You are here: Home / Project / Deliverables

Deliverables

List of deliverables. Some deliverables are public and available for consultation on this web page when they will be completed. The month 1 is March 2012.

 

Del. n°Deliverable nameDue date (month)Due datePublicly availableStatus
D1.1 Management Report 8 30.10.12 No Approved
D1.2 Project Periodic Report 16 30.06.13 No Approved
D1.3 Management Report 24 28.02.14 No Approved
D1.4 Project Periodic Report 32 30.10.14 No Approved
D1.5 Management Report 40 30.06.15 No Approved
D1.6 Project Periodic Report 48 28.02.16 No Approved
D1.7 Project Final Report 48 28.02.16 No Approved
D2.1 Functional specifications 6 30.08.12 No Approved
D2.2 High-level design 7 30.09.12 No Approved
D2.3 Application interfaces (front-end API and back-end API) 10 30.12.12 No Approved
D2.4 System architecture (front-end back-end and hardware) 11 30.01.13 No Approved
D2.5 Revised application interfaces 38 30.04.15 No Approved
D2.6 Revised system architecture 39 30.05.15 No Approved
D3.1 Description of initial reference biometric systems 5 30.07.12 Yes Approved
D3.2 Description of advanced reference biometric systems 24 28.02.14 No Approved
D3.3 Description of metrics for the evaluation of biometric performance 6 30.08.12 Yes Approved
D3.4 Metrics for the evaluation of biometric performance 19 30.09.13 Yes Approved
D3.5 Advanced metrics for the evaluation of biometric performance 25 30.03.14 Yes Approved
D3.6 Description of biometric databases and protocols 9 30.11.12 Yes Approved
D3.7 Biometric databases and protocols 16 30.06.13 No Approved
D4.1 Description of vulnerabilities to direct (spoofing) attacks 9 30.11.12 No Approved
D4.2 Description of vulnerabilities to indirect attacks 6 30.08.12 No Approved
D4.3 Description of reference countermeasures to direct (spoofing) attacks 24 28.02.14 No Approved
D4.4 Description of reference countermeasures to indirect attacks 36 28.02.15 No Approved
D4.5 Description of metrics for the evaluation of vulnerabilities to direct attacks 26 30.04.14 Yes Approved
D4.6 Description of metrics for the evaluation of vulnerabilities to indirect attacks 12 28.02.13 Yes Approved
D4.7 Description of spoofing methods, toolboxes and test protocols 30 30.08.14 No Approved
D4.8 Spoofing toolbox 30 30.08.14 No Approved
D5.1 Description of privacy preservation techniques 8 30.10.12 Yes Approved
D5.2 Reference privacy preservation system 16 30.06.13 No Approved
D5.3 Description of advanced privacy preservation techniques 26 30.04.14 Yes Approved
D5.4 Advanced privacy preservation system 36 28.02.15 No Approved
D5.5 Description of metrics for the evaluation of privacy preservation 10 30.12.12 Yes Approved
D5.6 Metrics for the evaluation of privacy preservation 24 28.02.14 No Approved
D6.1 Planning of standardisation activities 12 28.02.13 No Approved
D6.2 Standard description of spoofing methods and test protocols 36 28.02.15 No Approved
D6.3 Standard description of vulnerabilities to indirect attacks 36 28.02.15 No Approved
D6.4 Interoperable reporting of evaluation results 28 30.06.14 No Approved
D6.5 Toward Common Criteria evaluations of biometric systems 48 28.02.16 Yes Approved
D7.1 Prototype of the API 15 30.05.13 No Approved
D7.2 Prototype of the platform 17 30.07.13 No Approved
D7.3 Revised prototypes (API and platform) 35 30.01.15 No Approved
D7.4 Final revised prototype 42 30.08.15 No Approved
D7.5 Documentation 44 30.10.15 Yes Approved
D7.6 Public release of the platform 46 30.12.15 Yes Approved
D8.1 Planning for dissemination activities 6 30.08.12 Yes Approved
D8.2 Intermediate dissemination activities 26 30.04.14 Yes Approved
D8.3 Final dissemination activities 46 30.12.15 Yes Approved
D8.4 Exploitation plans 6 30.08.12 No Approved
D8.5 Revised exploitation plans 30 30.08.14 No Approved
D8.6 Report on exploitation activities 46 30.12.15 No Approved
D9.1 Analysis of the current legal framework 9 30.11.12 No Approved
D9.2 Guidelines for guaranteeing privacy and data protection compliance of the biometric data 16 30.06.13 Yes Approved
D9.3 Analysis of the current practices 36 28.02.15 Yes Approved
D9.4

Guidelines for guaranteeing the Intellectual Property in BEAT

42 30.08.15 No Approved