SmartCERT. Amugada Stephen Ambani Bsc. Information Technology SIT/0537/12 0716547283. Powered by: CAS



Similar documents
Degree Certificate Authentication using QR Code and Smartphone

PTE ACADEMIC SECURE

Adeoye Temitope Onaolamipo School of Computer Science, Mathematics & Information Technology Houdegbe North America University Republic of Benin

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

Future directions of the AusCERT Certificate Service

W.A.R.N. Passive Biometric ID Card Solution

Best Practices for the Use of RF-Enabled Technology in Identity Management. January Developed by: Smart Card Alliance Identity Council

IMPACT OF INFORMATION AND COMMUNICATION TECHNOLOGY ON EXAMINATION MALPRACTICE AT THE WEST AFRICAN SENIOR SCHOOL CERTIFICATE EXAMINATION IN NIGERIA

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

Fighting Identity Fraud with Data Mining. Groundbreaking means to prevent fraud in identity management solutions

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

WHITE PAPER. Let s do BI (Biometric Identification)

User Behaviour Analytics

Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER

RFID in Document Tracking

STRENGTHENING ANTICOUNTERFEITING CANADA

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

Opinion and recommendations on challenges raised by biometric developments

PROTECT YOUR INTELLECTUAL PROPERTY

ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET.

RFID BASED VEHICLE TRACKING SYSTEM

Enabling the secure use of RFID

Your Mobile Phone as a Ticket (NFC)

RFID Technology in Payment Cards

Keywords: fingerprints, attendance, enrollment, authentication, identification

RFID Tags - Advantages, Disadvantages and Solutions

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

NOT ALL CODES ARE CREATED EQUAL

LibRFID: Automation Software for Library Management System Using RFID Technology

Strategies of G8 Industry and Business to Promote Intellectual Property Protection and to Prevent Counterfeiting and Piracy

If you are interested in Radio Frequency Identification technology, then this is the best investment that you can make today!

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

THE LEADING EDGE OF BORDER SECURITY

REQUIREMENTS FOR CERTIFICATION BODIES TO DETERMINE COMPLIANCE OF APPLICANT ORGANIZATIONS TO THE MAGEN TZEDEK SERVICE MARK STANDARD

Industry Assessment. Awareness and Industry Efforts to Combat Counterfeits in Aerospace & Military Electronic Component Procurement

Radio Frequency Identification (RFID) An Overview

INTEGRATING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY IN ACADEMIC MANAGEMENT SYSTEM

esign Online Digital Signature Service

QUESTIONS & ANSWERS. How did the Department decide on the cost of the Passport Card?

May For other information please contact:

Implementation of biometrics, issues to be solved

Can RFID Tags Work Inside Metal?

The Place of Emerging RFID Technology in National Security and Development

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08

RECOMMENDATIONS COMMISSION

Extended Validation SSL Certificates

SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS

RESOLUTION ON RADIO-FREQUENCY IDENTIFICATION (RFID)

Biometrics in Identity as a Service

Using RFID Technology to Stop Counterfeiting

WHITE PAPER Usher Mobile Identity Platform

Biocryptology is an encryption-based. entry to a network or the Internet that. are vulnerable to third parties through

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution

COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION RECOMMENDATION. of

IT-Based Anti-Money Laundering and Anti-Fraud in Banks and Insurance Companies

Complete. security. begins with 3M

Development of Attendance Management System using Biometrics.

CHAPTER 1 Introduction 1

COMPANY PROFILE. About Cox & Kings Global

Development of a Radio Frequency Identification Based Attendance Management Application With A Pictorial Database Framework

WEB SERVICE FOR STUDENT ATTENDANCE MANAGEMENT SYSTEM

Fighting product clones through digital signatures

RFID Based Real Time Password Authentication System for ATM

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

SAMAY - Attendance, Access control and Payroll Software

Creating Trust Online TM. Comodo Mutual Authentication Solution Overview: Comodo Two Factor Authentication Comodo Content Verification Certificates

SURVEY REPORT SPON. Identifying Critical Gaps in Database Security. Published April An Osterman Research Survey Report.

RFID Design Principles

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Signature Verification Why xyzmo offers the leading solution.

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

Fingerprint-Based Authentication System for Time and Attendance Management

Transcription:

SmartCERT Reliability Robustness Security A Radio Frequency Identification (RFID) based solution to Certificate Counterfeiting. Amugada Stephen Ambani Bsc. Information Technology SIT/0537/12 0716547283 Powered by: CAS 1

The Degree Certificate awarded by a University is an asset of prime importance in an individual s life, circulation of fake degree certificates is a menace to the society, and a threat to the integrity of both the certificate holder and the educational institution the certificate purports to be from. Hence, there is a pressing need for universities to adopt a process that can ensure security of information and authenticity of the certificate issued. SmartCERT is expected to be the solution to this menace 2

Background Counterfeiting and piracy are a range of illicit activities linked to intellectual property rights(ipr) infringement. International trade in counterfeit and pirated products could have been up to USD 200 billion in 2005 (OECD, 2007). These illicit activities steal market share from legitimate businesses and undermine innovation, with negative implications on economic growth. Bribery associated with counterfeiting and piracy weakens the effectiveness of public institutions at the expense of society at large. 3

Introduction Universities across the world face ever increasing challenges in discharging their role as providers and enablers of higher education. One of the serious challenges faced by them is the circulation of fake or duplicate degree certificates. Besides, factors such as very high student strength and overworked staff, physical issuance and verification of certificates is cumbersome, time consuming and at times unreliable. 4

Problem Definition While the examination bodies have managed to stage a reasonably successful relentless fight against exam cheating, the war has moved from the confines of the examination rooms to the certificate production arena. Fake certificates that could easily pass for genuine ones are conveniently produced in the backstreets of major towns in Kenya. The certificates soon get into circulation thereby generating unfair competition for job posting and vacancies The practice is widely believed to be going on, thanks to technology and its sophistication. However, this situation cannot, and must not be left to continue. 5

Problem Justification SmartCert, a Radio Frequency Identification (RFID) based solution, enables universities to curb the problem of fake degree certificates and forgery of mark sheets. Using SmartCert, a university can award certificates with an embedded RFIDtagthat is encoded with the holder sname, dateofgraduation, type of degree and entire transcript, photograph and biometrics (fingerprints), all digitally signed by the university authorities. SmartCertalso enables potential employers, foreign embassies, other universities and other stakeholders to read the data embedded in the RFID tag and verify the identity of the certificate holder and authenticity of the certificate. 6

Objectives To develop a web based distributed referencing system that would provide a solution to the problem of certificate counterfeiting in both the work places and institutions of higher learning by providing means of linking certificates from multiple certifying authorities with features useful in combating identity theft and invasion of privacy. To design a second generation certificate that would hold a user information in an RFID tag that would ensure authenticity of the certificate issued and help in reducing cases of certificate counterfeiting and forgery. >That would provide an avenue for future employers and interviewing panels to verify the authenticity of certificates of the interviewees. >And minimize expenditure on conducting due diligence on employees/interviewees and prospective students. 7

How the SmartCertwill curb Certificate Counterfeiting The system is designed to defeat the crime of certificate counterfeiting by rendering the counterfeited certificates useless. This will be possible through the establishment of SmartCertas the de facto referencing tool in the validationprocess for both the students' credentials and certificates' authenticity. Given the inbuilt referencing and tracking ability of the system, it is set to be a foolproof system in the students' validation process. 8

About RFID Radio Frequency Identification (RFID) uses radio frequency waves to transfer data between a reader and a moveable item which is tagged, to identify, categorize and track the item. It is fast, reliable, and does not require contact between reader/scanner and the tagged item. RFID provides a wireless, over-the-air interface. Unlike bar codes, line-of-sight communication is not necessary. RFID uses an integrated microchip and antenna that reads information 9

RFID System 10

SmartCERT SmartCERT enables universities and other educational institutions to award degree certificates with an embedded passive 13.56 MHz RFID tag, complying with the ISO 14443A standard. Each tag is encoded with the certificate holder s name, dateof graduation, type of degreeand entire transcript, photographand the biometrics(fingerprints), all digitally signed by the university authorities. The RFID-tagged certificate is an authenticrepresentationof the student s educational qualification and credibility, certified by the university. 11

SmartCERT The entire system can be summarized in 3 simple steps, Enrolment, Personalization and Verification: 12

Beneficiaries The key beneficiaries will be learning institutions in: >Admission of students into learning institutions, >Recruitment of new staff, >Renewing contracts of existing staff, >Development of staff training programs, >Establishment and maintenance of students' internship programs, fighting white collar crime, evaluation of school curriculum's effectiveness, and for strategic planning for both private and government agencies. 13

Conclusion and Recommendation There is no question regarding the gravity of certificate counterfeiting and its impact on the dynamics of job placements,the recruitment process and economic growth. This situation calls for a foolproof solution that takes away focus from the problem and places it on the solution. The solution itself has got to be sustainable, reliable, readily availableand efficient. In this regard, SmartCerthas all the qualities to meet the requirements of that solution. I therefore recommends that SmartCertbe adopted as the best solution to the problem of certificate counterfeiting and a means to boost our economy. 14

1. American National Standards Institute(ANSI), Best Practices in the Fight against Global Counterfeiting 2. ANSI Report prepared February 2011 3. Concept Paper on Developing a Sustainable IP Judicial Training Program, rinnlreport by Tabban& Partners. 4. Sommerville, I. (2000). Software Engineering. Pearson publications. 5. Hoffer, J. J. (2007). Modern Systems Analysis and Design. Reading,MA: Prentice Hall Publishing Company. 6. Luqui, V. Berzins (1988).Rapidly prototyping Real-Time System. IEEE Software, September 1998, 25-36. 7. SoftDevTeam. (2006). Evoutionary Prototyping Model. Retrieved 04 12, 2008, from http://www.softdevteam.com 8. Kenya Institute of Education Website: www.kie.ac.ke 9. Communications Commission of Kenya website: www.cck.go.ke 10..www.cybercrime.gov 11.Crossing Borders and Sectors: Exploring Robust Anti Counterfeiting Solutions 12. STOPFAKES.GOV 13.OECD -Organization for Economic Co-Operation and Development 15

SmartCERT Reliability Robustness Security Thank You! Amugada Stephen Ambani Bsc. Information Technology Masinde Muliro University of Science and Technology SIT/0537/12 0716547283 16