes and the Online Manual
Indicative timeline for evaluation and grant agreement: described in Annex F of the Work Programme General Annexes
- Legal and financial set-up of the grants: described in Annex G of the Work Programme General Annexes
Specific conditions
- Specific conditions: described in the [specific topic of the Work Programme]
Documents
Call documents:
Standard application form — call-specific application form is available in the Submission System
Standard application form (HE RIA, IA)
Standard application form (HE CSA)
Standard application form (HE PCP)
Standard evaluation form — will be used with the necessary adaptations
Standard evaluation form (HE RIA, IA)
Standard evaluation form (HE CSA)
Standard evaluation form (HE PCP PPI)
MGA
Call-specific instructions
Template for Security & eligibility conditions in Horizon Europe
Additional documents:
HE Main Work Programme 2021–2022 – 1. General Introduction
HE Main Work Programme 2021–2022 – 6. Civil Security for Society
HE Main Work Programme 2021–2022 – 13. General Annexes
Rules for Legal Entity Validation, LEAR Appointment and Financial Capacity Assessment
EU Grants AGA — Annotated Model Grant Agreement
Funding & Tenders Portal Online Manual