radio frequency identification boarding pass and ... · radio frequency identification boarding...

Post on 16-Feb-2020

19 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Radio Frequency identification Radio Frequency identification boarding pass and passengers’ Rightsboarding pass and passengers’ Rights

presented by SAUTY Aurélien aurelien_sauty@yahoo.com

juridical training, IFURTA, second year of professional Master specialized in air transport.

Problem statementProblem statement

An original approach combining advanced tracking technology and juridical considerations

Based on the fact that Europe is an integrated area with uniform rules applicable to and by all member

Technology cannot be deployed when civil liberty are at stake there is a need for juridical study

Justification and interest of RFID Justification and interest of RFID in civil aviation in civil aviation

Our juridical overview led us to undertake several point of interest justifying the potential recourse to such technology

Airport and airline operating constraintsEnhanced security procedures Passengers economical rightsA non optimized system with regard to delays, loss of luggage and capacity deficiency

RFID could address these challenges

Presentation of RFID technologiesPresentation of RFID technologies

Advanced automatic identification technology

Passive - broadcast identification on interrogation only

Contact less – interrogation over short distance(1 to 2 metres) allowing smart tracking

Highly safe and secure system

Foreseen usesForeseen uses

This technology could be used to solve operating difficulties due to passengers and to their luggage

To do so RFID systems are embedded in:

Boarding pass, to locate passengers in security area until boarding gate

baggage tags, to allow a permanent tracking ofpassengers’ property until aircraft hold

AC

Scheme of an airport using RFIDand different areas composing the security area

Security check

BOARDING

GATERESTAURANTS

SHOPS ENTERTAINEMENT

Security Area

Check In

Public area

LOUNGE

SERVICE

Activation of the chipEntrance to the security area.

Specific area where a RFID would be placedNeutralisation of the chip

R

R

R

R

R

R

R

R

R RFID Reader

Tracking feed back within the security area

R 1 R 2 R 3

Passenger 1

Passenger 2Passenger 2

Passenger 3

Difficulties linked with RFID implementationDifficulties linked with RFID implementation

The characteristics and use of RFID are threefold:

RFID allows profiling

RFID allows tracking

RFID allows action

These possibilities, whether legitimate or notstresses the need of a juridical framework withregard to certain Rights such as privacy

Juridical principles allowing the use of this technology Juridical principles allowing the use of this technology

Juridical qualifications

An RFID tag containing a unique identification number and, referring to personal data located in the host system

A specific data subject known as the passenger

An identified processor known as the airline. Some other identified actors that could benefit from the RFID tags, identified as the airport operator and handling companies

Information collecting and broadcasting for security and operational purposes

Juridical principles allowing the use of this technologyJuridical principles allowing the use of this technology

Application of the European Directive 95/46 general principles:

Use limitation principle : data must only serve the purposes for which they were collected. It excludes commercial profiling and uses

Data minimization : data shall be limited to the most relevant one.We consider as relevant information the name of passenger, the flight number and name of the airline

Conservation principles : data are kept during a reasonable period

Information of the data subject : information concerning the existence of the system, identification of readers & delimitation of “readable areas”

Legal ground of the system based on contract application

Juridical principles allowing the use of this technologyJuridical principles allowing the use of this technology

Implementation of specific requirements

Disable functions : The boarding pass is disabled while boarding and the baggage tag is destroyed by the passenger after claiming his luggage. Information shall be provided to give him the possibility to render this chip inoperative

Protection of broadcasted content : implementation of Privacy Enhancement Technology (PET)

top related