2. Total e-Border Control
System
⢠Complete registration repository
module for all visitors
⢠Relationship channel management
module to enhance the inter-services
i.e. of all data collected at the countryâs
entry and exit points
⢠Compliance module to track and
monitor delinquent foreigners
⢠High-quality authentication process
⢠Enhanced features and functions for e-
VISA processing using biometric
technology systems
⢠Efficient and effective process
management for issuing passports
⢠Underlying IT platform proven to be a
more cost effective platform
⢠Ascertains authorized identity of
citizens, diplomatic staff and family
⢠Allows government authorities to more
easily and accurately monitor
authorized foreign workers
⢠Standardizes data elements and government system
interoperability, providing the potential for further enhancement of
identity checking by allowing confirmation of identity against
information contained in biometrics
⢠Helps national security programs achieve goals by ensuring
regulations, practices and procedures are followed in order to
safeguard against acts of unlawful interference
⢠Increases confidence of the public on personal and national security
⢠Platform to provide enhanced services to the public
⢠Enhances security and convenience of existing and new applications
using high security technology
3. Introduction to E-visas
⢠Uses electronic data collected for entry
programs
⢠Faster and more ergonomic methods to read
data from an official travel document
⢠Facilitates the identity management of visa
holders through machine assisted identity
confirmation
⢠Facilitates travelers through check-in and border
processes
1. Visas communicate data in a machine-
readable format to airline authorities
and border officials in transit and
receiving countries.
2. The machine-readable zone provides a
systematic way to gather and compare
personal data electronically, particularly
when the passport document is not
already machine readable.
3. E-visas allow additional biometric and
other data to be stored and read.
4. This offers the possibility of facilitated or
self-service inspection, and the capacity
to verify biometric information that is
stored on or linked to the visa.
4. e-Visa types â Advantages
Chip visa sticker
A sticker IC contactless chip has many
advantages for visa issuers, including
the capacity to carry biometric data on
a document without requiring a real-
time database at all points of service
to verify biographic and biometric
data.
This is a particularly useful concept
given that many travel documents are
not machine readable. However,
overcoming technical constraints will
be key to the adoption of this method.
Chip in a multi-use visa card:
Multi-use documents have increased in
use in national and multi-lateral settings.
As biometric and card technology
matures, card visas will grow in popularity
because of their durability and ease of
use.
Unique Data
Encrypted
in the Karsofâ˘
Microprocessor
Chip
rear outer Layer
sheet pre-printing
Karsof⢠Secure CHIP
sheet pre-printing
Karsof⢠Card Reader
Security Features
Unique Data from the
Karsof⢠Chip and the
Unique Code from the
Karsof⢠Smart Chip Card will
be authenticated each other
for the Card and Reader
Hand Shake by
Reader with
Card
Encrypted Data is mutually
transferred
5. e-Visa System
Checking Document Authenticity and Validity
It is essential for border agencies to check that the e-
Visa presented is genuine and has not been tampered
with since issue.
This can be done through examination of the face of
the document (through image processing and a
database of passport security features) or by a check of
the integrity of the chip contents, or reference to a
central passport issue database, or any combination of
these.
No system should be planned without this key
requirement ,and suppliersâ solutions should be
independently tested.
Identification and/or identity verification
Clearly border control agencies should identify each e-
Visa holder with a high degree of confidence.
The biographical/biometric data may be cross-checked
against other elements in the document and against
issuer databases. See section on biometric matching.
Determination of Eligibility
Once a passengerâs nationality, identity, and risk have
been established, they should be checked against a
rule-based system which determines whether or not
that person may be admitted without examination by
a border control officer.
Passenger movement logging
Systems should record details of passengers (both
biographic and biometric) who enter and exit.
Consideration should be given to how much of the
data contained in e-VISAs is essential to border
control and national security, and whether legal
powers exist to capture, store, and use such data.
6. Solution Overview
Make borders more secure:
Most countries have many entry and exit points. A
new approach is needed to prevent the entry of
illegal or high-risk travelers. Biometric security
technologies can help make borders more secure.
Start at country gateways:
Biometric security solutions can be used during visa
or travel card applications at a countryâs gateway, and
can then be used to authenticate and check the
background of applicants before they leave their
countries.
Multiple checkpoints:
Biometric security also needs to be implemented at
checkpoints to ensure that only the authorized
travelers are allowed through.
Linking the databases:
Sharing criminal, blacklists and terrorist watch list
database both locally and internationally.
Integrating systems:
Biometric security solutions must be integrated to other
critical systems such as immigration departmentâs
centralized database and other intelligence bureau
databases and applications
Zero false identification:
The use of biometrics security technology can eradicate
the false identification of travelers and their travel
documents.
International cooperation:
Fosters better international cooperation through the use
of integrated technologies and global standards.
Reliability and accuracy of screening:
Biometrics data from national and international criminal
databases and terrorist watch lists will increase the
reliability and accuracy of screening at immigration
checkpoints.
7. Karsof eServices Delivery
Suite
Portal Engine
Application Logic
Process
Open Architecture
eServices Development
Continuous
Enhancement
Enterprise Application
Integration Engine
Robust
O/S
Robust
O/S
Advanced Linux
Server
Multi-Threaded Coding
Multi-Layer Security
Business
Continuity
Business
Continuity
True Seamless (never
fail)
Active Architecture
Zero downtime
Advanced
Security
Advanced
Security
4096 bit Encryption
High Level Application
Security
Security Accelerator
5 tier Access Security
Transaction Level PKI
Single
Database
Single
Database
Karsof⢠Database
(ORDBMS)
Unlimited Record
Storage
Dynamic Code based
Search
8. Architecture overview
KarsofBusinessContinuitySystem
KarsofCentralMonitoringSystem
KarsofSecuritySoftware
Karsof VPN - Internet / Intranet / Extranet
Karsof Database (Object Oriented RDBMS)
Karsof Servers (Intel Architecture)
Karsof Operating System
Presentation
Application
Integration
Database
Common Services
Operating System
Hardware
Networks
Karsof Web Application Framework
Client Servers
Karsof EAI Engine â Connection to other system
Karsof Security Extensions
Karsof E-Visa System
9. Security Document Layers
Unique data encrypted
in the Karsof
microprocessor chip
rear outer Layer
sheet pre-printing
Karsof secure chip
sheet pre-printing
Karsof Card Reader Security
Features
Unique data from the Karsof
chip and the unique code from
the Karsof smart chip card will
be authenticated each other for
the card and reader
Hand shake
between
reader and
card
Encrypted data is
mutually transferred
⢠Physical dimension - 54mm x 86mm (width/length)
⢠Thickness - 0.75mm +/- 0.10mm
⢠Material â polycarbonate, design cards
10. Security Document Features
⢠Security with 4096-bit encryption
⢠PKI-based access control for individual areas
⢠Multiple segments of data storage with individual
access control
⢠Intrusion detection and auto lock mechanism
⢠Encrypted storage with unique keys and methods
for every card
⢠Configurable frequencies with dynamic encryption
⢠Built-in frequency integrity checker to prevent
snooping
⢠Access restricted and control of the readers
⢠Dynamic protocol and encryption for data storage
and retrieval
⢠Secure printing controls are built in during printing
⢠Uses open standard communications coding
Karsof⢠Compression
11. Karsof Fast Track Kiosk
⢠Foreign visitors and foreign workers personal identification
will be authenticated by matching database at the kiosk.
⢠This system provides a speedy clearance because it
automatically authenticates their identification. At the
same time, it also eliminates fraud and illegal immigrants
entering into the country.
⢠Foreign visitors and foreign workers personal identification
will be authenticated by matching database at the kiosk.
⢠This system provides a speedy clearance because it
automatically authenticates their identification. At the
same time, it also eliminates fraud and illegal immigrants
entering into the country.
12. Our Manufacturing Plant
Our competitive edge
⢠Karsof Systems owns a manufacturing plant that
produces its own suite of encrypted products and
security documents
⢠Specialized printer from biometric scanners, laser
engraving printer, passport readers, security ink,
auto stamping to mobile enforcement system,
smart cards
13. Karsof Biometric Technology
âOne to Manyâ and âOne to Oneâ
identification and recognition method
⢠âOne to Manyâ identification and
recognition method verifies individual
fingerprints from a large database of
fingerprints without interference or aid
by the use of any other media or
instruments.
Unique Features
⢠4096-bit dynamic, multi-layer
encryption
⢠16 bytes for storage of a fingerprint,
1st of its kind in the world
⢠Fastest identification â 0.5 seconds
⢠Integrated with existing sub-systems
⢠Fingerprint identification speed not
affected by the size of the database.Five patented technologies
⢠Biometric verification of electronic
transactions over the Web
⢠Storage of biometric Features
⢠Method of identifying an individual using
biometrics
⢠Computer network security
⢠Applications in biometrics
14. Single Platform, Single
Algorithm, Any Database
⢠Retina
⢠Iris
⢠Facial
⢠DNA
Single Algorithm for
verification and identification
⢠Fingerprint
15. Thank You
⢠For more information, visit our website at:
www.karsofsystems.com
⢠Or email us on info@karsofsystems.com
⢠Or give us a call on (877) 9KARSOF or (877) 952-7763
Jeff Rosen â Vice President Sales
Barney T. Villa â Senior Vice President