Logo
Data Snapshot
WEF_The_Known_Traveller_Digital_Identity_Concept
auto-generated 2-Feb-2021
System Initiative on Shaping the Future of Mobility The Known Traveller Unlocking the potential of digital identity for secure and seamless travel In collaboration with Accenture January 2018 Contents 3 4 5 7 12 14 21 23 31 36 Preface Foreword Executive summary 1. Increasing pressures on security in travel 2. Methodology 3. The Known Traveller Digital Identity concept 4. Paradigm shift to a digital identity 5. Principles and core technologies 6. Building a prototype 7. Next steps: Test and scale

Keywords

potential while a seamless enables value for secure stakeholders such as technology attestations to the digital biometrics and a mobile level at every process attestations to the traveller information without the control concept from a technology

Sources: WEF

Pathway Demo and Download Data

You can download the excel file containing Categories, Goals, Measures and Actions. Please use Lunge App, to try the pathway data.
This section lists the Pathway type, Priority/ function areas, Sectors/ fields of life and People/ roles for the pathway.
Type:   Forecasts
Priority/ Function Areas:   Law & Government  People & Society
Sectors/ Fields of Life:   Economy-wide
This section lists the Categories, Goals, Measures and Actions included in the pathway.
Profiles:   this increase   the fields   a study   the security   all data   the means   a password   a profile   a variety   the sector   an countries   its traveller   all jobs7   the ledger   the foundation   the pilot   the forum   ireland group   a introduction   each transaction   the use   a pki   the stage   the choices   the initiatives   a degree   every stakeholders   the concept   a individual   the class   the interdependencies   a level   the contract   another example   state funding   the pace   the milestones   the paradigm   a identity   all information   the blockchain   this event   a approach   the cost   the overstay   the driver   which components   a interface   the sharing   all stakeholders   publicprivate partnerships   the project   a hub   the combination   this instance   the design   a second   the steps   the maintenance   a entity   this types   this management   qr code   the difference   the capabilities   a vision   each owner   the costs   a mass   the feasibility   the result   the revolution   the identifier   the adoption   a innovation   this pointers   every block   this attestations   the organization   the ideas   the authority   a initiative   the table   identifier55 application   the demonstration   its drawbacks   the industry   the algorithms   this report   the determination   this efforts   you customer   a decision   the system   a passenger   this delegates   the technology   the identities   the experience   no tracking   the biometric   a journey   a constituents   a distribution   this terminals   a overview   it value   a concept   a blockchain   the individual   the entity   a party   this technology   the order   the introduction   the identity   a transaction   a number   the value   the official   the study   the blueprint   the chain   the providers   what purposes   the exchange   a network   a claim   each country   the level   all rights   the technologies   which permissions   the valueadd   a ledger   a part   the option   the framework   this address   the characteristics   the degree   uaf architecture   e traveller   the device   the commissioner   the prototype   the owner   the palm   this redesign   the developments   this chapter   the structure   have initiative   a system   the priority   the user   the authentication   whose commitment   the traveller   this architecture   every transaction   system initiative   the government   the pointer   the number   the information   a travellers   any combination   cation validation   the approval   the rise   b authorities   the node   the absence   the interface   this person   a architecture   a principle   a traveller   every node   the party   this future   the tree   the agencies   the goal
Goals:   add process time   represent major overhead   achieve secure journey   advance constant tension   implement scalable pilot   use airport system   map traveller journey   maintain security safety   include wider effects   use public key   demonstrate reengineer ability   encourage preemptive sharing   identify need challenges   show key steps   build known traveller   demonstrate technologies potential   go inconsistent management   access identity information   deliver traveller capabilities   limit growth ttgnordiccom   develop move prototype   maintain shared ledger   integrate datasharing platform   include mandatory finger   use identity data   lose held device   include expensive nature   verify choose transaction   highlight increasing industries   transform travel sector   develop demonstrable prototype   deliver personalized experience   solve mile problem   enhance global system   manage enable identities   give optimal experience   distribute interface figure   exploit network effects   provide identity information   enable secure exchange   harness economic benefits   maximize exponential value   maintain current system   remove perceived threat   expand technical capacity   cause hard fork   need required information   support public partners   develop empower toolkit   lay detailed description   limit privacy constraints   show passport pass   play passive role   process known traveller   offer best hope   read read access   figure planning journey   make own decisions   offer transform potential   enable secure journey   provide economic development   require technology standards   check distributed ledger   phenomenon disruptive potential   enable efficient processing   provide seamless experience   equip decentralized community   authorize enter traveller   determine enter permission   contradict forgotten right   improve passenger experience   achieve systemic shift   provide request potential   riskrating access verification   enable required figure   add new atm   set asked contacts   explore business models   connect physical identity   appendix application designs   sustain supportive framework   define guiding principles   principle known concept   define contractual arrangements   have personal data   share personal information   include understand system   share following components   request structured packet   initiate authorization application   require forgotten right   achieve security privacy   understand wider implications   accommodate vast flow   make collaborative effort   provide known profile   require needs checkin   ensure research development   putt future growth   screen departure gate   overcome achieve challenges   use relying party   conduct risk assessment   seal biographical data   involve security screening   use single token   redirect resources attention   influence adapt ability   acknowledgement forum appendix   store own data   include centricity digitization   optimize known traveller   lessen management burden   create signed attestation   trigger advanced preclearance   affect traveller journey   create seamless experience   apply development methodologies   transform global approach   unlock estimated value   implement distributed ledger   prescreening navigates traveller   act predict ability   ensure secure movement   shape world forum   safeguard security privacy   expedite security process   enable secure solutions   achieve presented potential   redesign process figure   articulate intervention concept   adopt concept authorization   achieve shared vision   create receives arrival   investigate transformative use   enhance security process   monitor breakthroughs considerations   get new phone   shift known identity   enhance security systems   enrolment traveller application   increase screen ability   predict director torres   add sophisticated logic   enable voluntary sharing   fuse physical worlds   use technology capability   demonstrate use cases   enable granular structure   utilize core technologies   include reasonable range   access identity data   provide become incentive   show personal message   identify pain points   deliver process outcomes   process experience technology   cite selfsovereignidentity https   collect chain information   address complex policy   sign request party   perform electronic validation   provide efficient means   solve current challenges   shape needs ability   enter foreign country   strengthen compliance claim   collate existing standards   identityproofing physical passport   inconvenience travellers businesses   collect core elements   undertake risk assessment   consider technological decision   maintain transparency anonymity   take intrinsic values   figure authority figure   measure better use   provide future shaping   test trialled concept   enable airport process   broaden entice applications   establish known table   represent integrate information   quantify time information   justify requires investment   expedite screening processes   understand intrinsic values   give manage opportunity   adopt riskbased assessments   spoil traveller experience   address pain point   respond economic forum   execute consensus protocol   demonstrate technology barriers   address increasing pressures   build known status   enable risk assessment   use value tree   enable personalized flow   perform match quantitative   create pointer address   process large majority   provide known parameters   develop known concept   reengineer bordercrossing experience   extend benefit opportunities   reach tipping point   eliminate show need   expect identify evidence   reinvent need wheel   entice private sectors   develop profiling risk   promote recognized framework   upload own information   assess prototype feasibility   involve office interaction   risk queues bottlenecks   engage relevant stakeholders   access travel routes   enable sharing storage   receive welcoming alert   provide draft v010   articulate business models   demonstrate critical action   suggest performance indicators   carry own device   hub management systems   connect physical world   create technological environment   share identity information   use provided framework   perform claim secure   unlock facilitate ways   enhance seamless flow   address key feature   revolutionize think way   offer value potential   improve provide efficiency   detail identity concept   improve traveller experience   achieve future vision   include writes intermediary   acquire contributing attestations   manipulate technology technology   share record data   encourage necessary shift   cause pain points   present most table   require wilful collaboration   enhance models offerings   get police information   build creating prototype   observe key values   trust attestations access   utilize revolution technologies   give move opportunity   hinder secure journey   screen risk assessment   do privacy legislation   issue organization state   imply verify ability   maintain technologyagnostic approach   facilitate providing exchange   construct new framework   pilot policies processes   lay following elements   establish trustful agreements   need predict ability   prevet low travelers   supply provide interface   present major opportunity   stay rating risk   develop stronger architecture   figure traveller figure   make comparison biometrics   enable light means   use native features   enable traveller journey   use fourth technologies   build status travellers   offer connect opportunity   find found data   affect actual data   replace private key   conduct passenger checks   manage secure movement   reach critical mass   address pain points   share identify evidence   recognize valuable participation   pose massive risk   repeat needs ability   maintain persistent identifier   ensure effective use   acknowledge many contributions   provide request opportunity   shape draft document   achieve true collaboration   predict needs ability
Measures:   unique representation   various choices   use standards   state information   relevant technologies   mile problem   general score   digital technologies   decentralize ecosystem   ongoing progress   accredible control   fullscale implementation   regional agendas   sophisticate logic   accurate information   specific product   specific information   private ledgers   current positioning   high integrity   human meaning   cohesive vision   press need   unmodi history   new framework   secure endnotes   disruptive potential   luggage reclaim   physical identity   travel regulations   identity table   european supervisor   passengercentric experience   governmental institution   digital certificate   anticipate advantages   physical worlds   digital components   economic opportunities   sufficient evidence   catalytic prototype   critical mass   private control   initial assessments   inconsistent management   departure arrival   sign event   human characteristics   international organizations   regularize routes   actual information   institutional relationships   statutory requirements   potential value   private core   ned environment   compel reason   pkd validation   occasional crossborder   vary contexts   physical world   nonexhaustive time   online identities   live environment   open standards   grow turmoil   central repository   digital service   share key   customer technology   vary degrees   airport experience   physical needs   centralize manner   international policies   current challenges   complete history   reasonable range   icao members   propose frameworks   enhance security25   exponential value   detail data   due savings   original embarkation   high security   detail description   future growth   such programmes   private sectors   necessary tools   algorithm agencies   overall optimization   lowrisk travellers   riskbased lanes   seamless journey   significant change   credential number   traveller privacy   design approach   assessment preclearance   criminal activity   trust passengers   vast amounts   false acceptance   more time   secure databases   callout box   seamless access   cybersecurity considerations   biometric verification   native features   wilful collaboration   know entities   own registry   physical passport   compromise data   current ecosystem   key values   massive risk   secure table   computational power   additional metainformation   various situations   live systems   know profile   personal identity   dipl control   convenient way   same period   travel history   humanitarian aid   intend aim   seamless value   passport information   maximum throughput   private data   valuable participation   trust source   social security   arrival number   alternative mechanisms   mobile interface   pointer address   maximum capacity   identifiable information   fast transactions   centralize services   advance screening   uninterrupted growth   immediate gains   valueadded activities   long leadtime   exist laws   new developments   need checkin   private companies   actual systems   small technology   customer society   permissioned design   digital profile   privacy issues   online bits   use cases   foremost business   secure biometrics   designthinking strategies   biometric technology   realtime communication   actionable information   global approach   mobile identity   effective time   new atm   international travellers   qualitative way   expensive nature   need ability   public draft   governmental sovereignty   identity systems   structure packet   international points   undetected management   permissioned cryptography   operational set   customer trust   selfsovereign identity   empower intuitiveness   screen processes   correct time   major attack   privacy constraints   fidocertified device   privacy legislation   prototype feasibility   biometric technologies   private sector   significant changes   select steps   global scalability   new solutions   quantitative time   core benefits   emerge technologies   criminal history   own discretion   seamless flow   pain point   global standards   executive officer   performance indicators   mandatory steps   access rights   technology standards   prescreened passengers   own identity   voluntary sharing   unintentional disclosure   traveller journey   legitimate use   important principles   open dialogue   legitimate reasons   biometric identity   private rationale   mobile device   readable zone   inanimate objects   target strategies   passenger checks   secure traveller   work prototype   identitysharing approval   global movement   distress hospitality   operational ecosystem   public sector   critical action   technological development   economic impact   global stakeholders   pragmatic experience   result attestation   blockchainbased data   new systems   airport system   current system   require traveller   malicious intent   fidocertified application   consequence investment   security process   new considerations   advance biometrics   online transaction   central authority   viable option   future country   share storage   most table   key points   datum analysis   various drivers   onerous nature   more detail   indelible alternative   economic levels   crime groups   require figure   origin identity   mandatory repetition   rely party   fracture governments   true threats   new choices   great value   fourth revolution   great privacy   expedite processing   correspond key   technological environment   low travelers   aggravation table   single capture   sign attestation   enroll identity   identity concept   prior research   expect cagr   multiple stakeholders   entire team   national systems   international arrivals   recent activities   recognize format   permission structure   reclaim reclaim   choose friends   technical capacity   security features   just ability   relevant stakeholders   contractual arrangements   venue quantitative   seamless capability   secure interpol   small proof   right hands   long queues   transformative use   visatravel assessment   enhance opportunity   distinctive features   major contributor   process figure   hash metainformation   digital borders   global economy   dedicate network   match crossborder   decentralize security   travel routes   responsible stakeholders   supportive framework   status traveller   global pandemics   know traveller   passengerprovided information   technology potential   secure exchange   good use   economic forum   medical services   main steps   wcoiataicao guidelines   business models   accept standards   privatesector engagement   public consortium   numerous layers   rapid rise   next years2   core elements   personal information   positive rmation   detail principles   global prosperity   risk travelers   collaborative effort   secure value   rapid adoption   secure driver   random strings   internal holdings   distribute ledger   public guidelines   great efficiency   contextual implications   artificial intelligence   vet processes   minimal screening   relate requirements   nearby residents   traditional process   important objectives   clear process   development methodologies   advance programmes   value realization   key feature   electronic passport   senior vicepresident   expedite lane   certificate chain   sustainable models   distribute database   security threats   datum elements   estimate passengers   capable prototype   last mile   senior facilitation   police information   different scenarios   coordinate signatures   digital transformation   current identity   policy processes   past years   know elements   rise concerns   github com   more information   new thinking   biometric data   international guidelines   sufficient proportionality   expedite clearance   specific vendor   necessary shift   many examples   estimate value   security system   full independence   travel offenders   public affairs   draft document   acceptable infrastructure   exist means   electrocardiogram show   seamless processing   undesirable censorship   twostage process   new cultures   different groups   public keys   concept authorization   digitalize society   watchlist checks   assessment risk   selective environment   social infrastructure   digital world   senior strategy   travellercentred experience   next steps   technological advancements   work meeting   public safety35   largescale partners   similar information   age ease   limit capacity   economic benefits   emerge modalities   conceptual technology   global uniqueness   digital feature   security processes   centralize databases   hard fork   global mobility   intensify screening   private office   resourceintensive approach   share ledger   global affairs   facial finger   scalable pilot   exist frameworks   authentication methods   border processing   gdpr regulation   intervention concept   core principles   trustbased relationships   behavioural biometrics   process steps   global agendas   4th ministers   large majority   distribute authority   identity claims   traveller identities   digital identity50   identity information   technologyagnostic approach   behavioural aspects   increase requirements   additional point   network effects   know concept   key element   record data   public ledger   private entities   seamless processes   pigmented portion   behavioural change   require score   blockchainbased systems   know identity   limit space   nonexhaustive overview   qualitative ability   identity figure   official level   general types   advance checks   facial biometric   delicate balance   personalize flow   individual management   limit ability   senior manager   technological concepts   collaborative relationships   traveller profile   cial privatekey   new models   streamline frictionfree   high costs   secure methodology   public organizations   more concerns   various points   automate technologies   private key   cybersecurity privacy   real value   big data   core technologies   mobility future   key indicators   own data   component information   assess level   service adoption   right individuals   key biometrics   exist governments   next step   short term   increase risk   inclusive standards   additional pilots   office interaction   good management   centricity digitization   optional proportionality   major strides   identity capture   board passengers   certain components   distinct concepts   everyday applications   consensus protocol   correspond metrics   own decisions   certain indicators   technological choices   private values   match cost   additional figure   broad standards   authorizedtoknow basis   global connectivity17   granular control   wellknown location   upfront entities   single identity   international organization   key store   ongoing demands   granular structure   full travelsecurity   distribute technology   know status   good solution   automate scanner   biometric authentication   security numbers   blockchain pointers   datum blocks   alternative ways   transparent minimum   specific ease   specific cases   key cryptography   central administrator   biometricsenabled identities   trust information   legacy systems   effective use   expedite process   second phase   persistent persistence   third parties   physical space   value potential   tip point   come decades   crossborder movement   mandatory finger   passenger experience   social impact   datum model   additional locations   advance options   necessary relationships   numerous companies   digital signatures   governmentsupported minimum   continuous feedback   main drivers   trustful cooperation   high levels   own information   central database   personal data   continue effort   personal challenge   potential ease   general movement   security risk   executive committee   know figure   private stakeholders   exist standards   global development   most travellers   multiple applications   individualize assessments   technological intervention   proxy contract   new ways   seamless solutions   correct match   level drivers   secure relationships   governmental agencies   large sector   first step   small set   secure journey   global industry   traveller traveller   follow trip   conventional identity   authorization application   fitforpurpose concept   personal security   application designs   traveller application   demonstrable prototype   tremendous potential   great number   blockchain cryptography   active partnership   several points   share information   share data   various stakeholders   airline check   subsequent actions   endtoend process   advance agencies   many components   significant improvements   significant challenges   travel solutions   real time   true collaboration   desire process   write permissions   promise intervention   travellercentric design   fast scale   vet outcomes   verify information   learn machine   legitimate travellers   complex policies   expect growth   guide principles   local marine   select information   advance technologies   iterative methodologies   future biometrics   intervention steps   single point   certain permissions   intermediary transactions   new regulation   positive declarations   token generator   global source   geopolitical security   public partners   more resources   recovery contacts   emotional checkin   constant tension   secure movement   governmental entities   online framework   mobile authority   travel documents   identityrelated questions   critical sharing   transport services   great return   seamless challenges   otd number   diverse partners   much variety   high probability   control distribution   broad guidelines   select data   technology pointers   local authentication   private keys   international interpol   single technology   persistent identifier   behavioural modality   next decades   akin identifier   identity data   passenger facilitation   reality glasses   secure pick   future iterations   datum integrity   relate value   valuable example   board pass   broad industry   prescreened travellers   efficient travel   secure storage   digital traveller   governmental players   use case   decentralize dpki   legitimate holder   granular level   new terminals   personalize recommendations   security systems   new streams   individual identity   own devices   political business   own authority   vast flow   typical alliances   continuous rise   seamless traveller   far details   specific serviceenter   multiple countries   biometric identification   security architecture   time information   legacy system   optimal experience   more travellers   distinguish consortium   ledger rationale   decentralize cuts   low risk   unique identifiers   biometric information   trust status   value tree   available technologies   trustful agreements   give time   significant potential   confine pilot   viable models   biometric biographic   technology capability   only space   follow components   technological resources   necessary actions   increase screening   pkd members   serious doubt   verification reclaim   detail insights   know capabilities   geopolitical tensions   full transparency   physiological aspects   border officials   annual meeting   nonexhaustive example   biometric finger   current mechanisms   travel authorization   advance risk   good samples   major opportunity   perceive threat   public safety   great scalability   special permission   credibility figure   select entities   historical travel   equifax breach   permissionbased permission   public key   paradigm shift   innovative concept   public sectors   trust entity   datasharing platform   additional buyin   key dpki   secure travel   chain information   know parameters   customer experience   centralize authorities   single token   extend history   optional information   management systems   industry partners   good practices   relevant stability   live pilot   actual integration   necessary elements   secure experience   high points   technology cooperation   critical component   high power   previous block   technological solutions   average rate   advance preclearance   expedite traveller   individual gate   traveller platform   future vision   cooperation outcomes   traveller experience   mobile devices   operational efficiency   digital chain   peertopeer transactions   inevitable rise   behavioural detection   maximum data   datum parameters   foreign destination   establish identity   seamless travel   register programmes   right time   status travellers   security technology   potential travellers   international airports   chief officer   transactional throughput   good assessment   admissibility permission   digital records   pain points   international experience   complex patterns   good hope   increase traffic18   pertinent questions   implement partners   sovereign processes   rate risk   european airports   centralize storage   know table   economic costs   qualitative level   identity prescreening   new concerns   intrinsic values   important barriers   central concern   more participants   primary residence   increase opportunity   private entity   bordercrossing experience   increase pressures   human expenses   replicate data   access access   global trends   risk assessment   personalize services   official document   efficient means   protect system   far expansion   limit potential   advance analytics   economic development   full advantage   mobile interfaces   safe future   environment accessibility   individual risk   universal framework   secure recommendations   global interoperability   hardwaresoftware cost   additional data   cognizant authority   diverse stakeholders   act office   estonian government   semantic data   process components   secure solutions   border agent   future travel   private store   far information   public design   particular product   regular learning   secure breakdown   specific process   transparent alternative   follow elements   institutional barriers   low value   vast differences   wide audience   know system   specific time   singledigital token   far scrutiny   more attestations   seamless level   external device   rough estimate   centric experience   prevetting assessment   otd date   secure forecasts   holistic visibiltiy   actual data   direct access   user digitization   previous assessment   preemptive sharing   perspective figure   valuable contributions   public parties   international trade   many contributions   nondiscriminated ability   efficient processing   permissionbased ledger   know lane   enhance analytics   passengercontrolled identities   interface figure   rapid ideation   executive summary   digital information   frictionfree process   appropriate evolution   distribute architectures   recent interactions   liberal approach   right incentives   most aspects   validation cost   key steps   general regulation   independent existence   individual airports   onward destination   traveller status   daily lives   red means   personal message   fast identity   specific area   broad range   far attention   potential constraints   identity community   revolution technologies   management agency   qualitative information   unsustainable levels   passenger screening   technological decision   exist initiatives   passenger manifests   large numbers   generic syntax   electronic validation   fast technology   third party   recognize framework   predictive analytics   service offerings   multiple workshops   granular information   cryptographic algorithm   travellercentric approach   share vision   current understanding   high d   custom questions   additional information   sustain growth   process results   detail insight   distribute design   overall score   advance storage   price finance   different ministries   multiple components   digital identities   major overhead   match secure   emotional needs   smart watch   comparison biometrics   effective information   electronic passports   datum storage   assessment authenticity   identity capabilities   additional elements   come year   border security   experience technology   pilot studies   ineffective time   digital authentication   great potential   specific flight   physical capacity   digital signature   external entities   identity profile   active partners   primary methods   great risk   financial services   vascular signature   relate risks   broad compatibility   base exchange   low rates   numerous times   possible transparency   datum exchange   several traveller   biometric systems   corporate strategy   right place   foreign country   next decade   secure environment   process time   limit infrastructure   white sclera   systemic shift   active contributors   mobile phone   international standards   improve security   senior supplier   management burden   profile credibility   new technologies   specific lane   seamless experience   download application   second legislation   single identifier   mobile application   legitimate travelers   biographical data   passive role   fourth technologies   technology barriers   potential range   manage director   human memorability   policy framework   consistent identity   positive effect   strong architecture   public dpki   require privacy   cryptographic expression   conceptual journey   discussion document   organically innovation   advance assessment   complex policy   read access   more locations   traveller parameters   individual s   available space   security risks   individualize screening   cryptographic systems   security screening   technological breakthroughs   general considerations   individual traveller   illegal movement8   correspond principles   distribute data   require information   personal devices   increase security   identifier model   otd names   own device   security challenges   new phone   secure figure   decentralize community   right authority   global impact   require level   dedicate team   facial recognition   several mechanisms   relate data   digital identity   measurement example   common screening   industrial revolution   personalize experience   mock sources   many individuals   advance answers   biometric trait   impartial moderator   individual security   smart contracts   effective security   repetitive steps   global system   wide implications   robust engagement   international travel   modern systems   fourth level   quantitative number   valueadded time   global architecture   digital data   datum privacy   fidocertified server   own implications   wide effects   riskbased assessments
Actions:   verify transaction   exhibit degrees   enable screening   predict torres   include finger   include ability   shift identity   use analysts   represent viewpoint   maintain identifier   share expertise   provide parameters   construct framework   push data   add atm   issue epassports   launch pilots   provide them   consolidate attestations   facilitate passage   enter nation   seek feedback   process traveller   missis time   establish agreements   address feature   hinder journey   include effects   know piece   promote isolationism   adapt ability   produce strings   missis costs   explore testing   respond forum   facilitate travel   perform cost   show sign   determine those   ensure levels   affiliate security   use application   create arrival   facilitate journey   share components   inconvenience governments   promote travel   undertake assessment   require compatibility   prevet travelers   preserve right   acknowledge contributions   maintain anonymity   see travellers   drive differences   http wwwriaeeenpublickeyinfrastructurehtml   respect sovereignty   enable travellers   advance tension   show landscape   reveal impediments   create environment   perform crossborder   reach 29   validate claims   measure realization   show benefits   manage information   improve experience   optimize traveller   raise concerns   achieve privacy   share data   convergence 38   optimize processes   increase ability   require invitation   use epassports   create profile   require interoperability   secure travel   determine one   demonstrate potential   incorporate technologies   present table   grasp president   equal billion   achieve journey   stay risk   book arrival   exploit benefits   help authentication   sell services   require governments   increase threats   asses valuepotential   encourage adherence   justify investment   improve minimum   book traveller   increase relationships   manage data   start proof   facilitate implementation   compromise technology   reach billion   build traveller   allow shift   travel currency   add attestations   shape process   use type   pilot processes   access data   cite https   connect identity   acquire resistance   lay elements   run it   save time   speed processing   act ability   asses information   increase infrastructure   engage stakeholders   address requirements   establish practices   use data   share pass   take place   improve efficiency   highlight industries   go management   use features   improve concept   provide breakdown   safeguard privacy   require control   unlock changes   prescreening traveller   develop analysis   devote resources   require checkin   maximize value   ensure traceability   increase challenge   facilitate screening   trigger preclearance   show pass   improve credibility   provide experience   make security   broaden horizons   bank opportunities   uphold principle   enable figure   suffer hacking   represent details   figure roadmap   develop risk   support jobs   cause points   address questions   consider facilitation   push proof   incorporate ability   shift security   enable efforts   redirect attention   reach point   enhance security   observe values   shape future   cost finance   invite experimentation   provide development   request deletion   demonstrate axiom   afford stakeholders   identify challenges   demonstrate barriers   influence regulations   determine permission   store data   enable achievement   integrate platform   trade exploration   link blocks   manage usage   empower decisionmakers   provide officials   gain access   provide shaping   affect data   outline set   demonstrate cases   respond value   seal data   permissioned rationale   give access   build prototype   generate keys   riskmodelling practices   share evidence   operationalize drivers   advance adherence   consider use   comprise data   require standards   offer potential   investigate use   increase security   validate identity   issue state   reengineer experience   provide guidance   lose documents   accommodate flow   enable 41   offer hope   maintain approach   improve safety   authorize traveller   generate identifiers   check signature   support development   prove identity   collect sample   use agencies   provide consent   download application   direct entity   selfselecting sharing   understand activities   experience reward   demonstrate etc   manage identities   maximize transformation   provide proof   expand pool   read access   cost elsevier   trust engagement   explore solutions   unlock ways   impact demonstration   support cooperation   repeat ability   include breach   store information   reinvent wheel   encourage sharing   protect safety   reach mass   involve interaction   increase travellers   understand implications   include form   add logic   have contract   involve mechanisms   use key   retain agility   include intermediary   provide entities   measure drivers   face features   profile figure   validate identities   use companies   redesign figure   expand capacity   determine iata   map socialize   travel authenticity   screen passengers   process 22   enable privacy   establish table   appendix designs   get phone   process decrease   permissioned cuts   provide opportunities   trust identity   enable scaling   request attestations   know something   join network   implement ledger   undertake types   deny rights   provide claim   receive answers   support processes   create buyin   understand values   shape ability   associate identifier   receive this   maintain privacy   enable countries   use it   verify identity   enable journey   figure overview   achieve potential   give experience   take lead   enable individual   ensure tests   vet passengers   distribute figure   expect evidence   cover number   maintain list   lay overview   develop toolkit   scale recommendations   evaluate attestations   quantify value   provide it   manage movement   use framework   produce improvements   screen travellers   use tree   facilitate exchange   affect customers   view travellers   require changes   provide applications   recommend practices   require trust   move project   take it   identify citizens   receive instructions   enable it   sign party   jeopardize progress   download members   tighten belts   reserve part   entrust systems   cost 2015   perform validation   create identity   further ability   improve assessment   join restrictions   make effort   interact interface   contain deletion   redesign process   enable process   trust access   upload information   enable conceptualization   check ledger   validate manifests   pilot intervention   access country   transmit information   create le   receive information   govern use   lessen burden   spoil experience   consider approach   organize groups   describe values   figure case   seek solutions   enable value   use validation   identify threats   use capability   own systems   identityproofing passport   hold records   overcome issues   allow entities   enable acceptance   meet demand   join security   unlock value   see box   expedite process   shape forum   demonstrate commitment   deepen engagement   address policy   require collaboration   confirm identity   identify subject   validate prescreening   follow process   accelerate scalability   process shift   identify themselves   enable means   include system   create insights   cause figure   achieve uniqueness   raise concept   increase growth   inconvenience businesses   process majority   disrupt landscape   riskrating verification   expose credential   predict risks   wait accessibility   share acts   ensure integrity   maintain safety   acquire attestations   unlock solutions   enable solutions   affect visualization   remove emergence   detail concept   entice sectors   demonstrate shift   utilize technologies   contribute trillion   promise value   enable exchange   share 15   suggest indicators   provide platform   reach capacity   encourage parties   fuse worlds   meet approval   encourage participants   reach arrivals   validate integrity   use identities   enable sharing   augment glasses   take values   give visibiltiy   prevent movement8   introduce process   ensure evolution   need information   indicate value   include range   build status   receive proof   need attention   harness benefits   reinforce rationale   bring concept   develop prototype   enable ease   change aspects   lay 2   access routes   make decisions   access service   distribute pointers   offer opportunity   supply interface   carry identity   test proof   follow identity   maximize autonomy   validate dif   engage business   design systems   manipulate technology   screen gate   cross borders   screen assessment   demonstrate ability   deliver capabilities   facilitate movement   provide journey   provide means   use recognition   deliver experience   hub systems   enhance flow   need ability   use tables   fit principles   enrolment application   assess fitness   provide incentive   enable assessment   verify contents   do what   enlist partners   measure value   enable storage   scale concept   improve state   access history   include biographic   confront risk   address which   riskbased screening   present opportunities   include nature   give opportunity   articulate models   find data   approve gdpr   approach counter   maintain standards   connect systems   contradict right   improve security   lose device   influence ability   answer questions   disrupt evaluation   test concept   initiate application   monitor considerations   indicate ability   enable processing   limit constraints   improve travel   enable improvements   provide information   map journey   integrate that   recover identity   verify chain   know more   cause fork   include steps   share identity   enable structure   apply strategies   require arrival   validate it   control system   exploit adoption   shape document   define principles   overstay visa   assert identity   review progress   sustain framework   reduce bottlenecks   address point   involve information   adapt them   surpass humans   achieve vision   receive requests   build trust   rethink ecosystems   figure figure   encourage shift   increase number   achieve change   thank minister   revolutionize way   recognize value   authorize entities   achieve travel   ensure movement   affect journey   change prototype   see activities   have knowledge   conduct assessment   enhance systems   monitor developments   address points   collect information   take advantage   move this   prescreen travellers   grasp it   create address   share amounts   maintain integrity   provide identity   house numbers   make biometrics   use system   assess feasibility   improve determination   improve accuracy   implement pilot   show steps   separate aspects   destroy chain   advance pretravel   prompt rise   build bridges   pose questions   create anxiety   make claims   collate standards   add time   provide pointer   transform sector   contain pointers   present opportunity   secure information   enable entities   have data   provide v010   make strides   demonstrate action   use token   provide insight   expedite security   unlock growth   increase tally   access quantitative   perform match   exist use   reach levels   request information   connect prototype   request packet   execute protocol   question assumptions   sustain jobs   need interdependencies   process assessment   adapt infrastructure   acknowledgement appendix   include detection   enter country   send keys   use technologies   share it   ensure attainment   provide direction   use party   influence intuitiveness   predict ability   share information   receive visa   take precedence   give consent   adapt stakeholders   access information   try technologies   develop framework   enable trust   enable traveller   lay description   broaden applications   solve challenges   replace key   support partners   handle information   strike balance   enable individuals   view information   quantify information   give permission   welcome them   redesign overview   validate capture   putt growth   adopt authorization   add eg   use biometrics   generate stakeholders   bring interactions   wait nonvalue   identify solution   expedite overview   solve privacy   enable 33   convergence b   consider decision   contain fragments   illustrate potential   develop architecture   illustrate ability   ensure use   show traveller   pose risk   affect people   solve problem   equip community   agree standards   connect physical   get information   issue authorities   alert 31   measure use   limit pressures   perform quantitative   require check   reclaim control   initiate studies   require agreement   perform secure   maintain ledger   contain list   identify points   allow access   consider authenticity   enable decisionmaking   apply methodologies   drive scalability   maintain trust   predict 19   expand adoption   require biographic   establish environment   represent overhead   demonstrate process   drive costs   represent information   enhance system   achieve collaboration   recognize participation   ensure development   unlock change   use blockchains   facilitate trade   limit ttgnordiccom   achieve shift   boost cybersecurity   include act   do legislation   interact biometrics   confront pressures   use communication   imply ability   separate pupil   reclaim accenture   develop concept   improve safety35   increase requirements   facilitate borders   use s   show passport   design concept   verify information   formulate future   share key   access traveller   require right   convene stakeholders   provide profile   facilitation organization   provide overview   focus efforts   provide potential   eliminate need   take travellers   provide services   enable flow   connect world   protect privacy   direct traveller   enable analytics   contain data   make use   download that   entice travellers   include digitization   connect it   request l1   require passport   share biometrics   expect resistance   unlock potential   extend opportunities   articulate concept   show potential   cite bitsonblocks   enable governments   analyse patterns   promote framework   trust ability   provide access   conduct checks   deliver outcomes   enhance offerings   adopt assessments   set contacts   enable recognition   create prototype   lose control   build travellers   scan face   experience period   maintain exploit   identify correlations   strengthen claim   mean what   overcome challenges   make processing   score cooperation   require costs   govern data   sign attestation   take developments   receive alert   review interactions   improve figure   screen value   play role   exploit effects   figure journey   demonstrate capabilities   disclose information   enable transactions   biometricbased learning   recognize patterns   make authentication   gain momentum   leave country   maintain mapping   obtain invitation   transform lives   explore models   provide that   present documents   process technology   uphold standards   balance inclusion   risk bottlenecks   validate attestations   verify identities   create experience   use atm   create attestation   enter agency   contain hash   provide opportunity   expedite processes   principle concept   maintain system   enhance process   remove threat   authenticate identities   involve screening   achieve challenges   access services   total billion   promote adoption   show message   phenomenon potential   collect elements   transform approach   have control   break chain   carry device   define arrangements   show sections   test suitability   provide authorities   drive economies   permit scalability   define concept   ensure security   transform way   address pressures   release power
This section lists the details about pathway-specific attributes.