Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs



Similar documents
DOCUMENT SECURITY ISSUES

TAKING A HOLISTIC APPROACH BEST PRACTICES FOR OVER-THE-COUNTER GOVERNMENT ID CARD PROGRAMS. Mary Olson, Senior Marketing Manager, Citizen Solutions

More Power and Performance With Each Printed Card

THE LEADING EDGE OF BORDER SECURITY

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics

Best Practices for the Use of RF-Enabled Technology in Identity Management. January Developed by: Smart Card Alliance Identity Council

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

Durability of Smart Cards for Government eid

Implementation of biometrics, issues to be solved

Audio: This overview module contains an introduction, five lessons, and a conclusion.

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology

Complete. security. begins with 3M

Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Establishing and Managing the Schengen Masterlist of CSCAs

Electronic machine-readable travel documents (emrtds) The importance of digital certificates

Advanced Authentication

eid Security Frank Cornelis Architect eid fedict All rights reserved

Full page passport/document reader Regula model 70X4M

Preventing fraud in epassports and eids

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

Printing/Encoding and Engraving Solutions

Defending the Internet of Things

EMV and Small Merchants:

Entrust Smartcard & USB Authentication

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

Mobile Electronic Payments

Best Solutions for Biometrics and eid

The Convergence of IT Security and Physical Access Control

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION

NACCU Migrating to Contactless:

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

DNP CX-330 Card Printer

Statewatch Briefing ID Cards in the EU: Current state of play

Future directions of the AusCERT Certificate Service

Integrated Identity Management Whitepaper

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Entrust IdentityGuard

22 nd NISS Conference

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Data Protection: From PKI to Virtualization & Cloud

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

European Electronic Identity Practices Country Update of Portugal

Checking Identification

Understanding Technologies for Creating High-Security ID Cards

EMV and Restaurants: What you need to know. Mike English. October Executive Director, Product Development Heartland Payment Systems

ID Document Scanning and Biometric Solutions

CRESCENDO SERIES Smart Cards. Smart Card Solutions

European Electronic Identity Practices

The Convergence of IT Security and Physical Access Control

Keep Out of My Passport: Access Control Mechanisms in E-passports

Zebra ZXP Series 8 Retransfer Card Printer. F r e q u e n t l y A s k e d Q u e s t i o n s

I N F O R M A T I O N S E C U R I T Y

Digital Signatures on iqmis User Access Request Form

Information Technology Policy

DATACARD ARTISTA VHD RETRANSFER COLOR PRINTING MODULE. Innovative Technology for the Datacard MX6000 Card Issuance System

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Deputy Chief Executive Netrust Pte Ltd

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

Integration of Access Security with Cloud- Based Credentialing Services

Smart Cards and Biometrics in Physical Access Control Systems

Controller of Certification Authorities of Mauritius

Executive Summary P 1. ActivIdentity

NC CJIN Governing Board. 13 October, George A. White

Smart Cards for Payment Systems

PRIME IDENTITY MANAGEMENT CORE

Zebra Card Printers Supplies List P330i/P430i with UHF Gen 2 RFID Encoder

PUF Physical Unclonable Functions

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards

I N F O R M A T I O N S E C U R I T Y

Extended SSL Certificates

Using Contactless Smart Cards for Secure Applications

What is a Smart Card?

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012

esign Online Digital Signature Service

October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services

EMV's Role in reducing Payment Risks: a Multi-Layered Approach

EMV-TT. Now available on Android. White Paper by

For Official Use Only (FOUO)

Chapter 1: Introduction

Understanding Digital Signature And Public Key Infrastructure

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

intertrax Suite intertrax exchange intertrax monitor intertrax connect intertrax PIV manager User Guide Version

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.

How Secure are Contactless Payment Systems?

MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia.

A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities.

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards

Operational and Technical security of Electronic Passports

The Adoption of EMV Technology in the U.S. By Dave Ewald Global Industry Sales Consultant Datacard Group

Discover Germany s Electronic Passport

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

Transcription:

Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs 1

GOVERNMENTS ADOPTING DIGITAL STRATEGIES Governments designing/operating digital ecosystems to create, transform and optimize services Benefits Significant economic growth and savings ($50B to $114B) for a trusted online environment Help governments go green and promote effective natural resource management Stimulate economic growth and promote social inclusion KEY ENABLERS Online Services Big Data Social Media Mobile Apps Cloud Computing Empowering people through eparticipation Providing stronger security and authentication 2

POWERFUL COMBINATION OF PHYSICAL AND DIGITAL SECURITY Physical Security Trusted Identity Digital Security Substrate Paper PVC Polycarbonate Smartcard Carrier We innovate across platform technologies HSM USB Mobile Smartcard Form Factor Personalisation Inkjet Dye Sublimation Retransfer Laser Credential We create the personalised credential X509 ICAO BAC/EAC ISO7816 PIV Identity Certificate Laminates Hologram STOP Laser Authenticity We protect and seal for integrity Encryption Hash Keys PKI Identity Digital Signature P Key Security Features Digital Signature Document Validation Secure Transactions evalidation We enable access to services and resources 3

Physical Security Carrier Digital Security The way in which we present identity details or attributes to be validated ISO 7816 ID3 ID1 The Secure Element (chip) is our common platform ISO 14443 Standards based on physical form factor to enable machine readability Standards based on electronic interface 4

Physical Security Carrier Digital Security Teslin PVC Polyester (PET) PVC/PET Composite Polycarbonate (PC) PC/PET Composite What s the required security level? How is document stored and carried? Wallet, pocket or badge? How often is it carried, handled or swiped through a reader? Hardware Security Module Software Secure Element Network/USB/PCI Connectivity What is the desired lifetime? New ISO standard (ISO 24789) helps define durability tests to meet selected usage profile of the document 5

Physical Security Credential Digital Security Physical or logical binding of identity to attributes & privileges assigned by an authority Multiple credentials for single identity Name: Tim Klabunde Birth Date: July 29, 1967 Street: 11111 Bren Road South City: Minnetonka State: Minnesota Zip: 55343 Country: USA 6

Physical Security Credential Digital Security Inkjet Dye Sublimation Retransfer Pigment Laser Engraving Majority of passports Crisp imagery Low cost Requires overlay Dye sublimation used in most cards Brilliant, life-like images Retransfer pigment more UV light resistant & better on irregular surface Higher security Uses no print ribbons or overlays Passport National ID Driving Licence Resident Permits Healthcare Benefits Voter ID Access Control Transport Emergency Response State/Local Gov ID Military ID Standardised Passport: ICAO Document 9303 EU Driving Licence PIV X509 ISO 7816 PIV Smart Card Logon Secure email Encryption Digital Signature Authentication Card Verifiable Certificates EMV epassport (EAC & BAC) eid Logical & Physical Applications Smart Card Logon, Secure email etc. Building Access Encryption Digital Signature 7

Physical Security Authenticity Digital Security Type of attacks Document is Authentic: Verify that the document is a genuine original and not a counterfeit ROM EEPR OM RAM CPU Coproces sor Log ic Make IT! Take IT! Data is Authentic: Verify that the data was personalised by a genuine, known issuer and is not counterfeit data Data has Integrity: Verify the data is the same as originally put there and has not been tampered with or forged Commercial & criminal Academia for prowess & public interest Government organisations try to break the chip Export control Dedicated certification scheme Third party evaluation Common Criteria & FIPS 140 Fake IT! 8

Physical Security Authenticity Digital Security Strong security features bring together 3-elements: specialized engineering, restricted components, knowhow & expertise Integration of Overt, Covert and Forensic Features Pre-print Personalization Laminate A Secure ID document is resistant to simulation ( counterfeiting ), alteration ( tamper), and easy to verify with confidence. Design and training are key A digital certificate is an electronic file securely linking an individual to encryption keys and identification data, and belongs to a person and resides on a mobile token A set of hardware, software, people, policies and procedures needed to create, manage, distribute, use, store and revoke digital certificates HASH Keys PKI One Way unique Digital Fingerprint of data Varying strengths (MD5, SHA-1, SHA- 256) Public and Private Keys Used to encrypt/decrypt hash so has can be verified Trust Infrastructure for the issuance of keys, Certs, CRLs Provides lifecycle management for credentials 9

Content supplied by: Government of Canada Canada Border Services Agency National Document Centre E-PASSPORT FRAUD Counterfeit RFID Chips Digital vs. Physical security features

Case #1 - Counterfeit RFID Chips June 2010: CBSA intercepted a UK e-passport. It was one of hundreds of genuine stolen blanks. A functioning counterfeit RFID chip was inserted into the back cover. 11

The counterfeit chip displays the information on the biopage. 12

Case #2 - May-Oct 2014: CBSA intercepted multiple Slovenian e-passports altered with biopage substitution. Functioning counterfeit RFID chips were inserted into the biopage. 13

The counterfeit chip displays the information on the biopage. 14

Low Quality Fraud The Optically Variable Ink does not change color. The Optically Variable Device is low quality. 15

The Variable Laser Image does not change when tilted. The tactile features were not reproduced. 16

The serial numbers have been altered by hand.

The genuine biopage was damaged and the original chip was disabled. The counterfeit chip was placed under the counterfeit biopage. 18

19

20

Thank you 21