AUTOMATED
AUTHENTICATION OF
IDENTITY DOCUMENTS
TAUSEEF JAMAL
Much has been said about the
difficulties in screening persons for
possible identity fraud or security
concerns based
upon...
Present Scene
One of the most visible changes in society today is
the need
to present identity documents (ID’s) in many mo...
Identity In India




India
Unique Identification Authority of India
Multi-purpose national identity cards, carrying 16...
Automated Authentication
New generation reader/authenticator/validator (RAV)
technology can assist in the ID screening pro...
In recent years, there has been a definite trend toward more
secure identity documents, particularly driver’s licenses.
Am...


Automated and immediate access control
including reading and authenticating the
identification of the person, increases...
Automated authentication
speeds document processing
and decreases errors due
to human limitations such
as fatigue, collusi...
FEATURES AND
COMPONENTS
One of the most critical components of an automated
authentication system is its knowledge base of...
and programmable in terms of the risk incurred
by a given
security feature alert (which could be due to dirt
or wear).
The...
PROCESS

Identity documents
authentication













Information

Solution made up of software and scanner for personal...


IDFraud (Documents authentication software)







Documents authentication from MRZ linesIntegrity checking of the...


IDBox (Images capture hardware)











Easy installation, remote deployment, with plug&play hardware
(USB2)
O...
iA-thenticate® SmartChip
Specifications
#Minimum Host PC Requirements Pentium® IV (2.8 GHz)
Windows® XP or Windows® 2000
5...
CONCLUSION
Inspectors are presented with a tremendous variety of
ID’s
and have a difficult time authenticating them and
ke...
Automated                                                             authentication of identity documents
Automated                                                             authentication of identity documents
Upcoming SlideShare
Loading in …5
×

Automated authentication of identity documents

397 views

Published on

Automated Authentication of IDs

Published in: Education, Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
397
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Automated authentication of identity documents

  1. 1. AUTOMATED AUTHENTICATION OF IDENTITY DOCUMENTS TAUSEEF JAMAL
  2. 2. Much has been said about the difficulties in screening persons for possible identity fraud or security concerns based upon use of current driver’s licenses or passports
  3. 3. Present Scene One of the most visible changes in society today is the need to present identity documents (ID’s) in many more situations. A key objective in improving public security is the interdiction of individuals using counterfeit or stolen ID’s to cross borders, use public transportation, open bank accounts, or enter facilities. However, security personnel are presented with an overwhelming number of identity documents and have only seconds to examine
  4. 4. Identity In India    India Unique Identification Authority of India Multi-purpose national identity cards, carrying 16 personal details and a unique identification number are issued to all citizens since 2007. Biometric data such as fingerprints and a digital signature are contained in a microchip embedded in the card. On it are details of the holder's date and place of birth and a unique 16-digit National Identification Number. The card has a SCOSTA micro-processor chip with a memory of 16 KB which is secured against tampering
  5. 5. Automated Authentication New generation reader/authenticator/validator (RAV) technology can assist in the ID screening process for the wide variety of existing identity documents such as passports and drivers licenses. Such devices can read the information on the ID, authenticate the ID, and provide a security risk analysis. Acting as an inspector’s automated assistant, their use permits an inspector to focus on evaluating the behavior of the presenter while the
  6. 6. In recent years, there has been a definite trend toward more secure identity documents, particularly driver’s licenses. American states and Canadian provinces have largely converted over to more secure ID’s incorporating such security features as ghost photos, check digits, security laminates, holograms, micro-printing, or patterns visible only in ultraviolet (UV), near-infrared (IR), or retroreflective light and biometric features, magnetic stripes and barcodes. This trend also applies to passports and visas, which for many years have had a machine readable zone (MRZ) and a somewhat standardized layout for photos and other information
  7. 7.  Automated and immediate access control including reading and authenticating the identification of the person, increases speed, security and dramatically reduce fraud documents. This system allows a smart document digitalization, eliminating photocopies and physical files cost, facilitates an efficient data management, due to their reliable keyboarding and confirms the authenticity of the identity.
  8. 8. Automated authentication speeds document processing and decreases errors due to human limitations such as fatigue, collusion, and extortion. The system’s simplicity and degree of automation means minimal training is required.
  9. 9. FEATURES AND COMPONENTS One of the most critical components of an automated authentication system is its knowledge base of document characteristics. It must be secure and encrypted to prevent potential forgers from using this information. By use of an encrypted knowledge base, even the inspectors, who may potentially be subject to compromise, may not be privy to security features that are being used in the authentication process. The knowledge base must be capable of being frequently updated as new documents and variations are issued. Being able to easily train the knowledge base for new documents is an important component. It must be flexible and expandable in its ability to deal with new security features that may be added. It must be adaptable
  10. 10. and programmable in terms of the risk incurred by a given security feature alert (which could be due to dirt or wear). The knowledge base is maintained through cooperative arrangements with government agencies and other access to known good and falsified documents.
  11. 11. PROCESS 
  12. 12. Identity documents authentication          Information Solution made up of software and scanner for personal identity documents authentication (ID card, passport, driving licence, etc). Quick process (2s for reading document). Elimination of physical files by not having to photocopy the document. Data reliable capture. Organic law on the protection of personal data performance. Technologic image of your business. Reading of entire ID documents data. Authentication of data from MRZ lines. Documents authentication with IR and UV illumination Reading of electronic documents with RFID chip or Smart Card.
  13. 13.  IDFraud (Documents authentication software)     Documents authentication from MRZ linesIntegrity checking of the MRZ lines Matching lines MRZ data to printed data Checking the expiry date. Checking the date of issue within normal limits.   Documents authentication with IR and UV illuminationB900 ink presence checking UV patterns checking, etc.     Access to RFID chip in electronic documentsChecking in one pass with IDBOX, without moving the document Chip 14443A -B reading. Matching chip data to MRZ lines data and to printed fields. Matching printed photo to chip photo.    Access to Smartcard chip in electronic documentsChip data reading. Possibility of matching chip data to to MRZ lines to printed fields Possibility of utilisation with PC-SC applications for identifications functions and signature (with PIN).
  14. 14.  IDBox (Images capture hardware)       Easy installation, remote deployment, with plug&play hardware (USB2) One small single device, with technological aesthetics, without power supply Whole page reader: captures images from the whole page of documents High resolution images (5 M sensor) Removable cover (compulsory with IR and UV authentication) Low incidences due to LED technology use and to the inexistence of mechanical pieces (high MTBF).  Optional Characteristics: Smartcard and RFID (ePassport) reading. In one single step the RFID antenna covers the whole document, allowing optical inspection and RFID without moving the document.
  15. 15. iA-thenticate® SmartChip Specifications #Minimum Host PC Requirements Pentium® IV (2.8 GHz) Windows® XP or Windows® 2000 512 MB of available memory 40 GB of available disk USB 2.0 #Size and Weight 8.55” (22 cm) Height 8.0” (20 cm) Width 14” (35 cm) Depth 10.04 lbs (4.55 kg) Weight #Power Supply 100 – 240 VAC 47 – 63 Hz 60 W #Compliance FCC Part 15, Class A SITA ARINC CSA/NRTL
  16. 16. CONCLUSION Inspectors are presented with a tremendous variety of ID’s and have a difficult time authenticating them and keeping up to date with what constitutes a valid document. A new generation of reader/authenticators can help automate the ID inspection process for existing travel documents. These devices are useful in detecting totally forged documents, modifications to otherwise valid documents, and flagging the use of valid ID’s by different presenters. Use of these new units minimizes the dependency on the inspector’s

×