Much has been said about the
difficulties in screening persons for
possible identity fraud or security
upon use of current driver’s
licenses or passports
One of the most visible changes in society today is
to present identity documents (ID’s) in many more
situations. A key objective in improving public
the interdiction of individuals using counterfeit or
ID’s to cross borders, use public
transportation, open bank
accounts, or enter facilities. However, security
are presented with an overwhelming number of
documents and have only seconds to examine
Identity In India
Unique Identification Authority of India
Multi-purpose national identity cards, carrying 16
personal details and a unique identification
number are issued to all citizens since 2007.
Biometric data such as fingerprints and a digital
signature are contained in a microchip embedded
in the card. On it are details of the holder's date
and place of birth and a unique 16-digit National
Identification Number. The card has a SCOSTA
micro-processor chip with a memory of 16 KB
which is secured against tampering
New generation reader/authenticator/validator (RAV)
technology can assist in the ID screening process
wide variety of existing identity documents such as
passports and drivers licenses. Such devices can
information on the ID, authenticate the ID, and
security risk analysis. Acting as an inspector’s
assistant, their use permits an inspector to focus on
evaluating the behavior of the presenter while the
In recent years, there has been a definite trend toward more
secure identity documents, particularly driver’s licenses.
American states and Canadian provinces have largely
converted over to more secure ID’s incorporating such
security features as ghost photos, check digits, security
laminates, holograms, micro-printing, or patterns visible
only in ultraviolet (UV), near-infrared (IR), or retroreflective light and biometric features, magnetic stripes and
barcodes. This trend also applies to passports and visas,
which for many years have had a machine readable zone
(MRZ) and a somewhat standardized layout for photos and
Automated and immediate access control
including reading and authenticating the
identification of the person, increases
speed, security and dramatically reduce fraud
documents. This system allows a smart
document digitalization, eliminating
photocopies and physical files cost, facilitates
an efficient data management, due to their
reliable keyboarding and confirms the
authenticity of the identity.
speeds document processing
and decreases errors due
to human limitations such
as fatigue, collusion, and
The system’s simplicity and
degree of automation means
minimal training is required.
One of the most critical components of an automated
authentication system is its knowledge base of document
characteristics. It must be secure and encrypted to prevent
potential forgers from using this information. By use of an
encrypted knowledge base, even the inspectors, who may
potentially be subject to compromise, may not be privy to
security features that are being used in the authentication
process. The knowledge base must be capable of being
frequently updated as new documents and variations are
issued. Being able to easily train the knowledge base for
new documents is an important component. It must be
flexible and expandable in its ability to deal with new
security features that may be added. It must be adaptable
and programmable in terms of the risk incurred
by a given
security feature alert (which could be due to dirt
The knowledge base is maintained through
arrangements with government agencies and
other access to
known good and falsified documents.
Solution made up of software and scanner for personal
identity documents authentication (ID card, passport, driving
Quick process (2s for reading document).
Elimination of physical files by not having to photocopy the
Data reliable capture.
Organic law on the protection of personal data performance.
Technologic image of your business.
Reading of entire ID documents data.
Authentication of data from MRZ lines.
Documents authentication with IR and UV illumination
Reading of electronic documents with RFID chip or Smart
IDFraud (Documents authentication software)
Documents authentication from MRZ linesIntegrity checking of the MRZ lines
Matching lines MRZ data to printed data
Checking the expiry date.
Checking the date of issue within normal limits.
Documents authentication with IR and UV illuminationB900 ink presence checking
UV patterns checking, etc.
Access to RFID chip in electronic documentsChecking in one pass with IDBOX, without
moving the document
Chip 14443A -B reading.
Matching chip data to MRZ lines data and to printed fields.
Matching printed photo to chip photo.
Access to Smartcard chip in electronic documentsChip data reading.
Possibility of matching chip data to to MRZ lines to printed fields
Possibility of utilisation with PC-SC applications for identifications functions and signature (with
IDBox (Images capture hardware)
Easy installation, remote deployment, with plug&play hardware
One small single device, with technological aesthetics, without
Whole page reader: captures images from the whole page of
High resolution images (5 M sensor)
Removable cover (compulsory with IR and UV authentication)
Low incidences due to LED technology use and to the inexistence
of mechanical pieces (high MTBF).
Smartcard and RFID (ePassport) reading. In one single step the
RFID antenna covers the whole document, allowing optical
inspection and RFID without moving the document.
#Minimum Host PC Requirements Pentium® IV (2.8 GHz)
Windows® XP or Windows® 2000
512 MB of available memory
40 GB of available disk
#Size and Weight 8.55” (22 cm) Height
8.0” (20 cm) Width
14” (35 cm) Depth
10.04 lbs (4.55 kg) Weight
100 – 240 VAC
47 – 63 Hz
#Compliance FCC Part 15, Class A
Inspectors are presented with a tremendous variety of
and have a difficult time authenticating them and
up to date with what constitutes a valid document. A
generation of reader/authenticators can help automate
ID inspection process for existing travel documents.
devices are useful in detecting totally forged documents,
modifications to otherwise valid documents, and flagging
the use of valid ID’s by different presenters. Use of
new units minimizes the dependency on the inspector’s