Karsof eVisa Solution
Karsof Systems LLC
Total e-Border Control
System
• Complete registration repository
module for all visitors
• Relationship channel management
module to enhance the inter-services
i.e. of all data collected at the country’s
entry and exit points
• Compliance module to track and
monitor delinquent foreigners
• High-quality authentication process
• Enhanced features and functions for e-
VISA processing using biometric
technology systems
• Efficient and effective process
management for issuing passports
• Underlying IT platform proven to be a
more cost effective platform
• Ascertains authorized identity of
citizens, diplomatic staff and family
• Allows government authorities to more
easily and accurately monitor
authorized foreign workers
• Standardizes data elements and government system
interoperability, providing the potential for further enhancement of
identity checking by allowing confirmation of identity against
information contained in biometrics
• Helps national security programs achieve goals by ensuring
regulations, practices and procedures are followed in order to
safeguard against acts of unlawful interference
• Increases confidence of the public on personal and national security
• Platform to provide enhanced services to the public
• Enhances security and convenience of existing and new applications
using high security technology
Introduction to E-visas
• Uses electronic data collected for entry
programs
• Faster and more ergonomic methods to read
data from an official travel document
• Facilitates the identity management of visa
holders through machine assisted identity
confirmation
• Facilitates travelers through check-in and border
processes
1. Visas communicate data in a machine-
readable format to airline authorities
and border officials in transit and
receiving countries.
2. The machine-readable zone provides a
systematic way to gather and compare
personal data electronically, particularly
when the passport document is not
already machine readable.
3. E-visas allow additional biometric and
other data to be stored and read.
4. This offers the possibility of facilitated or
self-service inspection, and the capacity
to verify biometric information that is
stored on or linked to the visa.
e-Visa types – Advantages
Chip visa sticker
A sticker IC contactless chip has many
advantages for visa issuers, including
the capacity to carry biometric data on
a document without requiring a real-
time database at all points of service
to verify biographic and biometric
data.
This is a particularly useful concept
given that many travel documents are
not machine readable. However,
overcoming technical constraints will
be key to the adoption of this method.
Chip in a multi-use visa card:
Multi-use documents have increased in
use in national and multi-lateral settings.
As biometric and card technology
matures, card visas will grow in popularity
because of their durability and ease of
use.
Unique Data
Encrypted
in the Karsof™
Microprocessor
Chip
rear outer Layer
sheet pre-printing
Karsof™ Secure CHIP
sheet pre-printing
Karsof™ Card Reader
Security Features
Unique Data from the
Karsof™ Chip and the
Unique Code from the
Karsof™ Smart Chip Card will
be authenticated each other
for the Card and Reader
Hand Shake by
Reader with
Card
Encrypted Data is mutually
transferred
e-Visa System
Checking Document Authenticity and Validity
It is essential for border agencies to check that the e-
Visa presented is genuine and has not been tampered
with since issue.
This can be done through examination of the face of
the document (through image processing and a
database of passport security features) or by a check of
the integrity of the chip contents, or reference to a
central passport issue database, or any combination of
these.
No system should be planned without this key
requirement ,and suppliers’ solutions should be
independently tested.
Identification and/or identity verification
Clearly border control agencies should identify each e-
Visa holder with a high degree of confidence.
The biographical/biometric data may be cross-checked
against other elements in the document and against
issuer databases. See section on biometric matching.
Determination of Eligibility
Once a passenger’s nationality, identity, and risk have
been established, they should be checked against a
rule-based system which determines whether or not
that person may be admitted without examination by
a border control officer.
Passenger movement logging
Systems should record details of passengers (both
biographic and biometric) who enter and exit.
Consideration should be given to how much of the
data contained in e-VISAs is essential to border
control and national security, and whether legal
powers exist to capture, store, and use such data.
Solution Overview
Make borders more secure:
Most countries have many entry and exit points. A
new approach is needed to prevent the entry of
illegal or high-risk travelers. Biometric security
technologies can help make borders more secure.
Start at country gateways:
Biometric security solutions can be used during visa
or travel card applications at a country’s gateway, and
can then be used to authenticate and check the
background of applicants before they leave their
countries.
Multiple checkpoints:
Biometric security also needs to be implemented at
checkpoints to ensure that only the authorized
travelers are allowed through.
Linking the databases:
Sharing criminal, blacklists and terrorist watch list
database both locally and internationally.
Integrating systems:
Biometric security solutions must be integrated to other
critical systems such as immigration department’s
centralized database and other intelligence bureau
databases and applications
Zero false identification:
The use of biometrics security technology can eradicate
the false identification of travelers and their travel
documents.
International cooperation:
Fosters better international cooperation through the use
of integrated technologies and global standards.
Reliability and accuracy of screening:
Biometrics data from national and international criminal
databases and terrorist watch lists will increase the
reliability and accuracy of screening at immigration
checkpoints.
Karsof eServices Delivery
Suite
Portal Engine
Application Logic
Process
Open Architecture
eServices Development
Continuous
Enhancement
Enterprise Application
Integration Engine
Robust
O/S
Robust
O/S
Advanced Linux
Server
Multi-Threaded Coding
Multi-Layer Security
Business
Continuity
Business
Continuity
True Seamless (never
fail)
Active Architecture
Zero downtime
Advanced
Security
Advanced
Security
4096 bit Encryption
High Level Application
Security
Security Accelerator
5 tier Access Security
Transaction Level PKI
Single
Database
Single
Database
Karsof™ Database
(ORDBMS)
Unlimited Record
Storage
Dynamic Code based
Search
Architecture overview
KarsofBusinessContinuitySystem
KarsofCentralMonitoringSystem
KarsofSecuritySoftware
Karsof VPN - Internet / Intranet / Extranet
Karsof Database (Object Oriented RDBMS)
Karsof Servers (Intel Architecture)
Karsof Operating System
Presentation
Application
Integration
Database
Common Services
Operating System
Hardware
Networks
Karsof Web Application Framework
Client Servers
Karsof EAI Engine – Connection to other system
Karsof Security Extensions
Karsof E-Visa System
Security Document Layers
Unique data encrypted
in the Karsof
microprocessor chip
rear outer Layer
sheet pre-printing
Karsof secure chip
sheet pre-printing
Karsof Card Reader Security
Features
Unique data from the Karsof
chip and the unique code from
the Karsof smart chip card will
be authenticated each other for
the card and reader
Hand shake
between
reader and
card
Encrypted data is
mutually transferred
• Physical dimension - 54mm x 86mm (width/length)
• Thickness - 0.75mm +/- 0.10mm
• Material – polycarbonate, design cards
Security Document Features
• Security with 4096-bit encryption
• PKI-based access control for individual areas
• Multiple segments of data storage with individual
access control
• Intrusion detection and auto lock mechanism
• Encrypted storage with unique keys and methods
for every card
• Configurable frequencies with dynamic encryption
• Built-in frequency integrity checker to prevent
snooping
• Access restricted and control of the readers
• Dynamic protocol and encryption for data storage
and retrieval
• Secure printing controls are built in during printing
• Uses open standard communications coding
Karsof™ Compression
Karsof Fast Track Kiosk
• Foreign visitors and foreign workers personal identification
will be authenticated by matching database at the kiosk.
• This system provides a speedy clearance because it
automatically authenticates their identification. At the
same time, it also eliminates fraud and illegal immigrants
entering into the country.
• Foreign visitors and foreign workers personal identification
will be authenticated by matching database at the kiosk.
• This system provides a speedy clearance because it
automatically authenticates their identification. At the
same time, it also eliminates fraud and illegal immigrants
entering into the country.
Our Manufacturing Plant
Our competitive edge
• Karsof Systems owns a manufacturing plant that
produces its own suite of encrypted products and
security documents
• Specialized printer from biometric scanners, laser
engraving printer, passport readers, security ink,
auto stamping to mobile enforcement system,
smart cards
Karsof Biometric Technology
“One to Many” and “One to One”
identification and recognition method
• “One to Many” identification and
recognition method verifies individual
fingerprints from a large database of
fingerprints without interference or aid
by the use of any other media or
instruments.
Unique Features
• 4096-bit dynamic, multi-layer
encryption
• 16 bytes for storage of a fingerprint,
1st of its kind in the world
• Fastest identification – 0.5 seconds
• Integrated with existing sub-systems
• Fingerprint identification speed not
affected by the size of the database.Five patented technologies
• Biometric verification of electronic
transactions over the Web
• Storage of biometric Features
• Method of identifying an individual using
biometrics
• Computer network security
• Applications in biometrics
Single Platform, Single
Algorithm, Any Database
• Retina
• Iris
• Facial
• DNA
Single Algorithm for
verification and identification
• Fingerprint
Thank You
• For more information, visit our website at:
www.karsofsystems.com
• Or email us on info@karsofsystems.com
• Or give us a call on (877) 9KARSOF or (877) 952-7763
Jeff Rosen – Vice President Sales
Barney T. Villa – Senior Vice President

karsof systems e-visa

  • 1.
  • 2.
    Total e-Border Control System •Complete registration repository module for all visitors • Relationship channel management module to enhance the inter-services i.e. of all data collected at the country’s entry and exit points • Compliance module to track and monitor delinquent foreigners • High-quality authentication process • Enhanced features and functions for e- VISA processing using biometric technology systems • Efficient and effective process management for issuing passports • Underlying IT platform proven to be a more cost effective platform • Ascertains authorized identity of citizens, diplomatic staff and family • Allows government authorities to more easily and accurately monitor authorized foreign workers • Standardizes data elements and government system interoperability, providing the potential for further enhancement of identity checking by allowing confirmation of identity against information contained in biometrics • Helps national security programs achieve goals by ensuring regulations, practices and procedures are followed in order to safeguard against acts of unlawful interference • Increases confidence of the public on personal and national security • Platform to provide enhanced services to the public • Enhances security and convenience of existing and new applications using high security technology
  • 3.
    Introduction to E-visas •Uses electronic data collected for entry programs • Faster and more ergonomic methods to read data from an official travel document • Facilitates the identity management of visa holders through machine assisted identity confirmation • Facilitates travelers through check-in and border processes 1. Visas communicate data in a machine- readable format to airline authorities and border officials in transit and receiving countries. 2. The machine-readable zone provides a systematic way to gather and compare personal data electronically, particularly when the passport document is not already machine readable. 3. E-visas allow additional biometric and other data to be stored and read. 4. This offers the possibility of facilitated or self-service inspection, and the capacity to verify biometric information that is stored on or linked to the visa.
  • 4.
    e-Visa types –Advantages Chip visa sticker A sticker IC contactless chip has many advantages for visa issuers, including the capacity to carry biometric data on a document without requiring a real- time database at all points of service to verify biographic and biometric data. This is a particularly useful concept given that many travel documents are not machine readable. However, overcoming technical constraints will be key to the adoption of this method. Chip in a multi-use visa card: Multi-use documents have increased in use in national and multi-lateral settings. As biometric and card technology matures, card visas will grow in popularity because of their durability and ease of use. Unique Data Encrypted in the Karsof™ Microprocessor Chip rear outer Layer sheet pre-printing Karsof™ Secure CHIP sheet pre-printing Karsof™ Card Reader Security Features Unique Data from the Karsof™ Chip and the Unique Code from the Karsof™ Smart Chip Card will be authenticated each other for the Card and Reader Hand Shake by Reader with Card Encrypted Data is mutually transferred
  • 5.
    e-Visa System Checking DocumentAuthenticity and Validity It is essential for border agencies to check that the e- Visa presented is genuine and has not been tampered with since issue. This can be done through examination of the face of the document (through image processing and a database of passport security features) or by a check of the integrity of the chip contents, or reference to a central passport issue database, or any combination of these. No system should be planned without this key requirement ,and suppliers’ solutions should be independently tested. Identification and/or identity verification Clearly border control agencies should identify each e- Visa holder with a high degree of confidence. The biographical/biometric data may be cross-checked against other elements in the document and against issuer databases. See section on biometric matching. Determination of Eligibility Once a passenger’s nationality, identity, and risk have been established, they should be checked against a rule-based system which determines whether or not that person may be admitted without examination by a border control officer. Passenger movement logging Systems should record details of passengers (both biographic and biometric) who enter and exit. Consideration should be given to how much of the data contained in e-VISAs is essential to border control and national security, and whether legal powers exist to capture, store, and use such data.
  • 6.
    Solution Overview Make bordersmore secure: Most countries have many entry and exit points. A new approach is needed to prevent the entry of illegal or high-risk travelers. Biometric security technologies can help make borders more secure. Start at country gateways: Biometric security solutions can be used during visa or travel card applications at a country’s gateway, and can then be used to authenticate and check the background of applicants before they leave their countries. Multiple checkpoints: Biometric security also needs to be implemented at checkpoints to ensure that only the authorized travelers are allowed through. Linking the databases: Sharing criminal, blacklists and terrorist watch list database both locally and internationally. Integrating systems: Biometric security solutions must be integrated to other critical systems such as immigration department’s centralized database and other intelligence bureau databases and applications Zero false identification: The use of biometrics security technology can eradicate the false identification of travelers and their travel documents. International cooperation: Fosters better international cooperation through the use of integrated technologies and global standards. Reliability and accuracy of screening: Biometrics data from national and international criminal databases and terrorist watch lists will increase the reliability and accuracy of screening at immigration checkpoints.
  • 7.
    Karsof eServices Delivery Suite PortalEngine Application Logic Process Open Architecture eServices Development Continuous Enhancement Enterprise Application Integration Engine Robust O/S Robust O/S Advanced Linux Server Multi-Threaded Coding Multi-Layer Security Business Continuity Business Continuity True Seamless (never fail) Active Architecture Zero downtime Advanced Security Advanced Security 4096 bit Encryption High Level Application Security Security Accelerator 5 tier Access Security Transaction Level PKI Single Database Single Database Karsof™ Database (ORDBMS) Unlimited Record Storage Dynamic Code based Search
  • 8.
    Architecture overview KarsofBusinessContinuitySystem KarsofCentralMonitoringSystem KarsofSecuritySoftware Karsof VPN- Internet / Intranet / Extranet Karsof Database (Object Oriented RDBMS) Karsof Servers (Intel Architecture) Karsof Operating System Presentation Application Integration Database Common Services Operating System Hardware Networks Karsof Web Application Framework Client Servers Karsof EAI Engine – Connection to other system Karsof Security Extensions Karsof E-Visa System
  • 9.
    Security Document Layers Uniquedata encrypted in the Karsof microprocessor chip rear outer Layer sheet pre-printing Karsof secure chip sheet pre-printing Karsof Card Reader Security Features Unique data from the Karsof chip and the unique code from the Karsof smart chip card will be authenticated each other for the card and reader Hand shake between reader and card Encrypted data is mutually transferred • Physical dimension - 54mm x 86mm (width/length) • Thickness - 0.75mm +/- 0.10mm • Material – polycarbonate, design cards
  • 10.
    Security Document Features •Security with 4096-bit encryption • PKI-based access control for individual areas • Multiple segments of data storage with individual access control • Intrusion detection and auto lock mechanism • Encrypted storage with unique keys and methods for every card • Configurable frequencies with dynamic encryption • Built-in frequency integrity checker to prevent snooping • Access restricted and control of the readers • Dynamic protocol and encryption for data storage and retrieval • Secure printing controls are built in during printing • Uses open standard communications coding Karsof™ Compression
  • 11.
    Karsof Fast TrackKiosk • Foreign visitors and foreign workers personal identification will be authenticated by matching database at the kiosk. • This system provides a speedy clearance because it automatically authenticates their identification. At the same time, it also eliminates fraud and illegal immigrants entering into the country. • Foreign visitors and foreign workers personal identification will be authenticated by matching database at the kiosk. • This system provides a speedy clearance because it automatically authenticates their identification. At the same time, it also eliminates fraud and illegal immigrants entering into the country.
  • 12.
    Our Manufacturing Plant Ourcompetitive edge • Karsof Systems owns a manufacturing plant that produces its own suite of encrypted products and security documents • Specialized printer from biometric scanners, laser engraving printer, passport readers, security ink, auto stamping to mobile enforcement system, smart cards
  • 13.
    Karsof Biometric Technology “Oneto Many” and “One to One” identification and recognition method • “One to Many” identification and recognition method verifies individual fingerprints from a large database of fingerprints without interference or aid by the use of any other media or instruments. Unique Features • 4096-bit dynamic, multi-layer encryption • 16 bytes for storage of a fingerprint, 1st of its kind in the world • Fastest identification – 0.5 seconds • Integrated with existing sub-systems • Fingerprint identification speed not affected by the size of the database.Five patented technologies • Biometric verification of electronic transactions over the Web • Storage of biometric Features • Method of identifying an individual using biometrics • Computer network security • Applications in biometrics
  • 14.
    Single Platform, Single Algorithm,Any Database • Retina • Iris • Facial • DNA Single Algorithm for verification and identification • Fingerprint
  • 15.
    Thank You • Formore information, visit our website at: www.karsofsystems.com • Or email us on info@karsofsystems.com • Or give us a call on (877) 9KARSOF or (877) 952-7763 Jeff Rosen – Vice President Sales Barney T. Villa – Senior Vice President