THE ID SHIELD SOLUTION FOR THE TRAVEL DOCUMENTS CONTROL Version 4.1
|
|
|
- Kory Rose
- 10 years ago
- Views:
Transcription
1 2015 THE ID SHIELD SOLUTION FOR THE TRAVEL DOCUMENTS CONTROL Version 4.1 ID SHIELD Hôtel d entreprises Albi-Innoprod 8 avenue Pierre-Gilles de Gennes ALBI Contact : Raphaël ROCHER [email protected] +33(0)
2 Part 1 : Hardware The proposed equipment includes : - 1 PC laptop semi-rugged Panasonic model CF 54 MK2 based on an I 5 processor, 8 Gb of RAM and 400 Gb of space on the hard disk. - 1 ARH documents scanner 960 dpi (Made in Hungary). This resolution allows to observe perfectly the IPI security (Invisible Personal Information). Peripheral devices : - 1 microscope-camera (2 Millions pixels, magnifier : x 200). - 1 camera and his support for the facial recognition. - 1 fingerprint reader for the FP recognition. - 1 mouse - 1 4G key for the telecommunications through Internet (SIM Card not supplied). WIFI Access is also possible. The Cognitec software licence can be provided although no camera is used. Just to better observe the visage on the photos. Cognitec is the world leader of the facial recognition. Solidity The first required feature is the solidity. The computer can fall down from 76 cm without being damaged. ID SHIELD has based its software development on the ARH Scanner. This equipment is extremely solid. We do not have noticed any scanner breakdown since 3 years in the suitcases installed in Western Africa and South America. Autonomy The equipment can work connected on electricity but also with Lithium Batteries. In this configuration, it has a real autonomy of 8 hours. 2 batteries are usually provided. The laptop has an autonomy of 8 hours. The new model of Panasonic laptop (CF 54) can have in option a second 1
3 battery so that more than 10 hours of autonomy are possible. Consequently, we can control the passengers at places without electricity and also on the gateway for passengers in transit. Service continuity For Service continuity reasons and considering the experience we have since many years, we add to the basic equipment : - 1 additional loader for the lithium batteries (total : 2 loaders), - 1 additional battery (total 3 batteries). The complete equipment is integrated in a suitcase with foam. This foam is specifically cut on measure. 2 wheels help the transfer of the equipment. The weight of the suitcase is roughly 12 kg. The micro-computer and the lithium batteries must be loaded at the end of the control during the night. The data must be downloaded on the external hard disk 2 Tb which is also supplied. Part 2 : The ID SHIELD Control Program ID SHIELD has developed a program to control the following documents : - Passports ( except the documents without MRZ track), - European Residence permits, - European ID cards, - Schengen Visas : France and other Schengen States. - French driving licences. The logic of the ID SHIELD controls is based on the programmation of all what is realizable. The crossing of all controls allows a kind of net in which a false document is rapidly trapped. Furthermore, the security features of the documents must be controllable. If they exist, they will be indicated and verified. If the controller does not find them, the document will be seriously questioned. 2
4 SUMMARY OF THE RELEASE 4.1 I. The MRZ control 1. Number of characters per line, 2. ICAO Check digits, 3. Personal Number check digit, 4. OCRB Characters chart and measures allowances, 5. Fillers, 6. Passport Number Format, 7. Dates format, 8. Expiry dates of a document, 9. Check of the States Code, 10. Verification through Internet of a document number or of the Identity of the document holder, (online), 11. Blank Stolen documents (ID SHIELD private database), 12. Difference between the information of the same doc read under visible light and IR light. 13. VIZMRZ : Data in VIZ and Data in MRZ comparison. 14. Non opening of the chip II. The control of the personal data page A. Controls which are common to all travel documents 1. The paper : the UV reaction. 2. The IR reaction. 3. The watermark. 4. The «Inkjet» background. 5. The rounded corner of the document. B. The controls of the presence of certain security features C. Known mistakes D. Securisation of the photo with the IPI process 1. Optically Variable Ink, 2. Micro-prints, 3. Tactile securities, 4. Physical securities, 5. The chromotrope ink (Fluorescent ink), 6. The laser perforations (Destriperf). 7. Delachrome effect. 3
5 III. The control of the RFID chip A. The chip has been destroyed. B. Chip authentication : Is the chip the first original chip? C. The verification of the signature of the data by the issuing State : have the data been modified? D. Are the data listed in the EF.COM file all present? (Index of all Data Groups). EF.SOD : hashes of all DG signed by the Issuing State. E. The Certificate used by the Issuing state : is it valid and non revoked? IV. The data contained in the chip A. The different methods to open the chip B. Information contained in the chip C. Use of this information. V. The identification of the traveler A. The comparison of the visages comparison. B. The Faces comparison (ARH). C. The facial recognition (Cognitec). D. The fingerprints recognition (Greenbit). E. The detection of emotion (2016). VI. The controls of the traveler regarding his destination and his nationality A. Requirement for a VISA/ATV (Airport Transit Visa) B. The calculation of the time spent in the Schengen Space (EU Regulation 610/2013) and the rule of the 90 days / 180 days. C. The travel within airports belonging to the Schengen Space (VISA C requirement). D. Period of time remaining after the return of the traveller to his State. VII. The assistance to the documentary controllers A. The Mail function. B. Skype : free phone on Internet C. Teamviewer : free remote control software D. Consequences on the controls organisation. VIII. Storage server IX. Software Maintenance 4
6 INTRODUCTION : The legal context and the obligations of the airlines A. The legal texts Item 3.33 of the annex 9 of the Chicago Convention (7 December 1944) Schengen agreement. 19 june Item 26. Transports French Code. Item L French CESEDA Item L French Law project 23 July Item 28 The passengers must have all the required documents for the transit and destination points of his travel. Idem Idem Idem. Indicates that an obvious error in the documents leads to a fine. This error is something that can be detected by an agent of the airline through a normal careful examination. Increase in the fine amount. B. The fraud observed by the airlines - The document (Passport, ID Card, Residence Permit, Schengen Visa) has been entirely manufactured or made from other true documents or with a blank stolen document. - The personal data page has been entirely replaced. - The personal data page has been modified. - The document is produced by a holder who should not be the holder (ID theft, look alikes) - The periods of time are not respected : expired document, time remaining after the passenger return, arrival before the period of validity of the visa - Inland transport within the Schengen space : a C visa is required. The airlines are responsible for all of these reasons. But they are not responsible for : - The duration of the stay inside the Schengen space : 90 days out of 180 days, - The living means of the traveler. - The residence at destination. 5
7 C. Controls performed by the airlines 14 MRZ Logical Controls 8 Physical controls Nbr of characters/line ICAO Check digit National check digit OCRB character chart Dimensional allowances Fillers Passport Number format Expiration date Country code Internet assistance Blank Stolen figure Between 2 lights comparison Non opening of the chip Comparison between VIZ and MRZ 2 Biometric controls (chip and data) S O F T W A R E Fiduciary paper B 900 Ink Watermark Inkjet background Document Round corners Presence of securities : OVI Micro-prints Perforations Tactile securities Chromotrope Ink Delachrome effect Mistakes IPI Traveller s Identification Situation of the traveller Assistance to the doc control : VGP, Mail Skype and Teamviewer Visual controls D. Controls for which the airline is not responsible - Duration of the stay within the Schengen Space, - Means of living. - Residence at destination. I. The MRZ track control The MRZ is the first element that permits to identify the document to control. A. Scope of the controls 1 / Number of characters per line The non-respect of the number of characters per line is a major error. It is also very tedious to be obliged to count each line in order to check if there are 30, 36 or 44 characters per line of an ID1, ID2 or ID3 document. 6
8 2 / ICAO check digit (according to the 9303 standard) The calculation of this check sum is applied to the document number, to the birth date, to the expiry date and to the whole track (composite check digit). In green : the check digit is validated by the program. In red: the check digit not validated by the program. 3 / The national check digit in the personal number The States can integrate in the free area of the MRZ (end of the second line) a personal number (Most often, it is the number of the ID Card). A check digit can also exist. If it is the case, ID SHIELD controls this number and its check digit (Around 45 checksums have been decoded). The calculation is not at all the same as the ICAO check digit control. On the contrary, these check digits are based on the Luhn Algoritm, the Modulus 11 or another method. These methods are most of time not published. The control is done by the program without the intervention of the user. Some check digits are remained unknown (Pakistan for example). Example : ISRAEL Personal Number : Israeli Passport. MRZ track «8» is the national checksum. We recalculate this digit in using the algorithm used by this State (Here : Luhn). ID SHIELD checks also the internal structure of these personal numbers. If an O is displayed, the program will transform the letter O into a zero. 4 / The OCRB character chart and the dimensional allowances The OCRB character chart is compulsory. The ID Shield Program checks that this chart is respected. 7
9 So ID SHIELD checks the dimensions defined by the standard (height of the characters, space between the characters, space between the lines, disposition of the lines with regard to the 2 edges of the document). The non-respect of this makes the difference between an industrial document and an home made document. 90% of the photocopies create this error. However, this control is not applied to the Schengen VISA : it has appeared that these documents were printed with the means of the consulate when it creates the VISA. 8
10 Example : True MRZ track of a Schengen Visa delivered by Italy and unfortunately nothing is conform Other example : 5 / The fillers (<) Portuguese Visa delivered at Dakar. Not conform but true Called Fillers, their position in the MRZ track respects specific rules (9303 Standard). We will regret that some documents do not respect them at all. This could also indicate that it is an homemade document. Especially if other documents respect this standard. Example of Fantasy : the Vietnam Example of non respect : India The Vietnamise Filler is printed in the wrong direction «>» The 2 fillers between the Issuing state and the Holder s name are of excess 9
11 Example of non respect : the Poland Complete Fantasy letting a doubt on the document 6 / Passport Number format The Passport Number never overtake 9 characters because the 10 th digit is the ICAO Check digit. In this number, we find letters and digits. The States are free to organize theses figures and letters. ID SHIELD performs this particular control and checks each format number. Besides, some States do not position this number where it should be. We must in that case create an exception in the Program. 7 / Dates Format Most of the time, the dates are presented according to the English tradition : YYMMDD. ID Shield checks the internal structure of the date (month not higher than 12, Day not higher than 31). ID SHIELD also draws attention to local practices : only the year is indicated as the birth date, not the month or the day. It should be abnormal to have a complete date in the Inspection Visible Area and nothing in the MRZ. Only the year 1952 is shown in the second line. Moreover, a special attention is displayed if the controlled person is a minor due to the different financial consequences that this particularity creates : the fine reaches euros in France and must be paid immediately if this minor is discovered with false or incomplete travel documents. 8 / Expired Document The program reads the expiry date and compares it with the date of the control. Normally, the expired document are not accepted (refer to the general conditions of transport of the airline). Concerning the Expired Residence Permits, it will be appropriate to ask for the document stating that a renewal has been requested. This document can be scanned and controlled under UV. 10
12 Background with guilloche Chromotrope Ink and coloured fibres appearing under 9 / Verification of the Country Code Verification of the Country Code. It exists nationality of fantasy. Example : CAB for Capo Verde that does not exist. CPV is correct. There are sometimes traditions that are difficult to modify. This is the case of the Zimbabwe who should use ZWE as its country code and who uses ZIM. 11
13 10 / On line Verification through Internet of a document number Sometimes, it is possible to check a passport number (or ID card, Residence Permit). These websites are not numerous but, when they exist or when they are indicated, ID SHIELD program their access, the rekeying of the number being suppressed using the memory of the mouse (right click and paste). Example : Latvia Site Sometimes, it is possible to valid the name of the holder of the document (Venezuela, Chile). URL : Indicate the ID Card Number (Cedula de Identidad). Result : We obtain the name of the holder indicated in this database (most often a voters list or a taxpayers list).sine qua non condition : be connected to Internet. Response time is very short. 12
14 16 The user must simply see that the Internet Icon is active (orange color) indicating that an access to a remote Web site is programmed. 11 / Blank Stolen Document It concerns the blank documents stolen during their transport before their personalization with the date of the future holder. Example : O3KD : French blank stolen series 13
15 ID SHIELD obtains lists of blank stolen lists from airlines or Embassies. The free access to these data through Interpol is reserved to only one Airline : QATAR airways (January 2015). If a document number is into a list, a Blank Stolen Pop up appears on the screen. This database is embedded in the laptop. 12 / Difference of reading between 2 lights If there is a difference between the MRZ read under the white light and the same MRZ read under Infra Red, an error will be indicated and the characters which are different will blink. This can reveal a MRZ scratching, the text which has been hidden reappearing under IR. 13 / Non opening of the chip The passport s chip is opened with a protocol called BAC or SAC. There are 2 reasons explaining that the chip is not readable : - The chip has been burnt : simply left in the microwave during 5 seconds, - The MRZ track has been modified and this modification prevents the chip to be open. In the second case, it is important to control with the microscope the area of the MRZ to search for scratchings, glue, modified background. EXAMPLE : On this image, the upper edge is based on blue points. If we go down the document to the MRZ, we can see inkjet background. This MRZ has a checksum error in the birthdate field (8). This has a consequence for the final check digit (6). The white and shining spots can result from glue. Note that the airline in France cannot be prosecuted for this error because it requires a microscope. So, the airline cannot be fined. 14 / Comparison between the data in VIZ and in MRZ This control is in progress. It permits, document after document, to compare data in VIZ (name, first name, birth date, expiry date) and in MRZ. 14
16 II. The control of the personal data page A. The controls common to all travel documents 1 / The Paper : UV reaction This page can be different from the other pages of the document. It is always interesting to compare the personal data page and its adjacent page. We first begin with the UV reaction (365 nm). The fiduciary paper used for banknotes or the security documents as the travel documents is manufactured from fibers coming from cotton, rags or wood without additions of optical whiteners. These whiteners react under UV light. The correct reaction is a document that remains dark. It exists genuine documents that fluoresce. Example : Passports from Israel and Chile ISRAEL CHILE On the contrary, this passport from Angola is false. UV : Angola. The PPT is fluorescent UV : Conform Reaction If the rule is not to have optical whiteners in the fiduciary paper, we can however have similar reaction with the recycled paper that does not fluoresce. We will in that case look at the other security features (watermark, colored fibers, planchettes). But all international calls for tenders indicate that the document must be manufactured without optical whiteners. 15
17 2 / The reaction under Infra Red Image under visible light Image under Infra-Red No data are readable under IR. This is not compliant with the 9303 standard. 3 / The watermark It is realized during the paper manufacturing. It is present on all pages of the passport. It is visible using transmitted light. Watermark of the French driving license (1999 Edition). 4 / Inkjet background The background must be realized in offset (offset). If Inkjet or other process (laser) is used for the background, the document must seriously be questioned. Inkjet back ground Differences between the personal data page and its adjacent page 16
18 The documents controller must use his magnifier and place it on a non printed spot. The program will indicate the rate concentration of the red, yellow and blue points. This information vary with the moves of the magnifier. Above a certain level, there is no doubt about the inkjet printing. 5 / The round corners of the document The round shape of the corners of the pages of the passport is done by a machine (not a nail cutter). We continue with our works to render this control automatic. B. The controls of presence of certain security features Each State defines its own visible or tactile securities that will be applied to its own credentials. In this scope, ID SHIELD defines into a database called «Visual Controls» the securities that can be checked. It also indicate frauds that has been discovered. Among them : - 1. L OVI : Optically Variable Ink : ink changing of color according the angle of view. (See the RF of the French ID Card), OVI Portugal Passport 17
19 - 2. The micro-prints : micro-letters or micro-texts invisible with naked eyes. Canadian Passport: The word «passport» is a micro-print - 3. The tactile securities : The MRZ of the Portuguese passport is printed in relief. So, we can feel it when we touch it («taille douce» printing or Intaglio Printing) The physical securities : Triangular (or rectangular or square Perforation on a part of the passport number (Opposite image : English Passport). Another example : The 3 micro-perforations of the French ID Card or of the French Residence Permit. Other example : the DESTRI-PERF process to create a ghost photo The securities realized with fluorescent ink (chromotrope) : Passport of Mauritius : ghost photo, signature, + information attached to the passport. The correct UV Image is systematically displayed with the 1st scan. Thus to avoid to accept an UV image different from the appropriate one. 18
20 6. The laser perforations Correct Destriperf process Cutter made security 7 / The Demachrome effect On the right : the visible image. On the left : If we place a red filter on the image of the right, we obtain another image which is a cock with an ax. Are concerned in particular : Kenya (above) and the Japan (here under). 19
21 C. Known Mistakes A POP UP message is displayed if known mistakes can be verified for the scanned document. Example : Japon. It is written FOREION instead of FOREIGN. It is written «SUNAME» instead of «SURNAME». + Inkjet back ground «Give Name» instead of «Given Name» «Code of Estate» instead of «Code of State» 20
22 A. Protection of the Photo with the IPI process It is a protection which is invisible. A decoder filter (or the ARH scanner) must be used. This security consists in hiding a text in the Photo. Example : Portugal. The Passport Number appears on the Photo. The Photo is correctly coupled with this Passport Number. 17 States use this protection against the photo substitution. The program automatically indicates that this security is implemented. States having adopted this security : Pays adoptant cette technologie pour leur passeport (Octobre 2015) : Hong Kong Bulgaria Croatia Portugal Thailand Sri Lanka Pakistan Korea Malaysia (not the latest) Philippines Macao South Africa Cyprus Sweden Estonia Belgium Cap verde III. The RFID Chip control Scope: biometric documents : Passports, Residence Permits, ID card. The objective is not to read the chip but to control that the chip has not been modified before we read it. Once this formal control is performed, then the controller can examine the data contained in the chip. These controls are based on a dialog between the RFID reader installed in the scanner and the Chip. These possible modifications (except when the chip has been knocked with a hammer or left in a micro-wave during 5 seconds) are invisible. 21
23 ID SHIELD has focused on this specific and technical control to avoid to validate an apparently correct document whose data have been completely modified. It is more a Security control than a documentary control. Airlines will not be fined for that but they could board a person whose identity is hidden. The question is : For which purposes a traveler has hidden his real identity? A decision must be taken within the airline to accept or to refuse these documents in the following situations : 1. Distroyed or burnt chip : no answer from the chip. 2. Chip authentication : Is the chip original? not replaced since the issuing date? 3. The chip contains a summary of the files which are present in the chip : This file is called : EF.COM. Are all Data Groups present? 4. Have the private data of the passport s holder been modified since the passport has been issued? Passive authentication is performed to check the hashes of all files (also called templates) from the chip. 5. Verification of the certificate of the Issuing State to avoid the use of a revoked certificate. The opening of the chip is done through what is called the Basic Access Control. ID SHIELD, as a private company, is not allowed to obtain a Certificate which, associated to Chip Authentication process, will allow the access to the DG 3 (Fingerprints). This is reserved to the Enforcement Agencies only. IV. The control of the content of the chip A. The methods to open the chip Are implemented : 1. Basic Access Control 2. Furthermore, since January 1st, 2015, SAC (standing for Supplemental Access control) is also implemented. This protocol is more secure. 3. Extended access control. The 2 first methods are accessible to everybody. The 3rd one requires a Certificate to authenticate the Terminal as a Police Terminal to allow it to access to the Fingerprints which stored in the Datagroup 3. B. Information contained in the chip The pertinent information are stored in different Data Droups (DG). 22
24 Obligatoire in French : means Compulsory in English. E. Use of the information ID SHIELD uses the information of the chip as follows : - Creation of a screen gathering all the morphologic information of the holder of the ID Document : photos, Photos comparison, color of the eyes, height), - Comparison between the visible photo and the photo in the chip : they must identical and the eyes are normally aligned according to the ground, - Comparison of the biometric photo with the real face using the face recognition system (Algorithm of COGNITEC- Germany). - Comparison of the 2 MRZ : the visible and the one in the chip. V. The traveller Identification The documentary controller needs also to be sure of the identity of the person in front of him (fight against the «lookalikes» who detain genuine documents but not belonging to them and for which the photos are looking like their own faces. Figures from the French Bureau de la Fraude Documentaire (DCPAF) : Years Number of«lookalikes» (source : PAF - BFD) In the airlines world, these ID thefts represent today 30% of the minutes addressed by the Police at Frontiers to airlines such as Royal Air Maroc or Tunis Air. This use of the resemblance can be explained by the higher and higher difficulty to ex nihilo manufacture a travel document, the used securities becoming more and more sophisticated. 23
25 A. Morphological results table ID Shield proposes a board with all the results of the comparison between the visible photos and the photos in the chips. It adds also physical elements such as height, race. B. The visages comparison 1. Manual : It is possible to align the photos of the passport + Visa + Photo in the chip. The software magnifier allows to increase the size of the same part of the face among the 2 or 3 photos. The manual comparison is then possible between the 3 images. 7 points must draw the attention of the controller : a) The forehead, b) Th eyes, c) The ears, d) The nose, e) The space between the nose and the lips, f) The lips, g) The chin. 2. Automatic : In less than 5 seconds, the comparison is done between 2 photos and a score is displayed using green and red rectangles. The green circled figure is a validated check digit. 3. COGNITEC, the supplier of the algorithm is the world leader of the facial recognition. We compare the photo in the chip (without noices due to the protection film) with the real face when the passenger board the plane. 24
26 C. The Fingerprints recognition ID SHIELD is able to perform this control when a certificate is given to him to authenticate the suitcase as a Police Terminal. We use the Greenbit technology. D. The stress detection ID SHIELD is on the point to test the stress detection. As we see on these images, this emotion is detected on the visage on the right.(blood under the skin.). It becomes possible to push this emotion. Examples to test : - Presentation of a anti-drugs dog to a traveller carrying drugs, - Indication of a fine amount and/or Jail for a false document holder. The aim is to provoke an emotion. The facial recognition can be performed at the same time. In France, the facial recognition is submitted to the autorisation of the privacy organisation (CNIL). The emotions detection belongs to the behaviour analysis and is not subject to authorization. VI. The control of the traveller s situation considering his destination A. Obligation to have a Visa/Transit Airport Visa The immigration rules concerning the Schengen Space is integrated into the Program and is corrected when necessary. Regarding his nationality, the traveler will have to produce a Visa or an Airport Transit Visa. TIMATIC WEB is integrated on a demo base. It is not a free product : a license must be paid to IATA. B. Time spent in the Schengen Space (EU Regulation n 610/2013) ID SHIELD has reprogrammed the calculator from the EU Commission (DG Home Affairs and Justice) It permits to calculate the time in days spent on the Schengen space during the 180 past days (Rule of the 90 days/180days). The airlines are not obliged to perform this control. 25
27 C. Travel within the Schengen Space If a traveler, after his landing at CDG, needs to go to a third country in crossing another Schengen State (even to go to ORY), a Visa Type C is required. ID SHIELD has created a specific interface to reveal the inner travel.this is based on the declarations of the traveler. This can also be modified if the airline agrees to give us the access to the Passenger Name Record (PNR) where these data exist. D. Validity of the passport (EU Regulation n 610) The passport must be valid 90 days after the passenger has returned into his usual country. A Pop up is displayed when we are in this situation. VII. The aids to the controller A. VGP (as Vigipirate) It is possible to pilot the controls in creating an alert when some information, extracted from the MRZ, can permit to create a specific profile of persons who can in particular destroy their documents on board. B. The Mail function During the control, the controller can send a mail to his Supervisor. This person receives all the photos of the documents of the traveler. The Supervisor can take the control of the remote suitcase through TEMVIEWER. A phone conversation can also be established using the free product SKYPE. C. Teamviewer : the way to remotely control the suitcase The Supervisor can take the control of the suitcase in installing the free Teamviewer on his computer. It is the same software that ID SHIELD uses to check a remote suitcase. D. Modification of the Organization due to the use of the suitcase The suitcase realizes some controls (not all) but realizes them quickly. The major errors must lead to a NO GO. The controller should be able to access to the upper level when necessary. 26
28 We recommend the local purchase of the SIM card necessary to perform a wireless connection. This will help the controller to: - Access to remote databases, - Access to his Upper Level. VIII. Data storage Today, storage is done with USB keys and an external hard disk. Data must be stored during 12 months. If the volume of data is important, we can propose a solution more adapted with a specific program to operate researches. IX. Software maintenance ID SHIELD no longer proposes the hardware maintenance. Just the software maintenance. Consequently, spares (scanner + Laptop + craddle) must be put in stock. For the software maintenance, the connection to our server «IDSHIELD.fr» is the best way to update the software and the embedded databases. If problems, do not hesitate to call us on phone. 27
The security features which are not visible on a photocopy
The security features which are not visible on a photocopy ID SHIELD does not authenticate an Identity document on the base of a photocopy but on the base of the original documents. This behaviour has
Full page passport/document reader Regula model 70X4M
Full page passport/document reader Regula model 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses
Statewatch Briefing ID Cards in the EU: Current state of play
Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled
(Payable to Casto Travel, Inc.)
REQUEST FOR VISA/PASSPORT PROCESSING (Transmittal) This form is for Casto s use only, to advise us as to what service you are requesting, when you depart on your trip, and the address to which the documents
ID Document Scanning and Biometric Solutions
ID Document Scanning and Biometric Solutions PRODUCT CATALOGUE Contents ID DOCUMENT SCANNING & BIOMETRIC SOLUTIONS Advanced ID document reading solutions Typical applications ID document scanning process
NEW PASSPORT PHOTO REQUIREMENTS FOR THE MACHINE READABLE PASSPORT
FREQUENTLY ASKED QUESTIONS (FAQs) ON THE MACHINE READABLE PASSPORT What is a Machine Readable Passport (MRP)? The Machine Readable Passport (MRP) is a passport where the personal details of the applicant
Discover Germany s Electronic Passport
Discover Germany s Electronic Passport Starting 1 Nov. 2007 E-Passport 2nd Generation www.epass.de 1 Introducing Germany s e-passport If you want to know why there are electronic passports and how to recognize
Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the
Implementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
BALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION
BALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION SOME RECENT NATIONAL AND REGIONAL INITIATVES IN IDENTITY MANAGEMENT
2. Is registration with PARAFES free? Yes.
Automated Border Control 1. What does PARAFES stand for? PARAFES (translated from French) means Automated Fast Track Crossing at External Schengen Borders. 2. Is registration with PARAFES free? Yes. 3.
ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER
ZIMBABWE SCHOOL EXAMINATIONS COUNCIL General Certificate of Education Ordinary Level COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER Candidates answer on the question paper Additional materials:
Basic Passport Checks 4 COLOUR SIMPLE VERSION
Basic Passport Checks 4 COLOUR SIMPLE VERSION Cases of document fraud involving the UK passport should be reported to Her Majesty s Passport Office. This includes altered or counterfeited UK passports
DOCUMENT SECURITY ISSUES
DOCUMENT SECURITY ISSUES Part of a Series of Datacard Group White Papers for the Secure Document Issuer DESIGNING AN ID DOCUMENT FOR ENHANCED SECURITY Overview Governments today are being driven to increase
MACHINE READABLE TRAVEL DOCUMENTS
MACHINE READABLE TRAVEL DOCUMENTS TECHNICAL REPORT Version 1.0 Date - April 7, 2011 Published by authority of the Secretary General ICAO/NTWG SUB-WORKING GROUP FOR NEW SPECIFICATIONS td1 CARD File Author
Basic Passport Checks 4 COLOUR SIMPLE VERSION
Basic Passport Checks 4 COLOUR SIMPLE VERSION Cases of document fraud involving the UK passport should be reported to Her Majesty s Passport Office. This includes altered or counterfeited UK passports
For more information, please refer to our Check Armor FAQ: https://www.blackbaud.com/files/pdf/blackbaud forms/checkarmorfaq.pdf
Check fraud is one of the largest challenges facing nonprofits and financial institutions today. With the advancement of computer technology, it is increasingly easy for criminals to manipulate checks
Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs
Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs 1 GOVERNMENTS ADOPTING DIGITAL STRATEGIES Governments designing/operating digital ecosystems to create, transform and optimize
Applying for a Schengen visa
Applying for a Schengen visa If you have any questions about this information booklet, please contact the International Student Advisers on [email protected] or (0141) 330 2912.
Student visa and temporary graduate visa programme trends
Student visa and temporary graduate visa programme trends 2008-09 to 2014-15 This page is left blank intentionally. Table of Contents Page About this report 1 Enquiries 1 Definition of terms 2 Background
Overseas: NOTES. Application for an Australian Passport. Your checklist. Keep your passport safe at all times.
Application for an Australian Passport Overseas: NOTES Who can apply for an Australian passport? All Australian citizens can apply if you have any questions or doubts about your Australian citizenship,
FAQs - New German ID Card. General
FAQs - New German ID Card General 1) How to change from the old ID card to the new one? The new Law on Identification Cards came into effect on 1 November 2010. Since then, citizens can apply for the new
Tier 4 (General) student visa Guide to making your visa application inside the UK
Tier 4 (General) student visa Guide to making your visa application inside the UK July 2014 1 Contents 3 Introduction & Student Advice Service contact details 4 Summary of application process General guidance
Biometrics for Public Sector Applications
Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach
Checking Identification
ServSafe Alcohol Fundamentals of Responsible Alcohol Service 3 Checking Identification After completing this chapter, you should be able to: Identify acceptable forms of identification. Identify the characteristics
Identity Verification Program Guide
Identity Verification Program Guide The National Crime Prevention and Privacy Compact Council (Compact Council) is a15-member body of local, state, and federal governmental officials which prescribes system
Changes in Schengen visa application process
Changes in Schengen visa application process As part of the worldwide introduction of the Visa Information System (VIS) 1, the Schengen States will launch the VIS in India (and in the neighbouring countries
PUBLIC KEY INFRASTRUCTURE CERTIFICATE REVOCATION LIST VERSUS ONLINE CERTIFICATE STATUS PROTOCOL
WHITE PAPER PUBLIC KEY INFRASTRUCTURE CERTIFICATE REVOCATION LIST VERSUS ONLINE CERTIFICATE STATUS PROTOCOL CERTIFICATE REVOCATION CHECKING ON CISCO IOS SOFTWARE Introduction The support for x.509 digital
ELFRING FONTS INC. MICR FONTS FOR WINDOWS
ELFRING FONTS INC. MICR FONTS FOR WINDOWS This package contains ten MICR fonts (also known as E-13B) used to print the magnetic encoding lines on checks, and eight Secure Fonts for use in printing check
Council of the European Union Brussels, 13 November 2015 (OR. en)
Council of the European Union Brussels, 13 November 2015 (OR. en) 12527/1/15 REV 1 LIMITE JAI 701 FRONT 202 COMIX 451 NOTE From: Presidency To: Working Party on Frontiers/Mixed Committee (EU-Iceland/Liechtenstein/Norway/Switzerland)
Establishing and Managing the Schengen Masterlist of CSCAs
Establishing and Managing the Schengen Masterlist of CSCAs Big City 21/04/2015 European Commission Directorate-General HOME Unit B3 Information Systems for Borders and Security [email protected]
MIT U.S. Income Tax Presentation Non US Resident Students
MIT U.S. Income Tax Presentation Non US Resident Students PwC Boston Nabih Daaboul Carol McNeil Rich Wagman 1 Basic U.S. Tax Overview for International Students A foreign national is a person born outside
Full scope of document security solutions
Full scope of document security solutions security since 1851 www.any.hu Full scope of document security solutions The specialists of the Document Security Laboratory of ANY Security Printing Company PLC
The Manitoba Identification Card. Secure proof of age, identity and Manitoba residency
The Manitoba Identification Card Secure proof of age, identity and Manitoba residency The Manitoba Identification Card A voluntary option for Manitoba residents The Manitoba Identification Card is a voluntary,
Payment Card Security Elements and Card Acceptance. Instruction
Payment Card Security Elements and Card Acceptance Instruction Content Internetbank. General requirements.... Use of Card in payment terminal.... Transaction cancellation.... Personal identification....
Maksekaartide vastuvõtmise nõuded. Requirements for accepting bankcards
Maksekaartide vastuvõtmise nõuded Requirements for accepting bankcards Contents General Requirements Using Cards in Payment Terminals Returning Purchases Identification of Persons Terminal Response Codes
Appendix 1: Full Country Rankings
Appendix 1: Full Country Rankings Below please find the complete rankings of all 75 markets considered in the analysis. Rankings are broken into overall rankings and subsector rankings. Overall Renewable
HOW TO REGISTER AS A NURSE OR MIDWIFE. A guide for all applicants who trained outside Ireland
HOW TO REGISTER AS A NURSE OR MIDWIFE A guide for all applicants who trained outside Ireland Table of contents Table of contents... 1 About NMBI... 2 Introduction to the Register... 2 Divisions of the
FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and ID verification.
Discover a new conception for customer verification and electronic contract management Your benefit is our task. FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and
International Call Services
International Call Services Affordable rates for business calls. Wherever you are in the world. We ve got plenty to say when it comes to staying in touch when you re overseas. We have agreements with 443
Preventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
Embassy of Italy. Application for Schengen Visa. This application form is free 1. Surname (Family name) (x) FOR OFFICIAL USE ONLY
Harmonised application form Embassy of Italy PHOTO Application for Schengen Visa This application form is free 1. Surname (Family name) (x) FOR OFFICIAL USE ONLY 2. Surname at birth (Former family name(s))
Application for Schengen Visa
Photo Stamp of Embassy or Consulate Application for Schengen Visa This application form is free 1. Surname(s) (family name(s)) FOR EMBASSY / CONSULATE USE ONLY 2. Surname(s) at birth (earlier family name(s))
NETWORK PRINT MONITOR User Guide
NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
ON IDENTITY CARDS. Based on Article 65 (1) of the Constitution of the Republic of Kosovo, LAW ON IDENTITY CARDS CHAPTER I GENERAL PROVISIONS
LAW Nо. 05/L-015 ON IDENTITY CARDS The Assembly of the Republic of Kosovo, Based on Article 65 (1) of the Constitution of the Republic of Kosovo, Approves LAW ON IDENTITY CARDS CHAPTER I GENERAL PROVISIONS
Keep Out of My Passport: Access Control Mechanisms in E-passports
Keep Out of My Passport: Access Control Mechanisms in E-passports Ivo Pooters June 15, 2008 Abstract Nowadays, over 40 different countries issue biometric passports to increase security on there borders.
Agilent N5970A Interactive Functional Test Software: Installation and Getting Started
Agilent N5970A Interactive Functional Test Software: Installation and Getting Started Application Note The N5970A Interactive Functional Test Software along with the 8960 Series 10 (E5515C) wireless communications
REAL ID Act Title II H.R.1268
H.R.1268 Emergency Supplemental Appropriations Act for Defense, the Global War on Terror, and Tsunami Relief, 2005 (Enrolled as Agreed to or Passed by Both House and Senate) TITLE II--IMPROVED SECURITY
Before you begin: Ensure you have a passport valid for at least six months after your program ends.
Italian Student Visa Packet Consulate General of Italy in Houston This consulate is for students whose zip codes fall under the jurisdiction of the Consulate General of Italy in Houston. Your assignment
EUR1 = LTL 3.45280 OUR MONEY REAL OR FAKE?
EUR1 = LTL 3.45280 OUR MONEY REAL OR FAKE? REAL OR FAKE? If you regularly handle cash at work, you might find this brochure useful. It describes the security features of euro banknotes, and how to spot
Elfring Fonts, Inc. PCL MICR Fonts
Elfring Fonts, Inc. PCL MICR Fonts This package contains five MICR fonts (also known as E-13B), to print magnetic encoding on checks, and six Secure Number fonts, to print check amounts. These fonts come
SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise
w w w. t h a l e s g r o u p. c o m SECURE IDENTITY MANAGEMENT Globally recognised identity management expertise Integrated identity management solutions As a global technology leader for the Aerospace
FAQs Electronic residence permit
FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit
Viewpoint Construction Software www.viewpointforms.com 800.825.8649
HECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITY
Intelligent Database Monitoring System using ARM9 with QR Code
Intelligent Database Monitoring System using ARM9 with QR Code Jyoshi Niklesh 1, Dhruva R. Rinku 2 Department of Electronics and Communication CVR College of Engineering, JNTU Hyderabad Hyderabad, India
An introduction to the World Federation of Occupational Therapists (WFOT)
An introduction to the World Federation of Occupational Therapists (WFOT) WHAT IS THE WORLD FEDERATION OF OCCUPATIONAL THERAPISTS? The key international representative for occupational therapists and occupational
Application form WH1_en_011115 Application for residence and work permit for Working Holiday
Application form WH1_en_011115 Application for residence and work permit for Working Holiday Uses This form can be used to apply for a residence and work permit in Denmark, if you are an Argentine, Australian,
Travel Document Application Form
Travel Document Application Form Irish Naturalisation & Immigration Services Travel Document Unit February 2016 Important Information Please ensure that you read this information before completing your
Payment Cards. Acceptance requirements and security features
Payment Cards Acceptance requirements and security features Contents General Requirements...3 Using The Card In A Payment Terminal...3 Returning of the Purchase...4 Identification of a Person...5 The Terminal
THE ADVANTAGES OF A UK INTERNATIONAL HOLDING COMPANY
THE ADVANTAGES OF A UK INTERNATIONAL HOLDING COMPANY Ideal Characteristics for the Location of an International Holding Company Laurence Binge +44 (0)1372 471117 [email protected] www.woolford.co.uk
Full guide for employers on preventing illegal working in the UK. October 2013
Full guide for employers on preventing illegal working in the UK October 2013 Contents Who should read this guide?... 4 Changes to preventing illegal working guidance... 4 Complaints... 4 Introduction...
ARE YOU A EUROPEAN CITIZEN LIVING IN BELGIUM? Come and vote for the European Parliament on 25 May 2014!
ARE YOU A EUROPEAN CITIZEN LIVING IN BELGIUM? Come and vote for the European Parliament on 25 May 2014! 1 WHO IS ENTITLED TO VOTE ON 25 MAY 2014? In order to take part in this election as a European citizen,
VISA AND RESIDENCE PERMIT FOR GERMANY FOR INTERNATIONAL STUDENTS AND Ph.D. STUDENTS
VISA AND RESIDENCE PERMIT FOR GERMANY FOR INTERNATIONAL STUDENTS AND Ph.D. STUDENTS Entry and visa obligation The entry regulations for the Federal Republic of Germany differ depending on the country of
Connecting Software. CB Mobile CRM Windows Phone 8. User Manual
CB Mobile CRM Windows Phone 8 User Manual Summary This document describes the Windows Phone 8 Mobile CRM app functionality and available features. The document is intended for end users as user manual
Once you have gathered all the information required please send to Key Travel s visa department
Dear Applicant, Thank you for choosing Key Travel to handle your visa application to Liberia Your visa pack contains: Embassy Information Visa requirements for Business and Tourist visa applications Visa
The face of consistent global performance
Building safety & security global simplified accounts The face of consistent global performance Delivering enterprise-wide safety and security solutions. With more than 500 offices worldwide Johnson Controls
A whitepaper on: Invisible and Fluorescing Bar Code Printing and Reading
A whitepaper on: Invisible and Fluorescing Bar Code Printing and Reading Important technical considerations that are the key to successful implementations Version 1.03 P a g e 2 OVERVIEW Background: Inks
Reporting practices for domestic and total debt securities
Last updated: 4 September 2015 Reporting practices for domestic and total debt securities While the BIS debt securities statistics are in principle harmonised with the recommendations in the Handbook on
USAccess System- Registrar. Help Guide. Prepared for
USAccess System- Registrar Help Guide Prepared for United States Department of Agriculture Office of Security 300 7th Street SW, Washington DC 20024 Version 1.0 December 12, 2007 USAccess System Registrar
Foreign Taxes Paid and Foreign Source Income INTECH Global Income Managed Volatility Fund
Income INTECH Global Income Managed Volatility Fund Australia 0.0066 0.0375 Austria 0.0045 0.0014 Belgium 0.0461 0.0138 Bermuda 0.0000 0.0059 Canada 0.0919 0.0275 Cayman Islands 0.0000 0.0044 China 0.0000
Data Modeling & Bureau Scoring Experian for CreditChex
Data Modeling & Bureau Scoring Experian for CreditChex Karachi Nov. 29 th 2007 Experian Decision Analytics Credit Services Help clients with data and services to make business critical decisions in credit
Chapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 5 Understanding Input Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define input and differentiate among a program, command, and user response Identify
Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013
Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013 Carlos Gómez Head of R&D and Innova.on, FNMT- RCM, Spain ICAO TRIP: Building Trust in Travel Document
Child. Application for an Australian Passport. Your checklist
Application for an Australian Passport Child Appointments Only certain applicants should lodge their forms at a passport office in Australia. Appointments are essential. See notes for details. Protect
Mail & More/123 Fingerprinting
Mail & More/123 Fingerprinting 5764 N. Orange Blossom Trail 407-299-7328 [email protected] mailandmore.com Fax 407-578-1219 If you reside out of state, or are unable to visit our location to be
FALSE ID GUIDANCE. July 2012
FALSE ID GUIDANCE July 2012 CONTENTS 1. Ministerial Foreword...4 2. Introduction...5 Who this guidance is for...5 Glossary...5 Background to the problem...6 3. The law regarding false ID...7 Types of false
Applying for a Passport
Please do not forget to make an appointment! Payment with credit cards (Visa, MasterCard) is accepted. Cheques cannot be used to pay the Embassy's fees. Applying for a Passport Find information about 1.
FRAUD TECHNIQUE: IDENTITY DOCUMENT VERIFICATION
FRAUD TECHNIQUE: IDENTITY DOCUMENT VERIFICATION A technique data sheet presented by The Fraud Practice LLC. Fraud Technique: Identity Document Verification Author: David Montague Identity Document Verification
Galileo Content Builder Featuring RBC Insurance. User Guide
Galileo Content Builder Featuring RBC Insurance User Guide Acknowledgement: This document was developed by Galileo by Travelport, Training and Development. Customer feedback is important to us. Please
Landscape of eid in Europe in 2013
Landscape of eid in Europe in 2013 July 2013 Eurosmart White Paper Contents Executive Summary 3 1. Purpose of the document 3 2. EU regulation 3 3. EU Member States identification policies 4 3.1. National
Students: undergraduate and graduate students who are currently enrolled in universities
DUO-Korea: 1. General Description CAUTION: If any application falls under the following 3 cases, the application is disqualified and will not be considered for selection. If such case is found after the
Your secure identity. Meeting proof of identity requirements
Your secure identity Meeting proof of identity requirements The Department of Transport (DoT) is committed to safeguarding your identity through secure information management and personal identification
Legislative Council Panel on Security. The Next Generation Smart Identity Card System
For discussion on 6 January 2015 LC Paper No. CB(2)534/14-15(03) Legislative Council Panel on Security The Next Generation Smart Identity Card System PURPOSE This paper seeks Members support for the proposal
2N Attendance System. Configuration manual 1.0
2N Attendance System Configuration manual Version 1.0 www.2n.cz The 2N TELEKOMUNIKACE a.s. is a Czech manufacturer and supplier of telecommunications equipment. The product family developed by 2N TELEKOMUNIKACE
Image Lab Software for the GS-900 Densitometer
Image Lab Software for the GS-900 Densitometer Quick Start Guide Catalog # 170-9690 Bio-Rad Technical Support For help and technical advice, please contact the Bio-Rad Technical Support department. In
Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS
This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION
Connecting Software Connect Bridge - Mobile CRM Android User Manual
Connect Bridge - Mobile CRM Android User Manual Summary This document describes the Android app Mobile CRM, its functionality and features available. The document is intended for end users as user manual
Application form ST1_en_011115 Application for a residence and work permit for students
Application form ST1_en_011115 Application for a residence and work permit for students Uses This form is to be used when applying for a Danish residence and work permit as a student. Residence and work
I-9 WEBINAR: HOW TO KEEP IMMIGRATION ENFORCEMENT FROM KNOCKING AT YOUR DOOR Q&A
I-9 WEBINAR: HOW TO KEEP IMMIGRATION ENFORCEMENT FROM KNOCKING AT YOUR DOOR Q&A Jon Velie recently hosted a webinar with Ascentis on the subject of I-9 s. There was over 500 attendees from around the globe
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
Remote Deposit Terms of Use and Procedures
Remote Deposit Terms of Use and Procedures Use of American National Bank Fox Cities (Bank) Remote Deposit service is subject to the following Terms of Use and Procedures. Bank reserves the right to update
HLX SCALE SYSTEM MODEL STANDARD FEATURES ACCESSORIES. Item # Quantity C.S.I. Section 11400
Item # Quantity C.S.I. Section 11400 HLX STANDARD FEATURES Operator Mode Large color touch screen display (10.4") Search database by description or PLU number Flashkeys can be laid out by categories or
GLOSSARY ABTC APEC API ASEAN
GLOSSARY ABTC APEC Business Travel Card Card used by business travellers from APEC member countries to enable visa-free travel between APEC countries and expedited processing at immigration checkpoints.
NONPROFIT ORGANIZATION JUMING CULTURE & EDUCATION FOUNDATION 2015 AUTHENTICATION REQUEST OF TWO-DIMENSIONAL WORKS
NONPROFIT ORGANIZATION JUMING CULTURE & EDUCATION FOUNDATION 2015 AUTHENTICATION REQUEST OF TWO-DIMENSIONAL WORKS The following checklist is to help owners seeking authentication of works owned complete
