The security features which are not visible on a photocopy

Similar documents
THE ID SHIELD SOLUTION FOR THE TRAVEL DOCUMENTS CONTROL Version 4.1

Basic Passport Checks 4 COLOUR SIMPLE VERSION

Basic Passport Checks 4 COLOUR SIMPLE VERSION

For more information, please refer to our Check Armor FAQ: forms/checkarmorfaq.pdf

Full scope of document security solutions

EUR1 = LTL OUR MONEY REAL OR FAKE?

DOCUMENT SECURITY ISSUES

Full page passport/document reader Regula model 70X4M

ID Document Scanning and Biometric Solutions

FALSE ID GUIDANCE. July 2012

Statewatch Briefing ID Cards in the EU: Current state of play

NEW PASSPORT PHOTO REQUIREMENTS FOR THE MACHINE READABLE PASSPORT

European Electronic Identity Practices Country Update of Portugal

ZEBRA CUSTOM LAMINATE QUOTE REQUEST FORM Custom Laminate Quick Reference Guide: Added Security to Meet Your Needs

ON IDENTITY CARDS. Based on Article 65 (1) of the Constitution of the Republic of Kosovo, LAW ON IDENTITY CARDS CHAPTER I GENERAL PROVISIONS

Uncompromised Summary

Scope. Interpretative provisions

Discover Germany s Electronic Passport

Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs

EMR 1, / 1, , CMS

How To Write An Electronic Nvis

State of Vermont Office of Vermont Health Access (OVHA) Pharmacy Benefit Management Program

Full guide for employers on preventing illegal working in the UK. October 2013

May Blackbaud Forms. Compatible Checks and Forms

SAMPLES OF ACCEPTABLE DOCUMENTS FOR AUTHORIZATION TO WORK VERIFICATION

issued by your financial institution.

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics

Guidelines for Producing High Quality Photographs for U.S.Travel Documents

FAQs - New German ID Card. General

About TRA Forms. Please call us anytime if you have questions School Software Solutions

YOU SHOULD COMPLETE THIS FORM IF YOU WISH TO COME TO THE UK TO WORK OR YOU ARE APPLYING UNDER UK ANCESTRY. 1.4 Sex Put a cross (x) in the relevant box

Blood-clotting disorders XARELTO Identifying genuine products of Bayer HealthCare

THE SECRET SERVICE. The Secret Service has two distinct missions PROTECTION SA DONNA JAMES

National Counterfeit, National Analysis and Coin National Analysis Centres Currency Department 17 January 2013 Page 1 of 7

Viewpoint Construction Software

Frequently Asked Questions on Prize Bonds (Updated on )

Laser Checks. High Security Blank Check Stock

The five main types of printing are:

FSP08 i mpr e ssi o n s

Revised March take a closer look Your easy-to-follow guide to checking your banknotes

Part 1 About your Self-Assessment Appendix Read Guidance notes, Part 1

NONPROFIT ORGANIZATION JUMING CULTURE & EDUCATION FOUNDATION 2015 AUTHENTICATION REQUEST OF TWO-DIMENSIONAL WORKS

DNP CX-330 Card Printer

TAKING A HOLISTIC APPROACH BEST PRACTICES FOR OVER-THE-COUNTER GOVERNMENT ID CARD PROGRAMS. Mary Olson, Senior Marketing Manager, Citizen Solutions

web form Application for an igo young person s concessionary travel pass Section A Your details

How To Get A 17 Month Opt Extension

Law Enforcement Guide to False Identification and Illegal ID Use

A Guide To Selected U.S. Travel/Identity Documents For Law Enforcement Officers

Plastic Fraud. Debit Cards Debit cards, unlike credit cards, automatically withdraw funds from your account at the time you make a transaction.

Implementation of biometrics, issues to be solved

NCC NAC CNAC Currency Department 21 July 2011 Page: 1/6 National Counterfeit, National Analysis and Coin National Analysis Centres

Part 1 About your Self-Assessment Appendix Read Guidance notes, Part 1

A whitepaper on: Invisible and Fluorescing Bar Code Printing and Reading

CRIME SCENE REMINDER CARD. "Interview, Examine, Photograph, Sketch, Process"

More Power and Performance With Each Printed Card

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

FAQs Electronic residence permit

Instructions for applying for a 17-month OPT extension for degrees in the STEM category

Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA

Basic Security Features (included in all Uncompromised laser checks)

The Invisible technology

Kodaikanal Christian College

New Banknotes Security Features

Banknotes and coins -- a quick guide

FIVE-MINUTES-TO-CONTRACT The DESKO over-all concept for digital contract management and ID verification.

Checking Identification

Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013

DIRECT AIRSIDE TRANSIT (VAF6 DEC

POLICY TITLE: IDENTITY THEFT PROTECTION POLICY

Child. Application for an Australian Passport. Your checklist

Application form WH1_en_ Application for residence and work permit for Working Holiday

Payment Card Security Elements and Card Acceptance. Instruction

eid Security Frank Cornelis Architect eid fedict All rights reserved

Land Registry Help protect yourself from property fraud keep your contact details up-to-date. May 2016

Overseas: NOTES. Application for an Australian Passport. Your checklist. Keep your passport safe at all times.

OPTIONAL PRACTICAL TRAINING APPLICATION AND INFORMATION

Landscape of eid in Europe in 2013

Preventing fraud in epassports and eids

The Advantages of Security Features

ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015

ITALIAN QUALITY & DESIGN EUROPEAN JETONS & PLAQUES

Information Technology

Virtual POS Services Information Guide

Travel Document Application Form

Merchant Services. How to help protect your business

Prepared by Sgt. Gibbs, Thomas B

Lebanon Business visa Application

Transcription:

The security features which are not visible on a photocopy ID SHIELD does not authenticate an Identity document on the base of a photocopy but on the base of the original documents. This behaviour has certainly excluded ID SHIELD from some markets. We want consequently explain why we are opposed to this method of work.

It exists 3 steps in the documentary control : The fiduciary paper with its passive and active securities, The prints, The personalization of the document. I. The fiduciary paper A. The passive securities This concerns : - the watermark which is compulsory, - the fibrous composition, - the optical whiteners, - the paper density (weight). None of these aspects can be controlled from a photocopy. B. The active securities This concerns: - The security thread, - All kinds of fluorescent planchettes, - The coloured fibres, - les hi-lites, - and the tracers like the one from Arjoscan. None of these processes can be detected from a photocopy. Coloured Fibres and fluorescent planchettes HI-lites

II. The prints A. Printing Process The typography, the flexography (near to the typography), Intaglio (perceptible in the touch), the serigraphy, the offset are not detectable on a photocopy which will reveal on the contrary an inkjet printing, which is forbidden process at the level of the document background. Typography (Doc Number) Intaglio B. Inks not detectable on a photocopy. The invisible fluorescent inks such as : - thermochrome, - fluochrome, - photochrome, - OVI (Optically Variable Ink), - iridescent, - B900, - the Delachrome effect are not detectable on a photocopy. These securities needs the UV light or the IR lights. Or for the thermochrome ink, a certain period of time. chromotrope Ink visible under UV, invisible in normal light Optically Variable Ink change of color According to the incidence of observation of the document

B900 Ink under IR (10 euros Bank Note with the partial vanishing of the Roman bridge) Chromotrope Ink : Schengen Visa whose number reacts under UV + Coloured fibres C. The patterns The latent images, passing images, back and front marks, micro-prints are not detectable on a photocopy. Latent Image («BEL» In the Belgium passport ) Micro-Prints (10 euros Bank Note) Back and Front Marks The 2 patterns are observed through transmitted light. They complete one with each other. As a result, the figure «500» appears. Passing Image The 1st Information is the word «TOGO». If we tilt the document, we can also see a latent image with the word «TOGO».

III. The personalization A. Elements not detectable on photocopies. The DOVID, the Optically variable Mark, the LEAD, the TLI/MLI Images, the Perf (perforation) image, the Invisible Personal Information (l IPI), the hidden texts, the in relief laser printing. TLI/MLI Alternately Ghost Photo or Passport Number depending on the way you tilt the document. Laser Perforation under magnifier and same image visible with naked eye. B. Detectable Elements The elements of minor importance for authentication (stamps, holographic films, Perfored numbering, the paper embossing) remain elements more or less visible on photocopies but impossible to control. Relief Laser Perforation IV. The control of the chip Is the chip genuine? Is the summary in compliance with the data groups? Have the data not been modified? That the first step before the control of the chip content.

What about the logical securities mainly based on the MRZ track? The MRZ contains numbers: document number, lists of figures (Birth date, Expiry date, National Personal Number), letters (surnames and given names, nationality). The ICAO 9303 standard has been published. It is consequently possible to oneself create its own MRZ. Given this, the MRZ verification remains essential but is it enough sufficient to appreciate the quality of an ID document? Surely not. To be complete, we should pay attention to the photos. Again, knowing that the biometric document must be universal in April 2015, how can we compare photos issued from a photocopier if we do not have access to the photography which is stored in the chip of the document (passport, residence permit, ID card and some driving licenses). And must we accept biometric documents for which the chip has been destroyed (less than 5 minutes in a microwave). Fraud is first the photo substitution and later the ID theft. We will conclude in asserting that the documentary control must be always performed on an original document and never on a black and white or colored photocopy. Besides, if the control of the Bank notes is an in depth control, why have we the impression that it is a light control when it concerns ID documents, The ID theft is a growing offense, pushed with the help of the digital techniques. Considering the difficulties raised by the ID theft and their duration for the victims, should not we consider that this control should be more seriously performed and never be based on a photocopies. What is the utility of the security features if they are not controlled? What is the reason of the biometric chips if we consider a photocopy as a sufficient document? ID SHIELD remains at your disposal to study with you how this control could be implemented in your environment. ID SHIELD Hôtel d Entreprises Albi-Innoprod 8 avenue Pierre Gille de Gennes 81000 ALBI Contact : tél. : +33(0)6.83.34.16.66 - raphael.rocher@idshield.fr