SlideShare a Scribd company logo
1 of 26
1. The Problem
2. The Options
3. What We Recommend
4. Conclusion
C O N T E N T S
• Protecting your certificates is expensive and difficult
• Counterfeiting is becoming increasingly prevalent
T H E P R O B L E M
Theology degree scam in South
Africa.
53 colleges were found by the
Department of Higher Education to
be providing illegitimate
qualifications – 21 of these colleges
were from the religious sector.
Investigators revealed Calvary
University was not a recognised
degree awarding institution.
(News24 28 January 2016)
C A S E S T U D Y
Delhi Law Minister arrested in
fake degree case.
Law Minister Jitendra Singh Tomar
was arrested in connection with the
ongoing row over the authenticity of
his academic degree. He had been
booked under Sections pertaining to
cheating and fraud after a university
from Bhagalpur submitted to a city
court that he was not on its student
rolls despite having a degree
seemingly issued by it.
C A S E S T U D Y
Why pay $10,000 for an
education when I can buy a
qualification for $500?
T H E P R O B L E M
Make it as easy as possible for you
to increase certificate security
H O W C A N W E
H E L P Y O U ?
Help make the certificate be proof
of an education as opposed to a
qualification that can be bought
S E C U R E
B A S E S T O C K
Designs are created using
sophisticated design computer
software.
Watermarked paper with threads
and invisible UV fibers, Solvent
Sensitive Inks, Guilloche Security
Designs, Holograms and Anti-copy
Features are just some of the
security we incorporate into our
designs.
S E C U R E
P E R S O N A L I S A T I O N
Personalising the unique candidate
data in the background of the
certificate quickly and simply
increases the security of certificates
using high security embedding
technology – similar to passport
personalisation.
Personal data is embedded as micro text into the
background tint
V A L I D A T I O N
A 2-D encrypted datamatrix barcode
is personalised on the Certificate at
the same time that the award criteria
is printed on the Certificate.
Decryption software and barcode
scanner can be supplied as
standalone verification tools.
S E C U R E
P R I N T E R S
Should have key locks on the paper
trays to prevent pilferage of
basestock Transcripts.
Additionally, special UV fluorescent
toner is used that is not
commercially available. This
ensures that any fraudulent
alteration can be quickly identified
using a UV torch.
C H A L L E N G E S
Your staff removed from their jobs
to complete the printing process
Wastage of basestock through
machine miss feeds, jams and
breakdowns
Consolidation and packing process
requires more staff
ALL OF WHICH COSTS
YOU MONEY!
Processing data from various
schools/centres
Y O U A R E I N
T H E B U S I N E S S
O F E D U C A T I N G
Is your staffs’ time better served
educating the leaders of the
future?
Help you
FOCUS ON EDUCATION
Help you
PROTECT THE VALUE OF
EDUCATION
W H A T W E
R E C O M M E N D
K E Y F E A T U R E S
A unique web portal making
implementing greater levels of
security easier than ever before
Flexible ways of personalising,
proofing, printing and distributing
Certificates and Transcripts
Offering Examination and Awarding
Bodies increased protection
against potential forgery in today’s
rapidly changing education sector
All actions can be carried out
remotely for complete flexibility
and convenience
Demonstrates our continued ability and determination to provide
even greater levels of security on these very valuable documents
1 D A T A U P L O A D
The security features are applied to
the certificate by uploading a data
file containing the candidate data,
such as name, date of birth, photo
and examination results.
The portal then generates the
personalised PDF certificates,
using the data contained within the
file.
2 H I G H
S E C U R I T Y
D I G I T A L
P E R S O N A L I T I O N
Now for the clever bit…
The personal data is also
embedded into the image
structure of the certificate, making
the data highly visible and an
integral part of the PDF. This makes
it very difficult to amend using image
manipulation software such as
Photoshop.
At the same time, an encrypted
barcode is added which links the
certificate to the data. This allows
anyone to quickly check the
certificate for fraudulent activity,
using a handheld scanner and
decryption software.
3 A P P R O V A L
Because the designated
Administrator of the Ecertsecure
portal has visibility of the process
at all times, they retain control
of the approval procedure.
After reviewing the proofs of the
certificates in PDF format on-
screen, the certificates can be
approved and submitted for
print; or if amends are needed
the data can be edited and re-
submitted for reprocessing.
4 P R I N T A N D
D I S T R I B U T I O N
The flexibility that Ecertsecure
offers means that you have two
options for the print and distribution
of your certificates once you have
approved them on-screen.
Using your own printers you can
print the certificates directly onto
your existing certificate paper.
Ecertsecure works with the
equipment you have already so you
don’t have to buy anything extra
from us in order to produce secure
certificates.
4 P R I N T A N D
D I S T R I B U T I O N
The second option is to use the
portal to instruct Ecertsecure to
print the approved certificates onto
secure paper at our premises and
then have them delivered either
back to you for distribution or
directly to the individual recipients
in tamper evident bags.
A full range of accessories such as
secure printers, printer cartridges,
document validation devices,
secure certificate paper and tamper
evident bags are available from
Smith & Ouzman.
S O L U T I O N
Please contact us to arrange for a
demonstration to find out how
Ecertsecure can benefit your
institution and your students.
Ecertsecure will help you increase
productivity, reduce your costs
and above all maintain high levels
of security.
Together we can better protect your future.
C O N C L U S I O N
Join the discussion on LinkedIn
We welcome you all to join the ‘SAAEA’ Group
L E T ’ S C O N N E C T

More Related Content

Similar to SAAEA 2016_Secure Personalisation Solution_S&O_V2

Case study- Cheran Colleges
Case study- Cheran CollegesCase study- Cheran Colleges
Case study- Cheran CollegesThamannaKotta1
 
Whitepaper: Best Practices for Electronic Document Management and Security
Whitepaper: Best Practices for Electronic Document Management and SecurityWhitepaper: Best Practices for Electronic Document Management and Security
Whitepaper: Best Practices for Electronic Document Management and SecurityDocuSign
 
The Revolutionary Solution in Secured Digital Identification
The Revolutionary Solution in Secured Digital IdentificationThe Revolutionary Solution in Secured Digital Identification
The Revolutionary Solution in Secured Digital IdentificationINPI ASIA Admin
 
Whole Process PPT of LC-Latest.pptx
Whole Process PPT of LC-Latest.pptxWhole Process PPT of LC-Latest.pptx
Whole Process PPT of LC-Latest.pptxLearningChain
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methodslapao2014
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token2FA, Inc.
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021CIO Look Magazine
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...SafeNet
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays
 
IRJET- Keep It – A System to Store Certificates and Develop a Profile
IRJET- Keep It – A System to Store Certificates and Develop a ProfileIRJET- Keep It – A System to Store Certificates and Develop a Profile
IRJET- Keep It – A System to Store Certificates and Develop a ProfileIRJET Journal
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 

Similar to SAAEA 2016_Secure Personalisation Solution_S&O_V2 (20)

E-commerce.pptx
E-commerce.pptxE-commerce.pptx
E-commerce.pptx
 
Case study- Cheran Colleges
Case study- Cheran CollegesCase study- Cheran Colleges
Case study- Cheran Colleges
 
Whitepaper: Best Practices for Electronic Document Management and Security
Whitepaper: Best Practices for Electronic Document Management and SecurityWhitepaper: Best Practices for Electronic Document Management and Security
Whitepaper: Best Practices for Electronic Document Management and Security
 
ProofeasyPPT.pptx
ProofeasyPPT.pptxProofeasyPPT.pptx
ProofeasyPPT.pptx
 
The Revolutionary Solution in Secured Digital Identification
The Revolutionary Solution in Secured Digital IdentificationThe Revolutionary Solution in Secured Digital Identification
The Revolutionary Solution in Secured Digital Identification
 
Whole Process PPT of LC-Latest.pptx
Whole Process PPT of LC-Latest.pptxWhole Process PPT of LC-Latest.pptx
Whole Process PPT of LC-Latest.pptx
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token
 
120 i143
120 i143120 i143
120 i143
 
Blockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecuredBlockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecured
 
Blockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecuredBlockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecured
 
BeSecured_Brochure_02 (1).pdf
BeSecured_Brochure_02 (1).pdfBeSecured_Brochure_02 (1).pdf
BeSecured_Brochure_02 (1).pdf
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
 
IRJET- Keep It – A System to Store Certificates and Develop a Profile
IRJET- Keep It – A System to Store Certificates and Develop a ProfileIRJET- Keep It – A System to Store Certificates and Develop a Profile
IRJET- Keep It – A System to Store Certificates and Develop a Profile
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
BSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdfBSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdf
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 

SAAEA 2016_Secure Personalisation Solution_S&O_V2

  • 1.
  • 2. 1. The Problem 2. The Options 3. What We Recommend 4. Conclusion C O N T E N T S
  • 3. • Protecting your certificates is expensive and difficult • Counterfeiting is becoming increasingly prevalent T H E P R O B L E M
  • 4. Theology degree scam in South Africa. 53 colleges were found by the Department of Higher Education to be providing illegitimate qualifications – 21 of these colleges were from the religious sector. Investigators revealed Calvary University was not a recognised degree awarding institution. (News24 28 January 2016) C A S E S T U D Y
  • 5. Delhi Law Minister arrested in fake degree case. Law Minister Jitendra Singh Tomar was arrested in connection with the ongoing row over the authenticity of his academic degree. He had been booked under Sections pertaining to cheating and fraud after a university from Bhagalpur submitted to a city court that he was not on its student rolls despite having a degree seemingly issued by it. C A S E S T U D Y
  • 6. Why pay $10,000 for an education when I can buy a qualification for $500? T H E P R O B L E M
  • 7. Make it as easy as possible for you to increase certificate security H O W C A N W E H E L P Y O U ? Help make the certificate be proof of an education as opposed to a qualification that can be bought
  • 8. S E C U R E B A S E S T O C K Designs are created using sophisticated design computer software. Watermarked paper with threads and invisible UV fibers, Solvent Sensitive Inks, Guilloche Security Designs, Holograms and Anti-copy Features are just some of the security we incorporate into our designs.
  • 9. S E C U R E P E R S O N A L I S A T I O N Personalising the unique candidate data in the background of the certificate quickly and simply increases the security of certificates using high security embedding technology – similar to passport personalisation.
  • 10. Personal data is embedded as micro text into the background tint
  • 11. V A L I D A T I O N A 2-D encrypted datamatrix barcode is personalised on the Certificate at the same time that the award criteria is printed on the Certificate. Decryption software and barcode scanner can be supplied as standalone verification tools.
  • 12. S E C U R E P R I N T E R S Should have key locks on the paper trays to prevent pilferage of basestock Transcripts. Additionally, special UV fluorescent toner is used that is not commercially available. This ensures that any fraudulent alteration can be quickly identified using a UV torch.
  • 13. C H A L L E N G E S Your staff removed from their jobs to complete the printing process Wastage of basestock through machine miss feeds, jams and breakdowns Consolidation and packing process requires more staff ALL OF WHICH COSTS YOU MONEY! Processing data from various schools/centres
  • 14. Y O U A R E I N T H E B U S I N E S S O F E D U C A T I N G Is your staffs’ time better served educating the leaders of the future?
  • 15. Help you FOCUS ON EDUCATION Help you PROTECT THE VALUE OF EDUCATION W H A T W E R E C O M M E N D
  • 16.
  • 17. K E Y F E A T U R E S A unique web portal making implementing greater levels of security easier than ever before Flexible ways of personalising, proofing, printing and distributing Certificates and Transcripts Offering Examination and Awarding Bodies increased protection against potential forgery in today’s rapidly changing education sector All actions can be carried out remotely for complete flexibility and convenience
  • 18. Demonstrates our continued ability and determination to provide even greater levels of security on these very valuable documents
  • 19. 1 D A T A U P L O A D The security features are applied to the certificate by uploading a data file containing the candidate data, such as name, date of birth, photo and examination results. The portal then generates the personalised PDF certificates, using the data contained within the file.
  • 20. 2 H I G H S E C U R I T Y D I G I T A L P E R S O N A L I T I O N Now for the clever bit… The personal data is also embedded into the image structure of the certificate, making the data highly visible and an integral part of the PDF. This makes it very difficult to amend using image manipulation software such as Photoshop. At the same time, an encrypted barcode is added which links the certificate to the data. This allows anyone to quickly check the certificate for fraudulent activity, using a handheld scanner and decryption software.
  • 21. 3 A P P R O V A L Because the designated Administrator of the Ecertsecure portal has visibility of the process at all times, they retain control of the approval procedure. After reviewing the proofs of the certificates in PDF format on- screen, the certificates can be approved and submitted for print; or if amends are needed the data can be edited and re- submitted for reprocessing.
  • 22. 4 P R I N T A N D D I S T R I B U T I O N The flexibility that Ecertsecure offers means that you have two options for the print and distribution of your certificates once you have approved them on-screen. Using your own printers you can print the certificates directly onto your existing certificate paper. Ecertsecure works with the equipment you have already so you don’t have to buy anything extra from us in order to produce secure certificates.
  • 23. 4 P R I N T A N D D I S T R I B U T I O N The second option is to use the portal to instruct Ecertsecure to print the approved certificates onto secure paper at our premises and then have them delivered either back to you for distribution or directly to the individual recipients in tamper evident bags. A full range of accessories such as secure printers, printer cartridges, document validation devices, secure certificate paper and tamper evident bags are available from Smith & Ouzman.
  • 24. S O L U T I O N Please contact us to arrange for a demonstration to find out how Ecertsecure can benefit your institution and your students. Ecertsecure will help you increase productivity, reduce your costs and above all maintain high levels of security.
  • 25. Together we can better protect your future. C O N C L U S I O N
  • 26. Join the discussion on LinkedIn We welcome you all to join the ‘SAAEA’ Group L E T ’ S C O N N E C T