Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.

Deployment of automated face comparison

This algorithm supports BRP employees in preventing "look-alike fraud" by comparing the face of the person at the counter with the image in the scanned identity document.

Last change on 3rd of December 2024, at 7:30 (CET) | Publication Standard 1.0
Publication category
Impactful algorithms
Impact assessment
Field not filled in.
Status
In use

General information

Theme

Field not filled in.

Begin date

2013-07

Contact information

gemeente@gennep.nl

Responsible use

Goal and impact


The purpose of this algorithm is to verify the identity of persons registering in the BRP. It compares the face of the person at the counter with the image in the scanned identity document and indicates with what certainty it is the same person. This supports the BRP employee in establishing identity and helps prevent "look-alike fraud". The "4-eye principle" is used here.


The impact is that it increases the reliability of the BRP registration process and supports the BRP employee in making identity determination decisions.

Considerations

The deployment of this algorithm helps the BRP employee establish the identity of the citizen at the counter. It increases the reliability of the process and reduces the risk of identity fraud. At the same time, privacy implications and the role of human decision-making in the process have been carefully considered.

Human intervention

There is always human intervention. The BRP employee decides whether the facial scan is used and what is done with the result. The employee is ultimately responsible for the decision on identity determination and possible rejection of registration

Risk management

  • The facial image is recorded in the system only during the identity determination process and is visible only to BRP employees. This reduces the risk of data leakage or manipulation.
  • System performance is regularly evaluated to ensure accuracy.
  • Strict access controls and security measures have been implemented to prevent unauthorised access to the system.
  • Employees are trained on how to use the system and recognise potential errors or limitations.

Legal basis

  • BRP Act art. 2.67 4th paragraph: Legal obligation to establish proper identity
  • BRP Decree art.35
  • UAVG art. 29: Admissibility of biometrics for authentication

Operations

Data


The system uses:

  • Face scan of the person at the counter
  • Scanned image from the identity document


Technical design

The system uses deep learning and advanced facial recognition APIs. Technical components include:

  • ID scanner
  • A4 scanner
  • Scan server
  • Small monitor
  • Face scanner

The process is as follows:

1. The identity document is scanned.

2. A face scan is made of the person at the counter.

3. The algorithm compares the facial scan with the image from the identity document.

4. The result of the comparison is displayed on the monitor.

5. The BRP employee evaluates the result and makes a decision.


Only the result of the scan ('The faces are the same' or 'The faces are not the same') is logged in the BRP system.

External provider

ORIBI-ID solutions ( Link to external pagehttps://oribi.nl/ )

Similar algorithm descriptions

  • This algorithm supports BRP employees in preventing "look-alike fraud" by comparing the face of the person at the counter with the image in the scanned identity document.

    Last change on 14th of January 2025, at 10:43 (CET) | Publication Standard 1.0
    Publication category
    Impactful algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • This algorithm supports RNI staff in preventing "look-alike fraud" by comparing the face of the person at the counter with the image in the scanned identity document.

    Last change on 1st of November 2024, at 16:51 (CET) | Publication Standard 1.0
    Publication category
    Impactful algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • The algorithm identifies personal data and pre-entered words in documents. An employee must go through the document and check whether the alert is justified and approve or reject it. An employee can add further markings himself. After approval by the employee, all approved alerts and markings are blacklisted.

    Last change on 14th of October 2024, at 10:02 (CET) | Publication Standard 1.0
    Publication category
    Other algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • Automated face comparison

    Last change on 20th of June 2024, at 9:43 (CET) | Publication Standard 1.0
    Publication category
    Impactful algorithms
    Impact assessment
    Field not filled in.
    Status
    In use
  • Automated facial comparison for first registration in the Basic Registry of Persons (BRP), resettlement applications and naturalisation applications for persons over 18 years old. This algorithm helps the registrant prevent "look-alike fraud". Sourced from the Rijksdienst voor Identiteitsgegevens (RvIG).

    Last change on 20th of August 2024, at 7:18 (CET) | Publication Standard 1.0
    Publication category
    Impactful algorithms
    Impact assessment
    Field not filled in.
    Status
    In use