Technology Advances in Authentication. Mohamed Lazzouni, SVP & CTO
|
|
- Morris Higgins
- 5 years ago
- Views:
Transcription
1 Technology Advances in Authentication Mohamed Lazzouni, SVP & CTO
2 Outline Optical Authentication Complexity of security features and their evolution Computing and optics Document analysis techniques Automation and front office (real-time) forensic capabilities Complementary technologies Electronic Authentication End 2 Standards and regulatory requirements Threats and countermeasures epassport authentication process Reader hardware from retrofit to redesign Emerging trends
3 Machine-Based Document authentication Definition: The equipment needs to provide good evidence of the authenticity of the document by making it impracticable to falsify or alter without detection. Electronic Authentication Value Optical Authentication 3 Time
4 Document Authentication Value Adjudication Authenticity of breeder documents Lower transaction and transaction speed High degree of automation Font office/real time forensic capability 4
5 Optical Authentication
6 Optical Authentication Evolution in Multiple Dimensions Document Security Features/Technologies Computing and Optics (Enabling Technologies) Document Analysis Techniques Automation / Simplicity of Operation Complimentary Technologies (Biometrics, Smartchips, PKI) 6
7 Optical Authentication Document Security Features/Technologies Electronic Contact/Contactless Chips ICAO Security Protocols PKI Traditional Optical Microprint, Watermarks Security Inks and Papers Security Laminates Seals / Patterns Embossing Serialized Perforations Advanced Optical Holograms / Kinegrams Digital Watermarks Taggants 7
8 Optical Authentication Computing and Optics / Enabling Technologies Image Acquisition Image Processing Applications Lighting Visible Infrared Ultraviolet Coaxial Firmware / Control Camera Module Lens System USB / Firewire Data Acquisition OCR Pattern Recognition Barcode Reads Compression / Decompression Processing Platform Authentication Transaction Processor Workflow Management Transaction Audits/Reports Security Adjudication Support Multi-Threaded, Multi-Processing Operating System Multi-Processor PC Platform Device Drivers High-Speed Driver Interfaces Smartchip Reader Magstripe / Barcode Data Repositories Document Test Profiles Reference Databases Transaction Status/Audits 8
9 Optical Authentication Computing and Optics / Document Reader Technology MRZ Slot Reader (MRZ OCR), Embedded Processor Full-Page Monochrome Reader (Vis, IR, UV Coaxial Lights) Full-Page Color Reader, High- Res USB CMOS Sensor Full-Page Color with Integrated Contactless Chip Reader for e-passports 400 DPI Resolution, 2D Barcodes from Image 1980s
10 Optical Authentication Document Analysis Techniques ICAO MRZ Tests (Analysis of OCR results) Checksum verification, expiration checks, B900 test Multi-Spectrum Pattern Recognition/Analysis Verify that expected patterns are present under a given light source Verify that prohibited patterns do not appear under a given light source Tests performed on security features and other expected document behaviors Tamper Tests Analyze document for signs of laminate violation and other tamper evidence Paper Stock Tests Verify use of proper papers (primary applications include photocopy detection) Color Fidelity Tests Verify that document patterns/regions are within expected color range Data Crosschecks Perform consistency check of redundant data sources (optical and electronic) Watchlist checks 10
11 Optical Authentication Document Analysis Techniques Image and text tests are performed automatically in seconds Optical recognition systems present challenges similar to those of biometrics systems Recognition accuracy and performance continue to improve with hardware/software platform advances Combination of optical and electronic authentication provides a powerful composite solution 11
12 Optical Authentication Process Automation / Problems with Manual Processes Legacy Document Forensics Manual process performed by trained specialists Elementary tools of the trade Magnifiers UV lamps Printed reference books and watchlists Libraries of good/bad documents Effective, but time-consuming process reserved for selectees from the front line This model only works for large government agencies and commercial institutions The selectee process can be very subjective and inconsistent, many will slip through the cracks as non-selectees Difficult to keep printed reference materials and document libraries up to date Difficult to scale the process to meet growing transaction volumes and pressures to improve customer service Imaging technology and automation were introduced to move document forensics analysis from back room to the front lines 12
13 Optical Authentication Process Automation / Increasing Degrees of Automation None Simple data capture, no authentication Minimal Basic authentication of the captured data (bearer age check and document expiration date) Low Capture full-page document image Data authentication including validating data checksums and checking for data consistency across redundant data sets Medium Verification of both visible and encoded biometric information Data consistency checks to detect discrepancies between visible and encoded information Special light sources, image analysis left to the operation High Extraction and analysis of security-pattern features using multi-spectrum light sources Detection of forgery / tampering based on feature recognition Extended data capture, including areas outside the machine-readable zone (MRZ) Automated tests, including pattern recognition, color fidelity checks and data crosschecks Adjudication tools for expanded forensic examination at a secondary workstation Highest Wide-area enterprise deployment (system configuration, monitoring, and maintenance) Secure access to databases containing document security profiles, intelligence data such as watch lists and related security alerts, and issuance databases Issuer verification using real-time and batch access to authorities responsible for issuing secure documents 13
14 Optical Authentication Process Automation / User Profiles Increased levels of automation are critical as the user profile changes Security requirements must be met while meeting customer service demands User Profile Qualifications / Limitations 1) Forensics Analyst The original user for optical authentication Forensics specialist Access to document libraries and intelligence data 2) Frontline Operator Automated authentication brought optical authentication from back room to the front line Minimal forensics training Under pressure to keep customers moving Susceptible to fatigue, coercion, fraud 3) Customer (Self-Service) Self-service applications are the future and will achieve new levels of customer service No training Process must be extremely simple and well defined 14
15 Optical Authentication Process Automation / Critical Success Factors Simple operation that can be performed by trained and untrained operators Extensive documetrics databases with breadth and depth to cover large variety of documents in circulation Robust recovery and adjudication procedures to maintain efficient operations Transaction times within acceptable limits (5 seconds or less for most applications) Sufficient accuracy to keep secondary inspections at or below acceptable levels Security to ensure privacy and system integrity Flexibility to accommodate customer-specific business rules 15
16 Optical Authentication Introduction of Complimentary Technologies Biometrics Smartchips Biometrics establish the link between the bearer and the document. Smartchips provide a secure storage and communications medium for electronic information. Electronic ID 16
17 Electronic Authentication
18 Electronic Authentication Standards and Regulatory Requirements Driving towards standards on Security, Privacy and Interoperability International body that guides and regulates international civil aviation Driving force behind international document specifications and e- Passports Established in member countries Provides specifications for machine readable passports and visas Works in cooperation with International Organization for Standardization (ISO) Works in cooperation with International Air Transport Association (IATA)
19 Electronic Authentication Benefits Primary goal is to enhance the capabilities and security of traditional identification documents Facilitate global economy via safe travel across international borders Extend support for machine-assisted identity verification Specify secure storage mediums for biometrics and other sensitive identity information Ensure document authenticity/uniqueness and data privacy Establish international interoperability standards Standards for machine-readable extensions using magnetic stripe, 2D barcode, optical memory, and contact/contactless smartchips ICAO New Orleans Resolution (March 2003) endorses face as the international interoperable biometric with fingerprint and iris recognized as additional supporting biometrics. Contactless smartchips recommended as the onboard storage medium. Logical Data Structure (LDS) is specified as standard interoperable format to store MRTD electronic data (2002) Privacy 19
20 Electronic Authentication e-passport Technologies e-passports contain a contactless RFID chip: Chip Module Antenna Contactless inlay (chip+antenna) can be located in: book cover center pages data page (where the photo and MRZ is located) Physical Layout Specifications: ICAO 9303 ISO/IEC 7810/7811 Contactless Specification: ISO14443 (Type A & B) ISO7816 Construction Data in the Chip Data is stored in the chip as files, called Data Groups (DG): DG1: MRZ data (name, DOB, sex, ) DG2: Face image, in JPEG or JPEG2000 format typical 16Kbytes DG3: Fingerprint image, in WSQ format typical 8Kbyte/fingerprint DG4: Iris image Secure Object Data (SOD): contains hashes, a digital signature of the data groups above These files are also referred as to the LDS (Logical Data Structure) DG1 (MRZ) and DG2 (Face Image) are mandatory, others are optional. For the EU, after June 2009 the use of DG3 (Fingerprints) is mandatory. EAC (Extended Access Control) is used to secure these. Chip contains: ROM, RAM, EEPROM, Crypto Engine, IO 20
21 Electronic Authentication e-passport Threats and Countermeasures (Security/Privacy) Threat Forgery / Tampering Skimming Eavesdropping Tracking Cloning Unauthorized Access Countermeasure Passive Authentication Verifies authenticity via digital signature and data group hash values. Mandatory feature for ICAO e-passports. Basic Access Control (BAC) -- Requires optically read MRZ to unlock the document s chip. Optional feature for ICAO e- Passports. RF shield built into the document or the sleeve that houses it while not in use. Used for US e-passport. BAC establishes secure communication channel between the reader and the chip. Random chip unique identifier (UID) is generated for each read access. Active Authentication Asymmetric key pair used with challenge-response protocol. Optional feature for ICAO. Extended Access Control (EAC) Uses symmetric/asymmetric cryptography used to secure sensitive data. The chip must authenticate the Inspection System before delivering the biometric data. Optional feature for ICAO e-passports. 21
22 Electronic Authentication e-passport Authentication Process epassport 1. Document is inserted 2. IS reads MRZ (OCR) 3. IS open BAC chip 4. IS reads SOD 5. IS reads DG14 Inspection System (IS) 10. IS asks for CSCA 11. IS performs Passive Authentication Local PKD PKD updated periodically ICAO PKD (CSCA) 6. Chip Authentication 7. IS reads DG1 & DG2 8. Terminal Authentication 9. IS reads DG3 Countries upload their CSCAs DV Server Note: EAC only CVCA Server Other Countries CVCAs 22
23 Electronic Authentication Reader Hardware Enhancements First Generation of ID Authentication: No RFID capabilities In 2003, the need for electronic authentication started. A new hardware platform was necessary to support the RFID chips. Migration to RFID Second Generation: RFID capabilities Third Generation: Enhanced Design for RFID New antenna design: Single PCB dual antenna Improved RFID tuning Fixed components Improved RFID interoperability Faster detection time 23
24 Electronic Authentication e-passport Interoperability Testing Interoperability Tests Tsukuba Singapore Berlin Paris Paris Ispra Prague BAC (Basic Access Control) Active Authentication Passive Authentication Inspection System EAC API EAC Ready EAC Back End System EAC API IS Workstation DV Centralizer CVCA IS and DV cert s reside in secure area (backend system / HSM) Flexible support for multiple integrators/back end systems 24
25 Electronic Authentication Emerging trends 1) Migration from point solutions to total solutions. 2) Possibly increasing levels of front-end device security 3) Decreasing levels of front-end device application footprint (e.g. thin client) 4) Multi-functional devices 5) Miniaturization, mobility and portability 6) Self-service 25
26 Thank you Mohamed Lazzouni Ph.D. SVP and CTO L1 Identity Solutions 296 Concord Road Billerica, MA
EU Passport Specification
Biometrics Deployment of EU-Passports EU Passport Specification (EN) 28/06/2006 (As the United Kingdom and Ireland have not taken part in the adoption of this measure, an authentic English version of the
More informationVerifying emrtd Security Controls
Blackhat Europe 2010 Verifying emrtd Security Controls Raoul D Costa 1 3M 2010. All Rights Reserved. Agenda Overview of ICAO / EU Specifications emrtds decomposed emrtd Infrastructure (PKI) Inspecting
More informationThe epassport: What s Next?
The epassport: What s Next? Justin Ikura LDS2 Policy Sub-Group Co-chair Tom Kinneging Convenor of ISO/IEC JTC1 SC17 WG3 International Organization for Standardization (ISO) Strengthening Aviation Security
More informationDocument reader Regula 70X4M
Document reader Regula 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses and other identification
More informationIntroduction to Electronic Identity Documents
Tutorial Introduction to Electronic Identity Documents Klaus Schmeh cryptovision I'm Klaus Schmeh, Chief Editor Marketing at cryptovision. I have published a number of books. Identity Documents Conventional
More information2 Electronic Passports and Identity Cards
2 Picture source: www.bundesdruckerei.de Paper based Passport Radio Frequency (RF) Chip Electronic Passport (E Pass) Biographic data Human readable Partially machine readable (optically) Conventional
More informationThe EAC for MRTD. 26 January 2010
The EAC for MRTD Rafik Chaabouni Serge Vaudenay 26 January 2010 Outline MRTD? Standards - RFID - ICAO and BAC - EAC Solutions? 2 MRTD? Machine Readable Travel Document 3 Standards RFID ICAO and BAC EAC
More informationLDS2 Concept and Overview: Exploring Possibilities in Travel Border Clearance
LDS2 Concept and Overview: Exploring Possibilities in Travel Border Clearance Overview Current generation of epassports Benefits and Limits of an epassport Overview of the next generation epassport Applications
More informationBiometric Passport from a Security Perspective
Biometric Passport from a Security Perspective Gildas Avoine INSA Rennes/IRISA Institut Universitaire de France SUMMARY Passport Primer Memory Content Cryptographic Mechanisms defined by ICAO Additional
More informationAn Overview of Electronic Passport Security Features
An Overview of Electronic Passport Security Features Zdeněk Říha Faculty of Informatics, Masaryk University, Botanická 68A, 602 00 Brno, Czech Republic zriha@fi.muni.cz Abstract. Electronic passports include
More informationWhitepaper: GlobalTester Prove IS
Whitepaper: GlobalTester Prove IS Testing of EAC inspection systems By HJP Consulting GmbH Introduction There have been a lot of activities in standardization to define conformity tests for e-passports.
More informationAn Overview of Electronic Passport Security Features
An Overview of Electronic Passport Security Features Zdeněk Říha Faculty of Informatics, Masaryk University, Botanická 68A, 602 00 Brno, Czech Republic zriha@fi.muni.cz Abstract. Electronic passports include
More informationSecurity Target Lite SK e-pass V1.0
Ref.: Security Target Lite SK e-pass V1.0 Table of Contents 1 INTRODUCTION... 6 1.1 ST AND ST-LITE IDENTIFICATION... 6 1.2 TOE IDENTIFICATION... 6 1.3 CC AND PP CONFORMANCE... 6 1.4 CONVENTIONS... 7 1.5
More informationSecurity of Biometric Passports ECE 646 Fall Team Members : Aniruddha Harish Divya Chinthalapuri Premdeep Varada
Security of Biometric Passports ECE 646 Fall 2013 Team Members : Aniruddha Harish Divya Chinthalapuri Premdeep Varada CONTENTS Introduction to epassports Infrastructure required for epassports Generations
More informationHash-based Encryption Algorithm to Protect Biometric Data in e-passport
Hash-based Encryption Algorithm to Protect Biometric Data in e-passport 1 SungsooKim, 2 Hanna You, 3 Jungho Kang, 4 Moonseog Jun 1, First Author Soongsil University, Republic of Korea, indielazy@ssu.ac.kr
More informationPart 9: Deployment of Biometric Identification and Electronic Storage of Data in MRTDs
Doc 9303 Machine Readable Travel Documents Seventh Edition, 2015 Part 9: Deployment of Biometric Identification and Electronic Storage of Data in MRTDs Approved by and published under the authority of
More informationQC1 VSC. Rapid Travel Document Authentication. foster+freeman. all passports & ID cards. alterations & counterfeits. covert security features
foster+freeman VSC Video Spectral Comparator QC1 Rapid Travel Document Authentication examine all passports & ID cards DeteCt alterations & counterfeits Reveal covert security features foster+freeman QC1
More informationfor Questioned Document Examination
VSC 8000 THE ESSENTIAL VIDEO SPECTRAL COMPARATOR for Questioned Document Examination Examine and Authenticate Passports & ID Cards Security Documents Banknotes & Cheques foster+freeman VSC 8000 A STATE-OF-THE-ART
More informationfor Questioned Document Examination
VSC 8000 THE ESSENTIAL VIDEO SPECTRAL COMPARATOR for Questioned Document Examination Examine and Authenticate Passports & ID Cards Security Documents Banknotes & Cheques foster+freeman VSC 8000 A STATE-OF-THE-ART
More informationThe New Seventh Edition of Doc Barry J. Kefauver Nairobi, Kenya November 2015
The New Seventh Edition of Doc 9303 Barry J. Kefauver Nairobi, Kenya November 2015 July 2015 ICAO published the 7 th edition of Doc 9303 Part 1 Part 2 Part 3 Part 4 Part 5 Part 6 Part 7 Part 8 Part 9
More informationVSC for document examination. foster+freeman. The Essential Video Spectral Comparator
4 foster+freeman Forensic Science Innovation 1978-2018 forty years in forensics VSC 8000 for document examination The Essential Video Spectral Comparator Examine and Authenticate Passports and ID Cards
More informationMachine Assisted Document Security Verification
Machine Assisted Document Security Verification Dr. Uwe Seidel Germany New Technologies Working Group (NTWG) TAG/MRTD 20 20 th Meeting of the Technical Advisory Group on Machine Readable Travel Documents
More informationVALIDATING E-PASSPORTS AT THE BORDER: THE ROLE OF THE PKD R RAJESHKUMAR CHIEF EXECUTIVE AUCTORIZIUM PTE LTD
VALIDATING E-PASSPORTS AT THE BORDER: THE ROLE OF THE PKD R RAJESHKUMAR CHIEF EXECUTIVE AUCTORIZIUM PTE LTD THE TRUST IMPERATIVE E-Passports are issued by entities that assert trust Trust depends on the
More informationFuture Expansion for emrtd PKI Mark Joynes, Entrust
Future Expansion for emrtd PKI Mark Joynes, Entrust 2013 MRTD Symposium 1 What are we trying to achieve Prevent: Production of credible false documents Tampering with legitimate documents Breach of sovereignty
More informationIntroduction of the Seventh Edition of Doc 9303
Introduction of the Seventh Edition of Doc 9303 Sjef Broekhaar Advisor ICAO TRIP IRAN SEMINAR Kish Island 17/05/2016 Footer 1 July 2015: ICAO publishes the 7th edition of Doc 9303 Part 1 Part 2 Part 3
More informationCONFORMITY TESTING OF EAC INSPECTION SYSTEMS
CONFORMITY TESTING OF EAC INSPECTION SYSTEMS By Dr. Michael Jahnich, Technical Director, HJP Consulting GmbH Testing the conformance of inspection systems for epassports is an ongoing and open issue. One
More informationMDR-1 Mobile Document Reader
MDR-1 Mobile Document Reader SPC_MDR-1 1/7 Mobile Document Reader MDR-1 Security Printing Consulting AG The new MDR-1 document reader fulfill the needs for fast and reliable reading, verification and authentication
More informationBSI TR Part 1.1 A framework for Official Electronic ID Document conformity tests
BSI TR-03105 Part 1.1 A framework for Official Electronic ID Document conformity tests Version 1.04.1 14.11.2008 CONTENTS 1 INTRODUCTION... 4 2 DEFINITIONS AND REFERENCES... 4 2.1 Definitions... 4 2.2
More informationThe Future of Smart Cards: Bigger, Faster and More Secure
The Future of Smart Cards: Bigger, Faster and More Secure Joerg Borchert, Vice President, Secure Mobile Solutions July 16, 2003 Page 1 N e v e r s t o p t h i n k i n g. Infineon Technologies: Overview
More informationCREDENTSYS CARD FAMILY
CREDENTSYS CARD FAMILY Credentsys is a secure smart card family that is designed for national ID systems, passports, and multi-use enterprise security environments. The family is certified to FIPS 140-2
More informationHow To Secure Electronic Passports. Marc Witteman & Harko Robroch Riscure 02/07/07 - Session Code: IAM-201
How To Secure Electronic Passports Marc Witteman & Harko Robroch Riscure 02/07/07 - Session Code: IAM-201 Other personal info on chip Other less common data fields that may be in your passport Custody
More informationAdvanced Security Mechanisms for Machine Readable Travel Documents and eidas Token
Technical Guideline TR-03110-1 Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Part 1 emrtds with BAC/PACEv2 and EACv1 Version 2.20 26. February 2015 History Version
More informationRTE8000 Getting Started Guide
Advanced Solutions for Document Processing RTE8000 Getting Started Guide Part Number: 97-0183-01 Version: 1.1 Date: December 2005 The company reserves the right to make changes to its products at any time
More informationThis paper focuses on the issue of increased biometric content. We have also published a paper on inspection systems.
White Paper 1 INTRODUCTION As ICAO 1 -compliant epassports come into widespread use in Q4 of 2006, it is an appropriate moment to review some of the initiatives required for the next stage of development.
More information3D Face Project. Overview. Paul Welti. Sagem Défense Sécurité Technical coordinator. ! Background. ! Objectives. ! Workpackages
3D Face Project Paul Welti Sagem Défense Sécurité Technical coordinator Overview! Background! Objectives! Workpackages 2 1 ! Biometric epassport Biometrics and Border Control! EU-Council Regulation No
More informationConformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek
Conformity and Interoperability Key Prerequisites for Security of eid documents Holger Funke, 27 th April 2017, ID4Africa Windhoek Agenda 1. About secunet Security Networks AG 2. Timeline of interoperability
More informationVerify your customers quickly and easily wherever they are in the world
Verify your customers quickly and easily wherever they are in the world AutoDoc-ID, automated ID document checks to enhance your customer acceptance process Automated Document authentication AutoDoc-ID
More informationMachine Readable Travel Documents
Doc 9303 Machine Readable Travel Documents Part 1 Machine Readable Passports Volume 1 Passports with Machine Readable Data Stored in Optical Character Recognition Format Approved by the Secretary General
More informationSecurity Mechanism of Electronic Passports. Petr ŠTURC Coesys Research and Development
Security Mechanism of Electronic Passports Petr ŠTURC Coesys Research and Development Smartcard CPU 16/32 bit 3.57MHz (20MHz) 1.8 / 3/ 5 V ROM 16-300 kb RAM 1-8 kb EEPROM 8-128kB Contactless communication
More informationElectronic passports
Electronic passports Zdeněk Říha, Václav Matyáš, Petr Švenda Faculty of Informatics, Masaryk University, Brno, Czech Republic {zriha,matyas,svenda}@fi.muni.cz February 2008 A number of countries have been
More informationICAO Regional Seminar on MRTDs and Traveller Identification Management Madrid, Spain June
ICAO Regional Seminar on MRTDs and Traveller Identification Management Madrid, Spain 25-27 June 2014 Regula Group facts and main activities Established in 1992 5 companies in Belarus, Brazil, Latvia, Russia,
More informationE-PASSPORT SCHEME USING AUTHENTICATION PROTOCOLS ALONG WITH FACE, FINGERPRINT, PALMPRINT AND IRIS BIOMETRICS
E-PASSPORT SCHEME USING AUTHENTICATION PROTOCOLS ALONG WITH FACE, FINGERPRINT, PALMPRINT AND IRIS BIOMETRICS 1 V.K. Narendira Kumar and 2 B. Srinivasan 1 Assistant Professor, Department of Information
More informationExperiences of w S itz w e itz rland
Joining the PKD why? Experiences of Switzerland State of Play Switzerland The first generation e passport is being issued since 4 September 2006 Name, first name Passport number Date and place of issue,
More informationMICROSCOPES & ACCESSORIES. foster+freeman
VSC 8000 MICROSCOPES & ACCESSORIES Further enhance the capabilities of the VSC 8000 through the addition of optional accessories including NIST traceable standards, high specification external microscopes,
More informationModule 5: Smart Card Usage Models Identity, Security and Access Control
Module 5: Smart Card Usage Models Identity, Security and Access Control Smart Card Alliance Certified Smart Card Industry Professional Accreditation Program 1 For CSCIP Applicant Use Only About the Smart
More informationTransportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005
Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005 Who Am I? How do you know? 2 TWIC Program Vision A high-assurance identity credential that
More informationMarket Trends and Veridos solutions for epassports & ID Documents
Market Trends and Veridos solutions for epassports & ID Documents Ludger Holtmann, Senior Product & Portfolio Manager Michael Ruhland-Bauer, Head of Product Mangement Documents Agenda Introducing Veridos
More informationTECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD)
International Civil Aviation Organization INFORMATION PAPER TAG/MRTD/20-IP/4 22/08/11 English Only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD) TWENTIETH MEETING Montréal, 7
More informationSecurity Mechanisms and Access Control Infrastructure for e-passports and General Purpose e-documents
Journal of Universal Computer Science, vol. 15, no. 5 (2009), 970-991 submitted: 1/8/08, accepted: 28/2/09, appeared: 1/3/09 J.UCS Security Mechanisms and Access Control Infrastructure for e-passports
More informationDATACARD PB6500 PASSPORT ISSUANCE SYSTEM ADVANCED TECHNOLOGY FOR HIGH-SECURITY PASSPORTS
DATACARD PB6500 PASSPORT ISSUANCE SYSTEM ADVANCED TECHNOLOGY FOR HIGH-SECURITY PASSPORTS A TRUSTED SOLUTIONS PROVIDER FOR GOVERNMENT Governments rely on Datacard Group to develop and deliver sophisticated
More informationSecurity Target Lite for CEITEC epassport Module CTC21001 with EAC
Security Target Lite for CEITEC epassport Module CTC21001 with EAC Version 2.0 12/Dec/2016 Document History 1.0 First version 2.0 Clarifications to section 7.1 CEITECSA 5.410.052 1 Table of contents 1
More informationRoadmap for Implementation of New Specifications for MRTDs
for MRTDs For Publication on the ICAO Website Roadmap for Implementation of New Specifications for MRTDs DISCLAIMER: All reasonable precautions have been taken by the International Civil Aviation Organization
More informationAustrian State Printing House
Austrian State Printing House Who we are Austrian company, located in Vienna Founded in 1804 Modern, forward looking identity management provider egovernment Services Turn-key solution provider of full
More informationOverview of cryptovision's eid Product Offering. Presentation & Demo
Presentation & Demo Benjamin Drisch, Adam Ross cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 General Requirements Government of Utopia Utopia Electronic
More informationFace recognition for enhanced security.
Face recognition for enhanced security. Cognitec Systems - the face recognition company FaceVACS : Face Recognition Technology FaceVACS Face Recognition Technology Cognitec s patented FaceVACS technology
More informationIntroduction Morpho The Art of Identification
Introduction Morpho The Art of Identification by Adriaan Kamphorst, Sales Manager Morpho Identity Documents Safran group businesses Aerospace Defense Security Morpho strengthens Safran s positioning to
More informationCan eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010
Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Content eid Primary Functions eid Privacy Features and Security
More informationE-Passport Validation: A practical experience
E-Passport Validation: A practical experience R Rajeshkumar International Organization for Standardization (ISO) ICAO TRIP: Making the Air Travel more Secure and Efficient TOWARDS A BETTER TRAVELLER IDENTIFICATION
More informationADAPTIVE RECOGNITION
ADAPTIVE RECOGNITION Image Recognition Products for Traffic, Security, ID Data Entry Automation and Biometric Identification P
More informationDer elektronische Personalausweis Mehr oder weniger Sicherheit?
Der elektronische Personalausweis Mehr oder weniger Sicherheit? Lukas Grunwald DN-Systems GmbH Germany CeBIT 2010- Heise Forum 2010 Hannover The Government s Dream Multi biometric, double gates, anti-tailgating,
More informationSTATUS: For NP ballot for development as a Type 2 Technical Report.
ISO/IEC JTC1/SC17 2002-03-27 Cards and personal identification ISO/IEC JTC1/SC17 N 2094 DOCUMENT TYPE : NP BALLOT TITLE: Ballot - Proposal for a New Work Item Personal identification - Machine-Assisted
More informationSPass NX V1.0 on S3CT9KW/S3CT9KC/S3CT9K9 Certification Report
KECS-CR-12-38 SPass NX V1.0 on S3CT9KW/S3CT9KC/S3CT9K9 Certification Report Certification No.: KECS-ISIS-0394-2012 2012. 6. 15 IT Security Certification Center History of Creation and Revision No. Date
More informationSecurity Target Lite for CEITEC epassport Module CTC21001 with BAC
Security Target Lite for CEITEC epassport Module CTC21001 with BAC Version 3.0 07/Dec/2016 Document History 1.0 Initial version 2.0 Minor corrections 3.0 Clarifications to section 7.1 CEITECSA 5.410.051
More informationMULTIAPP V2 PACE - SAC PUBLIC SECURITY TARGET
MultiApp v2 Pace SAC Common Criteria / ISO 15408 Security Target Public version EAL4+ Copyright Gemalto SA 2012. Page : 1/50 CONTENT 1. ST INTRODUCTION... 4 1.1 ST IDENTIFICATION... 4 1.2 ST OVERVIEW...
More informationA National Public Key Directory
A National Public Key Directory Version 1.0 definite Date 21 July 2015 Author Jeen de Swart Judicial Information services Ministry of Security and Justice, Netherlands ABSTRACT This white paper is about
More informationDESKO ICON Scanner Technical Specification
DESKO ICON Scanner Technical Specification ICON Scanner Long Cover CON Scanner Short Cover DESKO GmbH Gottlieb-Keim-Str. 56 95448 Bayreuth GERMANY Tel.: +49 (0)921/79279-0 Fax: +49 (0)921/79279-14 E-mail:
More informationCommon Criteria Protection Profile. Machine Readable Travel Document with ICAO Application, Extended Access Control BSI-CC-PP-0056
Common Criteria Protection Profile Machine Readable Travel Document with ICAO Application, Extended Access Control BSI-CC-PP-0056 Foreword This Protection Profile Machine Readable Travel Document with
More informationCertification Report. EAL 4+ (ALC_DVS.2) Evaluation of TÜBİTAK BİLGEM UEKAE. AKİS v1.4i PASAPORT
Certification Report EAL 4+ (ALC_DVS.2) Evaluation of TÜBİTAK BİLGEM UEKAE AKİS v1.4i PASAPORT issued by Turkish Standards Institution Common Criteria Certification Scheme SOFTWARE TEST and CERTIFICATION
More informationHID Passport Datapage Technology
HID Passport Datapage Technology GOVERNMENT ID SOLUTIONS HID Global s Passport Datapage Offering Datapage Security Features Governments around the world are implementing passport solutions that help better
More informationTECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD)
International Civil Aviation Organization WORKING PAPER TAG/MRTD/22-WP/8 16/04/14 English Only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD) TWENTY-SECOND MEETING Montréal, 21
More informationAuthentication Technologies
Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something
More informationBIOFLEX. Applications
HARDWARE BIOFLEX Bioflex is an essential tool for identity verification operations of a modern state. This identification device for persons is guarantor for population census, polling offices or police
More informationSmartCards as electronic signature devices Progress of standardization. Helmut Scherzer, CEN TC224/WG16 (Editor) IBM Germany
SmartCards as electronic signature devices Progress of standardization Helmut Scherzer, CEN TC224/WG16 (Editor) IBM Germany scherzer@de.ibm.com Active CEN working groups(today) TC224 : "Machine readable
More informationTECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD)
International Civil Aviation Organization WORKING PAPER TAG/MRTD/22-WP/4 16/04/14 English Only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD) TWENTY-SECOND MEETING Montréal, 21
More informationPast & Future Issues in Smartcard Industry
Past & Future Issues in Smartcard Industry Ecrypt 2 Summer School Guillaume Dabosville Oberthur Technologies Oberthur Technologies the group its divisions payment, mobile, transport and digital TV markets
More informationE-Passport: Cracking Basic Access Control Keys with COPACOBANA
E-Passport: Cracking Basic Access Control Keys with COPACOBANA Yifei Liu, Timo Kasper, Kerstin Lemke-Rust and Christof Paar Communication Security Group Ruhr University Bochum, Germany http://www.crypto.rub.de
More informationEvolution of Electronic Passport Scheme using Cryptographic Protocol along with Biometrics Authentication System
I. J. Computer Network and Information Security, 2012, 2, 50-58 Published Online March 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2012.02.08 Evolution of Electronic Passport Scheme using
More informationThe European Union approach to Biometrics
The European Union approach to Biometrics gerald.santucci@cec.eu.int Head of Unit Trust & Security European Commission Directorate General Information Society The Biometric Consortium Conference 2003 1
More informationPRIVACY ISSUES OF ELECTRONIC PASSPORTS 1. INTRODUCTION
JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 17/2011, ISSN 1642-6037 access control, biometrics, electronic passport, privacy, skimming, tracking Zdeněk ŘÍHA 1, Vashek MATYÁŠ 1 PRIVACY ISSUES OF
More informationE-Passport validation: A practical experience
E-Passport validation: A practical experience R Rajeshkumar Implementation & Capacity Building Working Group Antigua & Barbuda ICAO TRIP Regional Seminar Note This is an edited version of the presentation
More informationSafety & Mobility. Communication. Intelligent Interactivity. through Visual. Advancements in License Plate Technology for EVR
Advancements in License Plate Technology for EVR Brent James - Automatic Vehicle Identification Business Manager Safety & Mobility through Visual Communication Intelligent Interactivity Agenda Advancements
More informationCard Issuance/Encoding & PIN Pads
Card Issuance/Encoding & PIN Pads From Card Issuance to Card Security Card Issuance/Encoding & PIN Pads Card issuers know they can put their trust in Mag- Tek. Whether meeting the growing need for instant,
More informationSecurity Target Lite
Security Target Lite for the PEACOS Extended Access Control MRTD Common Criteria version 3.1 revision 3 ISO/IEC 15408 Assurance Level EAL 4+ Developer Gep S.p.A. Corso Salvatore D Amato, 90 80022 Arzano
More informationLecture 9 User Authentication
Lecture 9 User Authentication RFC 4949 RFC 4949 defines user authentication as: The process of verifying an identity claimed by or for a system entity. Authentication Process Fundamental building block
More informationMachine Readable Travel Document with ICAO Application", Basic Access Control
Common Criteria Protection Profile Machine Readable Travel Document with ICAO Application", Basic Access Control BSI-PP-0017 Approved by the Federal Ministry of the Interior Version 1.0, 18 August 2005
More informationAn emrtd inspection system on Android. Design, implementation and evaluation
An emrtd inspection system on Android Design, implementation and evaluation Halvdan Hoem Grelland Master s Thesis Spring 2016 An emrtd inspection system on Android Halvdan Hoem Grelland 2nd May 2016 ii
More informationID 1xx Series Cryptoterminals Trusted Hardware Security for Mobile Identity Solutions
ID 1xx Series Cryptoterminals Trusted Hardware Security for Mobile Identity Solutions The ID 1xx series devices are ideal for mobile and desktop computing platforms requiring registration and identity
More informationCredentialing Project Technical Architecture
Credentialing Project Technical Architecture Presented to Transportation Industry Association Stakeholder Meetings April 11-29, 2002 1 Agenda Overview of High Level Architecture Vision Components of Architecture
More informationSECURITY TARGET LITE FOR IDEAL PASS V2.0.1 EAC WITH PACE APPLICATION
SECURITY TARGET LITE FOR IDEAL PASS V2.0.1 EAC WITH PACE APPLICATION Reference: 2016_2000023040 Page: 2/141 Date Version Revision 01/12/2016 1.0 Document creation Page: 3/141 Table of contents 1.1 SECURITY
More informationPRODUCT INFORMATION BULLETIN
PRODUCT INFORMATION BULLETIN ID-One PIV v2.3.2 The electronic Identity card compliant with US specifications for electronic Table of contents 1. Foreword... 3 2. Introduction to PIV cards features... 4
More informationXSmart e-passport V1.2
KECS-CR-11-27 XSmart e-passport V1.2 LG CNS Certification Report Certification No : KECS-ISIS-0319-2011 National Intelligence Service IT Security Certification Center Revision Number Establishment & Revision
More informationID-Star 4054 epassport Reader
ID-Star 4054 epassport Reader Instruction manual Bedienungsanleitung Revision 0.91 o Océ Document Technologies GmbH Océ Document Technologies GmbH Max-Stromeyer-Strasse 116 D-78467 Konstanz Tel.: +49 (0)
More informationThirteenth Symposium and Exhibition on the ICAO Traveller Identification Programme (TRIP)
Thirteenth Symposium and Exhibition on the ICAO Traveller Identification Programme (TRIP) Advance Passenger Information (API) Workshop Fabrizio Di Carlo INTERPOL 26 October 2017 OBJECTIVES Matching passenger
More informationCONFORMANCE TESTING OF SECOND GENERATION E-PASSPORTS ISSUED BY THE NETHERLANDS. Authors: J.-M. Chareau, M. Van den Steen Editor: P.
CONFORMANCE TESTING OF SECOND GENERATION E-PORTS ISSUED BY THE NETHERLANDS Authors: J.-M. Chareau, M. Van den Steen Editor: P. Chawdhry The mission of the IPSC is to provide research results and to support
More informationChip Authentication for E-Passports: PACE with Chip Authentication Mapping v2
v.2 Chip Authentication for s: with Chip Authentication Mapping v2 Lucjan Mirosław Wrocław University of Science and Technology, Poland ISC 2016, Honolulu Electronic Passport v.2 e-passport and ebooth:
More informationA Trust Infrastructure for epassports
A Trust Infrastructure for epassports Building reliable, timely and cost-effective trust links for electronic travel document verification +1-888-690-2424 entrust.com Table of contents Trust in government
More informationSeptember OID: Public Document
THE UNITED KINGDOM S NATIONAL CERTIFICATE POLICY for Extended Access Control Infrastructure for machine readable travel documents and biometric residence permits issued and read within the UK September
More informationCOMPUTER NETWORK SECURITY
COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (3 rd Week) 3. User Authentication 3.Outline Electronic User Authentication Principles Password-Based Authentication Token-Based Authentication Biometric
More informationBiometrics. Overview of Authentication
May 2001 Biometrics The process of verifying that the person with whom a system is communicating or conducting a transaction is, in fact, that specific individual is called authentication. Authentication
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Biometric information protection
INTERNATIONAL STANDARD ISO/IEC 24745 First edition 2011-06-15 Information technology Security techniques Biometric information protection Technologies de l'information Techniques de sécurité Protection
More information