Austrian State Printing House

Size: px
Start display at page:

Download "Austrian State Printing House"

Transcription

1 Austrian State Printing House

2 Who we are Austrian company, located in Vienna Founded in 1804 Modern, forward looking identity management provider egovernment Services Turn-key solution provider of full Identity Management life cycle High Security Printer: e.g. electronic Passports Projects with more than 60 governments all over the world Certified by Intergraf CWA, ISO 9001, ISO and ISO Member of different ICAO working groups with huge expertise Innovative Research & Development center Quality Management with own Forensic Laboratory

3 OeSD egovernment Identity Management for disaster situations

4 Why? Keeping the country/government running in case of a disaster Identity connected distribution of aid supplies (money, food, clothes ) - with support of a social wellfare card

5 OeSD egovernment solution Life cycle of Identity Management Data Enrolment Border Management Central Register Database Storage Secure Transfer

6 Data Enrolment Data Enrolment of holder Demographic data Biometric data e.g.: Photo Fingerprints Signature Iris Database Storage Secure Transfer Border Mgmnt

7 Data Enrolment Data check if person is entitled to get requested document Consistency check of data with already existing data of holder Control of breeder documents Involvement of other authorities Database Storage Secure Transfer Border Mgmnt

8 Data Enrolment Database Storage Storage of holder data in electronic register Subsequent processing of data Access control to database Data privacy management Connection of other databases Backup of data Secure facility and disaster prevention Secure Transfer Border Mgmnt

9 Data Enrolment Database Storage Secure Transfer Encrypted communication between the database and the personalization facilities Encrypted network communication Quality control of data Border Mgmnt

10 Data Enrolment Database Storage Secure Transfer Data Preparation Batch generation (incl. prioritization) Calculation of MRZ, checksums, hashes, etc. Calculation of digital signatures Printing document data Data transformation into chip format Storage of data on chip Storing of PKI key s on chip Quality control of document (printing and chip) Border Mgmnt

11 Data Enrolment Database Storage Secure Transfer Tracking of the personalized document Transfer to authorities or directly to citizens (Secure, normal postal service, official courier, fast shipment) Feedback on successful transfer Border Mgmnt

12 Data Enrolment Database Storage Secure Transfer Handing over to citizen Verification if person is document holder Entry in database: document shipped document activated Valid declaration of the document in central database Border Mgmnt

13 Data Enrolment Database Storage Secure Transfer Border Management Verification of the person against document Verification of the person against register Using the document for egates

14 Identity Management Guaranteeing a fair distribution of aid supplies keeps the country/government running in case of a disaster situation.

15 Contact: Gerhard Wastl Head of International Sales

16

Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010

Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Content eid Primary Functions eid Privacy Features and Security

More information

Market Trends and Veridos solutions for epassports & ID Documents

Market Trends and Veridos solutions for epassports & ID Documents Market Trends and Veridos solutions for epassports & ID Documents Ludger Holtmann, Senior Product & Portfolio Manager Michael Ruhland-Bauer, Head of Product Mangement Documents Agenda Introducing Veridos

More information

LDS2 Concept and Overview: Exploring Possibilities in Travel Border Clearance

LDS2 Concept and Overview: Exploring Possibilities in Travel Border Clearance LDS2 Concept and Overview: Exploring Possibilities in Travel Border Clearance Overview Current generation of epassports Benefits and Limits of an epassport Overview of the next generation epassport Applications

More information

EU Passport Specification

EU Passport Specification Biometrics Deployment of EU-Passports EU Passport Specification (EN) 28/06/2006 (As the United Kingdom and Ireland have not taken part in the adoption of this measure, an authentic English version of the

More information

Verifying emrtd Security Controls

Verifying emrtd Security Controls Blackhat Europe 2010 Verifying emrtd Security Controls Raoul D Costa 1 3M 2010. All Rights Reserved. Agenda Overview of ICAO / EU Specifications emrtds decomposed emrtd Infrastructure (PKI) Inspecting

More information

3D Face Project. Overview. Paul Welti. Sagem Défense Sécurité Technical coordinator. ! Background. ! Objectives. ! Workpackages

3D Face Project. Overview. Paul Welti. Sagem Défense Sécurité Technical coordinator. ! Background. ! Objectives. ! Workpackages 3D Face Project Paul Welti Sagem Défense Sécurité Technical coordinator Overview! Background! Objectives! Workpackages 2 1 ! Biometric epassport Biometrics and Border Control! EU-Council Regulation No

More information

The epassport: What s Next?

The epassport: What s Next? The epassport: What s Next? Justin Ikura LDS2 Policy Sub-Group Co-chair Tom Kinneging Convenor of ISO/IEC JTC1 SC17 WG3 International Organization for Standardization (ISO) Strengthening Aviation Security

More information

e-sign and TimeStamping

e-sign and TimeStamping e-sign and TimeStamping Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 Recent Developments:

More information

2 Electronic Passports and Identity Cards

2 Electronic Passports and Identity Cards 2 Picture source: www.bundesdruckerei.de Paper based Passport Radio Frequency (RF) Chip Electronic Passport (E Pass) Biographic data Human readable Partially machine readable (optically) Conventional

More information

VALIDATING E-PASSPORTS AT THE BORDER: THE ROLE OF THE PKD R RAJESHKUMAR CHIEF EXECUTIVE AUCTORIZIUM PTE LTD

VALIDATING E-PASSPORTS AT THE BORDER: THE ROLE OF THE PKD R RAJESHKUMAR CHIEF EXECUTIVE AUCTORIZIUM PTE LTD VALIDATING E-PASSPORTS AT THE BORDER: THE ROLE OF THE PKD R RAJESHKUMAR CHIEF EXECUTIVE AUCTORIZIUM PTE LTD THE TRUST IMPERATIVE E-Passports are issued by entities that assert trust Trust depends on the

More information

Coesys Enrollment Solutions for Government Programs

Coesys Enrollment Solutions for Government Programs Coesys Enrollment Solutions for Government Programs Enrollment processes you can trust Enrollment is a first and critical step to ensure secure and reliable citizen registration before issuing trusted

More information

Technology Advances in Authentication. Mohamed Lazzouni, SVP & CTO

Technology Advances in Authentication. Mohamed Lazzouni, SVP & CTO Technology Advances in Authentication Mohamed Lazzouni, SVP & CTO Outline Optical Authentication Complexity of security features and their evolution Computing and optics Document analysis techniques Automation

More information

The Match On Card Technology

The Match On Card Technology Precise Biometrics White Paper The Match On Card Technology Magnus Pettersson Precise Biometrics AB, Dag Hammarskjölds väg 2, SE 224 67 Lund, Sweden 22nd August 2001 Abstract To make biometric verification

More information

Face recognition for enhanced security.

Face recognition for enhanced security. Face recognition for enhanced security. Cognitec Systems - the face recognition company FaceVACS : Face Recognition Technology FaceVACS Face Recognition Technology Cognitec s patented FaceVACS technology

More information

Open e-id implementation for temporary and future card deployments

Open e-id implementation for temporary and future card deployments Open e-id implementation for temporary and future card deployments Gauthier Van Damme Karel Wouters Danny De Cock Katholieke Universiteit Leuven ESAT/SCD/IBBT-COSIC World e-id Conference, 2010 ESAT/SCD-COSIC

More information

Past & Future Issues in Smartcard Industry

Past & Future Issues in Smartcard Industry Past & Future Issues in Smartcard Industry Ecrypt 2 Summer School Guillaume Dabosville Oberthur Technologies Oberthur Technologies the group its divisions payment, mobile, transport and digital TV markets

More information

IBM Payment Gateway for AIX, Version 2 Adds Major Functions to Financial Institutions Processing Transactions for Internet Commerce

IBM Payment Gateway for AIX, Version 2 Adds Major Functions to Financial Institutions Processing Transactions for Internet Commerce Software Announcement February 1, 2000 IBM Payment Gateway for AIX, Version 2 Adds Major Functions to Financial Institutions Processing Transactions for Internet Commerce Overview Payment Gateway for AIX,

More information

Mobile: Purely a Powerful Platform; Or Panacea?

Mobile: Purely a Powerful Platform; Or Panacea? EBT: The Next Generation 2017 Mobile: Purely a Powerful Platform; Or Panacea? Evan O Regan, Director of Product Management Authentication & Fraud Solutions Entrust Datacard POWERFUL PLATFORM OR PANACEA

More information

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare 2017 Ruslans Arzaniks Head of Development About us WHO WE ARE X Infotech is a global provider of software

More information

Conformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek

Conformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek Conformity and Interoperability Key Prerequisites for Security of eid documents Holger Funke, 27 th April 2017, ID4Africa Windhoek Agenda 1. About secunet Security Networks AG 2. Timeline of interoperability

More information

79 th INTERPOL General Assembly Doha, Qatar, 8-12 November 2010

79 th INTERPOL General Assembly Doha, Qatar, 8-12 November 2010 79 th INTERPOL General Assembly Doha, Qatar, 8-12 November 2010 delivers state-of-the-art security technologies for strategic partnership Yuriy Shostak Deputy Chairman of the Board International Strategy

More information

Role of Biometrics in Cybersecurity. Sam Youness

Role of Biometrics in Cybersecurity. Sam Youness Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday

More information

Introduction Morpho The Art of Identification

Introduction Morpho The Art of Identification Introduction Morpho The Art of Identification by Adriaan Kamphorst, Sales Manager Morpho Identity Documents Safran group businesses Aerospace Defense Security Morpho strengthens Safran s positioning to

More information

Security of Biometric Passports ECE 646 Fall Team Members : Aniruddha Harish Divya Chinthalapuri Premdeep Varada

Security of Biometric Passports ECE 646 Fall Team Members : Aniruddha Harish Divya Chinthalapuri Premdeep Varada Security of Biometric Passports ECE 646 Fall 2013 Team Members : Aniruddha Harish Divya Chinthalapuri Premdeep Varada CONTENTS Introduction to epassports Infrastructure required for epassports Generations

More information

Pro s and con s Why pins # s, passwords, smart cards and tokens fail

Pro s and con s Why pins # s, passwords, smart cards and tokens fail Current Authentication Methods Pro s and con s Why pins # s, passwords, smart cards and tokens fail IDENTIFYING CREDENTIALS In The Physical World Verified by Physical Inspection of the Credential by an

More information

Biometric Technology

Biometric Technology Biometric Technology Contents Biometric Technology M2SYS is a leading global provider of biometric technology and software solutions with 16 years of real-world experience. Our experience enables us to

More information

MODULE USER LOGIN (CREATE USER ACCOUNT)

MODULE USER LOGIN (CREATE USER ACCOUNT) MODULE USER LOGIN (CREATE USER ACCOUNT) 1 P a g e VERSION HISTORY Version Number Implemented By Revision Date Approved By Approval Date Description of Change 1.0 2 P a g e Contents Introduction... 4 Objective...

More information

Document reader Regula 70X4M

Document reader Regula 70X4M Document reader Regula 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses and other identification

More information

SmartCards as electronic signature devices Progress of standardization. Helmut Scherzer, CEN TC224/WG16 (Editor) IBM Germany

SmartCards as electronic signature devices Progress of standardization. Helmut Scherzer, CEN TC224/WG16 (Editor) IBM Germany SmartCards as electronic signature devices Progress of standardization Helmut Scherzer, CEN TC224/WG16 (Editor) IBM Germany scherzer@de.ibm.com Active CEN working groups(today) TC224 : "Machine readable

More information

Biometric Fingerprint Reader Unit OZD-ABC-OA99 Technical Specification Data Sheet

Biometric Fingerprint Reader Unit OZD-ABC-OA99 Technical Specification Data Sheet BIOMETRIC FINGERPRINT TIME & ATTENDANCE FINGERPRINT READER UNIT Item Code: OZD-ABC-OA99 OZD-ABC-OA99 is one of the most cost effective Biometric Fingerprint Readers on the market today. OZD-ABC-OA99 incorporates

More information

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013 MAESON MAHERRY 3 Factor Authentication and what it means to business. Date: 21/10/2013 Concept of identity Access Control User Self-Service Identity and Access Management Authoritive Identity Source User

More information

Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005

Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005 Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005 Who Am I? How do you know? 2 TWIC Program Vision A high-assurance identity credential that

More information

Hash-based Encryption Algorithm to Protect Biometric Data in e-passport

Hash-based Encryption Algorithm to Protect Biometric Data in e-passport Hash-based Encryption Algorithm to Protect Biometric Data in e-passport 1 SungsooKim, 2 Hanna You, 3 Jungho Kang, 4 Moonseog Jun 1, First Author Soongsil University, Republic of Korea, indielazy@ssu.ac.kr

More information

esign - Evolving Opportunities and Applications C E N T R E F O R D E V ELOPMENT O F A D VANCED C O MPUTING N O V E M B E R 1 5,

esign - Evolving Opportunities and Applications C E N T R E F O R D E V ELOPMENT O F A D VANCED C O MPUTING N O V E M B E R 1 5, esign - Evolving Opportunities and Applications C E N T R E F O R D E V ELOPMENT O F A D VANCED C O MPUTING N O V E M B E R 1 5, 2 0 1 7 Presentation Outline e-sign Architecture Interesting Challenges

More information

The Future of Smart Cards: Bigger, Faster and More Secure

The Future of Smart Cards: Bigger, Faster and More Secure The Future of Smart Cards: Bigger, Faster and More Secure Joerg Borchert, Vice President, Secure Mobile Solutions July 16, 2003 Page 1 N e v e r s t o p t h i n k i n g. Infineon Technologies: Overview

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data Sphinx List Summary Version Order # Included software components Sphinx Enterprise S-30 Install Sphinx Logon Manager software and desktop card readers on end-user computers. Pre-configured Sphinx CardMaker

More information

Charter Pacific Biometrics Acquisition

Charter Pacific Biometrics Acquisition Charter Pacific Biometrics Acquisition Charter Pacific Biometrics Acquisition Charter Pacific has executed a Share Purchase Agreement to acquire 100% of Microlatch. Charter Pacific/Microlatch has a patent

More information

HID Passport Datapage Technology

HID Passport Datapage Technology HID Passport Datapage Technology GOVERNMENT ID SOLUTIONS HID Global s Passport Datapage Offering Datapage Security Features Governments around the world are implementing passport solutions that help better

More information

Part 9: Deployment of Biometric Identification and Electronic Storage of Data in MRTDs

Part 9: Deployment of Biometric Identification and Electronic Storage of Data in MRTDs Doc 9303 Machine Readable Travel Documents Seventh Edition, 2015 Part 9: Deployment of Biometric Identification and Electronic Storage of Data in MRTDs Approved by and published under the authority of

More information

BIOFLEX. Applications

BIOFLEX. Applications HARDWARE BIOFLEX Bioflex is an essential tool for identity verification operations of a modern state. This identification device for persons is guarantor for population census, polling offices or police

More information

Towards a better solution for Border Guards. D.I. Bernhard Strobl Department Digital Safety and Security

Towards a better solution for Border Guards. D.I. Bernhard Strobl Department Digital Safety and Security Towards a better solution for Border Guards D.I. Bernhard Strobl Department Digital Safety and Security MobilePass A secure, modular and distributed mobile border control solution for European land border

More information

1 Introduction. dloc is a revolutionary system for managing and

1 Introduction. dloc is a revolutionary system for managing and 1 Introduction dloc is a revolutionary system for managing and authenticating critical records. Combining the security of blockchain and the convenience of Near Field Communication (NFC), it allows any

More information

V.V. COLLEGE OF ENGINEERING

V.V. COLLEGE OF ENGINEERING A.R. NIVETHITHAA BE 1 ST YEAR V.V. COLLEGE OF ENGINEERING TISAIYANVILAI DIGITAL FIANCIAL LITERACY India is a developing economy with focus on achieving sustainable development. To achieve sustainable development,

More information

E-Passport: Cracking Basic Access Control Keys with COPACOBANA

E-Passport: Cracking Basic Access Control Keys with COPACOBANA E-Passport: Cracking Basic Access Control Keys with COPACOBANA Yifei Liu, Timo Kasper, Kerstin Lemke-Rust and Christof Paar Communication Security Group Ruhr University Bochum, Germany http://www.crypto.rub.de

More information

Lecture 9 User Authentication

Lecture 9 User Authentication Lecture 9 User Authentication RFC 4949 RFC 4949 defines user authentication as: The process of verifying an identity claimed by or for a system entity. Authentication Process Fundamental building block

More information

A UK perspective: The use of modern technology. Simon Peachey

A UK perspective: The use of modern technology. Simon Peachey A UK perspective: The use of modern technology Simon Peachey UKvisas Governance and Structure Joint Foreign Office and Home Office Department Joint Ministerial and senior official oversight Staff drawn

More information

Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token

Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Technical Guideline TR-03110-1 Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Part 1 emrtds with BAC/PACEv2 and EACv1 Version 2.20 26. February 2015 History Version

More information

FINLAND

FINLAND 21.09.2016 FINLAND WWW.SAFRANGROUP.COM Ce document et les informations qu il contient sont la propriété de Safran. Ils ne doivent pas être copiés ni communiqués à un tiers sans l autorisation préalable

More information

TWIC Readers What to Expect

TWIC Readers What to Expect TWIC Readers What to Expect Walter Hamilton Chairman International Biometric Industry Association Walter Hamilton International Biometric Industry Association 1155 F Street, NW Washington, DC 20004 (727)

More information

Smart Mobile Identity. Revolutionizing biometric identity verification

Smart Mobile Identity. Revolutionizing biometric identity verification Smart Mobile Identity Revolutionizing biometric identity verification Introduction Mobile devices are poised to transform the biometric industry and greatly broaden the use of biometrics for identity verification.

More information

Credentialing Project Technical Architecture

Credentialing Project Technical Architecture Credentialing Project Technical Architecture Presented to Transportation Industry Association Stakeholder Meetings April 11-29, 2002 1 Agenda Overview of High Level Architecture Vision Components of Architecture

More information

This paper focuses on the issue of increased biometric content. We have also published a paper on inspection systems.

This paper focuses on the issue of increased biometric content. We have also published a paper on inspection systems. White Paper 1 INTRODUCTION As ICAO 1 -compliant epassports come into widespread use in Q4 of 2006, it is an appropriate moment to review some of the initiatives required for the next stage of development.

More information

Der elektronische Personalausweis Mehr oder weniger Sicherheit?

Der elektronische Personalausweis Mehr oder weniger Sicherheit? Der elektronische Personalausweis Mehr oder weniger Sicherheit? Lukas Grunwald DN-Systems GmbH Germany CeBIT 2010- Heise Forum 2010 Hannover The Government s Dream Multi biometric, double gates, anti-tailgating,

More information

Legal Regulations and Vulnerability Analysis

Legal Regulations and Vulnerability Analysis Legal Regulations and Vulnerability Analysis Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security) Germany Introduction of the BSI National Authority for Information

More information

The EAC for MRTD. 26 January 2010

The EAC for MRTD. 26 January 2010 The EAC for MRTD Rafik Chaabouni Serge Vaudenay 26 January 2010 Outline MRTD? Standards - RFID - ICAO and BAC - EAC Solutions? 2 MRTD? Machine Readable Travel Document 3 Standards RFID ICAO and BAC EAC

More information

AirSIMS Visuals Draft Presentation

AirSIMS Visuals Draft Presentation AirSIMS Visuals Draft Presentation Felix Keng Fong Cheong Kelly Jung Scott Moura Wai Leung William Wong November 16, 2005 A System of Systems Population Movement Infectious Diseases AirSIMS Structural-Health

More information

Interagency Advisory Board Meeting Agenda, February 2, 2009

Interagency Advisory Board Meeting Agenda, February 2, 2009 Interagency Advisory Board Meeting Agenda, February 2, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Mini Tutorial on NIST SP 800-116 AND PIV use in Physical Access Control Systems (Bill MacGregor,

More information

College Board IDOC Frequently Asked Questions

College Board IDOC Frequently Asked Questions College Board IDOC Frequently Asked Questions Produced from the College Board by West Angeles TM Education & Enrichment Program IDOC Frequently Asked Questions Q: What is the College Board and why am I

More information

UK Cooperative Extension Service Policies, Procedures & Guidelines D.21

UK Cooperative Extension Service Policies, Procedures & Guidelines D.21 I. Policy Using Federal Commercial Mail Postage Federal Commercial Mail applies to all official mail mailed by the Cooperative Extension Service offices using postal meter and bulk mail. Restrictions are

More information

Biometrics & Smart Cards In Use Today

Biometrics & Smart Cards In Use Today Biometrics & Smart Cards In Use Today Christer Bergman President and CEO, Precise Biometrics In Use Today... Alan L. Herto Chief, Systems Integrity Division Requirements Improved IT security & stronger

More information

E-PASSPORT SCHEME USING AUTHENTICATION PROTOCOLS ALONG WITH FACE, FINGERPRINT, PALMPRINT AND IRIS BIOMETRICS

E-PASSPORT SCHEME USING AUTHENTICATION PROTOCOLS ALONG WITH FACE, FINGERPRINT, PALMPRINT AND IRIS BIOMETRICS E-PASSPORT SCHEME USING AUTHENTICATION PROTOCOLS ALONG WITH FACE, FINGERPRINT, PALMPRINT AND IRIS BIOMETRICS 1 V.K. Narendira Kumar and 2 B. Srinivasan 1 Assistant Professor, Department of Information

More information

A Trust Infrastructure for epassports

A Trust Infrastructure for epassports A Trust Infrastructure for epassports Building reliable, timely and cost-effective trust links for electronic travel document verification +1-888-690-2424 entrust.com Table of contents Trust in government

More information

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Total Operational Security Roger Roehr Executive Director, Roehr Consulting 8 th Annual Smart Cards

More information

Biometric Technologies Signature

Biometric Technologies Signature Biometric Signature Solutions Presented at the Open House The Standards Institution of Israel 1 WonderNet The leading provider of digital signature solutions Over 5 million current users Cutting edge technologies:

More information

Module 5: Smart Card Usage Models Identity, Security and Access Control

Module 5: Smart Card Usage Models Identity, Security and Access Control Module 5: Smart Card Usage Models Identity, Security and Access Control Smart Card Alliance Certified Smart Card Industry Professional Accreditation Program 1 For CSCIP Applicant Use Only About the Smart

More information

Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria

Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria General Privacy is a matter of trust, and your trust is important to us. Handling personal data in a responsible

More information

TWIC Transportation Worker Identification Credential. Overview

TWIC Transportation Worker Identification Credential. Overview TWIC Transportation Worker Identification Credential Overview TWIC Program Vision Goals Improve the security of identity management by establishing a system-wide common credential, universally acceptable

More information

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008 Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal

More information

Identity Verification Code of Practice Explanatory Note Updated in December 2017

Identity Verification Code of Practice Explanatory Note Updated in December 2017 AML / CFT Anti-money laundering and countering financing of terrorism Identity Verification Code of Practice Explanatory Note Updated in December 2017 Explanatory Note 1. This Explanatory Note should be

More information

An Introduction to Digital Identity

An Introduction to Digital Identity 1 An Introduction to Digital Identity Andreas Pfitzmann Dresden University of Technology, Department of Computer Science, D-01062 Dresden Nöthnitzer Str. 46, Room 3071 Phone: +49 351 463-38277, e-mail:

More information

Identity Proofing Standards and Beyond

Identity Proofing Standards and Beyond Solutions for Health Care Providers Identity Proofing Standards and Beyond Kimberly Little Sutherland LexisNexis Risk Solutions Sr. Director, Identity Management Solution Strategy Agenda Identity Proofing

More information

Privacy Policy: itsme APP

Privacy Policy: itsme APP Privacy Policy: itsme APP This privacy policy applies to the itsme Application (hereafter the itsme App or the App) developed by Belgian Mobile ID SA/NV (the Privacy Policy). The itsme App (the App) allows

More information

cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH

cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 cryptovision cryptovision Gelsenkirchen

More information

6 facts about GenKey s ABIS

6 facts about GenKey s ABIS 6 facts about GenKey s ABIS Lightning fast deduplication 6 facts about ABIS 2 3 What is ABIS? 3 Core Functions For any biometric identity to be reliable, it s essential there s only one unique ID for every

More information

An Overview of Electronic Passport Security Features

An Overview of Electronic Passport Security Features An Overview of Electronic Passport Security Features Zdeněk Říha Faculty of Informatics, Masaryk University, Botanická 68A, 602 00 Brno, Czech Republic zriha@fi.muni.cz Abstract. Electronic passports include

More information

MULTIAPP V2 PACE - SAC PUBLIC SECURITY TARGET

MULTIAPP V2 PACE - SAC PUBLIC SECURITY TARGET MultiApp v2 Pace SAC Common Criteria / ISO 15408 Security Target Public version EAL4+ Copyright Gemalto SA 2012. Page : 1/50 CONTENT 1. ST INTRODUCTION... 4 1.1 ST IDENTIFICATION... 4 1.2 ST OVERVIEW...

More information

What is RFID, where is it being used and why? Security implications of RFID Why is it being used to secure passports? The methodology used to asses

What is RFID, where is it being used and why? Security implications of RFID Why is it being used to secure passports? The methodology used to asses Matthew Sirotich What is RFID, where is it being used and why? Security implications of RFID Why is it being used to secure passports? The methodology used to asses epassports and create its successor

More information

Aspects of Identity. InfoSec April BCS Security Community of Expertise

Aspects of Identity. InfoSec April BCS Security Community of Expertise Aspects of Identity InfoSec April 2011 BCS Security Community of Expertise SCoE Representatives Dr. Louise Bennett FBCS CITP Chair of the BCS Security Community of Expertise Ian Fish FBCS BCS Information

More information

USING A CENTRAL DATA REPOSITORY FOR BIOMETRIC AUTHENTICATION IN PASSPORT SYSTEMS 1

USING A CENTRAL DATA REPOSITORY FOR BIOMETRIC AUTHENTICATION IN PASSPORT SYSTEMS 1 USING A CENTRAL DATA REPOSITORY FOR BIOMETRIC AUTHENTICATION IN PASSPORT SYSTEMS 1 Morné Breedt a,b, Martin S Olivier b a eyedentity b Information and Computer Security Architectures Research Group, Department

More information

Towards e-passport Duplicate Enrolment Check in the European Union

Towards e-passport Duplicate Enrolment Check in the European Union 2013 European Intelligence and Security Informatics Conference Towards e-passport Duplicate Enrolment Check in the European Union Moazzam Butt, Sandra Marti, Alexander Nouak,Jörg Köplin, R. Raghavendra

More information

CREDENTSYS CARD FAMILY

CREDENTSYS CARD FAMILY CREDENTSYS CARD FAMILY Credentsys is a secure smart card family that is designed for national ID systems, passports, and multi-use enterprise security environments. The family is certified to FIPS 140-2

More information

IBM SmartCloud Engage Security

IBM SmartCloud Engage Security White Paper March 2012 IBM SmartCloud Engage Security 2 IBM SmartCloud Engage Security Contents 3 Introduction 3 Security-rich Infrastructure 4 Policy Enforcement Points Provide Application Security 7

More information

JTC 1 SC 37 Biometrics International Standards

JTC 1 SC 37 Biometrics International Standards JTC 1 SC 37 Biometrics International Standards Dr. Stephen Elliott Biometrics Standards, Performance, and Assurance Laboratory Purdue University www.bspalabs.org Overview Market Opportunities for Biometric

More information

Non Person Identities After all, who cares about me? Gilles Lisimaque & Dave Auman Identification technology Partners, Inc.

Non Person Identities After all, who cares about me? Gilles Lisimaque & Dave Auman Identification technology Partners, Inc. Identities Non Person Identities After all, who cares about me? Gilles Lisimaque & Dave Auman Identification technology Partners, Inc. Device Identifiers Most devices we are using everyday have (at least)

More information

An Overview of Electronic Passport Security Features

An Overview of Electronic Passport Security Features An Overview of Electronic Passport Security Features Zdeněk Říha Faculty of Informatics, Masaryk University, Botanická 68A, 602 00 Brno, Czech Republic zriha@fi.muni.cz Abstract. Electronic passports include

More information

COMPUTER NETWORK SECURITY

COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (3 rd Week) 3. User Authentication 3.Outline Electronic User Authentication Principles Password-Based Authentication Token-Based Authentication Biometric

More information

Biometric Passport from a Security Perspective

Biometric Passport from a Security Perspective Biometric Passport from a Security Perspective Gildas Avoine INSA Rennes/IRISA Institut Universitaire de France SUMMARY Passport Primer Memory Content Cryptographic Mechanisms defined by ICAO Additional

More information

Strategies for the Implementation of PIV I Secure Identity Credentials

Strategies for the Implementation of PIV I Secure Identity Credentials Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual

More information

Whitepaper: GlobalTester Prove IS

Whitepaper: GlobalTester Prove IS Whitepaper: GlobalTester Prove IS Testing of EAC inspection systems By HJP Consulting GmbH Introduction There have been a lot of activities in standardization to define conformity tests for e-passports.

More information

Aspects of Identity. InfoSec April BCS Security Community of Expertise

Aspects of Identity. InfoSec April BCS Security Community of Expertise Aspects of Identity InfoSec April 2011 BCS Security Community of Expertise SCoE Representatives Dr. Louise Bennett FBCS CITP Chair of the BCS Security Community of Expertise Ian Fish FBCS BCS Information

More information

SENTRI PASS APPLICATION

SENTRI PASS APPLICATION SENTRI PASS APPLICATION HOW TO APPLY 1. Pay the SentriPass service fee via PayPal on the SENTRIPASS webpage Please note: We cannot use your credit card to pay for the SentriPass service fee Your credit

More information

Security Mechanisms and Access Control Infrastructure for e-passports and General Purpose e-documents

Security Mechanisms and Access Control Infrastructure for e-passports and General Purpose e-documents Journal of Universal Computer Science, vol. 15, no. 5 (2009), 970-991 submitted: 1/8/08, accepted: 28/2/09, appeared: 1/3/09 J.UCS Security Mechanisms and Access Control Infrastructure for e-passports

More information

PNB KIOSK BANKING SOLUTION KBS MANUAL FOR BCAs

PNB KIOSK BANKING SOLUTION KBS MANUAL FOR BCAs PNB KBS MANUAL FOR BCAs 1 About This Document Purpose This document KIOSK- Agent Manual serves as a guide for the Kiosk Agent to use the services available in the KIOSK Banking Application. Intended Users

More information

ADAPTIVE RECOGNITION

ADAPTIVE RECOGNITION ADAPTIVE RECOGNITION Image Recognition Products for Traffic, Security, ID Data Entry Automation and Biometric Identification P

More information

Introduction of the Seventh Edition of Doc 9303

Introduction of the Seventh Edition of Doc 9303 Introduction of the Seventh Edition of Doc 9303 Sjef Broekhaar Advisor ICAO TRIP IRAN SEMINAR Kish Island 17/05/2016 Footer 1 July 2015: ICAO publishes the 7th edition of Doc 9303 Part 1 Part 2 Part 3

More information

Employment Ontario Information System (EOIS) Case Management System

Employment Ontario Information System (EOIS) Case Management System Employment Ontario Information System (EOIS) Case Management System Service Provider User Guide Service Provider User Management Version 1.1 December 2015 Table of Contents Service Provider User Management...1

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 4: Finger image data

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 4: Finger image data INTERNATIONAL STANDARD ISO/IEC 19794-4 Second edition 2011-12-15 Information technology Biometric data interchange formats Part 4: Finger image data Technologies de l'information Formats d'échange de données

More information

How To Secure Electronic Passports. Marc Witteman & Harko Robroch Riscure 02/07/07 - Session Code: IAM-201

How To Secure Electronic Passports. Marc Witteman & Harko Robroch Riscure 02/07/07 - Session Code: IAM-201 How To Secure Electronic Passports Marc Witteman & Harko Robroch Riscure 02/07/07 - Session Code: IAM-201 Other personal info on chip Other less common data fields that may be in your passport Custody

More information

Aadhaar. Scalability & Data Management Challenges. Dr. Pramod K. Varma. Chief Architect, UIDAI

Aadhaar. Scalability & Data Management Challenges. Dr. Pramod K. Varma. Chief Architect, UIDAI Aadhaar Scalability & Data Management Challenges Dr. Pramod K. Varma Chief Architect, UIDAI twitter.com/pramodkvarma pramodkvarma.com Understanding Aadhaar System 2 Establishing ID is a Challenge Issue

More information