PROVEN BY TIME.
|
|
- Jared Adams
- 7 years ago
- Views:
Transcription
1 PROVEN BY TIME
2 Applying biometric solutions in identity documents SPEAKER 1: SPEAKER 2: Dr hab. inŝ. Aleksander Nawrat Prof. Pol. Śl. Member of the Management Board at WASKO Łukasz Hoppe Director of Security Systems Department at WASKO Wszelkie prawa zastrzeŝone. śaden fragment prezentacji nie moŝe być powielany lub rozpowszechniany w jakiejkolwiek formie i wŝaden sposób bez uprzedniego zezwolenia WASKO S.A
3 Wszelkie prawa zastrzeŝone. śaden fragment prezentacji nie moŝe być powielany lub rozpowszechniany w jakiejkolwiek formie i wŝaden sposób bez uprzedniego zezwolenia WASKO S.A
4 Prizes and mentions in 2010 The winner of the competition Innovation Leader 2010 granted at the Fair of Economic and Scientific Innovation INTARG 2010 for technological innovation: WAMAX the First Polish platform in WiMax technology Wasko S.A. and the Military University of Technology WAT received a Grand Prix at the International Warsaw Innovation Exhibition IWIS 2010 granted for the project and development of innovative National Scrambler National Leaders of Innovation and Development Award 2010 in large firm category President of the Polish Chamber of Commerce Award for special achievements in the field of innovation The Prize of Economic Leader of Silesian Voivodship granted by Chamber of Commerce an Industry in Katowice The Gold Badge of Honour for WASKO S.A. for Merits for Silesian Voivodship granted by Silesian Voivodeship Council Wszelkie prawa zastrzeŝone. śaden fragment prezentacji nie moŝe być powielany lub rozpowszechniany w jakiejkolwiek formie i wŝaden sposób bez uprzedniego zezwolenia WASKO S.A
5 Biometrics in IDs
6 What is biometrics in modern EU. Today, many state governments are trying to protect their country and citizens from terrorist attacks, crime and the influx of undesirable groups of people that is what biometrics is for - a science that studies living organisms for the presence of measurable individual characteristics.
7 Technological advantage of the electronic document over a traditional one. Protection, security, versatility and reliability, Electronic identity Graphical and electronic personalization, Electronic signature and data encryption services Applying a dokument to authenticating and authorization in IT systems, Thanks to a termo-transferred overprint and laser engraving graphic personalisation ensures a high quality of issued documents/
8 Passports The need to follow with technological progress and increasing international threat, called for the development of international standards, aimed at unification travel documents and introduction of biometric identifiers in them. ICAO International Civil Aviation Organization issued a set of recomendations for specyfying Machine Readable Travel Documents, including passports The document "Doc "has evolved and the ICAO recommendations are reflected, among others in the Standards of ISO / IEC dedicated to documents. 13 December 2004 the EU set a deadline for the introduction of biometric features in passports. The first Polish biometric document containing a microchip was a passport. On 28 August 2006, every citizen applying for a passport could get a biometric document.
9 How to recognize a document containing a microchip? ICAO group called the New Technologies Working Group, defined a sign symbolizing the electronic document. It was recommended that this sign was placed at the bottom of the front cover, below the word "PASSPORT" There are many different documents for identity verification ID, Passport, insurance card, driving license. Biometrics is being placed in this kind of documents increasingly, which lets to create a document very reliable and difficult to counterfeit. Putting this type of data in the document creates a strong link with the holder.
10 Verification and identification Identification and verification schemes VERIFICATION user data, comparing the pattern I' m PIOTROWSKI, this is my biometric data System response Yes, You're PIOTROWSKI IDENTIFICATION This is biometric data, who is identified? System response This is Mr. Zych tested data are compared with all records in the database
11 RFID Technology Reading data stored on an electronic biometric document is possible with RFID (Radio Frequency IDentification). Polish passports issued now contain the first and second biometric feature (facial image and fingerprints of the holder), secured with BAC (Basic Access Control) and EAC (Extended Access Control). Contactless holding biometrics templates in RFID documents
12 How to exploit the potential of science? Finger Vein biometric authentication is based on unique vein patterns which are located inside the human finger.
13 Privacy compliant biometrics Maximumm achievable security (min. False Acceptance Rate) Non traceable biometrics (template cannot be stolen) Higiening biometric Based on unique biometric templates which are not changing during whole life High acceptance by society Easy access to e-services for people digitally excluded and disabled Universal technolog with wide range of applications
14 Finger Vein Pattern Matching 1. Image capture Infra-red light intensity is adjusted to acquire optimal image 2. Image normalisation Finger outline is adjusted 3. Template extraction Mapping the veins and creating a template 4. Template matching Reference template stored on card, internally, on PC or server.
15 Finger Vein medical study The universality Veins and arteries are essential for circulating oxygen and nutrients to the finger tissues Everyone has veins of approximately 0.3 to 1.0 mm thick in the skin surface layer. Everybody can use Finger Vein authentication method The uniqueness The forming process of the vascular network undergoes change from its initial state The arteriovenous network is formed subject to the effects of low oxygen and blood flow This process takes place under genetic constraints, but is not deterministic; it includes many probabilistic elements Large individual differences in the pattern of the vein High utility as the basis for personal authentication
16 Finger Vein: important technology in goverment biometric laboratory IMM (Institute of Mathematics Machines) is goverment lab owned by Ministry of Economy of Poland. FV system is part of national biometric and e-signature lab. IMM conclusions: FV is most advanced, secure and user friendly biometric Easy to adopt in big populations Highest FAR, FRR, FTE rates (own results) UBReader (609,602UE) are most advanced biometric devices along with Iris Scanner
17
18 Intelligent identity PERSON carries out a process of personal data registration, a process of graphic and electronic personalisation, distribution and issuing ready identity documents as well. The documents issued by the PERSON system meet the most rigorous requirements in the scope of security and reliability. Thanks to an application of most recent recommendations and standards in a field of microprocessor cards, cryptography and biometry the documents are consistent with the ICAO requirements and they can be used to person identification worldwide. Identity documents issued by the PERSON system are like versatile users identity carrier. It is possible to apply the carrier in any IT system and the identity card can be also used as biometric data carrier.
19 The process of documents production in the PERSON System Activation of personnal and biometrica data Data registry and verification Data transmission to a central system Production and personalization the documents Quality control and documents distribution
20 Security Issuing documents which contain digital certificates within Public Key Infrastructure. PKI is a reliable and universal way of authenticating in IT system. Thanks to it a document s owner can log on to his computer or VPN network. Certification Center Module a part of the PERSON System ensures a complex servicing of digital certificates in a scope of: Issuing digital certificates, Certificates life cycle servicing (suspending, cancelling, renewing), PKI services (CRL publication, OCSP, time marking). Applying microprocessor in identity document enables: Storing personal data in digital form, Reliable and fast identity verification that uses biometry (e.g. fingerprint pattern, vascular system), Confirming document authenticity that uses advanced cryptographic techniques, Multilevel document protection against attempts of forgery or unauthorized usage.
21 PERSON Advantages Possibility of exploiting electronic signature, Applying a document to authenticating and authorization in IT system, Increasing the security of an thanks to enciphering and digital signature, Thanks to a termo-transffered overprint and laser engraving graphic personalisation ensures a high quality of issued documents.
22 EU border security The opening of internal borders between EU member states gives very tangible benefits for ordinary people who now can move freely without border controls. However, moving freely inside the EU borders is inextricably linked with increased controls at EU external borders in order to effectively combat human and drug trafficking, crime, illegal immigration and terrorism. The EU countries cooperate in the area of policing and justice, to enhance security in Europe.
23 Security Security is a major concern for European citizens. In today's world, where Europe is still integrating in the European Union, security of States, Nations and their citizens is a matter for every European. In Poland, biometric passports are issued from 28 August An important change was the introduction of electronic passports in the form of a security chip encoded with information about the passport holder. Introducing a new design of the passport, in addition to the obligations of EU membership, is used primarily to minimize material losses related to identity theft and forgery of documents. Biometric passport also raises the prestige of Poland on international arena because it is one of the most advanced documents in the world.
24 Safe stadiums, sports halls and other places of sports or artistic events. What possibilities gives card with biometric record of individual traits? Security once put on a card biometric data cannot be cancelled or reissued Precision an identification requires transfer a set of biometric information to card which compares them with primary data Protection the matching process is performed entirely on card Universality applying a document to authenticating and authorization in IT systems
25 Intelligent identity Biometric authentication can be used in many different aspects, for example Supporter Card it s a magnetic card which is a type of ticket Working identity, Access cards, Official cards, Student cards, Regular Customer Cards, Patient Cards, Journey documents Nowadays biometric techniques are one of the most dynamically developing in ICT (Information and communication technology) branch. It is necessary to expect a large increase in practical use of biometrics in the future - especially in passports and travel documents systems. So far, in Poland the biometric is not in common usage yet.
26 Intelligent identity European Football Championships Euro 2012 will be the greatest sport event, where polish security services and companies specialised in creating Intelligent Safty Systems will be tested. System OLIMP created by WASKO S.A. is modern solution providing: Safety for Fans, Increase marketability of sport object, Increase of tickets selling system performances, Successful execution of stadium ban, 100% agreement with Act on Mass Events Safety.
27 EURO 2012 & Supporter Card Investitions in safety are expensive and clubs are trying to optymalise them with realization of basic functionalities supportiong quick results. An example of this kind of operation is mentioned before - Supporter Card. In more cases it becomes simple visual identificator, in complex solution it evolves in to electronic contactless card, which is identificator or identificator containing electronical ticket. But All this solutions are not perfect, they don t verify person using card, they only verify card. For automation of this process it is necessary to implement biometry, which will allow checking if fan is using its own card during verification.
28 Biometric and Smart Card combination in WASKO systems Contactless chip card MIRAFE stores data using advanced authentication methods. The system can be used to manage the process of issuing such documents as: Student Cards Identity Cards Employee IDs Access Cards Personal Membership Cards Patient Cards Travel Documents Passports The Card is personalized The Card as a part of entry control process verify and gives an access.
29 Contact us: WASKO S.A. ul. Berbeckiego Gliwice tel fax wasko@wasko.pl
Implementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
More informationStatewatch Briefing ID Cards in the EU: Current state of play
Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled
More informationDiscover Germany s Electronic Passport
Discover Germany s Electronic Passport Starting 1 Nov. 2007 E-Passport 2nd Generation www.epass.de 1 Introducing Germany s e-passport If you want to know why there are electronic passports and how to recognize
More informationWe Must Comply with International Requirements! Introducing Biometric ID Cards in France
We Must Comply with International Requirements! Introducing Biometric ID Cards in France Meryem Marzouki CNRS - LIP6/PolyTIC / IRIS Meryem.Marzouki@iris.sgdg.org www.iris.sgdg.org Terrorizing Privacy?
More informationEnd-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments
More informationEnd-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory
More informationLandscape of eid in Europe in 2013
Landscape of eid in Europe in 2013 July 2013 Eurosmart White Paper Contents Executive Summary 3 1. Purpose of the document 3 2. EU regulation 3 3. EU Member States identification policies 4 3.1. National
More informationSecurity by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the
More informationEvidence of Identity: Breeder Documents and Beyond Barry J. Kefauver International national Standards ds Organization ation Why Care? A false passport in the hands of a terrorist is as dangerous as a bomb
More informationPreventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
More informationCombatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs
Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs 1 GOVERNMENTS ADOPTING DIGITAL STRATEGIES Governments designing/operating digital ecosystems to create, transform and optimize
More informationAchieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
More informationBiometrics for payments. The use of biometrics in banking
Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,
More informationFAQs Electronic residence permit
FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit
More informationMoving to the third generation of electronic passports
Moving to the third generation of electronic passports A new dimension in electronic passport security with Supplemental Access Control (SAC) > WHITE PAPER 2 Gemalto in brief Gemalto is the world leader
More informationMay 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.
More informationMobile Driver s License Solution
Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity
More informationElectronic machine-readable travel documents (emrtds) The importance of digital certificates
Electronic machine-readable travel documents (emrtds) The importance of digital certificates Superior security Electronic machine-readable travel documents (emrtds) are well-known for their good security.
More informationSmart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
More informationBiometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
More informationW.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
More informationID Certificates (SMIME)
ID Certificates (SMIME) Reliability on the Internet Technology, security and usage www.certum.eu CONTENTS Introduction I. ID Certificates in a nutshell... 1. What is an ID Certificate?... 2. What is a
More informationBiometric Electronic Signaturein a Bank Biometryczny podpis elektroniczny w kontekście banku
Biometric Electronic Signaturein a Bank Biometryczny podpis elektroniczny w kontekście banku Agenda 1. Biometric e-signature: what is it? 2. Possible Biometric Signature Applications 3. Biometric Electronic
More informationDigital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
More informationORDINANCE ON THE ELECTRONIC SIGNATURE CERTIFICATES IN THE. Chapter One GENERAL PROVISIONS
ADMINISTRATIONS Effective as of 13 June 2008 Adopted by Decree of the Council of Ministers No 97 of 16 May 2008 Promulgated SG, No. 48 of 23 May 2008 Chapter One GENERAL PROVISIONS Article 1. This Ordinance
More informationBest Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
More informationTrends in Finger Vein Authentication and Deployment in Europe
Hitachi Review Vol. 64 (2015), No. 5 275 Featured Articles Trends in Finger Vein Authentication and Deployment in Europe Yuji Nakamaru Makiko Oshina Shuichi Murakami Ben Edgington Ravi Ahluwalia OVERVIEW:
More informationCertum QCA PKI Disclosure Statement
CERTUM QCA PKI Disclosure Statement v1.1 1 Certum QCA PKI Disclosure Statement Version 1.1 Effective date: 1 st of April, 2016 Status: valid Asseco Data Systems S.A. ul. Żwirki i Wigury 15 81-387 Gdynia
More informationFAQs - New German ID Card. General
FAQs - New German ID Card General 1) How to change from the old ID card to the new one? The new Law on Identification Cards came into effect on 1 November 2010. Since then, citizens can apply for the new
More informationE-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption
Journal of Computer Science 6 (7): 723-727, 2010 ISSN 1549-3636 2010 Science Publications E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Najlaa A. Abuadhmah,
More informationPRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
More informationQUESTIONS & ANSWERS. How did the Department decide on the cost of the Passport Card?
1 Front U.S.PASSPORT CARD APPLICATIONS ACCEPTED BEGINNING FEBRUARY 1 Back U.S. citizens may begin applying in advance for the new U.S. Passport Card beginning February 1, 2008, in anticipation of land
More informationEnabling Security, Compliance and Efficiency: Achieve Your Federal Identification Credentialing Goals
Enabling Security, Compliance and Efficiency: Achieve Your Federal Identification Credentialing Goals executive summary Identity management and verification depend on trusted credentialing technologies.
More informationNOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?
NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with
More informationBALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION
BALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION SOME RECENT NATIONAL AND REGIONAL INITIATVES IN IDENTITY MANAGEMENT
More informationFull page passport/document reader Regula model 70X4M
Full page passport/document reader Regula model 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses
More informationKeep Out of My Passport: Access Control Mechanisms in E-passports
Keep Out of My Passport: Access Control Mechanisms in E-passports Ivo Pooters June 15, 2008 Abstract Nowadays, over 40 different countries issue biometric passports to increase security on there borders.
More informationPhysical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network
More informationBest Solutions for Biometrics and eid
Best Solutions for Biometrics and eid In times of virtual communication even a person s identity is converted into an electronic form with the help of biometrics and then organised through intricate technical
More informationGlobal Deployment of Finger Vein Authentication
Global Deployment of Finger Vein Authentication Hitachi Review Vol. 61 (2012), No. 1 35 Yutaka Matsui Akihito Sawada Shigenori Kaneko Yuji Nakamaru Ravi Ahluwalia Dipak Kumar OVERVIEW: Finger vein authentication
More informationThis method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
More informationFinger Vein digital biometric signature: use cases
Finger Vein digital biometric signature: use cases Arkadiusz Buroń Presales & Account Director Information Systems Group Serock, 2015-09-23 Agenda 1. Introduction to Finger Vein technology 2. Digital biometric
More informationAuthentication Levels. White Paper April 23, 2014
Summary White Paper April 23, 2014 This document describes levels of authentication that can be utilized for users known and unknown to gain access to applications and solutions. Summary... 1 Description...
More informationOpinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
More informationExpertise for biometric solution
Expertise for biometric solution Biometrics Solutions from Kaba Kaba is the leading manufacturer for biometric solutions in time and attendance, shop floor data collection and access control. From the
More informationSOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS
SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS The number of people in need of medical care in the world is continuously increasing, as evidenced by the evolving demographic outlook in both developed
More informationNFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
More informationaddressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
More informationAudio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
More informationA Note on the Relay Attacks on e-passports
A Note on the Relay Attacks on e-passports The Case of Czech e-passports Martin Hlaváč 1 and Tomáš Rosa 1,2 hlavm1am@artax.karlin.mff.cuni.cz and trosa@ebanka.cz 1 Department of Algebra, Charles University
More informationWhite paper Fujitsu Identity Management and PalmSecure
White paper Fujitsu Identity Management and PalmSecure To protect your business, it s critical that you can control who accesses your data, systems and premises. Today, many organizations rely on passwords
More informationDigital Signatures and Interoperability
Setting Processes for Electronic Signature Dr. Joachim Schiff On behalf of the SPES Consortium Workgroup City of Saarbruecken IKS Nell-Breuning-Allee 1 D-66115 Saarbruecken Germany Tel. 0049 681 905 5000
More informationBiometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI
Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems
More informationEuropean Electronic Identity Practices Country Update of Portugal
European Electronic Identity Practices Country Update of Portugal Speaker: Anabela Pedroso anabela.pedroso@umic.pt Date: 3 November 2006 1. Status of National legislation on eid Are eid specific regulations
More informationfleischhauer tickets RFID
fleischhauer tickets RFID RFID solutions tailor-made Tickets for Public Transport Tickets in Motion RFID ticketing revolutionises access systems for mass transit facilities worldwide. Public transport
More informationEstablishing and Managing the Schengen Masterlist of CSCAs
Establishing and Managing the Schengen Masterlist of CSCAs Big City 21/04/2015 European Commission Directorate-General HOME Unit B3 Information Systems for Borders and Security Richard.Rinkens@ec.europa.eu
More informationStrategy for Mobile ID
Mobile ID Devices Strategy for Mobile ID 20 September 2013 Version 2.1 Strategy for Mobile ID Solutions Contents Summary...1 Context...2 Police and immigration services...2 Mobile solutions generally...2
More information2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population.
1. What is the current status of the project? INDECT started the 3rd year of work. Almost 3 years are ahead of the project. All project tasks are realized according to the schedule. Current status of the
More informationSmart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems
Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems A Smart Card Alliance White Paper May 2002 Smart Card Alliance 191 Clarksville Road Princeton Junction, NJ 08550 www.smartcardalliance.org
More informationDefending the Internet of Things
Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity
More informationBiometrics for Public Sector Applications
Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach
More informationesign Online Digital Signature Service
esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities
More informationNIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics
NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics Jan Krhovják Outline Introduction and basics of PIV Minimum
More informationCONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
More informationis the leading Russian B2B magazine
is the leading Russian B2B magazine about building, exploitation and management of sport facilities S. A. R. building and exploitation of sport facilities magazine for professionals спортмагазин.рф Our
More informationFIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and ID verification.
Discover a new conception for customer verification and electronic contract management Your benefit is our task. FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and
More informationTHE LEADING EDGE OF BORDER SECURITY
THE LEADING EDGE OF BORDER SECURITY RECORD-BREAKING TRAVEL CREATING NEW CHALLENGES TIM KLABUNDE Entrust Datacard; Director, Government Vertical Marketing THE ERA OF THE MOBILE IDENTITY In an increasingly
More informationAN INTRODUCTION TO THE GLOBAL DOCUMENT TYPE IDENTIFIER (GDTI) TABLE OF CONTENTS
TABLE OF CONTENTS What Is a Global Document Type Identifier?... 3 What Is a GDTI Used For?... 3 Key Attributes of the GDTI... 3 Business Benefits of Using GDTIs... 4 How Is the GDTI Formed?... 4 Frequently
More informationHow to check if I care for the safety of my Clients?
How to check if I care for the safety of my Clients? www.certum.eu Have you considered ways to increase the reliability of your business on the Internet and stand out from the crowd? 72% 91% of Internet
More informationPOSITION PAPER. The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND
POSITION PAPER The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND Dear ACI Members and World Business Partners, With the increasing need for secure personal
More informationAccess Control, Ticketing and Booking System for Sports Halls
Access Control, Ticketing and Booking System for Sports Halls SDD Information Technology Group has developed system for ticketing, booking and access control for sport objects. The system is based on contact
More informationEuropean Electronic Identity Practices
European Electronic Identity Practices Country Update of Austria Speaker: Herbert Leitold Date: 9 Nov 2004 PART I: Overview Table of contents Overview of Citizen Card initiatives and its status (Summary
More informationBiometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
More informationWhite Paper PalmSecure truedentity
White Paper PalmSecure truedentity Fujitsu PalmSecure truedentity is used for mutual service and user authentication. The user's identity always remains in the possession of the user. A truedentity server
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationCoesys Border Management
Coesys Border Management Offering convenience for secure border crossing Improving border intelligence for detection and prevention Supporting your immigration organization Combating cross-border crime,
More information22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
More informationMinnesota State Colleges and Universities System Guideline Chapter 5 Administration
Minnesota State Colleges and Universities System Guideline Chapter 5 Administration Appropriate Use and Implementation of Electronic Part 1. Purpose. To establish requirements and responsibilities for
More informationSmart Card in Biometric Authentication
Smart Card in Biometric Authentication Željka Požgaj, Ph.D. Faculty of Economics and Business 10000 Zagreb, Trg. J.F. Kennedy-a 6 E-mail: zpozgaj@efzg.hr Ivor Đurinek, Bs.C. 10090 Zagreb, Dvoriček 1 E-mail:
More informationOnline Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers
Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers Frequently Asked Questions and Answers 2011 CardLogix Corporation. All rights reserved. This document contains information
More informationSECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise
w w w. t h a l e s g r o u p. c o m SECURE IDENTITY MANAGEMENT Globally recognised identity management expertise Integrated identity management solutions As a global technology leader for the Aerospace
More informationIDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
More informationROADMAP TOWARDS A VISA-FREE REGIME WITH TURKEY
ROADMAP TOWARDS A VISA-FREE REGIME WITH TURKEY A. The Dialogue Within the broader dialogue and cooperation framework between the EU and its Member States and Turkey in Justice and Home Affairs matters,
More informationUsing Contactless Smart Cards for Secure Applications
Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,
More informationThe Canadian Migration to EMV. Prepared By:
The Canadian Migration to EMV Prepared By: December 1993 Everyone But The USA Is Migrating The international schemes decided Smart Cards are the way forward Europay, MasterCard & Visa International Produced
More informationPretty Good Privacy (PGP)
Pretty Good Privacy (PGP) Contents...1 Abstract...2 Introduction...3 The importance of the cryptography...4 The idea about how (PGP) works...5 Legal issues surrounding (PGP)...6 The implementation and
More informationSmart Cards and Biometrics in Physical Access Control Systems
Smart Cards and Biometrics in Physical Access Control Systems Robert J. Merkert, Sr. Vice President of Sales Americas Biometric Consortium 2005 Conference September 21, 2005 All Company and/or product
More informationHow To Get Smart Cards From Atos
secure authentication and trusted identity delivering assurance and efficiency to every sector with CardOS Smart Card Solutions Your business technologists. Powering progress Delivering certainty through
More informationeidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
More informationConformance test specification for BSI-TR 03121 Biometrics for public sector applications
Technical Guideline TR-03122-1 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik
More informationGemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
More informationSub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013
Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013 Carlos Gómez Head of R&D and Innova.on, FNMT- RCM, Spain ICAO TRIP: Building Trust in Travel Document
More informationContactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
More informationHomeConvenience.com. Creating Trust Online CASE STUDY. Comodo Identity and Trust Assurance Suite. Content Verification Certificate.
TM Creating Trust Online CASE STUDY HomeConvenience.com Comodo Identity and Trust Assurance Suite Content Verification Certificate Hacker Guardian SSL Certification Corner of Trust Logo Who are HomeConvenience?
More informationSecurity Model in E-government with Biometric based on PKI
Security Model in E-government with Biometric based on PKI Jaafar.TH. Jaafar Institute of Statistical Studies and Research Department of Computer and Information Sciences Cairo, Egypt Nermin Hamza Institute
More informationBiometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
More informationMathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
More informationFighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
More informationFrench Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
More information