The Use of ID Reader-Authenticators in Secure Access Control and Credentialing

Size: px
Start display at page:

Download "The Use of ID Reader-Authenticators in Secure Access Control and Credentialing"

Transcription

1 The Use of ID Reader-Authenticators in Secure Access Control and Credentialing Theodore Kuklinski, Bruce Monk AssureTec Systems, Inc., Manchester NH Abstract Knowing who is entering, and whether they should be granted access, is key information for many types of military, government and commercial facilities. In many situations, access is granted based on an Identification Document (ID) such as a dri ver s license, passport, visa, or other specialized ID card. Although screeners are trained to detect false IDs, they have the daunting task of trying to do this within a few seconds for large numbers of people and types of documents on a daily basis. Newe r cost effective ID Reader-Authenticators can add a high degree of automation and accuracy to the secure access control process. Available in a variety of physical configurations, they can automatically read IDs in full color at high resolution with multiple light sources, extracting image fields such as photos, as well as data fields, whether from text, barcodes, magnetic stripes, or embedded chips. The data extracted can be vetted against external watchlists without compromising priv acy. They can process most currently issued IDs whether or not they contain machine readable enhancements. IDs can be authenticated via a wide variety of tests based on detecting embedded security features. Reader-Authenticators are particularly useful in the enrollment process (as part of new government ID initiatives) to avoid issuing IDs based on false breeder documents. Secure access control, whether at a national border, secure installation, lobby of a building, or airport screening area, can be enhanc ed with the use of today s advanced Reader-Authenticator technology. 1. SECURE ACCESS CONTROL In the much more security conscious post 9/11 era, it has become of utmost importance to know who is entering military, government and commercial facilities and whether they should be granted access. The traditional security paradigm holds that there are three ways to authenticate a person: (1) what the person is - a biometric such as a photo, signature, or fingerprint, (2) what the person knows e.g., a special password, or (3) what the person has - a token of some kind that is carried with the person. In many situations, that token is an Identification Document (ID) such as a driver s license or passport. More effective security is often achieved with some combination of these elements. Data derived from an ID card can be vetted against external watchlists or databases. For instance, the ID number (from what they have) can be the key to accessing stored biometric information, such as a facial image, to compare with the presenter (to test what they are), and even provide questions to ask the presenter (to test what they know). A photo derived from the card could be compared with a live photo of the presenter and sent to a remote server for facial matching to a previously stored image. As an access control example, airport screeners on the frontlines visually inspect a passenger s ID, verify the photo to the presenter s face, and then compare the name to that printed on the boarding pass. Although screeners are trained to detect fake IDs, they have the daunting task of trying to do this within a few seconds for hundreds of passengers and types of documents on a daily basis. In others cases, such as military checkpoints, it may be desirable to fully automate the credential validation process at a distance from the inspector. What kind of places need secure access control? Among these are governmental facilities (buildings, monuments, etc.), border control stations, military areas and facilities, cargo handling areas, hazardous material areas, nuclear facilities, transportation facilities (air, rail, subway, bus, buildings (lobby check-in), and ), entertainment venues (large sporting events, age restricted sites). 2. CREDENTIALING FOR SECURE IDs In recent years, there have been many new government programs introduced, having the goal of improving the /08/$ IEEE 246

2 security of such IDs. Newer e-passports have or are being introduced in many countries including both traditional and credit card sized form factors. Other examples include the GSA s HSPD-12 program for reissuing more secure US Government IDs, and the Transportation Workers Identity Credential (TWIC). The enrollment credentialing process for such newer ID initiatives often includes the collection of biometrics such as fingerprints. The implementation of some new ID initiatives have taken years to implement. There will be an existing base of existing format documents that will be with us into the foreseeable future. For example, new e-passports have only been issued in volume over the last year, and it will take a period for existing passports to expire and be replaced. Thus there will be a need to be able to read and process such older IDs. These newer secure documents often include RFID chips which can be queried via special readers. Such chips can fail either through wear, moisture, or by intentional disablement, thus necessitating processing the document manually anyway. There have also been concerns that such chips could be read at a distance which has been addressed in some cases by altering the information that is accessible via RFID and requiring a read of some other printed data in order to unlock the RFID information. There is a particular need in the credentialing enrollment process to avoid issuing new real and very secure IDs based on false breeder documents such as fake driver s licenses. Existing old school IDs are one of the primary evidence sources for granting new secure IDs. An automatic system which is capable of both reading and authenticating such breeder documents is highly desirable. Reading the data from such documents allows automatic querying of remote databases. Validating the genuineness of the physical document protects against someone using valid data on a false document which might contain a substituted photo, birthdate, or other information. Document Variability Early ID readers were only capable of processing IDs that were specifically designed for machine processing. Passport readers really only had to perform Optical Character Recogniton (OCR) on the two line Machine Readable Zone (MRZ) of a passport, which was specifically formatted according to International Civil Aviation Organization (ICAO) specifications. License readers could just deal with the magnetic stripe information or the PDF D barcode information. However, some of today s Reader-Authenticators are capable of processing most of the currently issued drivers licenses, passports, and visas whether or not they contain machine readable enhancements such as barcodes, magnetic-stripes, RFID chips, or specially formatted MRZs. There are a tremendous number of ID types being used in the world today and new varieties are being introduced on a regular basis, sometimes for simple aesthetics and in other cases by a desire or mandate for more document security features. A given issuing agency (state or country) typically has a number of different unexpired generations in circulation at any given time. There are three sizes of standard ICAO formatted ID Documents, ID-1, ID-2, and ID-3. Driver s licenses are ID-1 size while full size passports are considered of ID-3 size. ICAO documents have MRZs with two or three lines of OCR-B font text containing relevant information. However, there are many passports that do not follow the ICAO standards as to MRZ or layout of other information. There are some passports where the photo is not even on the same page as the text data (e.g. Brazil). There are cases where the country follows the ICAO standards but still the passport information may even be handprinted if produced under certain circumstances. Among the types of photo IDs often presented are types other than driver s licenses, such a military IDs, foreign voter ID cards, visas, border crossing cards, and consular issued cards such as the Mexican Matricula Card. Indeed there are ID books or even online references which will show some of the common variants of licenses or passports. Even within a given state, there are many classes of licenses for different purposes - under 21 years of age, Commercial Drivers License (CDL), non-driver ID, motorcycle, etc. These variants may have different wording, have the photo in different locations and, usually in the case of US Under 21 licenses, be in portrait instead of landscape orientation. Although screeners are trained to detect fake ID s, they have the daunting task of trying to do this within a few seconds for hundreds of passengers and types of documents on a daily basis. Inspectors may be familiar with IDs from larger countries or states but would have difficulty recognizing some IDs from less familiar locales as legitimate or not without consultation with some auxiliary reference material. Furthermore, it would be almost impossible for them to know the security features that might be present in such documents. Even armed with magnifiers and UV flashlights, they may not be able to discriminate false documents from real. Screeners have varying amounts of training and experience. As with any repetitive task, they are subject to distraction, get tired or bored sometimes, and may even be subject to compromise. By focusing on the analysis of the ID, they spend less time on the analysis of the ID presenter, which may also hold clues to nefarious intent. This is where the true value in the use of Reader- Authenticators comes into play. They are not subject to the attention span problems of humans and can analyze an ID with the same degree of thoroughness each time. Such systems are trained to recognize most IDs in circulation, even the uncommon ones, and to know where to quickly find the name, ID number, photo, and to evaluate the 247

3 security features in play for that particular document. They can deal not only with pristine ID documents but can be trained to deal with those that are severely worn, dirty, cracked, or even documents that are taped together. 3. READER-AUTHENTICATORS A new generation of cost effective ID Reader- Authenticators can add a high degree of automation and accuracy to both the secure access control and secure document credentialing processes. What is a reader authenticator? Reader-Authenticators both read the data on IDs and perform some steps to authenticate whether the document is real or not. Reader-Authenticators have both a hardware device component, responsible for the actual image capture of an ID document, and a software component, most often running on a PC which analyzes the images, extracts data, and determines document authenticity. Reader Authenticator Hardware Factors Today s devices are capable of one step automatic reading of IDs in full color at high resolution with multiple light sources (e.g. IR, UV, coaxial). Color capability is a very important component in automatic document classification and validation, just as it is for human inspectors in judging ID characteristics. While much information can be gleaned from the color visible image of an ID, there is a lot of security value in analyzing the ID under alternate light sources such as near-infrared (IR) and Ultra-Violet (UV) lighting sources. IR images tend to show up any carbon based ink. Often this can be used to advantage to perform OCR in the absence of background color interference. In addition, some issuers imprint IDs with patterns or seals only visible in IR. Most IDs are printed such that their appearance under UV light is dull; this allows special colored patterns to become visible against a dark background when excited with UV light while many false documents will glow bright under a UV light source. A special glass bead laminate is used in some passports and licenses in which a special pattern becomes visible if illuminated with a coaxial light source. Images captured under such additional lighting scenarios basically add extra dimensionality to an ID, dimensions which raise the bar for would be forgers. Spatial resolution of scanning and camera devices is another important consideration. Typical resolutions run from approximately dpi in today s Reader- Authenticators. Higher resolution imaging allows the discernment and detection of microprint and texture based security features and may permit the decoding of special watermarks embedded in photo images produced by some ID card producers. Depending on the specific usage scenario, they are available in a variety of physical configurations for desktop, self service kiosk, or even mobile use. Desktop Devices - Desktop units have traditionally been used at customs inspection stations. On sometimes cramped workspace, the size footprint of the device is often an important consideration. Devised for reading passports and smaller documents, such Reader-Authenticators might be considered something like small copy machines with a glass platen surface on which the ID document is placed. Camera based units essentially take a picture of the ID under different illumination conditions which are sequentially generated. This has the advantage of very short read time since no motion of the document is involved. A hood-like cover prevents stray light from interfering with the imaging, particularly in detecting sometimes faint UV patterns. Such devices are usually intended for use by a dedicated operator. There are a number of companies who manufacture such hardware devices, which vary in size, spatial resolution, and speed of capture. There are new generations of smaller desktop units for processing ID-1 sized cards. Some of these devices mechanically transport the card into the unit and utilize fixed image sensor heads that the card is pulled across. Some such devices have separate reading heads for the front and back of the card or for alternate light sources (e.g. IR), and may contain a magnetic stripe read head as well. Today there are a number of simple card scanners or even duplex page full page scanners that can also accommodate ID-1 size cards. Such devices can act as input devices in a Reader-Authenticator System; however, authentication capability is usually reduced in the absence of IR or UV imaging capability. Kiosk Devices - In the interest of saving labor costs, automated kiosk mounted readers are now becoming available. These allow unattended or semi-attended operation. Such devices have found some current application in airline check-in terminals. They are beginning to be deployed in many financial application scenarios in situations where a driver s license might be required to be presented. Kiosks may have camera or scanner type operation depending on the variety of IDs which are to be processed. In some military situations, e.g. where the presenter may potentially have bomb material, it may be desirable for the ID checking to be done at some safe distance from the inspector. Only after appropriate ID or possibly chemical detector checking, would the presenter be allowed closer access., Mobile Devices - There are some situations where the checking of IDs may be performed by someone who needs to be mobile and may be assigned to different locations where it is not convenient to have a desktop system due to power or other constraints. One such possible situation is 248

4 at airports where inspectors examine passenger IDs prior to allowing entry to the security inspection area. For such situations, there are battery powered devices that may be hand carried or even waist mounted. Such systems may be self contained with localized processing and communication via wireless to a central server. When an operator uses a device for a significant portion of the day, having the ID processing be automatic becomes quite important. Fully automatic readers allow the operator to place the ID in any orientation into the device and then automatically detect the presence of a document, locate the document position within the view area, discriminating the ID image from fingers which may be in view, deskew the image, rotate to a correct orientation, and crop the ID from the background. This correctly oriented cropped image can then be classified as to issuer and series type by further analysis. Such a one step operation has a significant operator speed advantage over a process which might require a separate step of manually selecting an ID type from a list or of even requiring a separate swipe of the magnetic-stripe or scan with a separate barcode scanner. Devices are usually equipped with some indicator light feedback indicating such status items as when it is okay to place or remove a document, a color indication of the result of any authentication (accept or reject), and power status. Auditory feedback to the user can also be important, providing an indication when it is okay to remove the ID from the device after all necessary images have been captured. Operator efficiency at processing IDs is important if there are lines queued up, for instance, waiting to clear customs. Average document processing time with Reader- Authenticators typically should only take a few seconds. In some inspection scenarios (such as border crossing), frontline inspectors have to process a great many ID holders quickly but can pass off any documents with which they have difficulty to secondary inspectors who have more training and experience. Devices are usually interfaced with a PC via a USB-2, Firewire (IEEE-1394), or in some cases by network connection. The higher speed interface is necessary since high resolution ID images can be large in lossless uncompressed form especially if multiple light sources are involved. ID Processing Software Engine The software based analysis engine component of Reader- Authenticators is important to a successful deployment. Different implementations of Reader-Authenticators vary quite a bit in analysis capability. The following are some steps taken in a typical automated document authentication process. detect document insertion perform an initial document capture classify the document by type and series capture additional images in other lighting conditions if relevant (e.g. UV) extract relevant image data fields from the card (e.g. photo, signature, UV, IR) extract alphanumeric information (OCR, Bar Code, MRZ, magnetic stripe, RFID) perform authentication tests provide images, text, and authentication result to user / server All these steps can typically be performed in only a few seconds total. The image fields extracted, for example photos, could be used for facial matching with the presenter or previously captured stored database photo. Alphanumeric data can be extracted and decoded via multiple methodologies including Optical Character Recognition (OCR) of printed text strings, or software decoding of images of 1D or 2D barcodes. Driver s licenses from many states utilize the PDF-417 2D barcode format to encode the same information printed on the license in plain text. In readers equipped with integrated magnetic stripe heads or an embedded chip decoder, the data can be extracted and even compared with the printed information. It is much easier to generate fake documents with today s computer technology. Even without access to such technology, fake IDs are readily available for a price on the internet or the local street corner in some localities. The quality of fake IDs varies tremendously in some cases, even stolen genuine blank ID laminate and other blank stock is used. In other cases, presenters can get often away with fake IDs that look nothing like any document from the issuing government body if the issuing state is remote from the inspection location and the inspector is not as familiar with the form of the issuer s IDs. IDs can be truly authenticated via a wide variety of tests based on extracting embedded security features, e.g., microprint, UV and IR patterns, seals, holograms, and data field crosschecking. The measures that may be used to determine authenticity are different for each document. In some cases, the presence of some characteristic may determine if it is real; in others it is the absence. Where text data is available from multiple locations on an ID, the data can be crosschecked. Detailed pattern matching can be employed to detect subtle differences between real and false documents (something as minuscule as a missing or extra serif on a given letter, a slightly different font, or an intentional misspelling). In almost all cases there is some detectable difference between a real and fake document. The overall outcome of the authentication process can be a risk factor evaluation. A low risk factor indicates a high 249

5 correlation between the presented document and known good documents. A high risk factor could indicate a false or altered document or possibly even a damaged or very dirty document. In any case, the document would be examined in more detail or perhaps passed on for a secondary inspection. There are typically alarm thresholds that can be set for risk factors. Likewise there can be other informational alerts where an ID might be flagged because it is expired (or in the case of age restricted sales applications that the presenters date of birth indicates they are too young). 4. APPLICATION AREAS Reader-Authenticators find broad application in government, travel, financial, and commercial areas but are especially attractive in credentialing enrollment and in secure access control whether at a national border, secure installation, lobby of a building, or airport screening area. Here are a few real world scenarios where Reader- Authenticator technology systems could be applied today to enhance both efficiency and security: Travel Document Checking at Airports Airport travel document checkers currently use manual techniques for document inspection. Given the volume of inspections a document officer handles daily, even a small percentage of errors could result in a big compromise of security; all it takes is for one terrorist to escape detection. Human factors such as inadequate training, staff turnover, boredom, fatigue, rush-hour backlogs, and distraction threaten their effectiveness and thus overall security. A solution might involve providing officers with an automated document checking solution: a portable, cost-effective, wireless mini-workstation that would comfortably fit in one corner of the document checker s pedestal (or could be waist mounted), with the capability to authenticate almost all government-issued ID cards from around the world. An integrated bar code scanner could be used to scan the passenger s boarding pass simultaneously. In less time than an officer can manually vet a travel document, it could be authenticated, cross-checked with the boarding pass, and the information could be wirelessly integrated with auxiliary systems for further checks. Visitor ID Verification for Government and Sensitive Facilities Visitors to Government buildings and sensitive facilities such as ports and nuclear power plants must be properly screened. Today, security desks typically use a visual scan or a bar code scanner, sometimes in combination with database lookups, to vet IDs, a solution that is totally inadequate due to the ease with which the system can be scammed to the detriment of security. Systems for Travel Document Checking at Land Borders It is likely that several years will pass before enhanced Driver s License and e-passport issuances reach a point where the requirement for these at our land borders will no longer hurt tourism and trade. How do we secure our land borders without turning away millions of legitimate tourists and business people who have legitimate IDs that would pass the REAL ID test? While transitioning to more secure ID documents, provide border inspectors with an efficient, fast, automated document checking solution capable of authenticating most Government-issued IDs. Cross-check the captured information against watch lists of known terrorists and criminals. A bonus feature is the availability of a fall-back mechanism for authenticating electronic IDs that have chip failures. 5. SUMMARY We have seen examined some of the technology behind the operation of today s Reader-Authenticator devices for IDs. They can automatically classify, read, and extract image and data from a wide variety of existing IDs. The use of such devices is especially attractive in credentialing enrollment and in secure access control. They can be a cost effective, accurate, and time saving means of improving security by better ID validation. REFERENCES [1] Senate Committee on Finance, Border Insecurity, Take Two: Fake IDs Foil the First Line of Defense", August 2, [2] American Association of Motor Vehicle Administrators (AAMVA), Personal Identification AAMVA International Specification DL/ID Card Design, September 25, [3] International Civil Aviation Organization (ICAO), Document 9303, Machine Readable Travel Documents, Part 1 Machine Readable Passports (2002), Part 2 Machine Readable Visas (1994), Part 3 Size 1 and Size 2 Machine Readable Official Travel Documents (2002), ICAO, Montreal, Quebec, Canada. [4] Drivers License Guide Company, ID Checking Guide, 2004 Edition, Redwood City, CA, [5] Kuklinski, Theodore, Automated Identification of Current Identity Documents, 2004 IEEE Conference on Technologies for Homeland Security, Cambridge, MA, April 21-22,

6 [6] Monk, Bruce, Designing Identity Documents for Automated Screening, 2004 IEEE Conference on Technologies for Homeland Security, Cambridge, MA, April 21-22, [7] Monk, Bruce., Whitepaper: Improving Security - Protecting Privacy, A Practical Path to Greater National Security, AssureTec Systems, Inc., May 3,

Full page passport/document reader Regula model 70X4M

Full page passport/document reader Regula model 70X4M Full page passport/document reader Regula model 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses

More information

ID Document Scanning and Biometric Solutions

ID Document Scanning and Biometric Solutions ID Document Scanning and Biometric Solutions PRODUCT CATALOGUE Contents ID DOCUMENT SCANNING & BIOMETRIC SOLUTIONS Advanced ID document reading solutions Typical applications ID document scanning process

More information

DOCUMENT SECURITY ISSUES

DOCUMENT SECURITY ISSUES DOCUMENT SECURITY ISSUES Part of a Series of Datacard Group White Papers for the Secure Document Issuer DESIGNING AN ID DOCUMENT FOR ENHANCED SECURITY Overview Governments today are being driven to increase

More information

Checking Identification

Checking Identification ServSafe Alcohol Fundamentals of Responsible Alcohol Service 3 Checking Identification After completing this chapter, you should be able to: Identify acceptable forms of identification. Identify the characteristics

More information

Discover Germany s Electronic Passport

Discover Germany s Electronic Passport Discover Germany s Electronic Passport Starting 1 Nov. 2007 E-Passport 2nd Generation www.epass.de 1 Introducing Germany s e-passport If you want to know why there are electronic passports and how to recognize

More information

QUESTIONS & ANSWERS. How did the Department decide on the cost of the Passport Card?

QUESTIONS & ANSWERS. How did the Department decide on the cost of the Passport Card? 1 Front U.S.PASSPORT CARD APPLICATIONS ACCEPTED BEGINNING FEBRUARY 1 Back U.S. citizens may begin applying in advance for the new U.S. Passport Card beginning February 1, 2008, in anticipation of land

More information

Evidence of Identity: Breeder Documents and Beyond Barry J. Kefauver International national Standards ds Organization ation Why Care? A false passport in the hands of a terrorist is as dangerous as a bomb

More information

W.A.R.N. Passive Biometric ID Card Solution

W.A.R.N. Passive Biometric ID Card Solution W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused

More information

Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs

Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs 1 GOVERNMENTS ADOPTING DIGITAL STRATEGIES Governments designing/operating digital ecosystems to create, transform and optimize

More information

A Guide To Selected U.S. Travel/Identity Documents For Law Enforcement Officers

A Guide To Selected U.S. Travel/Identity Documents For Law Enforcement Officers U. S. Department of Justice Immigration and Naturalization Service A Guide To Selected U.S. Travel/Identity Documents For Law Enforcement Officers Prepared by: Law Enforcement Support Center U.S. Immigration

More information

USAccess System- Registrar. Help Guide. Prepared for

USAccess System- Registrar. Help Guide. Prepared for USAccess System- Registrar Help Guide Prepared for United States Department of Agriculture Office of Security 300 7th Street SW, Washington DC 20024 Version 1.0 December 12, 2007 USAccess System Registrar

More information

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Audio: This overview module contains an introduction, five lessons, and a conclusion. Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules

More information

Fingerprint Based Biometric Attendance System

Fingerprint Based Biometric Attendance System Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id awaghmare194@gmail.com kazmiali786@gmail.com Contact Numbers 8097031667 9167689265

More information

The Leading Provider of Identity Solutions and Services in the U.S.

The Leading Provider of Identity Solutions and Services in the U.S. THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that

More information

NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?

NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II? NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with

More information

MACHINE READABLE TRAVEL DOCUMENTS

MACHINE READABLE TRAVEL DOCUMENTS MACHINE READABLE TRAVEL DOCUMENTS TECHNICAL REPORT Version 1.0 Date - April 7, 2011 Published by authority of the Secretary General ICAO/NTWG SUB-WORKING GROUP FOR NEW SPECIFICATIONS td1 CARD File Author

More information

May 2010. For other information please contact:

May 2010. For other information please contact: access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.

More information

PalmSecureID for the EDUCATION MARKETPLACE

PalmSecureID for the EDUCATION MARKETPLACE PalmSecureID for the EDUCATION MARKETPLACE with Student Identity Integrity With the continued effort to increase efficiencies in the world of education, PalmSecureID can be utilized in a variety of settings

More information

Optical Character Recognition (OCR)

Optical Character Recognition (OCR) History of Optical Character Recognition Optical Character Recognition (OCR) What You Need to Know By Phoenix Software International Optical character recognition (OCR) is the process of translating scanned

More information

Credential and Workflow Design with TruCredential. DataCard Corporation. All rights reserved.

Credential and Workflow Design with TruCredential. DataCard Corporation. All rights reserved. Credential and Workflow Design with TruCredential 1 AGENDA About Entrust Datacard TruCredential Overview Credential Design Basics Credential and Workflow Design with TruCredential 2 ABOUT ENTRUST DATACARD

More information

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Biometrics in Physical Access Control Issues, Status and Trends White Paper Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry

More information

Time Clocks for Employee Attendance Tracking. Attendance on Demand, Inc. Farmington Hills, MI

Time Clocks for Employee Attendance Tracking. Attendance on Demand, Inc. Farmington Hills, MI Time Clocks for Employee Attendance Tracking Attendance on Demand, Inc. Farmington Hills, MI Time clocks record employee attendance information including start, end, and lunch break times. This information

More information

Chapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 5 Understanding Input Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define input and differentiate among a program, command, and user response Identify

More information

Time Clocks for Employee Attendance Tracking

Time Clocks for Employee Attendance Tracking Time Clocks for Employee Attendance Tracking InfoTronics, Inc. Whitepaper Time clocks record employee attendance information including start, end, and lunch break times. This information is then shared

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

Border control using biometrics in Japan. September 2008 NEC Corporation/Daon

Border control using biometrics in Japan. September 2008 NEC Corporation/Daon Border control using biometrics in Japan September 2008 NEC Corporation/Daon Today s Agenda 1. Project Overview 2. Challenges and Lessons Learned 1. Project Overview Japan Biometrics Identification System

More information

Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA

Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the

More information

Implementation of biometrics, issues to be solved

Implementation of biometrics, issues to be solved ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents

More information

Identity Verification Program Guide

Identity Verification Program Guide Identity Verification Program Guide The National Crime Prevention and Privacy Compact Council (Compact Council) is a15-member body of local, state, and federal governmental officials which prescribes system

More information

POSITION PAPER. The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND

POSITION PAPER. The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND POSITION PAPER The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND Dear ACI Members and World Business Partners, With the increasing need for secure personal

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on

More information

THE LEADING EDGE OF BORDER SECURITY

THE LEADING EDGE OF BORDER SECURITY THE LEADING EDGE OF BORDER SECURITY RECORD-BREAKING TRAVEL CREATING NEW CHALLENGES TIM KLABUNDE Entrust Datacard; Director, Government Vertical Marketing THE ERA OF THE MOBILE IDENTITY In an increasingly

More information

A whitepaper on: Invisible and Fluorescing Bar Code Printing and Reading

A whitepaper on: Invisible and Fluorescing Bar Code Printing and Reading A whitepaper on: Invisible and Fluorescing Bar Code Printing and Reading Important technical considerations that are the key to successful implementations Version 1.03 P a g e 2 OVERVIEW Background: Inks

More information

Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems

Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems A Smart Card Alliance White Paper May 2002 Smart Card Alliance 191 Clarksville Road Princeton Junction, NJ 08550 www.smartcardalliance.org

More information

AIE Frequently Asked Questions

AIE Frequently Asked Questions AIE Frequently Asked Questions Q: What is AIE? A: AIE stands for Automated Installation Entry (AIE) The AIE system is designed to leverage technology to increase security for Soldiers, Family Members,

More information

Mobile Driver s License Solution

Mobile Driver s License Solution Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity

More information

Preventing fraud in epassports and eids

Preventing fraud in epassports and eids Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,

More information

Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers

Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers Frequently Asked Questions and Answers 2011 CardLogix Corporation. All rights reserved. This document contains information

More information

Paper-based Document Authentication using Digital Signature and QR Code

Paper-based Document Authentication using Digital Signature and QR Code 2012 4T International Conference on Computer Engineering and Technology (ICCET 2012) Paper-based Document Authentication using Digital Signature and QR Code Maykin Warasart and Pramote Kuacharoen Department

More information

Technical specifications for Digitization of Consular documents

Technical specifications for Digitization of Consular documents Annexure A 1. Deliverables Technical specifications for Digitization of Consular documents Scanning/ Digitization work has to be carried out at the respective Indian Mission/Post where-in all infrastructure/

More information

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies

More information

CRESCENDO SERIES Smart Cards. Smart Card Solutions

CRESCENDO SERIES Smart Cards. Smart Card Solutions CRESCENDO SERIES Smart Cards Smart Card Solutions Crescendo offers the lowest total cost of ownership (TCO) for a combined logical and physical access control solution. Crescendo smart cards allow me to

More information

MegaMatcher Case Study

MegaMatcher Case Study MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated

More information

DigitalPersona Pro Enterprise

DigitalPersona Pro Enterprise DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and

More information

Get the benefits of mobile document capture with Motorola s Advanced Document Imaging

Get the benefits of mobile document capture with Motorola s Advanced Document Imaging Tech Brief Get the benefits of mobile document capture with Motorola s Advanced Document Imaging Technology Executive summary While the world is migrating to a paperless society, there are still many types

More information

Application of Biometric Technology Solutions to Enhance Security

Application of Biometric Technology Solutions to Enhance Security Application of Biometric Technology Solutions to Enhance Security Purpose: The purpose of this white paper is to summarize the various applications of fingerprint biometric technology to provide a higher

More information

A Barcode Primer for Manufacturers Dr. Peter Green BellHawk Systems Corporation

A Barcode Primer for Manufacturers Dr. Peter Green BellHawk Systems Corporation A Barcode Primer for Manufacturers Dr. Peter Green BellHawk Systems Corporation Introduction This document is an introduction to the principles and practice of barcode scanning as it relates to a manufacturing

More information

QUICK REFERENCE GUIDE MOBILE HUMAN MACHINE INTERFACE (HMI): INNOVATION THAT EMPOWERS THE MOBILE OPERATOR

QUICK REFERENCE GUIDE MOBILE HUMAN MACHINE INTERFACE (HMI): INNOVATION THAT EMPOWERS THE MOBILE OPERATOR MOBILE HUMAN MACHINE INTERFACE (HMI): INNOVATION THAT EMPOWERS THE MOBILE OPERATOR Mobile operators are critical to ensuring the overall efficiency and uptime of the production line and play a critical

More information

FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and ID verification.

FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and ID verification. Discover a new conception for customer verification and electronic contract management Your benefit is our task. FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and

More information

REAL ID Act Title II H.R.1268

REAL ID Act Title II H.R.1268 H.R.1268 Emergency Supplemental Appropriations Act for Defense, the Global War on Terror, and Tsunami Relief, 2005 (Enrolled as Agreed to or Passed by Both House and Senate) TITLE II--IMPROVED SECURITY

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

[INSTALLING THE M2SYS BIOMETRIC SCANNING SYSTEM]

[INSTALLING THE M2SYS BIOMETRIC SCANNING SYSTEM] Installing the M2SYS BIOMetric Scanning System 2009 Fellowship Technologies, LP [INSTALLING THE M2SYS BIOMETRIC SCANNING SYSTEM] CONSULTING & DELIVERY SERVICES 7/22/2010 1 TABLE OF CONTENTS 2 Figures Index...

More information

SCB Access Single Sign-On PC Secure Logon

SCB Access Single Sign-On PC Secure Logon SCB Access Single Sign-On PC Secure Logon Manage all your passwords One smart card to access all your applications past & future Multi-factor authentication Dramatically increase your security Save $150

More information

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems

More information

Complete. security. begins with 3M

Complete. security. begins with 3M Complete security begins with : Global Helping to protect people, documents and goods Leadership in the Security Industry For more than 30 years, Security has been a trusted partner, helping governments

More information

Assignment 1 Biometric authentication

Assignment 1 Biometric authentication Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4

More information

Biometrics for Public Sector Applications

Biometrics for Public Sector Applications Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach

More information

Using Strong Authentication for Preventing Identity Theft

Using Strong Authentication for Preventing Identity Theft Position Paper Using Strong Authentication for Preventing Identity Theft Robert Pinheiro Consulting LLC Better identity authentication has been proposed as a potential solution not only to identity theft,

More information

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201. PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize

More information

Optical passport reader VPR-451/Blue VPR-451/USB VPR-451e/Blue VPR-451e/USB

Optical passport reader VPR-451/Blue VPR-451/USB VPR-451e/Blue VPR-451e/USB Document reading systems Optical passport reader VPR-451/Blue VPR-451/USB VPR-451e/Blue VPR-451e/USB User manual www.vicomp.com.pl Optical passport reader VPR - 451 Contents Introduction 2 Unpacking 2

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

ONE PLATFORM FOR ALL YOUR PRINT, SCAN, AND DEVICE MANAGEMENT

ONE PLATFORM FOR ALL YOUR PRINT, SCAN, AND DEVICE MANAGEMENT ONE PLATFORM FOR ALL YOUR PRINT, SCAN, AND DEVICE MANAGEMENT MANAGE ALL PRINTING & SCANNING WITH ONE SINGLE PLATFORM Incorporating uniflow into your document processes will lead to real improvements in

More information

PKD Board ICAO PKD unclassified B-Tec/37. Procedures for the ICAO Public Key Directory

PKD Board ICAO PKD unclassified B-Tec/37. Procedures for the ICAO Public Key Directory Procedures for the ICAO Public Key Directory last modification final 1/13 SECTION 1 INTRODUCTION 1.1 As part of the MRTD initiative by ICAO, the Participants will upload to and download from the PKD, their

More information

Modular biometric architecture with secunet biomiddle

Modular biometric architecture with secunet biomiddle Version 2.1 Modular biometric architecture with secunet biomiddle White Paper Version 2.0, 25/03/10 secunet Security Networks AG Copyright 2010 by secunet Security Networks AG This document is for information

More information

Lobby Track Getting Started Guide

Lobby Track Getting Started Guide Jolly Presents Lobby Track Getting Started Guide An Introduction to Lobby Track Contents Introducing Lobby Track... 3 Overview... 3 A Quick Start... 6 Quick Start Option 1... 6 Getting to Configuration...

More information

CASE STUDY 3 Canada Border Services Agency (CBSA) Aéroport de Montréal Vancouver International Airport

CASE STUDY 3 Canada Border Services Agency (CBSA) Aéroport de Montréal Vancouver International Airport CASE STUDY 3 Canada Border Services Agency (CBSA) Aéroport de Montréal Vancouver International Airport Page 1 Table of Contents EXECUTIVE SUMMARY... 3 1 CUSTOMER NAME... 4 2 BUSINESS CASE BUSINESS DRIVERS...

More information

Lenovo Miix 2 8. User Guide. Read the safety notices and important tips in the included manuals before using your computer.

Lenovo Miix 2 8. User Guide. Read the safety notices and important tips in the included manuals before using your computer. Lenovo Miix 2 8 User Guide Read the safety notices and important tips in the included manuals before using your computer. Notes Before using the product, be sure to read Lenovo Safety and General Information

More information

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION Shermin Sultana 1, Asma Enayet 1 and Ishrat Jahan Mouri 1 1 Department of Computer Science and Engineering, Stamford

More information

Optical Memory Cards in Federal Government

Optical Memory Cards in Federal Government NIST Storage & Processor Card Workshop July 7 & 8, 2003, Gaithersburg, MD Optical Memory Cards in Federal Government Stephen Price-Francis Vice President, Business Development LaserCard Systems Corporation

More information

Access Control, Ticketing and Booking System for Sports Halls

Access Control, Ticketing and Booking System for Sports Halls Access Control, Ticketing and Booking System for Sports Halls SDD Information Technology Group has developed system for ticketing, booking and access control for sport objects. The system is based on contact

More information

Payment Card Security Elements and Card Acceptance. Instruction

Payment Card Security Elements and Card Acceptance. Instruction Payment Card Security Elements and Card Acceptance Instruction Content Internetbank. General requirements.... Use of Card in payment terminal.... Transaction cancellation.... Personal identification....

More information

More Power and Performance With Each Printed Card

More Power and Performance With Each Printed Card s tan d ar d ID SOlutions GUIDE More Power and Performance With Each Printed Card the importance of secure identity Today s society shares information at incredible speeds. A technologically advanced world

More information

Coesys Border Management

Coesys Border Management Coesys Border Management Offering convenience for secure border crossing Improving border intelligence for detection and prevention Supporting your immigration organization Combating cross-border crime,

More information

Chapter 5 Objectives. Chapter 5 Input

Chapter 5 Objectives. Chapter 5 Input Chapter 5 Input Describe two types of input List characteristics of a Identify various types of s Identify various types of pointing devices Chapter 5 Objectives Explain how voice recognition works Understand

More information

Fingerprint-Based Authentication System for Time and Attendance Management

Fingerprint-Based Authentication System for Time and Attendance Management 1 2 3 4 5 6 7 8 9 10 11 12 Fingerprint-Based Authentication System for Time and Attendance Management ABSTRACT Ikuomola, Aderonke Justina Ondo State University of Science and Technology, Okitipupa, Ondo

More information

LobbyWorks VMS Configuration and Technical Requirement Survey

LobbyWorks VMS Configuration and Technical Requirement Survey LobbyWorks VMS Configuration and Technical Requirement Survey Initial Date Completed: Revised Date: Sales Person: Name Office Phone: Email Address Title: Mobile Phone: Customer Contact: Name: IT Person:

More information

How 2D Scanning Can Benefit your Business

How 2D Scanning Can Benefit your Business How 2D Scanning Can Benefit your Business BarcodesInc www.barcodesinc.com 1.800.351.9962 What You'll Learn in this ebook 2D scanning vs. traditional laser scanning - what are the advantages? How 2D scanners

More information

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access

More information

Back to Basics: Introduction to Industrial Barcode Reading

Back to Basics: Introduction to Industrial Barcode Reading Back to Basics: Introduction to Industrial Barcode Reading 1 Agenda What is a barcode? History 1 D codes Types and terminology 2 D codes Types and terminology Marking Methods Laser Scanning Image Based

More information

Coesys Border Management

Coesys Border Management Coesys Border Management Offering convenience for secure border crossing Improving border intelligence for detection and prevention Supporting your immigration organization Combating cross-border crime,

More information

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

Form Design Guidelines Part of the Best-Practices Handbook. Form Design Guidelines

Form Design Guidelines Part of the Best-Practices Handbook. Form Design Guidelines Part of the Best-Practices Handbook Form Design Guidelines I T C O N S U L T I N G Managing projects, supporting implementations and roll-outs onsite combined with expert knowledge. C U S T O M D E V E

More information

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards Converged Smart Card for Identity Assurance Solutions Crescendo Series Smart Cards Crescendo is the proven smart card solution for a combined logical and physical access control solution. Crescendo smart

More information

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1

More information

ACI - NA PUBLIC SAFETY & SECURITY FALL CONFERENCE 2012 AVIATION BADGING EFFICIENCIES

ACI - NA PUBLIC SAFETY & SECURITY FALL CONFERENCE 2012 AVIATION BADGING EFFICIENCIES ACI - NA PUBLIC SAFETY & SECURITY FALL CONFERENCE 2012 AVIATION BADGING EFFICIENCIES ACI-NA PUBLIC SAFETY & SECURITY, FALL CONFERENCE 2012 BADGING BEST PRACTICES SURVEY Cheryl Vauk Productive Solutions

More information

ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE THREAT RESPONSE SYSTEM USING STATE OF THE ART INFORMATION TECHNOLOGIES IN THE REPUBLIC OF KOREA

ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE THREAT RESPONSE SYSTEM USING STATE OF THE ART INFORMATION TECHNOLOGIES IN THE REPUBLIC OF KOREA International Civil Aviation Organization WORKING PAPER A38-WP/273 9/9/13 (Information paper) English only Agenda Item 13: Aviation Security Policy ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE THREAT RESPONSE

More information

Understanding Digital Signature And Public Key Infrastructure

Understanding Digital Signature And Public Key Infrastructure Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where

More information

DriveLock and Windows 8

DriveLock and Windows 8 Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

United States Canada Border Crossing Information

United States Canada Border Crossing Information United States Canada Border Crossing Information Entry / Exit Requirements for U.S. Citizens.. page 1 Who Needs What?. page 2 Approved Documents.. page 2 Tips. page 5 Q & A. page 6 Introduction All United

More information

3M Public Security. Industry-leading reader and scanner. solutions

3M Public Security. Industry-leading reader and scanner. solutions 3M Public Security Industry-leading reader and scanner solutions Improving security across markets and around the globe 3M offers a wide variety of hardware and software solutions that help take the guesswork

More information

3M Cogent, Inc. White Paper. Facial Recognition. Biometric Technology. a 3M Company

3M Cogent, Inc. White Paper. Facial Recognition. Biometric Technology. a 3M Company 3M Cogent, Inc. White Paper Facial Recognition Biometric Technology a 3M Company Automated Facial Recognition: Turning Promise Into Reality Once the province of fiction, automated facial recognition has

More information

QUE Accounting Inc. QUE Accounting Software and Services

QUE Accounting Inc. QUE Accounting Software and Services QUE Accounting Software and Services A) Time and Attendance Calculate gross payroll hours for employees using access control time stamps as time punches Stand Alone PC entry, Time Clock, Bar Code readers,

More information

Keeping Track of Fixed Assets with Microsoft Dynamics GP LEVERAGING MICROSOFT DYNAMICS GP AND BARCODE TECHNOLOGY

Keeping Track of Fixed Assets with Microsoft Dynamics GP LEVERAGING MICROSOFT DYNAMICS GP AND BARCODE TECHNOLOGY Keeping Track of Fixed Assets with Microsoft Dynamics GP LEVERAGING MICROSOFT DYNAMICS GP AND BARCODE TECHNOLOGY October 2011 ne Need to get a better handle on managing your fixed assets? Panatrack has

More information

Enjoy easy, fast and versatile scanning

Enjoy easy, fast and versatile scanning DR-1210C DR-1210C Complete Document Manager Enjoy easy, fast and versatile scanning Easy for everyone. Enhance efficiency whatever the size of your business. Be competitive. Scan all your paperwork into

More information

Establishing and Managing the Schengen Masterlist of CSCAs

Establishing and Managing the Schengen Masterlist of CSCAs Establishing and Managing the Schengen Masterlist of CSCAs Big City 21/04/2015 European Commission Directorate-General HOME Unit B3 Information Systems for Borders and Security Richard.Rinkens@ec.europa.eu

More information

Impact+OCR 1.1 Readme

Impact+OCR 1.1 Readme April 22, 2016 Impact+OCR 1.1 Readme Welcome to the Impact+OCR (Optical Character Recognition) application, a complete software and hardware application to solve your machine vision OCR needs. This is

More information

1. User Guide... 2 1.1 Logging On to OnDemand... 2 1.2 Managing Your Files... 3 1.2.1 Saving Files from OnDemand... 4 1.2.2 Transferring Files

1. User Guide... 2 1.1 Logging On to OnDemand... 2 1.2 Managing Your Files... 3 1.2.1 Saving Files from OnDemand... 4 1.2.2 Transferring Files User Guide................................................................................................. 2 1 Logging On to OnDemand................................................................................

More information