SlideShare a Scribd company logo
1 of 35
Download to read offline
The Rise of
Biometric Smart Cards
For the ID Card Industry
By Antonio D’Albore
Founder
Embedded Security News
London
June 27th, 2018
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
Standard eID Cards are Great, however…
- Verification often not done when traveling outside Home country
- Sometime verification is not even done within the Home country
- Offline verification don’t always possible
- Can’t be used for Logical/Physical Access Control
- Can’t help when Proof-of-Life is needed
- Limited use for storage of personal sensitive data
- Without proper equipment (fingerprint scanner) and connection
to issuing govt. DB, it does not allow to estabilish that the person
that is carrying it is the legit owner of the eID
2
What we can be done to improve the status quo?
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
...hence my proposal for a whole new class of eIDs
3
Let’s dig into the FeIDs world!
Combining a biometric sub system into existing eID card
we obtain a Fingerprint National eID (FeID) card
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
What is a FeID?
A FeID, also referred as BSC (Biometric Smart Card), Fingerprint Card or
Biometric System-on-Card (BSoC) is a Smart Card containing a fingerprint
sensor where:
• Biometric sample capture (enrolment / verification)
• Minutiae Template extraction
• Template storage
• Templates matching
is performed within the card.
4
Fingerprint eID cards will be referred trough this presentation as «FeID»
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
Fingerprint Cards Applications
• Financial Cards
• Debit / Credit Cards
• OTP Cards
• Cryptocurrency Wallet Cards
• Government
• National ID Cards
• National Healthcare Cards
• Government Ration/Subsidy Cards
• eSignature of Government documents
• Driving License Cards
• Online Voting
• Proof of Life
• Identity Verification
• Loyalty / Membership
• Access Control
• Physical Access entry
• Logical Access Login
• Healthcare & Insurance
• Health Insurance Cards
Enabler of Multi-Factor
(MFA) Authentication
Something I have
CARD
Something I know
PIN
Something I am
FINGERPRINT
5
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
The Biometric Sub-System of a FeID
6
Extract
Measurement
Query
Template
Capture
Pre-
Processing
Feature
Extraction
Template
Creation
Reference
template
Compare
Matching
Adaptive
Score
decision
Authenticate
Enrolment
Authentication
Typical operation time 2 ~ 5 sec.
Typical operation time 1 ~ 2 sec.
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
FeID: How They Are Made
Back Side Overlaminate
Back Side Layer
7
Inlay
Front Side Layer
Front Side Overlaminate
Fingerprint Sensor
Micro module
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
FeID: What’s Inside
SE Contacts Pad
Antenna
Power Button
FPS Contacts Pad
Buzzer
Passive Components
Test Pads
LEDs
MCU / ASIC
RF IC
FPS Controller IC
Secure FlashFlexible PCB
8
Battery / SC
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
Enrolment Scheme for FeID
9
Citizen identify is
verified
FeID is produced and
mailed to Citizen
Govt. staff activate FeID into
National ID card network
FeID ready for use
Citizen bring its non-active
FeID at govt. office
Citizen apply for FeID National ID Card database
Govt. staff assist Citizen
fingerprints enrolment
Citizen enrols its fingerprints
directly on the FeID
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
FeID Sample Use Cases
10
Identification / Proof of Life of
witness/citizen in court or in
any other Gov’t environment
Citizen identification by govt.
forces that normally don’t
carry eID readers
Fast Citizen identification by
Road Patrol officers
Fast citizen identification
during emergencies, by non
law enforcement entities
Citizen identification by Border
Control officers
Easy check,
even by non
trained people,
that person
under
identification is
using its/her
own finger on
card and not a
fake ones.
Citizen identification / Proof of
Life assigned to Private
organizations
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
Use Case Citizen Identification During Emergencies
11
Blinking RED
Main finger
not match
Steady GREEN
User
Authenticated
1: Fireman ask
person to be
identified to get
her FeID
6: Final result
3: Person place her
main finger on sensor
2: Person get her FeID
Suitable during emergencies or when a quick
identification is needed
Very easy to implement
Very low implementation cost
(no terminal needed)
Easy personnel training
Steady RED
User not
Authenticated
Steady GREEN
User
Authenticated
5: When main finger
match fail user put
secondary finger on
sensor
4: Results of main
finger match
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
Use Case Identification with Offline Terminal
12
George blake
b June 20 1967
Id 123975384042
GEORGE BLAKE
B JUNE 20 1967
ID 123975384042
1: Border control
officer ask person
to be identified to
get his FeID
USER NOT
VERIFIED
5: officer perform visual check info on
terminal vs info printed on FeID
George blake
b June 20 1967
Id 123975384042
USER NOT
VERIFIED
3: Person place his main
finger on sensor
6: When main finger
match fail user put
secondary finger on
sensor
GEORGE BLAKE
B JUNE 20 1967
ID 123975384042
2: Person get his FeID
7: when also secondary
finger fails, officer
might decide to
perform alternative
identification
procedure
Suitable for places with limited or no online
connectivity
4: Upon successful verification,
Terminal access FeID records and
display them
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
13
Use Case Identification with Online Terminal
User Data / Key
not recognised
User Data / Key
recognised
1: Officer ask person
to be identified to get
her FeID
2: Person give her
FeID to Officier
3: Officer get FeID and
insert it in the mobile
wireless terminal
4: Person place
fingerprint on eID
5: FeID release User Data + Key, terminal encrypt
data and query Government FeID system
6: Government FeID
system check validity
of query and send
back reply
7: mobile terminal show result
received from Government eID DB
When person under identification is not the
genuine FeID card holder, no User Data and Key
shall be released by the card.
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
14
Use Case Access Control and eHealth
1: Patient use FeID to
self-identify herself at
hospital reception
desk
2: Patient repeat self-
authentication at the
doctor room
4: Doctor access Patient
health records
3: Health records are transferred
to Doctor’s PC
In this use case the FeID has three functions:
1- Patient authentication.
2- Consent to release sensitive data (personal Health
Records)
3- Store Health Records
eID Fingerprint Card can store personal Health
Records, currently up to 8GB of secure flash
5: When done, Doctor return
FeID back to Patient
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
FeID Applications, combined with Access Control
15
Citizen Access to govt. building
Travelers Access to eGates in Airports / Borders
Govt. employees Access to sensitive IT services / infostructure
Citizen Access to eGov online services
Govt. employees access to sensitive sites
PHYSICAL
ACCESS
CONTROL
LOGICAL
ACCESS
CONTROL
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
Some Considerations on FeID Schemes
16
• No system can have a totally fool proof method of authentication.
• Issuers need to understand cost and risks associated with a chosen
authentication method.
• From a criminal organization standpoint, is much more appealing to
access a centralised National ID database containing biometric data of
millions of citizen than hacking a single eID card.
• Since Biometrics data are statics, and they cannot be revoked, once
stolen, the specific body feature cannot be used anymore for
enrolment.
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
Multi Applications Scheme on FeID
17
National ID Card
eSignature Card
Drivers License Card
Healthcare / Social Security Card
Voting Card
Debit / Ration Card
Passport Card
Fingerprint Verification in lieu of
multiple User Name + Passwords
18
FeID Multi Applications Architecture
Microcontroller - Memory - I/O
OS / Native Functions
JavaCard VM
Biometric Kernel
JavaCard Framework
JavaCard Runtime Environment
Loader
Installer
Card Manager PKI
Applet
eID
Applet
eHealth
Applet
eVoting
Applet
eSign
Applet
eDriving
Applet
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
Requirements for a FeID Card
• ISO/IEC 17839-1:2014 compliant sensor size (minimum 169mm2)
• Multi finger enrolment
• Liveness detection
• Templates storage and Match in the SE
• Battery (when fully offline use is needed)
• Material compatible with eID validity requirements and manufacturing process
(PC+PET, PVC+PETG)
...and some ideas for the Future:
• Vein scan capability
• Fingerprint scanner embedded into ePassport inlays
19
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
Challenges for FeIDs Implementation
20
• Most current BSC are assembled in Cold Lamination while ID Card Industry
use Hot Lamination.
• Most current BSC are made of PVC or similar material while industry is
mostly using PC.
• FeIDs without batteries need portable reader for card holder identification.
• With current battery technology FeIDs can last no more than 4 years.
• Application of complex hologram not always possible.
• Application of overlaminate with security elements can be complex on the
front side of the BSC.
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
FeID Benefits
21
• Compliant with personal data privacy laws and regulations such as GDPR
(EU) and Data Protection Act 2018 (UK).
• Govt. issue single card instead of multiple cards (cost saving).
• No need of specialized biometric terminal (cost saving).
• Govt. single authority managing one card for multiple services (cost saving).
• Less use of PIN and Password (less risks).
• Enabler of multi factor authentication: something I have «card» +
something I am «fingerprint» (more security).
• For basic scheme no or simple equipment can be used (cost saving).
• Tool for «Proof of Life» verification (less fraud)
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
22
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
Contacts
23
Antonio D’Albore
Founder
Embedded Security News
antonio@embeddedsecuritynews.com
+39 392 5198737
@AndongESN
@embedded.sec.news
embeddedsecuritynews.com
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
ACKNOWLEDGEMENTS
24
Thank you to the following people for all their contribution, effort, motivation provided to me during this work: Ondřej
Adámek, Rouzet Agaiby, Massimo Edoardo Baumgartner, Paolo Bean, Fred Benkley, Luca Bertoletti, Fabrizio Borracci,
Adriano Canzi, Unho Choi, James Chuang, Mona Chung, Laszlo Csercsa , Renato Comelli, Thomas Decker, Pascal Dufour,
Ritu Favre, Sebastian Gallschütz, Michael Gardiner, Franck Germain, Kim Kristian Humborstad, Min-ki Jung, In-Beom Kang,
Dong Su Kim, Ariyuki Kishimoto, Charlotte Knudsen, Henrik Knudzon, Julien Larsonneur, Ted Lin, Joe Lo, Christopher A
Ludden, Hemant Mardia, Giovanni Memoli, Anne McAleer, Chuck Milligan, Marc Muller, Robert Mueller, Henning Bonde
Nielsen, Francesco Pesenti Barili, Nicolas Raffin, Michel Roig, Frank Sandeløv, Michele Scarlatella, Stan Swearingen, Mindy
Tan, Luca Tenzi, Enrico Vainieri, David B. Walshak, David Wyatt, Jin Yiwen.
Finally, to my caring, loving, and supportive wife, Tina: my deepest gratitude. Your encouragement when the times got
rough are much appreciated and duly noted. My heartfelt thanks.
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
References
25
- http://coe.int/en/web/conventions/full-list/-/conventions/treaty/005
- http://cordis.europa.eu/search/result_en?q=cardlab
- http://dhl.it/en/express/shipping/shipping_advice/lithium_batteries.html
- http://dmt.com.cn/product/aqkz/zwsb/529.html
- http://ec.europa.eu/justice/policies/privacy/docs/95-46-ce/dir1995-46_part1_en.pdf
- https://en.wikipedia.org/wiki/Biometrics
- https://en.wikipedia.org/wiki/Data_Protection_Directive
- https://en.wikipedia.org/wiki/General_Data_Protection_Regulation
- https://en.wikipedia.org/wiki/Fingerprint_recognition
- https://en.wikipedia.org/wiki/Personally_identifiable_information
- https://en.wikipedia.org/wiki/Supercapacitor
- http://fingertec.com/download/tips/whitepaper-01.pdf
- http://www.gemalto.com/govt/biometrics/biometric-data
- http://heritage.org/homeland-security/report/biometric-technologies-security-legal-and-policy-implications
- http://horizon2020projects.com/special-reports/technical-information-card-fraud-identity-theft-protection-
technologies/
- http://iata.org/whatwedo/cargo/dgr/Pages/lithium-batteries.aspx
- https://www.icao.int/Meetings/a38/Documents/WP/wp094_en.pdf
- https://www.icao.int/publications/pages/publication.aspx?docnum=9303
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
References
26
- https://www.icao.int/publications/Documents/9303_p9_cons_en.pdf
- https://www.icao.int/publications/Documents/9303_p10_cons_en.pdf
- http://www.isorg.fr/
- http://legacy.emvco.com/faq.aspx?id=319
- https://www.level2kernel.com/emv-contactless-kernel-system-functions-configurations.html
- http://www.mainguet.org/
- https://www.mastercardconnect.com/
- https://ncbi.nlm.nih.gov/pubmed/19006507
- http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-122.pdf
- http://patentexaminer.org/wp-content/uploads/2011/09/SmartMetric.MC_.2.Complaint_small.pdf
- http://patentexaminer.org/wp-content/uploads/2011/09/SMME_v_MasterCard_1.pdf
- http://prba.org/wp-content/uploads/IATA-Lithium-Battery-Guidance-2017-1.pdf
- https://www.quardlock.com/
- https://www.sec.gov/Archives/edgar/data/1301991/000114420415058083/v421136_ex10-8.htm
- https://scribd.com/doc/316791717/Special-Report-Biometrics-and-Border-Security
- https://uni-kassel.de/fb07/fileadmin/datas/fb07/5-Institute/IWR/Hornung/isse_2004_47-
57_biometric_identity_cards.pdf
- https://ups.com/media/news/en/ca/intl_lithium_battery_regulations.pdf
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
References
27
- https://www.youtube.com/watch?v=jw_4uaRNsBA&t=1228s
- https://www.youtube.com/watch?v=VESg5mPWk34&t=21s
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
References
28
Struif, B.: Use of Biometrics for User Verification in Electronic Signature Smartcards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS,
vol. 2140, pp. 220–227. Springer, Heidelberg (2001)
Murdoch, S.J., Drimer, S., Anderson, R., Bond, M.: Chip and PIN is broken. In: 2010 IEEE Symposium on Security and Privacy (2010)
Biometric Application Programming Interface (API) for Java Card, NIST/Biometric Consortium Biometric Interoperability, Assurance, and
Performance Working Group, version 1.1 (August 2002)
Henniger O., Nikolov D. (2013) Extending EMV Payment Smart Cards with Biometric On-Card Verification. In: Fischer-Hübner S., de Leeuw
E., Mitchell C. (eds) Policies and Research in Identity Management. IDMAN 2013. IFIP Advances in Information and Communication
Technology, vol 396. Springer, Berlin, Heidelberg
Privacy-preserving biometric authentication: challenges and directions, Elena Pagnin, Aikaterini Mitrokotsa Chalmers University of
Technology Gothenburg, Sweden (2017)
“EMV integrated circuit card specifications for payment systems – Book3: Application specification,” Version 4.2, June 2008.
Encyclopedia of Biometrics, Stan Z., Anil K. Jain, Springer Reference, ISBN: 978-3-642-27733-7
Anil K., Arun A. Ross – Introduction to Biometrics, Springer, ISBN: 978-0387773254
Nicholas M. Orlans John D. Woodward Jr., Peter T. Higgins – Biometrics, McGraw Hill Professional, ISBN: 978-0072222272
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
Specs
29
ISO/IEC 7816-4:2013 Identification cards – Integrated circuit cards – Part 4: Organization, security and commands for
interchange
ISO/IEC 7816-11:2014 Identification cards – Integrated circuit cards – Personal verification through biometric methods
ISO/IEC 9797-2:2011 Information technology – Security techniques – Message Authentication Codes (MACs) – Part 2: Mechanisms
using a dedicated hash-function
ISO/IEC 17839-1:2014 Biometric System-on-Card: Core requirements
ISO/IEC 17839-2:2015 Biometric System-on-Card: Physical characteristics
ISO/IEC 17839-3:2016 Biometric System-on-Card: Logical information interchange mechanism
ISO/IEC 18033-2:2006 Information technology – Security techniques – Encryption algorithms – Part 2: Asymmetric ciphers
ISO/IEC 18033-3:2010 Information technology – Security techniques – Encryption algorithms – Part 3: Block ciphers
ISO/IEC 19092:2008 -- Financial services -- Biometrics -- Security framework
ISO/IEC 19785-3 Information technology – Common Biometric Exchange Formats Framework – Patron format specifications
ISO/IEC 19794-1:2011 - Information technology -- Biometric data interchange formats -- Part 1: Framework
ISO/IEC 19794-2:2011 - Information technology –- Biometric data interchange formats –- Part 2: Finger minutiae data
ISO/IEC 19794-2:2011/Cor 1:2012 - XML encoding and clarification of defects
ISO/IEC 19794-2:2011/Amd 1:2013 - Conformance testing methodology and clarification of defects
ISO/IEC 19794-2:2011/Amd 2:2015 - Conformance testing methodology and clarification of defects
ISO/IEC 19794-3:2006 - Information technology -- Biometric data interchange formats -- Part 3: Finger pattern spectral data
ISO/IEC 19794-4:2011 - Information technology -- Biometric data interchange formats -- Part 4: Finger image data
ISO/IEC 19794-5:2011 - Information technology -- Biometric data interchange formats -- Part 5: Face image data
ISO/IEC 19794-6:2014 - Information technology -- Biometric data interchange formats -- Part 6: Iris image data
ISO/IEC 19794-7:2014 - Information technology -- Biometric data interchange formats -- Part 7: Signature/sign time series
data
ISO/IEC 19794-8:2011 -- Information technology -- Biometric data interchange formats -- Part 8: Finger pattern skeletal data
ISO/IEC 19794-9:2011 -- Information technology -- Biometric data interchange formats -- Part 9: Vascular image data
ISO/IEC 19794-10:2007 -- Information technology -- Biometric data interchange formats -- Part 10: Hand geometry silhouette
data
EMV® Specification Bulletin No. 185 - First Edition March 2017 - Biometric Terminal Specification
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
Patents (1/5)
30
CA 02581230 C Apparatus for fingerprint sensing and other measurements
CN 2010 20665177 非接触式包含指纹辨识的电子智能卡片 (Non-contact intelligent electronic card comprising
fingerprint identification )
CN 2010 20671893 非接触式电子式智慧卡片 (Non-contact electronic smart card )
CN 2015 20355127 智慧卡片指纹按压装置 (Wisdom card fingerprint press device)
CN 2016 02176914 U Fingerprint identification smart card
DE 2002 10257111 A1 Chipcard and method for production of a chipcard
DE 2016 10101609 A1 Authentifikationsvorrichtung, Authentifikationsdokument und Verfahren zur
Authentifizierung einer Person
DE 2016 10201976 B3 Vorrichtung und Verfahren zur Bearbeitung eines Substrats
GB 2012 00019750 D0 Enrolling fingerprints by combining image strips to obtain sufficient width
GB 2013 00004639 D0 Fingerprint sensor
GB 2015 00022870 D0 Biometric smartcard with multiple modes of operation
GB 2015 00008294 D0 Biometric enrolment authorisation
GB 2015 00008296 D0 Contactless biometric identification device allowing multiple configurations
GB 2016 00000892 D0 Low thickness biometric card
GB 2016 00003099 D0 One-time password device
GB 2016 00004138 D0 Apparatus for testing a battery-powered device
GB 2016 00009572 D0 Smartcard and method for controlling a smartcard
GB 2016 00014998 D0 Biometric smartcard for providing feedback to a user
GB 2017 00004847 D0 Calibration method
GB 2017 00006460 D0 Biometric smartcard
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
Patents (2/5)
31
IT 2006 UD00028 A1 Carta Elettronica Universale Personale
IT 2006 UD00046 A1 Metodo Per Realizzare Una Scheda Personale Sicura E Suo Processo Di Funzionamento
IT 2006 UD00075 A1 A method for making a secure personal card and its working process
JP 2011 0105750 A ic card with fingerprint authentication
JP 2014 0529123 A Biometric authentication available smart card
JP 2016 0115098 A 指紋認証付スマートカードとこれを用いた決済方法
(Smart card with fingerprint authentication and settlement method using the same)
KR 2014 0164109 B1 RF Smart Combi-card Of Fingerprint Type And Dealing Method Thereof
KR 2015 0056437 RF Smart Card Of Fingerprint Type With Battery
KR 2015 0121247 Fingerprint Recognition Card and Authentication Method Using the Same
KR 2015 0180446 B2 Smart Card Integrated With Thermoelement And Fingerprint Verification Chip As Laminated
Structure
KR 2016 0064133 A Smart Card Comprising Fingerprint Detecting Device And Method For Driving The Same
KR 2016 0090633 A Smart Card And A Fingerprint Recognition System Using Thereof
KR 2016 0125877 A RF Smart Card of Fingerprint Type with Battery
KR 2016 0129832 B1 Fingerprint Smart Card Having A Prevention Function Forged Fingerprint
TW 2010 0009718 A Method of manufacturing secure personal card and manufacturing processes thereof
TW 2016 0029842 A Fingerprint press device for smart card
TW 2016 0202811 U Switch structure of electronic module
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
Patents (3/5)
32
US 1983 4621190 A Card with an IC module
US 1999 6325285 B1 Smart card with integrated fingerprint reader
US 2004 0129787 A1 Secure biometric verification of identity
US 2005 0178827 A1 Flexible fingerprint sensor arrays
US 2005 0212657 A1 Identity verification system with self-authenticating card
US 2006 0000892 A1 Method for biometric security using a smartcard
US 2006 0000899 A1 Method and system for dna recognition biometrics on a smartcard
US 2006 0113381 A1 Batteryless contact fingerprint-enabled smartcard that enables contactless capability
US 2007 0223179 A1 Fingerprint recognition smart card
US 2007 0228154 A1 System and method for sensing biometric and non-biometric smart card devices
US 2008 0164325 A1 Universal Smart Card
US 2008 0054875 A1 Biometric sensor and sensor panel
US 2008 0040615 A1 Biometric embedded devicer
US 2009 0084858 A1 Method For Making A Secure Personal Card And Its Working Process
US 2012 0241524 A1 Activation and indication of an RF field on a device including a chip
US 2013 0036463 A1 Biometric-enabled smart card
US 2013 0320464 A1 Integrally molded die and bezel structure for fingerprint sensors and the like
US 2015 0049925 A1 Method of manufacturing an electronic card
US 2015 0286855 A1 Fingerprint matching algorithm
US 2015 0371077 A1 Fingerprint recognition for low computing power applications
US 2015 0379250 A1 Secure biometric verification of identity
US 2017 0161528 A1 Smart card systems comprising a card and a carrier
US 2017 0213097 A1 Flexible Card with Fingerprint Sensor
US 2017 0213122 A1 Document with Sensor Means
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
Patents (4/5)
33
US 2017 0228631 A1 Smartcard and method for controlling a smartcard
US 2017 0262692 A1 Capacitive Fingerprint sensing Device and Methon for Capturing a fingerprint using the
sensing device
USD 693874 S1 Electronic payment card with biometric verification means
USD 776664 S1 Smart card
USD 786355 S1 Smart card with a chip and finger-print sensor
USD 788847 S1 Smart card with a chip and finger-print sensor
USD 791772 S1 Smart card with a fingerprint sensor
WO 1998 052735 A1 Method of making smart cards
WO 2011 083241 A1 Multiple application chip card having biometric validation
WO 2006 080929 A1 Method of making a memory card by injection molding
WO 2013 155040 A1 Smart connect devices for the interconnectivity of data cards with computing devices to
enable the performance of various functions upon authentication by a user's fingerprint
and/or a user's photograph
WO 2013 160011 A1 Method of manufacturing an electronic card
WO 2016 016129 A1 Multi-layer composite for a security and/or value document and method for producing same
WO 2016 055660 A1 Contactless Biometric Identification Device Allowing Multiple Configurations
WO 2016 055661 A1 Biometric enrolment authorisation
WO 2016 055662 A1 Power load management
WO 2016 055663 A1 Power harvesting in a passive rfid device
WO 2016 055665 A1 Self-contained fingerprint identification device
WO 2016 062822 A1 Device for Acquiring Digital Fingerprints
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
Patents (5/5)
WO 2016 160816 A1 Smart data cards that enable the performance of various functions upon
activation/authentication by a user's fingerprint, oncard pin number entry, and/or by
facial recognition of the user, or by facial recognition of a user alone, including an
automated changing security number that is displayed on a screen on a card's surface
following an authenticated biometric match
WO 2016 190678 A1 Smart Card Including Fingerprint Detection Device And Driving Method Therefor
WO 2017 017085 A1 Smart card with main application and persistence application
WO 2017 025479 A1 Security protected passive rfid device
WO 2017 025481 A1 Power optimization
WO 2017 064097 A1 Multiple finger fingerprint authentication device
WO 2017 081268 A1 Value or security document made of a fiber composite material, and method for producing
the value or security document
WO 2017 089216 A1 Identification document and method for identifying an individual
WO 2017 093514 A1 Fingerprint card
WO 2017 093516 A1 Biometric card
WO 2017 102699 A1 Id token having a protected microcontroller
WO 2017 102984 A1 Device
WO 2017 109173 A1 Biometric device
34
The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com
© 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners.
Acronyms
2FA Two-Factors Authentication
3FA Three-Factors Authentication
ASIC Application-specific integrated circuit
AOC Authentication On Card
ASP Average Selling Price
BISC Biometric ID Smart Card
BSC Biometric Smart Card
BSoC Biometric System on Cards
CBEFF Common Biometric Exchange File Format
CLESS Contactless
CNP Card Not Present Fraud
COF Chip On Film
CQM Card Quality Management
CP Card Present
CVM Cardholder Verification Method
FPC Fingerprint Card
FPCA Flexible Printed Circuit Assembly
FPCB Flexible Printed Circuit Board
FPS Fingerprint Sensor
FPU Floating Point Unit
FTIR Fourier-transform infrared spectroscopy
JV Joint Venture
LDO Low-Dropout Regulator
MEMS Microelectromechanical systems
MAC Multiplier-accumulator
MOC Match-on-Card
MCU Micro Controller Unit
MPU Memory Protection Unit
NFC Near field communication
OTP One Time Password
OCT Optical Coherence Tomography
PC Polycarbonate
PETG Polyethylene terephthalate
PII Personally Identifiable Information
PSD2 Payment Service Directive
PVC Polyvinyl chloride
RFID Radio-frequency identification
SC Supercapacitor
SE Secure Element
SW Software
TIP Terminal Integration Process
TOC Template-On-Card
35

More Related Content

What's hot

Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future walletAbbas Ambawala
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMAlpesh Kurhade
 
Iot ppt
Iot pptIot ppt
Iot pptpiyuu7
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Pavan Kumar MT
 
Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontrollerrajkanakaraj007
 
Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)Dr. Mazlan Abbas
 
Presentation on IoT by tushar
Presentation on IoT by tusharPresentation on IoT by tushar
Presentation on IoT by tushartushar4609
 
A Review on Motion Detection Techniques
A Review on Motion Detection TechniquesA Review on Motion Detection Techniques
A Review on Motion Detection Techniquesijtsrd
 
Mine workers protection slides
Mine workers protection slidesMine workers protection slides
Mine workers protection slidesArya Ls
 
Internet of Things [IoT]
Internet of Things [IoT]Internet of Things [IoT]
Internet of Things [IoT]Vikram Nandini
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligencenalini swaraj
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Internet of Things Workshop
Internet of Things WorkshopInternet of Things Workshop
Internet of Things WorkshopDr. Mazlan Abbas
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
 

What's hot (20)

Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future wallet
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontroller
 
Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022
 
Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)
 
IOT
IOT IOT
IOT
 
Presentation on IoT by tushar
Presentation on IoT by tusharPresentation on IoT by tushar
Presentation on IoT by tushar
 
A Review on Motion Detection Techniques
A Review on Motion Detection TechniquesA Review on Motion Detection Techniques
A Review on Motion Detection Techniques
 
Iot - Internet of Things
Iot - Internet of ThingsIot - Internet of Things
Iot - Internet of Things
 
Mine workers protection slides
Mine workers protection slidesMine workers protection slides
Mine workers protection slides
 
Internet of Things [IoT]
Internet of Things [IoT]Internet of Things [IoT]
Internet of Things [IoT]
 
Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
 
Biometric
BiometricBiometric
Biometric
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Internet of Things Workshop
Internet of Things WorkshopInternet of Things Workshop
Internet of Things Workshop
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
 

Similar to The Rise of Biometric Smart Cards for the ID Card Industry

The Rise of Biometric Cards - Edition February 2018
The Rise of Biometric Cards - Edition February 2018The Rise of Biometric Cards - Edition February 2018
The Rise of Biometric Cards - Edition February 2018Antonio D'Albore
 
The Rise of Biometric Cards - Edition January 2018
The Rise of Biometric Cards - Edition January 2018The Rise of Biometric Cards - Edition January 2018
The Rise of Biometric Cards - Edition January 2018Antonio D'Albore
 
FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Alliance
 
Biometrics - The Key for Effective, Secure & Smart Identification
Biometrics - The Key for Effective, Secure & Smart IdentificationBiometrics - The Key for Effective, Secure & Smart Identification
Biometrics - The Key for Effective, Secure & Smart IdentificationIDEX ASA
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIVR Technology Group
 
Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar FIDO Alliance
 
The Super Broken Story of the True Digital Identity
The Super Broken Story of the True Digital IdentityThe Super Broken Story of the True Digital Identity
The Super Broken Story of the True Digital IdentityManah Khalil
 
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid InnovationFIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid InnovationFIDO Alliance
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressFIDO Alliance
 
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...IdentityNorthEvents
 
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilityBiometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilitySamsung SDS America
 
Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative FIDO Alliance
 
FIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Alliance
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Alliance
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Alliance
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationFIDO Alliance
 
Survey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In MalaysiaSurvey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In MalaysiaFICO
 

Similar to The Rise of Biometric Smart Cards for the ID Card Industry (20)

The Rise of Biometric Cards - Edition February 2018
The Rise of Biometric Cards - Edition February 2018The Rise of Biometric Cards - Edition February 2018
The Rise of Biometric Cards - Edition February 2018
 
The Rise of Biometric Cards - Edition January 2018
The Rise of Biometric Cards - Edition January 2018The Rise of Biometric Cards - Edition January 2018
The Rise of Biometric Cards - Edition January 2018
 
FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPR
 
GHC-2014-Lavanya
GHC-2014-LavanyaGHC-2014-Lavanya
GHC-2014-Lavanya
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics - The Key for Effective, Secure & Smart Identification
Biometrics - The Key for Effective, Secure & Smart IdentificationBiometrics - The Key for Effective, Secure & Smart Identification
Biometrics - The Key for Effective, Secure & Smart Identification
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar
 
The Super Broken Story of the True Digital Identity
The Super Broken Story of the True Digital IdentityThe Super Broken Story of the True Digital Identity
The Super Broken Story of the True Digital Identity
 
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid InnovationFIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome Address
 
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
 
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilityBiometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
 
Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative
 
FIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Authentication in Hong Kong
FIDO Authentication in Hong Kong
 
FIDO in Government
FIDO in GovernmentFIDO in Government
FIDO in Government
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
Survey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In MalaysiaSurvey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In Malaysia
 

Recently uploaded

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

The Rise of Biometric Smart Cards for the ID Card Industry

  • 1. The Rise of Biometric Smart Cards For the ID Card Industry By Antonio D’Albore Founder Embedded Security News London June 27th, 2018
  • 2. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. Standard eID Cards are Great, however… - Verification often not done when traveling outside Home country - Sometime verification is not even done within the Home country - Offline verification don’t always possible - Can’t be used for Logical/Physical Access Control - Can’t help when Proof-of-Life is needed - Limited use for storage of personal sensitive data - Without proper equipment (fingerprint scanner) and connection to issuing govt. DB, it does not allow to estabilish that the person that is carrying it is the legit owner of the eID 2 What we can be done to improve the status quo?
  • 3. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. ...hence my proposal for a whole new class of eIDs 3 Let’s dig into the FeIDs world! Combining a biometric sub system into existing eID card we obtain a Fingerprint National eID (FeID) card
  • 4. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. What is a FeID? A FeID, also referred as BSC (Biometric Smart Card), Fingerprint Card or Biometric System-on-Card (BSoC) is a Smart Card containing a fingerprint sensor where: • Biometric sample capture (enrolment / verification) • Minutiae Template extraction • Template storage • Templates matching is performed within the card. 4 Fingerprint eID cards will be referred trough this presentation as «FeID»
  • 5. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. Fingerprint Cards Applications • Financial Cards • Debit / Credit Cards • OTP Cards • Cryptocurrency Wallet Cards • Government • National ID Cards • National Healthcare Cards • Government Ration/Subsidy Cards • eSignature of Government documents • Driving License Cards • Online Voting • Proof of Life • Identity Verification • Loyalty / Membership • Access Control • Physical Access entry • Logical Access Login • Healthcare & Insurance • Health Insurance Cards Enabler of Multi-Factor (MFA) Authentication Something I have CARD Something I know PIN Something I am FINGERPRINT 5
  • 6. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. The Biometric Sub-System of a FeID 6 Extract Measurement Query Template Capture Pre- Processing Feature Extraction Template Creation Reference template Compare Matching Adaptive Score decision Authenticate Enrolment Authentication Typical operation time 2 ~ 5 sec. Typical operation time 1 ~ 2 sec.
  • 7. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. FeID: How They Are Made Back Side Overlaminate Back Side Layer 7 Inlay Front Side Layer Front Side Overlaminate Fingerprint Sensor Micro module
  • 8. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. FeID: What’s Inside SE Contacts Pad Antenna Power Button FPS Contacts Pad Buzzer Passive Components Test Pads LEDs MCU / ASIC RF IC FPS Controller IC Secure FlashFlexible PCB 8 Battery / SC
  • 9. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. Enrolment Scheme for FeID 9 Citizen identify is verified FeID is produced and mailed to Citizen Govt. staff activate FeID into National ID card network FeID ready for use Citizen bring its non-active FeID at govt. office Citizen apply for FeID National ID Card database Govt. staff assist Citizen fingerprints enrolment Citizen enrols its fingerprints directly on the FeID
  • 10. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. FeID Sample Use Cases 10 Identification / Proof of Life of witness/citizen in court or in any other Gov’t environment Citizen identification by govt. forces that normally don’t carry eID readers Fast Citizen identification by Road Patrol officers Fast citizen identification during emergencies, by non law enforcement entities Citizen identification by Border Control officers Easy check, even by non trained people, that person under identification is using its/her own finger on card and not a fake ones. Citizen identification / Proof of Life assigned to Private organizations
  • 11. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. Use Case Citizen Identification During Emergencies 11 Blinking RED Main finger not match Steady GREEN User Authenticated 1: Fireman ask person to be identified to get her FeID 6: Final result 3: Person place her main finger on sensor 2: Person get her FeID Suitable during emergencies or when a quick identification is needed Very easy to implement Very low implementation cost (no terminal needed) Easy personnel training Steady RED User not Authenticated Steady GREEN User Authenticated 5: When main finger match fail user put secondary finger on sensor 4: Results of main finger match
  • 12. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. Use Case Identification with Offline Terminal 12 George blake b June 20 1967 Id 123975384042 GEORGE BLAKE B JUNE 20 1967 ID 123975384042 1: Border control officer ask person to be identified to get his FeID USER NOT VERIFIED 5: officer perform visual check info on terminal vs info printed on FeID George blake b June 20 1967 Id 123975384042 USER NOT VERIFIED 3: Person place his main finger on sensor 6: When main finger match fail user put secondary finger on sensor GEORGE BLAKE B JUNE 20 1967 ID 123975384042 2: Person get his FeID 7: when also secondary finger fails, officer might decide to perform alternative identification procedure Suitable for places with limited or no online connectivity 4: Upon successful verification, Terminal access FeID records and display them
  • 13. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. 13 Use Case Identification with Online Terminal User Data / Key not recognised User Data / Key recognised 1: Officer ask person to be identified to get her FeID 2: Person give her FeID to Officier 3: Officer get FeID and insert it in the mobile wireless terminal 4: Person place fingerprint on eID 5: FeID release User Data + Key, terminal encrypt data and query Government FeID system 6: Government FeID system check validity of query and send back reply 7: mobile terminal show result received from Government eID DB When person under identification is not the genuine FeID card holder, no User Data and Key shall be released by the card.
  • 14. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. 14 Use Case Access Control and eHealth 1: Patient use FeID to self-identify herself at hospital reception desk 2: Patient repeat self- authentication at the doctor room 4: Doctor access Patient health records 3: Health records are transferred to Doctor’s PC In this use case the FeID has three functions: 1- Patient authentication. 2- Consent to release sensitive data (personal Health Records) 3- Store Health Records eID Fingerprint Card can store personal Health Records, currently up to 8GB of secure flash 5: When done, Doctor return FeID back to Patient
  • 15. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. FeID Applications, combined with Access Control 15 Citizen Access to govt. building Travelers Access to eGates in Airports / Borders Govt. employees Access to sensitive IT services / infostructure Citizen Access to eGov online services Govt. employees access to sensitive sites PHYSICAL ACCESS CONTROL LOGICAL ACCESS CONTROL
  • 16. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. Some Considerations on FeID Schemes 16 • No system can have a totally fool proof method of authentication. • Issuers need to understand cost and risks associated with a chosen authentication method. • From a criminal organization standpoint, is much more appealing to access a centralised National ID database containing biometric data of millions of citizen than hacking a single eID card. • Since Biometrics data are statics, and they cannot be revoked, once stolen, the specific body feature cannot be used anymore for enrolment.
  • 17. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. Multi Applications Scheme on FeID 17 National ID Card eSignature Card Drivers License Card Healthcare / Social Security Card Voting Card Debit / Ration Card Passport Card Fingerprint Verification in lieu of multiple User Name + Passwords
  • 18. 18 FeID Multi Applications Architecture Microcontroller - Memory - I/O OS / Native Functions JavaCard VM Biometric Kernel JavaCard Framework JavaCard Runtime Environment Loader Installer Card Manager PKI Applet eID Applet eHealth Applet eVoting Applet eSign Applet eDriving Applet
  • 19. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. Requirements for a FeID Card • ISO/IEC 17839-1:2014 compliant sensor size (minimum 169mm2) • Multi finger enrolment • Liveness detection • Templates storage and Match in the SE • Battery (when fully offline use is needed) • Material compatible with eID validity requirements and manufacturing process (PC+PET, PVC+PETG) ...and some ideas for the Future: • Vein scan capability • Fingerprint scanner embedded into ePassport inlays 19
  • 20. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. Challenges for FeIDs Implementation 20 • Most current BSC are assembled in Cold Lamination while ID Card Industry use Hot Lamination. • Most current BSC are made of PVC or similar material while industry is mostly using PC. • FeIDs without batteries need portable reader for card holder identification. • With current battery technology FeIDs can last no more than 4 years. • Application of complex hologram not always possible. • Application of overlaminate with security elements can be complex on the front side of the BSC.
  • 21. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. FeID Benefits 21 • Compliant with personal data privacy laws and regulations such as GDPR (EU) and Data Protection Act 2018 (UK). • Govt. issue single card instead of multiple cards (cost saving). • No need of specialized biometric terminal (cost saving). • Govt. single authority managing one card for multiple services (cost saving). • Less use of PIN and Password (less risks). • Enabler of multi factor authentication: something I have «card» + something I am «fingerprint» (more security). • For basic scheme no or simple equipment can be used (cost saving). • Tool for «Proof of Life» verification (less fraud)
  • 22. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. 22
  • 23. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. Contacts 23 Antonio D’Albore Founder Embedded Security News antonio@embeddedsecuritynews.com +39 392 5198737 @AndongESN @embedded.sec.news embeddedsecuritynews.com
  • 24. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. ACKNOWLEDGEMENTS 24 Thank you to the following people for all their contribution, effort, motivation provided to me during this work: Ondřej Adámek, Rouzet Agaiby, Massimo Edoardo Baumgartner, Paolo Bean, Fred Benkley, Luca Bertoletti, Fabrizio Borracci, Adriano Canzi, Unho Choi, James Chuang, Mona Chung, Laszlo Csercsa , Renato Comelli, Thomas Decker, Pascal Dufour, Ritu Favre, Sebastian Gallschütz, Michael Gardiner, Franck Germain, Kim Kristian Humborstad, Min-ki Jung, In-Beom Kang, Dong Su Kim, Ariyuki Kishimoto, Charlotte Knudsen, Henrik Knudzon, Julien Larsonneur, Ted Lin, Joe Lo, Christopher A Ludden, Hemant Mardia, Giovanni Memoli, Anne McAleer, Chuck Milligan, Marc Muller, Robert Mueller, Henning Bonde Nielsen, Francesco Pesenti Barili, Nicolas Raffin, Michel Roig, Frank Sandeløv, Michele Scarlatella, Stan Swearingen, Mindy Tan, Luca Tenzi, Enrico Vainieri, David B. Walshak, David Wyatt, Jin Yiwen. Finally, to my caring, loving, and supportive wife, Tina: my deepest gratitude. Your encouragement when the times got rough are much appreciated and duly noted. My heartfelt thanks.
  • 25. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. References 25 - http://coe.int/en/web/conventions/full-list/-/conventions/treaty/005 - http://cordis.europa.eu/search/result_en?q=cardlab - http://dhl.it/en/express/shipping/shipping_advice/lithium_batteries.html - http://dmt.com.cn/product/aqkz/zwsb/529.html - http://ec.europa.eu/justice/policies/privacy/docs/95-46-ce/dir1995-46_part1_en.pdf - https://en.wikipedia.org/wiki/Biometrics - https://en.wikipedia.org/wiki/Data_Protection_Directive - https://en.wikipedia.org/wiki/General_Data_Protection_Regulation - https://en.wikipedia.org/wiki/Fingerprint_recognition - https://en.wikipedia.org/wiki/Personally_identifiable_information - https://en.wikipedia.org/wiki/Supercapacitor - http://fingertec.com/download/tips/whitepaper-01.pdf - http://www.gemalto.com/govt/biometrics/biometric-data - http://heritage.org/homeland-security/report/biometric-technologies-security-legal-and-policy-implications - http://horizon2020projects.com/special-reports/technical-information-card-fraud-identity-theft-protection- technologies/ - http://iata.org/whatwedo/cargo/dgr/Pages/lithium-batteries.aspx - https://www.icao.int/Meetings/a38/Documents/WP/wp094_en.pdf - https://www.icao.int/publications/pages/publication.aspx?docnum=9303
  • 26. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. References 26 - https://www.icao.int/publications/Documents/9303_p9_cons_en.pdf - https://www.icao.int/publications/Documents/9303_p10_cons_en.pdf - http://www.isorg.fr/ - http://legacy.emvco.com/faq.aspx?id=319 - https://www.level2kernel.com/emv-contactless-kernel-system-functions-configurations.html - http://www.mainguet.org/ - https://www.mastercardconnect.com/ - https://ncbi.nlm.nih.gov/pubmed/19006507 - http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-122.pdf - http://patentexaminer.org/wp-content/uploads/2011/09/SmartMetric.MC_.2.Complaint_small.pdf - http://patentexaminer.org/wp-content/uploads/2011/09/SMME_v_MasterCard_1.pdf - http://prba.org/wp-content/uploads/IATA-Lithium-Battery-Guidance-2017-1.pdf - https://www.quardlock.com/ - https://www.sec.gov/Archives/edgar/data/1301991/000114420415058083/v421136_ex10-8.htm - https://scribd.com/doc/316791717/Special-Report-Biometrics-and-Border-Security - https://uni-kassel.de/fb07/fileadmin/datas/fb07/5-Institute/IWR/Hornung/isse_2004_47- 57_biometric_identity_cards.pdf - https://ups.com/media/news/en/ca/intl_lithium_battery_regulations.pdf
  • 27. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. References 27 - https://www.youtube.com/watch?v=jw_4uaRNsBA&t=1228s - https://www.youtube.com/watch?v=VESg5mPWk34&t=21s
  • 28. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. References 28 Struif, B.: Use of Biometrics for User Verification in Electronic Signature Smartcards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 220–227. Springer, Heidelberg (2001) Murdoch, S.J., Drimer, S., Anderson, R., Bond, M.: Chip and PIN is broken. In: 2010 IEEE Symposium on Security and Privacy (2010) Biometric Application Programming Interface (API) for Java Card, NIST/Biometric Consortium Biometric Interoperability, Assurance, and Performance Working Group, version 1.1 (August 2002) Henniger O., Nikolov D. (2013) Extending EMV Payment Smart Cards with Biometric On-Card Verification. In: Fischer-Hübner S., de Leeuw E., Mitchell C. (eds) Policies and Research in Identity Management. IDMAN 2013. IFIP Advances in Information and Communication Technology, vol 396. Springer, Berlin, Heidelberg Privacy-preserving biometric authentication: challenges and directions, Elena Pagnin, Aikaterini Mitrokotsa Chalmers University of Technology Gothenburg, Sweden (2017) “EMV integrated circuit card specifications for payment systems – Book3: Application specification,” Version 4.2, June 2008. Encyclopedia of Biometrics, Stan Z., Anil K. Jain, Springer Reference, ISBN: 978-3-642-27733-7 Anil K., Arun A. Ross – Introduction to Biometrics, Springer, ISBN: 978-0387773254 Nicholas M. Orlans John D. Woodward Jr., Peter T. Higgins – Biometrics, McGraw Hill Professional, ISBN: 978-0072222272
  • 29. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. Specs 29 ISO/IEC 7816-4:2013 Identification cards – Integrated circuit cards – Part 4: Organization, security and commands for interchange ISO/IEC 7816-11:2014 Identification cards – Integrated circuit cards – Personal verification through biometric methods ISO/IEC 9797-2:2011 Information technology – Security techniques – Message Authentication Codes (MACs) – Part 2: Mechanisms using a dedicated hash-function ISO/IEC 17839-1:2014 Biometric System-on-Card: Core requirements ISO/IEC 17839-2:2015 Biometric System-on-Card: Physical characteristics ISO/IEC 17839-3:2016 Biometric System-on-Card: Logical information interchange mechanism ISO/IEC 18033-2:2006 Information technology – Security techniques – Encryption algorithms – Part 2: Asymmetric ciphers ISO/IEC 18033-3:2010 Information technology – Security techniques – Encryption algorithms – Part 3: Block ciphers ISO/IEC 19092:2008 -- Financial services -- Biometrics -- Security framework ISO/IEC 19785-3 Information technology – Common Biometric Exchange Formats Framework – Patron format specifications ISO/IEC 19794-1:2011 - Information technology -- Biometric data interchange formats -- Part 1: Framework ISO/IEC 19794-2:2011 - Information technology –- Biometric data interchange formats –- Part 2: Finger minutiae data ISO/IEC 19794-2:2011/Cor 1:2012 - XML encoding and clarification of defects ISO/IEC 19794-2:2011/Amd 1:2013 - Conformance testing methodology and clarification of defects ISO/IEC 19794-2:2011/Amd 2:2015 - Conformance testing methodology and clarification of defects ISO/IEC 19794-3:2006 - Information technology -- Biometric data interchange formats -- Part 3: Finger pattern spectral data ISO/IEC 19794-4:2011 - Information technology -- Biometric data interchange formats -- Part 4: Finger image data ISO/IEC 19794-5:2011 - Information technology -- Biometric data interchange formats -- Part 5: Face image data ISO/IEC 19794-6:2014 - Information technology -- Biometric data interchange formats -- Part 6: Iris image data ISO/IEC 19794-7:2014 - Information technology -- Biometric data interchange formats -- Part 7: Signature/sign time series data ISO/IEC 19794-8:2011 -- Information technology -- Biometric data interchange formats -- Part 8: Finger pattern skeletal data ISO/IEC 19794-9:2011 -- Information technology -- Biometric data interchange formats -- Part 9: Vascular image data ISO/IEC 19794-10:2007 -- Information technology -- Biometric data interchange formats -- Part 10: Hand geometry silhouette data EMV® Specification Bulletin No. 185 - First Edition March 2017 - Biometric Terminal Specification
  • 30. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. Patents (1/5) 30 CA 02581230 C Apparatus for fingerprint sensing and other measurements CN 2010 20665177 非接触式包含指纹辨识的电子智能卡片 (Non-contact intelligent electronic card comprising fingerprint identification ) CN 2010 20671893 非接触式电子式智慧卡片 (Non-contact electronic smart card ) CN 2015 20355127 智慧卡片指纹按压装置 (Wisdom card fingerprint press device) CN 2016 02176914 U Fingerprint identification smart card DE 2002 10257111 A1 Chipcard and method for production of a chipcard DE 2016 10101609 A1 Authentifikationsvorrichtung, Authentifikationsdokument und Verfahren zur Authentifizierung einer Person DE 2016 10201976 B3 Vorrichtung und Verfahren zur Bearbeitung eines Substrats GB 2012 00019750 D0 Enrolling fingerprints by combining image strips to obtain sufficient width GB 2013 00004639 D0 Fingerprint sensor GB 2015 00022870 D0 Biometric smartcard with multiple modes of operation GB 2015 00008294 D0 Biometric enrolment authorisation GB 2015 00008296 D0 Contactless biometric identification device allowing multiple configurations GB 2016 00000892 D0 Low thickness biometric card GB 2016 00003099 D0 One-time password device GB 2016 00004138 D0 Apparatus for testing a battery-powered device GB 2016 00009572 D0 Smartcard and method for controlling a smartcard GB 2016 00014998 D0 Biometric smartcard for providing feedback to a user GB 2017 00004847 D0 Calibration method GB 2017 00006460 D0 Biometric smartcard
  • 31. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. Patents (2/5) 31 IT 2006 UD00028 A1 Carta Elettronica Universale Personale IT 2006 UD00046 A1 Metodo Per Realizzare Una Scheda Personale Sicura E Suo Processo Di Funzionamento IT 2006 UD00075 A1 A method for making a secure personal card and its working process JP 2011 0105750 A ic card with fingerprint authentication JP 2014 0529123 A Biometric authentication available smart card JP 2016 0115098 A 指紋認証付スマートカードとこれを用いた決済方法 (Smart card with fingerprint authentication and settlement method using the same) KR 2014 0164109 B1 RF Smart Combi-card Of Fingerprint Type And Dealing Method Thereof KR 2015 0056437 RF Smart Card Of Fingerprint Type With Battery KR 2015 0121247 Fingerprint Recognition Card and Authentication Method Using the Same KR 2015 0180446 B2 Smart Card Integrated With Thermoelement And Fingerprint Verification Chip As Laminated Structure KR 2016 0064133 A Smart Card Comprising Fingerprint Detecting Device And Method For Driving The Same KR 2016 0090633 A Smart Card And A Fingerprint Recognition System Using Thereof KR 2016 0125877 A RF Smart Card of Fingerprint Type with Battery KR 2016 0129832 B1 Fingerprint Smart Card Having A Prevention Function Forged Fingerprint TW 2010 0009718 A Method of manufacturing secure personal card and manufacturing processes thereof TW 2016 0029842 A Fingerprint press device for smart card TW 2016 0202811 U Switch structure of electronic module
  • 32. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. Patents (3/5) 32 US 1983 4621190 A Card with an IC module US 1999 6325285 B1 Smart card with integrated fingerprint reader US 2004 0129787 A1 Secure biometric verification of identity US 2005 0178827 A1 Flexible fingerprint sensor arrays US 2005 0212657 A1 Identity verification system with self-authenticating card US 2006 0000892 A1 Method for biometric security using a smartcard US 2006 0000899 A1 Method and system for dna recognition biometrics on a smartcard US 2006 0113381 A1 Batteryless contact fingerprint-enabled smartcard that enables contactless capability US 2007 0223179 A1 Fingerprint recognition smart card US 2007 0228154 A1 System and method for sensing biometric and non-biometric smart card devices US 2008 0164325 A1 Universal Smart Card US 2008 0054875 A1 Biometric sensor and sensor panel US 2008 0040615 A1 Biometric embedded devicer US 2009 0084858 A1 Method For Making A Secure Personal Card And Its Working Process US 2012 0241524 A1 Activation and indication of an RF field on a device including a chip US 2013 0036463 A1 Biometric-enabled smart card US 2013 0320464 A1 Integrally molded die and bezel structure for fingerprint sensors and the like US 2015 0049925 A1 Method of manufacturing an electronic card US 2015 0286855 A1 Fingerprint matching algorithm US 2015 0371077 A1 Fingerprint recognition for low computing power applications US 2015 0379250 A1 Secure biometric verification of identity US 2017 0161528 A1 Smart card systems comprising a card and a carrier US 2017 0213097 A1 Flexible Card with Fingerprint Sensor US 2017 0213122 A1 Document with Sensor Means
  • 33. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. Patents (4/5) 33 US 2017 0228631 A1 Smartcard and method for controlling a smartcard US 2017 0262692 A1 Capacitive Fingerprint sensing Device and Methon for Capturing a fingerprint using the sensing device USD 693874 S1 Electronic payment card with biometric verification means USD 776664 S1 Smart card USD 786355 S1 Smart card with a chip and finger-print sensor USD 788847 S1 Smart card with a chip and finger-print sensor USD 791772 S1 Smart card with a fingerprint sensor WO 1998 052735 A1 Method of making smart cards WO 2011 083241 A1 Multiple application chip card having biometric validation WO 2006 080929 A1 Method of making a memory card by injection molding WO 2013 155040 A1 Smart connect devices for the interconnectivity of data cards with computing devices to enable the performance of various functions upon authentication by a user's fingerprint and/or a user's photograph WO 2013 160011 A1 Method of manufacturing an electronic card WO 2016 016129 A1 Multi-layer composite for a security and/or value document and method for producing same WO 2016 055660 A1 Contactless Biometric Identification Device Allowing Multiple Configurations WO 2016 055661 A1 Biometric enrolment authorisation WO 2016 055662 A1 Power load management WO 2016 055663 A1 Power harvesting in a passive rfid device WO 2016 055665 A1 Self-contained fingerprint identification device WO 2016 062822 A1 Device for Acquiring Digital Fingerprints
  • 34. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. Patents (5/5) WO 2016 160816 A1 Smart data cards that enable the performance of various functions upon activation/authentication by a user's fingerprint, oncard pin number entry, and/or by facial recognition of the user, or by facial recognition of a user alone, including an automated changing security number that is displayed on a screen on a card's surface following an authenticated biometric match WO 2016 190678 A1 Smart Card Including Fingerprint Detection Device And Driving Method Therefor WO 2017 017085 A1 Smart card with main application and persistence application WO 2017 025479 A1 Security protected passive rfid device WO 2017 025481 A1 Power optimization WO 2017 064097 A1 Multiple finger fingerprint authentication device WO 2017 081268 A1 Value or security document made of a fiber composite material, and method for producing the value or security document WO 2017 089216 A1 Identification document and method for identifying an individual WO 2017 093514 A1 Fingerprint card WO 2017 093516 A1 Biometric card WO 2017 102699 A1 Id token having a protected microcontroller WO 2017 102984 A1 Device WO 2017 109173 A1 Biometric device 34
  • 35. The Rise of Biometric Smart Cards for the ID Card Industry | Embedded Security News | embeddedsecuritynews.com © 2018 Antonio D’Albore | All product names, logos, and brands are property of their respective owners. Acronyms 2FA Two-Factors Authentication 3FA Three-Factors Authentication ASIC Application-specific integrated circuit AOC Authentication On Card ASP Average Selling Price BISC Biometric ID Smart Card BSC Biometric Smart Card BSoC Biometric System on Cards CBEFF Common Biometric Exchange File Format CLESS Contactless CNP Card Not Present Fraud COF Chip On Film CQM Card Quality Management CP Card Present CVM Cardholder Verification Method FPC Fingerprint Card FPCA Flexible Printed Circuit Assembly FPCB Flexible Printed Circuit Board FPS Fingerprint Sensor FPU Floating Point Unit FTIR Fourier-transform infrared spectroscopy JV Joint Venture LDO Low-Dropout Regulator MEMS Microelectromechanical systems MAC Multiplier-accumulator MOC Match-on-Card MCU Micro Controller Unit MPU Memory Protection Unit NFC Near field communication OTP One Time Password OCT Optical Coherence Tomography PC Polycarbonate PETG Polyethylene terephthalate PII Personally Identifiable Information PSD2 Payment Service Directive PVC Polyvinyl chloride RFID Radio-frequency identification SC Supercapacitor SE Secure Element SW Software TIP Terminal Integration Process TOC Template-On-Card 35