SlideShare a Scribd company logo
Document Authentication System
India Office :
Kvaliteta Systems and Solutions
2205 Ganga Building ,
Techno Park Phase 3 ,
Trivandrum , India .
Middle East :
Kvaliteta Systems and Solutions FZC
Business Park 2, P O Box 17191,
RAK Free Trade Zone,
Ras Al Khaima , UAE.
Africa :
Kvaliteta Systems and Solutions FZC
KG 33 Utexirwa Road
P O Box 5683,
Kigali – Rwanda
Verfication Library by
:
http://www.assuretec.com/
About Kvaliteta
Kvaliteta Systems with a vision to cater the global IT market was established
in the year 2010.
Our service ranges from IT architecture, Design , Consulting , Project
Management.
Technology expertise in Business Process Management , Web Portals ,
Enterprise solutions, IT Infrastructure.
10+ yrs. experienced consultants for Enterprise Solutions
24 * 7 State of Art Facility with 50 seat Capacity.
Versatile Partner Network offering diversified IT solutions across cross domain
in multiple geographies.
 Volume : Increased volume of Air travel , Physical Verification is Slow.
 Time Bound : Always rush environment puts the Inspection as a routine.
 Illegal Stay : Immigrants , Over Stay , Criminals , Wanted Terrorists , Watch List
 Technology :
 The Tools for the manufacture of “fake” or altered ID documents have gotten much
better, more readily available and cheaper.
 Inspection of New Generation Documents like e-ID, E-Passports requires Digital
Certificates and Inspection System.
 Collaboration : Airports are Complex, Overlap of responsibilities between Airport
Security , Immigration and Airlines, information sharing required on realtime.
 People : Insider threat – Disgruntled or alienated employees, Ideological,
radicals , Criminals
Importance of Travel Document Authentication
 “Of the 19 suicide bombers involved in the Sept. 11 attacks, authorities say that six were using
false names (and false Saudi Arabian passports), three overstayed their visas, two entered on
student visas and never reported to class, and two were on an FBI watch list for terrorists but were
never tracked down.” – Various Sources.
Some Statistics
 For every fraudulent/altered visa detected nine or
more are missed! – US CBP report
 EU, USA and 53 Other Countries issue Biometric /
Electronic Passports, Which requires machine
assistance for verification. (Wiki)
 Improve Security to the Extent Reality Permits
 Improve Travel experience to the extent reality Permits
 Collaborate More
 Simplicity to the Extend reality permits
Objectives of Travel Document Authentication
Greater Security
Faster Process
Less Frustration for Employees and
travelers
Technology Ready
 Automate inspection process for Machine Readable travel documents
 Minimize the dependencies on inspectors’ document expertise
 Use technology which can work with the facial biometric as it exists on travel
documents
 Maximize the time available for “Profiling”
The Concept
 Reduce
Fatigue
Boredom
Bribery
Blackmail
Distraction
Airport Security “Points of Interest”
Vehicle Entry Gates
 Vehicle Number Plate
 Driver Credentials
 Other visitors
Building Entrances
 Authorised Entry
 Verification & Validity
 Employee ID Verification
 PAX Document Verification
 Crew Document Verification
 Passport Authentication
 Visa Authentication
 Validity of Documents
Security–Command&Control
High Level Overview – Document Authentication System
PAX
List
Global Watch Lists
Cleared Pax
Suspected ?
Document Verification
Secondary
Document
Verification
Primary
Cleared Pax
Wanted ?
Other Government Systems
 National PP System
 National ID
 Stolen Vehicle Register
 IATA – timaticweb2
 PNR Query
Command & Control
Road Side Kiosk
APNR Camera
Document Reader
1. APNR & DL Kiosk
2. Road Barriers
3. Entry Verification (ALL)
4. Document Verification (Visa &
Passport for PAX)
1
2
3
4
Process Flow – Document Authentication System
1. On Entry the Vehicle Number Plate is Captured by APNR Camera.
2. All Personal need to Self Authenticate a Valid ID Proof in Original ( Known DL/ID/Passport , Over 3500 Known Documents
Supported ) 3-5 Sec Per person.
 Fake ID or DL is rejected , Handled by Local Security.
3. Captured Information is send to Central DB – Verified against any known watch List or Stolen vehicle DB.
4. Any Stolen / Suspicious Vehicle is Isolated Before Entering Premises
1. PAX / Employee / Crew – Respective Travel / Entry Authorisation is Inspected.
2. Anyone Entering with a Fake ID is Isolated
1. PAX / Employee / Crew – respective Travel Document is Inspected.
2. Any EPAX / Employee / Crew – respective Travel Document is Inspected.
 Any Entering the Premises are inspected for their
 ntering the Premises are inspected for their
Check Point 1 – All Personal and Vehicles
Check Point 2 – All Personal Entering Premises
Check Point 3 – Passengers
No Change in
Current
Inspection
Process – More
Automation of
Current Systems
The Process – “Capture and Check Data”
• All types of machine printed data
• ICAO Machine /Visual Readable Zones
• Typed or printed anywhere
• Barcodes 1-D, 2-D
• Special characters/fonts
• Background
• All light source –white, infrared, ultraviolet
• Field validations –format, check digits, range
• Cross-field comparisons –zones, light sources
• Country/issuer specific information
• Information in Secure Memory –
Biometrics and Data
Details of the Inspected
region in the Document
The Process – “Capture and Check Data”
• AssureTec's Document Library is the largest in the industry
• AssureID recognizes Identity Documents presented all over
the world.
• Highly responsive document repository continuously learns
and grows adding new sources as they become available.
• Currently supports about 3,500 document types and growing
– the largest in the industry.
• No ID images are stored in this document library database to
keep your customer’s personally identifiable information
secure.
Passport Scanners
MFP- ID +
Cheque Scanners
ID Scanners
Kiosk – APNR +
ID reader
The Process – “Capture and Check Data”
• Photo Substitution Test:. AssureID is able to authenticate laminated photos as well as modern
digital integration techniques to account for this very frequent type of forgery.
• Microprint Test: Microprinting can be authenticated in all available light sources.
• Color Check: Correct color response of crucial areas in all available light sources.
• B900 Ink Check: Correct response under near infrared light and checks for differing
personalization or printing techniques.
• Security Paper Check: Presence of UV dull paper which is a property of the substrate used in
most security documents around the world.
• Thread Detect: UV fluorescent threads in the substrate.
• Optically Variable Inks (OVI) and Optically Variable Devices (OVD) Detect: Specific ink
characteristics or devices such as holograms and kinegrams.
• Pattern Match: The pattern match can check for many characteristics of a security document
under all available light sources that the other authentications miss.
• Geometry Test: Defined geometric relationships between features in a security document.
The Process – “Inspection Results ”
All Available Images for
immediate View
Display of region
inspected
Individual Test results
Overall Result based on
Score
Web Based Central System
Role Based Access Control
Web Based Central System – Flight Information
Web Based Central System – Add / Import PAX data
Web Based Central System – PAX Info – Post Review
Web Based Central System – PAX Info – Post Review
Web Based Central System – Employees and Crew – Detailed Info.
Document Authentication – Desktop View - Passport
Document Authentication – Desktop View – TZ Visa

More Related Content

What's hot

Access control system
Access control systemAccess control system
Access control system
Paheerathan Sabaratnam
 
User Authentication Based on Representative Users
User Authentication Based on Representative UsersUser Authentication Based on Representative Users
User Authentication Based on Representative Users
saddamhusain hadimani
 
Authentication
AuthenticationAuthentication
Authentication
Kusumalatha Karre
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
Will Adams
 
1 Tan Ibm Vienna (Ica)
1 Tan Ibm Vienna (Ica)1 Tan Ibm Vienna (Ica)
1 Tan Ibm Vienna (Ica)ronald2505
 
Biometrics in banking lara and becky
Biometrics in banking lara and beckyBiometrics in banking lara and becky
Biometrics in banking lara and beckyAdam Nickey
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
IBM Security
 
Identity as a Matter of Public Safety
Identity as a Matter of Public SafetyIdentity as a Matter of Public Safety
Identity as a Matter of Public Safety
Adam Lewis
 
Jips v07 no1_paper17
Jips v07 no1_paper17Jips v07 no1_paper17
Jips v07 no1_paper17Hai Nguyen
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
nayakslideshare
 
Inttelix Suspect Detection System
Inttelix Suspect Detection SystemInttelix Suspect Detection System
Inttelix Suspect Detection SystemInttelix
 
Why Two-Factor Authentication?
Why Two-Factor Authentication?Why Two-Factor Authentication?
Why Two-Factor Authentication?
Fortytwo
 
Document Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - CopyDocument Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - CopyRima Hajou
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
Hai Nguyen
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
PortalGuard dba PistolStar, Inc.
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsRamesh Nagappan
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
Jorge Sebastiao
 

What's hot (20)

Access control system
Access control systemAccess control system
Access control system
 
User Authentication Based on Representative Users
User Authentication Based on Representative UsersUser Authentication Based on Representative Users
User Authentication Based on Representative Users
 
FirstNet ICAM
FirstNet ICAMFirstNet ICAM
FirstNet ICAM
 
Authentication
AuthenticationAuthentication
Authentication
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
1 Tan Ibm Vienna (Ica)
1 Tan Ibm Vienna (Ica)1 Tan Ibm Vienna (Ica)
1 Tan Ibm Vienna (Ica)
 
Biometrics in banking lara and becky
Biometrics in banking lara and beckyBiometrics in banking lara and becky
Biometrics in banking lara and becky
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
Identity as a Matter of Public Safety
Identity as a Matter of Public SafetyIdentity as a Matter of Public Safety
Identity as a Matter of Public Safety
 
Jips v07 no1_paper17
Jips v07 no1_paper17Jips v07 no1_paper17
Jips v07 no1_paper17
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Inttelix Suspect Detection System
Inttelix Suspect Detection SystemInttelix Suspect Detection System
Inttelix Suspect Detection System
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Why Two-Factor Authentication?
Why Two-Factor Authentication?Why Two-Factor Authentication?
Why Two-Factor Authentication?
 
Document Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - CopyDocument Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - Copy
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 

Similar to Document authentication system powered by assuretec

karsof systems e-visa
karsof systems e-visakarsof systems e-visa
karsof systems e-visa
Colin Valencia
 
How to secure electronic passports
How to secure electronic passportsHow to secure electronic passports
How to secure electronic passports
Riscure
 
ches.ppt
ches.pptches.ppt
ches.ppt
AnzariAs1
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapHai Nguyen
 
Authentication.Next
Authentication.NextAuthentication.Next
Authentication.Next
Mark Diodati
 
Fiduciary Documents
Fiduciary DocumentsFiduciary Documents
Fiduciary Documents
Semlex Europe
 
Electronic Passport Verification System using IOT
Electronic Passport Verification System using IOTElectronic Passport Verification System using IOT
Electronic Passport Verification System using IOT
IRJET Journal
 
C True Presentation V9
C True Presentation V9C True Presentation V9
C True Presentation V9
Rudy Shainer
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
Anyck Turgeon, CFE/GRCP/CEFI/CCIP/C|CISO/CBA
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
Varun Sehgal
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
A Meeting Master Picture for a Patent
A Meeting Master Picture for a PatentA Meeting Master Picture for a Patent
A Meeting Master Picture for a PatentClarity Thinker
 
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
cscpconf
 
Security for Connected Vehicle: Successes and Challenges
Security for Connected Vehicle: Successes and ChallengesSecurity for Connected Vehicle: Successes and Challenges
Security for Connected Vehicle: Successes and Challenges
OnBoard Security, Inc. - a Qualcomm Company
 
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
ijujournal
 
Semlex Group : Introduction
Semlex Group : IntroductionSemlex Group : Introduction
Semlex Group : Introduction
Semlex Europe
 
Pengamanan kertas dokumen
Pengamanan kertas dokumenPengamanan kertas dokumen
Pengamanan kertas dokumen
Ahmadi Madi
 
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
ijujournal
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
SecureAuth
 

Similar to Document authentication system powered by assuretec (20)

karsof systems e-visa
karsof systems e-visakarsof systems e-visa
karsof systems e-visa
 
How to secure electronic passports
How to secure electronic passportsHow to secure electronic passports
How to secure electronic passports
 
ches.ppt
ches.pptches.ppt
ches.ppt
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
 
Authentication.Next
Authentication.NextAuthentication.Next
Authentication.Next
 
Fiduciary Documents
Fiduciary DocumentsFiduciary Documents
Fiduciary Documents
 
Electronic Passport Verification System using IOT
Electronic Passport Verification System using IOTElectronic Passport Verification System using IOT
Electronic Passport Verification System using IOT
 
C True Presentation V9
C True Presentation V9C True Presentation V9
C True Presentation V9
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
A Meeting Master Picture for a Patent
A Meeting Master Picture for a PatentA Meeting Master Picture for a Patent
A Meeting Master Picture for a Patent
 
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
 
Security for Connected Vehicle: Successes and Challenges
Security for Connected Vehicle: Successes and ChallengesSecurity for Connected Vehicle: Successes and Challenges
Security for Connected Vehicle: Successes and Challenges
 
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
 
Semlex Group : Introduction
Semlex Group : IntroductionSemlex Group : Introduction
Semlex Group : Introduction
 
Pengamanan kertas dokumen
Pengamanan kertas dokumenPengamanan kertas dokumen
Pengamanan kertas dokumen
 
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
AN INTERNET OF THINGS BASED VEHICLE PERMIT VERIFICATION SYSTEM WITH DIGITAL D...
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 

Recently uploaded

Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge
Digital Marketing Trends - Experts Insights on How to Gain a Competitive EdgeDigital Marketing Trends - Experts Insights on How to Gain a Competitive Edge
Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Adapt or Die - Jon Lakefish, Lakefish Group LLC
Adapt or Die - Jon Lakefish, Lakefish Group LLCAdapt or Die - Jon Lakefish, Lakefish Group LLC
AI-Powered Personalization: Principles, Use Cases, and Its Impact on CRO
AI-Powered Personalization: Principles, Use Cases, and Its Impact on CROAI-Powered Personalization: Principles, Use Cases, and Its Impact on CRO
AI-Powered Personalization: Principles, Use Cases, and Its Impact on CRO
VWO
 
10 Videos Any Business Can Make Right Now! - Shelly Nathan
10 Videos Any Business Can Make Right Now! - Shelly Nathan10 Videos Any Business Can Make Right Now! - Shelly Nathan
10 Videos Any Business Can Make Right Now! - Shelly Nathan
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Digital Marketing Trends - Experts Insights on How
Digital Marketing Trends - Experts Insights on HowDigital Marketing Trends - Experts Insights on How
How to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
How to use Short Form Video To Grow Your Brand and Business - Keenya KellyHow to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
How to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
De-risk Your Digital Evolution - Hannah Grap
De-risk Your Digital Evolution - Hannah GrapDe-risk Your Digital Evolution - Hannah Grap
How to Run Landing Page Tests On and Off Paid Social Platforms
How to Run Landing Page Tests On and Off Paid Social PlatformsHow to Run Landing Page Tests On and Off Paid Social Platforms
How to Run Landing Page Tests On and Off Paid Social Platforms
VWO
 
May 2024 - VBOUT Partners Meeting Group Session
May 2024 - VBOUT Partners Meeting Group SessionMay 2024 - VBOUT Partners Meeting Group Session
May 2024 - VBOUT Partners Meeting Group Session
Vbout.com
 
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel LeminTurn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Is AI-Generated Content the Future of Content Creation?
Is AI-Generated Content the Future of Content Creation?Is AI-Generated Content the Future of Content Creation?
Is AI-Generated Content the Future of Content Creation?
Cut-the-SaaS
 
Playlist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music UPlaylist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music U
SemajahParker
 
Top 3 Ways to Align Sales and Marketing Teams for Rapid Growth
Top 3 Ways to Align Sales and Marketing Teams for Rapid GrowthTop 3 Ways to Align Sales and Marketing Teams for Rapid Growth
Top 3 Ways to Align Sales and Marketing Teams for Rapid Growth
Demandbase
 
Core Web Vitals SEO Workshop - improve your performance [pdf]
Core Web Vitals SEO Workshop - improve your performance [pdf]Core Web Vitals SEO Workshop - improve your performance [pdf]
Core Web Vitals SEO Workshop - improve your performance [pdf]
Peter Mead
 
Winning local SEO in the Age of AI - Dennis Yu
Winning local SEO in the Age of AI - Dennis YuWinning local SEO in the Age of AI - Dennis Yu
The New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
The New Era Of SEO - How AI Has Changed SEO Forever - Danny LeibrandtThe New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
The New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Your Path to Profits - The Game-Changing Power of a Marketing - Daniel Bussius
Your Path to Profits - The Game-Changing Power of a Marketing - Daniel BussiusYour Path to Profits - The Game-Changing Power of a Marketing - Daniel Bussius
Your Path to Profits - The Game-Changing Power of a Marketing - Daniel Bussius
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
The New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
The New Era Of SEO - How AI Has Changed SEO Forever - Danny LeibrandtThe New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
The New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Consumer Journey Mapping & Personalization Master Class - Sabrina Killgo
Consumer Journey Mapping & Personalization Master Class - Sabrina KillgoConsumer Journey Mapping & Personalization Master Class - Sabrina Killgo
Consumer Journey Mapping & Personalization Master Class - Sabrina Killgo
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
BLOOM_May2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_May2024. Balmer Lawrie Online Monthly BulletinBLOOM_May2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_May2024. Balmer Lawrie Online Monthly Bulletin
BalmerLawrie
 

Recently uploaded (20)

Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge
Digital Marketing Trends - Experts Insights on How to Gain a Competitive EdgeDigital Marketing Trends - Experts Insights on How to Gain a Competitive Edge
Digital Marketing Trends - Experts Insights on How to Gain a Competitive Edge
 
Adapt or Die - Jon Lakefish, Lakefish Group LLC
Adapt or Die - Jon Lakefish, Lakefish Group LLCAdapt or Die - Jon Lakefish, Lakefish Group LLC
Adapt or Die - Jon Lakefish, Lakefish Group LLC
 
AI-Powered Personalization: Principles, Use Cases, and Its Impact on CRO
AI-Powered Personalization: Principles, Use Cases, and Its Impact on CROAI-Powered Personalization: Principles, Use Cases, and Its Impact on CRO
AI-Powered Personalization: Principles, Use Cases, and Its Impact on CRO
 
10 Videos Any Business Can Make Right Now! - Shelly Nathan
10 Videos Any Business Can Make Right Now! - Shelly Nathan10 Videos Any Business Can Make Right Now! - Shelly Nathan
10 Videos Any Business Can Make Right Now! - Shelly Nathan
 
Digital Marketing Trends - Experts Insights on How
Digital Marketing Trends - Experts Insights on HowDigital Marketing Trends - Experts Insights on How
Digital Marketing Trends - Experts Insights on How
 
How to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
How to use Short Form Video To Grow Your Brand and Business - Keenya KellyHow to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
How to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
 
De-risk Your Digital Evolution - Hannah Grap
De-risk Your Digital Evolution - Hannah GrapDe-risk Your Digital Evolution - Hannah Grap
De-risk Your Digital Evolution - Hannah Grap
 
How to Run Landing Page Tests On and Off Paid Social Platforms
How to Run Landing Page Tests On and Off Paid Social PlatformsHow to Run Landing Page Tests On and Off Paid Social Platforms
How to Run Landing Page Tests On and Off Paid Social Platforms
 
May 2024 - VBOUT Partners Meeting Group Session
May 2024 - VBOUT Partners Meeting Group SessionMay 2024 - VBOUT Partners Meeting Group Session
May 2024 - VBOUT Partners Meeting Group Session
 
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel LeminTurn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
 
Is AI-Generated Content the Future of Content Creation?
Is AI-Generated Content the Future of Content Creation?Is AI-Generated Content the Future of Content Creation?
Is AI-Generated Content the Future of Content Creation?
 
Playlist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music UPlaylist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music U
 
Top 3 Ways to Align Sales and Marketing Teams for Rapid Growth
Top 3 Ways to Align Sales and Marketing Teams for Rapid GrowthTop 3 Ways to Align Sales and Marketing Teams for Rapid Growth
Top 3 Ways to Align Sales and Marketing Teams for Rapid Growth
 
Core Web Vitals SEO Workshop - improve your performance [pdf]
Core Web Vitals SEO Workshop - improve your performance [pdf]Core Web Vitals SEO Workshop - improve your performance [pdf]
Core Web Vitals SEO Workshop - improve your performance [pdf]
 
Winning local SEO in the Age of AI - Dennis Yu
Winning local SEO in the Age of AI - Dennis YuWinning local SEO in the Age of AI - Dennis Yu
Winning local SEO in the Age of AI - Dennis Yu
 
The New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
The New Era Of SEO - How AI Has Changed SEO Forever - Danny LeibrandtThe New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
The New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
 
Your Path to Profits - The Game-Changing Power of a Marketing - Daniel Bussius
Your Path to Profits - The Game-Changing Power of a Marketing - Daniel BussiusYour Path to Profits - The Game-Changing Power of a Marketing - Daniel Bussius
Your Path to Profits - The Game-Changing Power of a Marketing - Daniel Bussius
 
The New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
The New Era Of SEO - How AI Has Changed SEO Forever - Danny LeibrandtThe New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
The New Era Of SEO - How AI Has Changed SEO Forever - Danny Leibrandt
 
Consumer Journey Mapping & Personalization Master Class - Sabrina Killgo
Consumer Journey Mapping & Personalization Master Class - Sabrina KillgoConsumer Journey Mapping & Personalization Master Class - Sabrina Killgo
Consumer Journey Mapping & Personalization Master Class - Sabrina Killgo
 
BLOOM_May2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_May2024. Balmer Lawrie Online Monthly BulletinBLOOM_May2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_May2024. Balmer Lawrie Online Monthly Bulletin
 

Document authentication system powered by assuretec

  • 1. Document Authentication System India Office : Kvaliteta Systems and Solutions 2205 Ganga Building , Techno Park Phase 3 , Trivandrum , India . Middle East : Kvaliteta Systems and Solutions FZC Business Park 2, P O Box 17191, RAK Free Trade Zone, Ras Al Khaima , UAE. Africa : Kvaliteta Systems and Solutions FZC KG 33 Utexirwa Road P O Box 5683, Kigali – Rwanda Verfication Library by : http://www.assuretec.com/
  • 2. About Kvaliteta Kvaliteta Systems with a vision to cater the global IT market was established in the year 2010. Our service ranges from IT architecture, Design , Consulting , Project Management. Technology expertise in Business Process Management , Web Portals , Enterprise solutions, IT Infrastructure. 10+ yrs. experienced consultants for Enterprise Solutions 24 * 7 State of Art Facility with 50 seat Capacity. Versatile Partner Network offering diversified IT solutions across cross domain in multiple geographies.
  • 3.  Volume : Increased volume of Air travel , Physical Verification is Slow.  Time Bound : Always rush environment puts the Inspection as a routine.  Illegal Stay : Immigrants , Over Stay , Criminals , Wanted Terrorists , Watch List  Technology :  The Tools for the manufacture of “fake” or altered ID documents have gotten much better, more readily available and cheaper.  Inspection of New Generation Documents like e-ID, E-Passports requires Digital Certificates and Inspection System.  Collaboration : Airports are Complex, Overlap of responsibilities between Airport Security , Immigration and Airlines, information sharing required on realtime.  People : Insider threat – Disgruntled or alienated employees, Ideological, radicals , Criminals Importance of Travel Document Authentication
  • 4.  “Of the 19 suicide bombers involved in the Sept. 11 attacks, authorities say that six were using false names (and false Saudi Arabian passports), three overstayed their visas, two entered on student visas and never reported to class, and two were on an FBI watch list for terrorists but were never tracked down.” – Various Sources. Some Statistics  For every fraudulent/altered visa detected nine or more are missed! – US CBP report  EU, USA and 53 Other Countries issue Biometric / Electronic Passports, Which requires machine assistance for verification. (Wiki)
  • 5.  Improve Security to the Extent Reality Permits  Improve Travel experience to the extent reality Permits  Collaborate More  Simplicity to the Extend reality permits Objectives of Travel Document Authentication Greater Security Faster Process Less Frustration for Employees and travelers Technology Ready
  • 6.  Automate inspection process for Machine Readable travel documents  Minimize the dependencies on inspectors’ document expertise  Use technology which can work with the facial biometric as it exists on travel documents  Maximize the time available for “Profiling” The Concept  Reduce Fatigue Boredom Bribery Blackmail Distraction
  • 7. Airport Security “Points of Interest” Vehicle Entry Gates  Vehicle Number Plate  Driver Credentials  Other visitors Building Entrances  Authorised Entry  Verification & Validity  Employee ID Verification  PAX Document Verification  Crew Document Verification  Passport Authentication  Visa Authentication  Validity of Documents Security–Command&Control
  • 8. High Level Overview – Document Authentication System PAX List Global Watch Lists Cleared Pax Suspected ? Document Verification Secondary Document Verification Primary Cleared Pax Wanted ? Other Government Systems  National PP System  National ID  Stolen Vehicle Register  IATA – timaticweb2  PNR Query Command & Control Road Side Kiosk APNR Camera Document Reader 1. APNR & DL Kiosk 2. Road Barriers 3. Entry Verification (ALL) 4. Document Verification (Visa & Passport for PAX) 1 2 3 4
  • 9. Process Flow – Document Authentication System 1. On Entry the Vehicle Number Plate is Captured by APNR Camera. 2. All Personal need to Self Authenticate a Valid ID Proof in Original ( Known DL/ID/Passport , Over 3500 Known Documents Supported ) 3-5 Sec Per person.  Fake ID or DL is rejected , Handled by Local Security. 3. Captured Information is send to Central DB – Verified against any known watch List or Stolen vehicle DB. 4. Any Stolen / Suspicious Vehicle is Isolated Before Entering Premises 1. PAX / Employee / Crew – Respective Travel / Entry Authorisation is Inspected. 2. Anyone Entering with a Fake ID is Isolated 1. PAX / Employee / Crew – respective Travel Document is Inspected. 2. Any EPAX / Employee / Crew – respective Travel Document is Inspected.  Any Entering the Premises are inspected for their  ntering the Premises are inspected for their Check Point 1 – All Personal and Vehicles Check Point 2 – All Personal Entering Premises Check Point 3 – Passengers No Change in Current Inspection Process – More Automation of Current Systems
  • 10. The Process – “Capture and Check Data” • All types of machine printed data • ICAO Machine /Visual Readable Zones • Typed or printed anywhere • Barcodes 1-D, 2-D • Special characters/fonts • Background • All light source –white, infrared, ultraviolet • Field validations –format, check digits, range • Cross-field comparisons –zones, light sources • Country/issuer specific information • Information in Secure Memory – Biometrics and Data Details of the Inspected region in the Document
  • 11. The Process – “Capture and Check Data” • AssureTec's Document Library is the largest in the industry • AssureID recognizes Identity Documents presented all over the world. • Highly responsive document repository continuously learns and grows adding new sources as they become available. • Currently supports about 3,500 document types and growing – the largest in the industry. • No ID images are stored in this document library database to keep your customer’s personally identifiable information secure. Passport Scanners MFP- ID + Cheque Scanners ID Scanners Kiosk – APNR + ID reader
  • 12. The Process – “Capture and Check Data” • Photo Substitution Test:. AssureID is able to authenticate laminated photos as well as modern digital integration techniques to account for this very frequent type of forgery. • Microprint Test: Microprinting can be authenticated in all available light sources. • Color Check: Correct color response of crucial areas in all available light sources. • B900 Ink Check: Correct response under near infrared light and checks for differing personalization or printing techniques. • Security Paper Check: Presence of UV dull paper which is a property of the substrate used in most security documents around the world. • Thread Detect: UV fluorescent threads in the substrate. • Optically Variable Inks (OVI) and Optically Variable Devices (OVD) Detect: Specific ink characteristics or devices such as holograms and kinegrams. • Pattern Match: The pattern match can check for many characteristics of a security document under all available light sources that the other authentications miss. • Geometry Test: Defined geometric relationships between features in a security document.
  • 13. The Process – “Inspection Results ” All Available Images for immediate View Display of region inspected Individual Test results Overall Result based on Score
  • 14. Web Based Central System Role Based Access Control
  • 15. Web Based Central System – Flight Information
  • 16. Web Based Central System – Add / Import PAX data
  • 17. Web Based Central System – PAX Info – Post Review
  • 18. Web Based Central System – PAX Info – Post Review
  • 19. Web Based Central System – Employees and Crew – Detailed Info.
  • 20. Document Authentication – Desktop View - Passport
  • 21. Document Authentication – Desktop View – TZ Visa