Secure document verification
|
|
- Junior Henry
- 7 years ago
- Views:
Transcription
1 Secure document verification Reliable document verification for efficient control procedures Author: Andreas Rach Product Manager, Verification Solutions Bundesdruckerei GmbH Oranienstrasse Berlin, Germany Identity checks at the border must be as fast and as convenient as possible and should not cause long delays for travellers. But it is even more important that this process is as reliable as possible. Today's document verification systems support border control officers in their work. They help them to detect forged ID documents and to quickly decide whether the person presenting the ID document is in fact the holder. As an internationally recognised ID document the passport plays a key role in identity assurance all over the world. Reliably checking this document, especially at borders, is considered to be one of the most important ways of verifying or confirming a person's identity. The authenticity and validity of documents are checked, the document holder is identified on the basis of the personal data and, if necessary, subjected to further examination. This task calls for an enormous amount of specialist knowledge even with classic, i.e. non-electronic, ID documents. This is largely due to the vast number of international documents and the diversity of personalisation methods and security features in use. Most known document security concepts are based on printed security elements, however, documents issued today by many countries increasingly contain additional electronic security features to ensure reliable identity protection. These security features are usually based on computer chips directly integrated into the document. The personal data, a facial image that can be used in biometric procedures and two (optional) fingerprint images are digitally signed and stored in these chips.
2 New documents call for new verification systems Currently 89 countries issue chip-based travel documents. The technical specifications of almost all of these documents comply with the recommendations of the International Civil Aviation Organization (ICAO 1 ). For most documents, Basic Access Control (BAC) is used to control access to the stored data. In addition to the biographical data and the facial image of the passport holder, two fingerprint images can also be stored in epassports. In order to protect these additional identity features, all the EU member states are required to integrate the Extended Access Control (EAC) protocol. This type of access protection, which is based on authorisation certificates, allows government-authorised reading of fingerprint data which require special protection. In line with an ICAO recommendation so-called Passive Authentication (PA) is used to check the digital signatures of the personalised chip data for authenticity and possible manipulation. PA is also based on digital certificates. These certificates which must be signed by the document issuer and his authorising government body must be available to the verification system for instance via the link to a public key infrastructure (PKI) that provides the certificate. Over the past few years, many public authorities and document issuers have focused on the development of electronic documents. The focus today is on setting up the infrastructures needed for electronic document verification. Electronic ID documents are the key to new reliable methods of verification When checking the authenticity of documents, the signature verification of the chip data yields much more than a simple plausibility check of the document's machine readable zone. In addition to verifying data consistency, another precondition for establishing the authenticity of the personal chip data is the validation of the chip signature with the entire "trust chain" right down to its so-called "national trust anchor". In other words, it must be verified whether the chip signature was produced by a document manufacturer whose signature was also signed by a public authority. Meanwhile, an international infrastructure is in place to provide trustworthy certificates for verifying the signatures of electronic MRTDs the ICAO Public Key Directory (PKD) 2. Currently (November 2010), 21 countries participate in the PKD. The number is increasing continuously. 1 International Civil Aviation Organization. In its Doc 9303 specification, ICAO lays down the requirements for travel documents issued by participating countries. 2 ICAO website for the PKD:
3 For the issuing countries the introduction of electronic ID documents is the first step on the road to greater document security. They also have to invest in a document verification infrastructure that is tailored to their respective needs. Optical and electronic verification: the combination matters Optical security features always play a key role and remain important even when chips are used in documents. An optical check can be carried out even if the document does not have a chip, if the chip cannot be read or if the certificate chain cannot be accessed. The certificate chain can only be verified when the public key infrastructure (PKI) is accessible and contains the relevant certificates. Under most jurisdictions, a document is valid proof of identity even when access to the chip is not possible during the ID check. Although the number of countries issuing electronic documents is growing rapidly, the majority of ICAO member states still issue passports secured with optical features only. Considering the fact that ID documents have a validity period of up to ten years, the large stock of documents without a chip will continue to circulate for a long time to come and these documents must be checked on the basis of their visible optical security features. If, however, a chip is integrated into the document, this boosts document security significantly as the chip data can be additionally compared to the printed biographical data. The key to the best and most reliable information regarding the authenticity of a document is a comprehensive, combined examination of both the optical and electronic security features. Mastering document diversity In addition to electronic passports, there are countless other travel documents in circulation world-wide. More than 170 countries currently issue ID cards, visa documents or classic passports with a machine readable zone (MRZ) which are based on the ICAO guidelines. In the past, there have been many reports on the challenges of reading an MRZ 3 reliably. The integration of a uniform MRZ means considerable advantages for processing speed and document recognition. But, looking at the details, some documents deviate from the ICAO specification. State-of-the-art verification systems, however, are able to deal with deviations. This enables reliable document verification with automated support. 3 Keesing Journal, Issue 24, 2007 "OCR-B Machine Readability Factors of Influence" by Mike Ellis
4 Fig. 1: Example of a document in circulation having a composite check digit not compliant with the ICAO Doc 9303 recommendation Fig. 2: Example of a document in circulation where the number of characters per MRZ line does not comply with ICAO Doc 9303 recommendation Other security features are much less standardized and call for specialist knowledge in order to detect forgeries and manipulations. ICAO Doc 9303 provides a guide for ensuring the authenticity of documents with different features. The specifications concerning feature positions and sizes leave sufficient creative leeway for document producers to design their documents, thus allowing a colourful range of distinguishable documents to be created. The final attributes of optical security features are defined by the respective governments and
5 depend on the technologies and know-how available to the document manufacturers. This means that this leads to strong manufacturing-related variations in positions, levels of absorption, design details, contrast, etc. within document types and series. Specialist knowledge unveils forgeries This is where present-day verification systems come into play. Even when the authorities in charge have access to very detailed information on document verification, there is often not enough time to make full use of this information in an actual control situation. At the same time, forgers are increasingly becoming experts and deploy general technological developments for identity fraud. Hence, document verification today requires a change in attitude. In order to give an officer more time for comprehensive plausibility checks and so-called profiling, powerful support systems should enable much more efficient processes for checking documents and individuals. Regularly updated, knowledge-based systems, for instance, could continuously improve the performance of international ID document verification. They quickly supply the officer with valuable information about security features and help him to assess whether a document presented is genuine or not. At the same time, national and international wanted lists are searched and the results are presented to the officer. The time gained through more efficient processes can be used to check the document holder more closely in the case of irregularities. Strengths and weaknesses of current document verification systems In order to perform an efficient, machine-supported document check, detailed basic data of the document to be checked is required. Based on this data, the document can be compared with the attributes stored in the verification system. Swipe readers quickly capture the MRZ and are easy to handle with stable datapages made of various plastic materials; however, they do not provide any information about the optically visible security features. An ISO reader is additionally required here in order to read and verify the chip data. This is why full-page readers are increasingly used at many borders. These readers capture a white-light, infrared and UV-A image of the document datapage and read out the electronic data at the same time. In addition to the MRZ check, the images are displayed to the officer and a document paper test is carried out. Countries with knowledge-based document verification systems are one step ahead; these systems know and automatically verify the specific features of identity documents. They
6 identify the document presented on the basis of the images taken and evaluate security feature patterns under different illumination conditions. Fig. 3: UV features of a sample passport taken in October 2007 Fig. 4: Despite extended exposure time, degradation of the UV features can be clearly seen in the image of the same passport taken in November 2010
7 The systems currently available on the market differ in terms of the number of trained documents, the number and logical linking of verifiable features, the consideration of manufacturing tolerances as well as the effects of wear and tear on the ID document. Dozens of individual checks are automatically combined to obtain an overall result and the integrated document knowledge supplies images of sample documents for quick visual comparison and inspection. What's essential here is the quality of the check along with the quality of the information stored. A system with a sufficiently low false acceptance rate (FAR) 4 supports the officer and a system with a sufficiently low false rejection rate (FRR) 5 leads to the necessary acceptance among officers and document holders. To achieve this, the underlying document knowledge and the verification algorithms must always be up to date and well aligned. That's why many state-of-the-art verification systems offer often on a monthly or more frequent basis - the inclusion of the latest findings on new documents, production changes and recently uncovered forgeries. These document verification systems provide specialist knowledge and help officers considerably. They offer a high degree of support for decisions during document checks. By taking over routine tasks, they allow officers more time for checks that cannot be performed by a machine. Standardisation and standards There are hardly any standards for knowledge and rule-based document verification systems. The individual checks are derived from the document specifications and the guidelines drawn up for this purpose. The MRZ check with its integrated check digits, for instance, is the most precisely defined check and hence the best-comparable check. This is due to the fact that the MRZ was not designed as a security feature but as an area designated for machine-based reading of document data. Nevertheless, easily detectable deviations in the MRZ are often an indication of forgery or manipulation. More advanced standards would make absolute sense and are under discussion among the respective committees. Good standards promote comparability between devices, software and complete systems. Up to now, when selecting a new system, it is necessary to 4 False acceptance: A false or forged document is not rejected. 5 False rejection: A genuine document is rejected.
8 repeatedly perform comparisons and tests in order to better define the requirements and suitability of document verification systems. Known and standardized verification methods have known weaknesses which are covered by intelligent verification systems and hence offer no potential for attack. A forger would attempt to forge in compliance with standards in order to avoid drawing attention to himself. Good verification systems, however, always go beyond the "state of the art". Creativity and variations in system design are therefore still demanded and necessary.
Implementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
More informationPreventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
More informationElectronic machine-readable travel documents (emrtds) The importance of digital certificates
Electronic machine-readable travel documents (emrtds) The importance of digital certificates Superior security Electronic machine-readable travel documents (emrtds) are well-known for their good security.
More informationFull page passport/document reader Regula model 70X4M
Full page passport/document reader Regula model 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses
More informationSecurity by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the
More informationEvidence of Identity: Breeder Documents and Beyond Barry J. Kefauver International national Standards ds Organization ation Why Care? A false passport in the hands of a terrorist is as dangerous as a bomb
More informationFAQs Electronic residence permit
FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit
More informationEstablishing and Managing the Schengen Masterlist of CSCAs
Establishing and Managing the Schengen Masterlist of CSCAs Big City 21/04/2015 European Commission Directorate-General HOME Unit B3 Information Systems for Borders and Security Richard.Rinkens@ec.europa.eu
More informationCombatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs
Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs 1 GOVERNMENTS ADOPTING DIGITAL STRATEGIES Governments designing/operating digital ecosystems to create, transform and optimize
More informationBest Solutions for Biometrics and eid
Best Solutions for Biometrics and eid In times of virtual communication even a person s identity is converted into an electronic form with the help of biometrics and then organised through intricate technical
More informationDiscover Germany s Electronic Passport
Discover Germany s Electronic Passport Starting 1 Nov. 2007 E-Passport 2nd Generation www.epass.de 1 Introducing Germany s e-passport If you want to know why there are electronic passports and how to recognize
More informationMoving to the third generation of electronic passports
Moving to the third generation of electronic passports A new dimension in electronic passport security with Supplemental Access Control (SAC) > WHITE PAPER 2 Gemalto in brief Gemalto is the world leader
More informationBiometrics for payments. The use of biometrics in banking
Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,
More informationMobile Driver s License Solution
Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity
More informationWhite Paper PalmSecure truedentity
White Paper PalmSecure truedentity Fujitsu PalmSecure truedentity is used for mutual service and user authentication. The user's identity always remains in the possession of the user. A truedentity server
More informationeidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
More informationKeep Out of My Passport: Access Control Mechanisms in E-passports
Keep Out of My Passport: Access Control Mechanisms in E-passports Ivo Pooters June 15, 2008 Abstract Nowadays, over 40 different countries issue biometric passports to increase security on there borders.
More informationID Document Scanning and Biometric Solutions
ID Document Scanning and Biometric Solutions PRODUCT CATALOGUE Contents ID DOCUMENT SCANNING & BIOMETRIC SOLUTIONS Advanced ID document reading solutions Typical applications ID document scanning process
More informationSub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013
Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013 Carlos Gómez Head of R&D and Innova.on, FNMT- RCM, Spain ICAO TRIP: Building Trust in Travel Document
More informationModular biometric architecture with secunet biomiddle
Version 2.1 Modular biometric architecture with secunet biomiddle White Paper Version 2.0, 25/03/10 secunet Security Networks AG Copyright 2010 by secunet Security Networks AG This document is for information
More informationOperational and Technical security of Electronic Passports
European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union Operational and Technical security of Electronic Passports Warsaw, Legal
More informationStatewatch Briefing ID Cards in the EU: Current state of play
Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled
More informationMACHINE READABLE TRAVEL DOCUMENTS
MACHINE READABLE TRAVEL DOCUMENTS TECHNICAL REPORT Version 1.0 Date - April 7, 2011 Published by authority of the Secretary General ICAO/NTWG SUB-WORKING GROUP FOR NEW SPECIFICATIONS td1 CARD File Author
More informationFAQs - New German ID Card. General
FAQs - New German ID Card General 1) How to change from the old ID card to the new one? The new Law on Identification Cards came into effect on 1 November 2010. Since then, citizens can apply for the new
More informationA c o n c i s e g u i d e t o t h e G e r m a n e Pa s s p o r t s y s t e m 2 0 0 7
10/2007 A c o n c i s e g u i d e t o t h e G e r m a n e Pa s s p o r t s y s t e m 2 0 0 7 www.bundesdruckerei.de A c o n c i s e g u i d e t o t h e G e r m a n e Pa s s p o r t s y s t e m 2 0 0 7
More informationBiometrics for Public Sector Applications
Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach
More informationRSA Adaptive Authentication For ecommerce
RSA Adaptive Authentication For ecommerce Risk-based 3D Secure for Credit Card Issuers SOLUTION BRIEF RSA FRAUD & RISK INTELLIGENCE The Threat of ecommerce Fraud ecommerce fraud is a threat to both issuers
More informationA Note on the Relay Attacks on e-passports
A Note on the Relay Attacks on e-passports The Case of Czech e-passports Martin Hlaváč 1 and Tomáš Rosa 1,2 hlavm1am@artax.karlin.mff.cuni.cz and trosa@ebanka.cz 1 Department of Algebra, Charles University
More informationPKD Board ICAO PKD unclassified B-Tec/37. Procedures for the ICAO Public Key Directory
Procedures for the ICAO Public Key Directory last modification final 1/13 SECTION 1 INTRODUCTION 1.1 As part of the MRTD initiative by ICAO, the Participants will upload to and download from the PKD, their
More informationInternational Civil Aviation Organization ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE
A38-WP/11 17/05/13 International Civil Aviation Organization WORKING PAPER ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE Agenda Item 16: Facilitation and Machine Readable Travel Documents PROPOSAL FOR AN ICAO
More informationInformation about the European Union is available on the Internet. It can be accessed through the Europa server ( www.europa.eu).
European Agency for the Management of Operational Cooperation at the External Bo of the Member States of the European Union Best Practice Guidelines on the Design, Deployment and Operation of Automated
More informationDeputy Chief Executive Netrust Pte Ltd
ICAO Public Key Directory R Rajeshkumar R Rajeshkumar Deputy Chief Executive Netrust Pte Ltd The trust imperative E-Passports are issued by entities that assert trust Trust depends on the requirements
More informationDoc. Machine. authority
Doc 93033 Machine Readable Travel Documents Seventh Edition, 2015 Part 9: Deployment of Biometric Identification and Electronic Storage of Data in emrtds Approved by the Secretary General and published
More informationDOCUMENT SECURITY ISSUES
DOCUMENT SECURITY ISSUES Part of a Series of Datacard Group White Papers for the Secure Document Issuer DESIGNING AN ID DOCUMENT FOR ENHANCED SECURITY Overview Governments today are being driven to increase
More informationCommon Criteria Protection Profile for Inspection Systems (IS) BSI-CC-PP-0064. Version 1.01 (15 th April 2010)
Common Criteria Protection Profile for BSI-CC-PP-0064 Version 1.01 (15 th April 2010) Federal Office for Information Security Postfach 20 03 63 53133 Bonn Phone: +49 228 99 9582-0 e-mail: zertifizierung@bsi.bund.de
More informationID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents
ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents 3 Your Personal Identity: Unique, Secure, Multifaceted Every person has individual characteristics by which
More informationEnd-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments
More informationEnd-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory
More informationMACHINE READABLE TRAVEL DOCUMENTS
MACHINE READABLE TRAVEL DOCUMENTS (Logo) TECHNICAL REPORT PKI for Machine Readable Travel Documents offering ICC Read-Only Access Version - 1.1 Date - October 01, 2004 Published by authority of the Secretary
More informationA B U N D E S D R U C K E R E I P O C K E T G U I D E T O B O R D E R C O N T R O L
A B U N D E S D R U C K E R E I P O C K E T G U I D E T O B O R D E R C O N T R O L www.bundesdruckerei.de A B U N D E S D R U C K E R E I P O C K E T G U I D E T O B o r d e r C o n t r o l P u b l i
More informationCase Studies. National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system
Case Studies National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system Royal Oman Police (ROP) of the Sultanate of Oman eid Consulting for e-passport system Federal
More informationE-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption
Journal of Computer Science 6 (7): 723-727, 2010 ISSN 1549-3636 2010 Science Publications E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Najlaa A. Abuadhmah,
More information39 myths about e-passports
14 39 myths about e-passports The facts behind e-passports and RFID technology by Mike Ellis The International Civil Aviation Organisation () - and the NTWG 1 in particular - first started work on what
More informationEnhanced calibration High quality services from your global instrumentation partner
Products Solutions Services Enhanced calibration High quality services from your global instrumentation partner Services 2 Calibration One trusted advisor Get the best to meet all your critical application
More informationTHE LEADING EDGE OF BORDER SECURITY
THE LEADING EDGE OF BORDER SECURITY RECORD-BREAKING TRAVEL CREATING NEW CHALLENGES TIM KLABUNDE Entrust Datacard; Director, Government Vertical Marketing THE ERA OF THE MOBILE IDENTITY In an increasingly
More informationINDIVIDUAL bizhub ENHANCEMENT
INDIVIDUAL bizhub ENHANCEMENT Advanced functionality with i-option Streamlining user operation and increasing workflow capabilities are important requirements in today s corporate environments. Taking
More informationBest Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
More informationPublic Key Directory: What is the PKD and How to Make Best Use of It
Public Key Directory: What is the PKD and How to Make Best Use of It Christiane DerMarkar ICAO Programme Officer Public Key Directory ICAO TRIP: Building Trust in Travel Document Security 19/10/2015 Footer
More informationCommon Criteria Protection Profile. Electronic Identity Card (ID_Card PP) BSI-CC-PP-0061. Approved by the Federal Ministry of Interior. Version 1.
Common Criteria Protection Profile Approved by the Federal Ministry of Interior Version 1.03, 1 Common Criteria Protection Profile Version 1.03, Foreword This Protection Profile is issued by Bundesamt
More informationCommon Criteria Protection Profile
Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE PP) Version 1.01, 22th July 2014 Foreword This Protection Profile Electronic Passport using Standard Inspection procedure
More informationEPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION
COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...
More informationPOSITION PAPER. The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND
POSITION PAPER The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND Dear ACI Members and World Business Partners, With the increasing need for secure personal
More informationPKD Board ICAO PKD unclassified B-Tec/36. Regulations for the ICAO Public Key Directory
Regulations for the ICAO Public Key Directory last modification final 1/8 SECTION 1 AUTHORITY These Regulations are issued by ICAO on the basis of Paragraph 3 b) of the Memorandum of Understanding (MoU)
More informationPosition Paper European Citizen Card: One Pillar of Interoperable eid Success
Position Paper European Citizen Card: One Pillar of Interoperable eid Success October 2008 Disclaimer Eurosmart takes reasonable measures to ensure the quality of the information contained in this document.
More informationAll you need to know about the electronic residence permit (eat)
All you need to know about the electronic residence permit (eat) www.bamf.de/eaufenthaltstitel Contents Contents 1 The electronic residence permit 5 2 Photo and fingerprints 7 3 Additional provisions
More informationOB10 - Digital Signing and Verification
Global Headquarters 90 Fetter Lane London EC4A 1EN Tel: +44 (0) 870 165 7410 Fax: +44 (0) 207 240 2696 OB10 - Digital Signing and Verification www.ob10.com Version 2.4 March 2013 Summary In order to comply
More informationPost-Merger Integration at Sachtleben
Post-Merger Integration at Sachtleben The seamless merging of operational business processes and systems by BearingPoint In just ten months, BearingPoint brought together the key operational processes,
More informationaddressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
More informationConformance test specification for BSI-TR 03121 Biometrics for public sector applications
Technical Guideline TR-03122-1 Conformance test specification for BSI-TR 03121 Biometrics for public sector applications Part 1: Framework Version 3.0 Bundesamt für Sicherheit in der Informationstechnik
More informationCOMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES
COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES BSI TR-03139 Version 2.1 27 May 2013 Foreword The present document
More informationSecure Web Access Solution
Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...
More informationA blueprint for an Enterprise Information Security Assurance System. Acuity Risk Management LLP
A blueprint for an Enterprise Information Security Assurance System Acuity Risk Management LLP Introduction The value of information as a business asset continues to grow and with it the need for effective
More informationPayment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1
Payment Card Industry (PCI) Data Security Standard PCI DSS Applicability in an EMV Environment A Guidance Document Version 1 Release date: 5 October 2010 Table of Contents 1 Executive Summary... 3 1.1
More informationNew Attacks against RFID-Systems. Lukas Grunwald DN-Systems GmbH Germany
New Attacks against RFID-Systems Lukas Grunwald DN-Systems GmbH Germany Agenda What is RFID? How to exploit and attack RFID systems Attacks against the middleware Reader-emulation, soft-tags Unexpected
More informationLandscape of eid in Europe in 2013
Landscape of eid in Europe in 2013 July 2013 Eurosmart White Paper Contents Executive Summary 3 1. Purpose of the document 3 2. EU regulation 3 3. EU Member States identification policies 4 3.1. National
More informationMACHINE VISION FOR SMARTPHONES. Essential machine vision camera requirements to fulfill the needs of our society
MACHINE VISION FOR SMARTPHONES Essential machine vision camera requirements to fulfill the needs of our society INTRODUCTION With changes in our society, there is an increased demand in stateof-the art
More informationRF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
More informationAn Introduction to PRINCE2
Project Management Methodologies An Introduction to PRINCE2 Why use a Project Methodology and What Does PRINCE2 Enable? PRINCE - PRojects IN Controlled Environments - is a project management method covering
More informationDoc. Machine. Part. authority
Doc 93033 Machine Readable Seventh Edition, 2015 Travel Documents Part 2: Specifications for the Security of the Design, Manufacture and Issuance of MRTDs Approved by the Secretary General and published
More informationMulti-Factor Authentication
Enhancing network security through the authentication process Multi-Factor Authentication Passwords, Smart Cards, and Biometrics INTRODUCTION Corporations today are investing more time and resources on
More informationU.S. FDA Title 21 CFR Part 11 Compliance Assessment of SAP Records Management
U.S. FDA Title 21 CFR Part 11 Compliance Assessment of SAP Records Management Disclaimer These materials are subject to change without notice. SAP AG s compliance analysis with respect to SAP software
More informationQUESTIONS & ANSWERS. How did the Department decide on the cost of the Passport Card?
1 Front U.S.PASSPORT CARD APPLICATIONS ACCEPTED BEGINNING FEBRUARY 1 Back U.S. citizens may begin applying in advance for the new U.S. Passport Card beginning February 1, 2008, in anticipation of land
More informationBiometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
More informationSignature Verification Why xyzmo offers the leading solution.
Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all
More information2nd End-User Group Meeting on 3D Face Recognition
2nd End-User Group Meeting on 3D Face Recognition Martin Willich Project Manager, Infrastructure Terminals, Fraport AG February 21, 2008, Berlin Page 2 Contents 1. Fraport at a Glance 2. New Challenges
More informationBALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION
BALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION SOME RECENT NATIONAL AND REGIONAL INITIATVES IN IDENTITY MANAGEMENT
More informationFingerprint Based Biometric Attendance System
Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id awaghmare194@gmail.com kazmiali786@gmail.com Contact Numbers 8097031667 9167689265
More informationAN INTRODUCTION TO THE GLOBAL DOCUMENT TYPE IDENTIFIER (GDTI) TABLE OF CONTENTS
TABLE OF CONTENTS What Is a Global Document Type Identifier?... 3 What Is a GDTI Used For?... 3 Key Attributes of the GDTI... 3 Business Benefits of Using GDTIs... 4 How Is the GDTI Formed?... 4 Frequently
More informationSECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise
w w w. t h a l e s g r o u p. c o m SECURE IDENTITY MANAGEMENT Globally recognised identity management expertise Integrated identity management solutions As a global technology leader for the Aerospace
More informationNAndtB/25 Training Pack for Personnel Required to Administer Near Vision Test per NANDTB/24. Compiled by the UK NANDTB
NAndtB/25 Training Pack for Personnel Required to Administer Near Vision Test per NANDTB/24 Compiled by the UK NANDTB Background EN4179:2005 required near vision acuity to Jaeger No. 1 or equivalent, not
More informationFEDERAL LAW GAZETTE FOR THE REPUBLIC OF AUSTRIA. Year 2015 Issued on December 11, 2015 Part II
1 of 11 FEDERAL LAW GAZETTE FOR THE REPUBLIC OF AUSTRIA Year 2015 Issued on December 11, 2015 Part II 410th Regulation: Cash Register Security Regulation, [RKSV] 410th Regulation by the Federal Minister
More informationThe ID card with eid function at a glance
The ID card with eid function at a glance New possibilities, more security Since 1 November 2010, Germany has been issuing the new ID card in smart card format and with a chip. With this chip, the ID card
More informationTake the cost, complexity and frustration out of two-factor authentication
Take the cost, complexity and frustration out of two-factor authentication Combine physical and logical access control on a single card to address the challenges of strong authentication in network security
More informationCERTIFICATION REPORT
REF: 2011-11-INF-837 v1 Target: Público Date: 17.04.2012 Created by: CERT8 Revised by: CALIDAD Approved by: TECNICO CERTIFICATION REPORT File: 2011-11 KONA 102J1 epassport EAC v1.1 Applicant: KEBTechnology
More informationCompany Overview. Iraq: Activities & Experience
Company Overview Iraq: Activities & Experience SAFE ID Solutions AG 2009 SAFE ID Management Board Omar El Gohary Executive Vice President Operations Long year leadership and operational experience with
More informationSecurity solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.
Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?
More informationSmart Tiger STARCHIP SMART TIGER PAYMENT PRODUCT LINE. Payment. STiger SDA. STiger DDA. STiger DUAL
PAYMENT CATALOG Smart Tiger Payment STiger SDA Static or Java Card Modules offer for Contact SDA markets STARCHIP SMART TIGER PAYMENT PRODUCT LINE is a versatile compound of a Highly Secure Microcontroller,
More informationLearn about OCR: Optical Character Recognition Track, Trace & Control Solutions
: Optical Character Recognition Track, Trace & Control Solutions About Your Presenter Learn about OCR Presenting today: Juan Worle Technical Training Coordinator Microscan Corporate Headquarters Renton,
More informationConcept of and need for assurance
chapter 1 Concept of and need for assurance Contents Introduction Examination context Topic List 1 What is assurance? 2 Why is assurance important? 3 Why can assurance never be absolute? Summary and Self-test
More informationDigital Signatures in the Legal Market:
The Digital Signature Company Digital Signatures in the Legal Market: How to Select the Right Solution for Your Firm or Legal Department Introduction A shift is taking place in the relationship between
More informationAutomated Travel and Entertainment (T&E) Expense Management
White Paper Automated Travel and Entertainment (T&E) Expense Management File & Approve Expense Reports faster. Increase ROI Version 1.0 Last Updated: 04-06-2010 www.sutisoft.com 1 2 3 4 6 7 Introduction
More informationVeridos Protects Identities. The expert for worldwide government solutions
Veridos Protects Identities The expert for worldwide government solutions 2 Personal identity in a globalized world Today s globalized world is fast, mobile, and highly virtualized. We now expect access
More informationsign-me Bundesdruckerei's solution for online signatures using the new German ID card
Basic information: sign-me sign-me Bundesdruckerei's solution for online signatures using the new German ID card What is sign-me? sign-me is a web application from Bundesdruckerei that enables online signatures
More informationfleischhauer tickets RFID
fleischhauer tickets RFID RFID solutions tailor-made Tickets for Public Transport Tickets in Motion RFID ticketing revolutionises access systems for mass transit facilities worldwide. Public transport
More informationFive Steps Towards Effective Fraud Management
Five Steps Towards Effective Fraud Management Merchants doing business in a card-not-present environment are exposed to significantly higher fraud risk, costly chargebacks and the challenge of securing
More informationTHIRD REGIONAL TRAINING WORKSHOP ON TAXATION. Brasilia, Brazil, December 3 5, 2002. Topic 4
THIRD REGIONAL TRAINING WORKSHOP ON TAXATION Brasilia, Brazil, December 3 5, 2002 Topic 4 INFORMATION TECHNOLOGY IN SUPPORT OF THE TAX ADMINISTRATION FUNCTIONS AND TAXPAYER ASSISTANCE Nelson Gutierrez
More informationComplete. security. begins with 3M
Complete security begins with : Global Helping to protect people, documents and goods Leadership in the Security Industry For more than 30 years, Security has been a trusted partner, helping governments
More informationThe security features which are not visible on a photocopy
The security features which are not visible on a photocopy ID SHIELD does not authenticate an Identity document on the base of a photocopy but on the base of the original documents. This behaviour has
More informationFull scope of document security solutions
Full scope of document security solutions security since 1851 www.any.hu Full scope of document security solutions The specialists of the Document Security Laboratory of ANY Security Printing Company PLC
More informationExpertise for biometric solution
Expertise for biometric solution Biometrics Solutions from Kaba Kaba is the leading manufacturer for biometric solutions in time and attendance, shop floor data collection and access control. From the
More information