SlideShare a Scribd company logo
DocumentVerification through
C-One E-Id
Prepared by: Rima HAJOU
Supervised by: Dr. Lina OUEIDAT
Date: 13 July 2016
Hosting Company: Inkript R&D Department
(March – June 2016)
Content
 Objective and Project Definition
 Device Used: C-One E-ID
 Biometrics
◦ Fingerprint
 Machine Readable Passport
◦ Machine Readable Zone (MRZ)
◦ Logical Data Structure
◦ Communication with IC/Chip
◦ E-Passport Security features
◦ Smart Card Security features
 Project Development
◦ MRZ Project
◦ Smart Card and E-passport projects:
◦ Fingerprint project
 Document verification application
 Conclusion and Recommendations
2
Objective and Project Definition
 Current users are able to do many different tasks
on the go using just a small pocket device.
 Implement eGovernment mechanisms for
documents.
How?
 Using handheld device, we will be able to identify
a person based on their personal ID or E-
Passport.
3
A mobile android application that read an ID
document, extract the fingerprint data and
compare it to the scanned fingerprint using
the readers integrated in C-One E-ID device.
Content
 Objective and Project Definition
 Device Used: C-One E-ID
 Biometrics
◦ Fingerprint
 Machine Readable Passport
◦ Machine Readable Zone (MRZ)
◦ Logical Data Structure
◦ Communication with IC/Chip
◦ E-Passport Security features
◦ Smart Card Security features
 Project Development
◦ MRZ Project
◦ Smart Card and E-passport projects:
◦ Fingerprint project
 Document verification application
 Conclusion and Recommendations
4
C-One E-ID
 Why a handheld
device?
 Why C-One E-ID ?
 Fingerprint sensor
 Contact and Contact less card-readers (RFID
Technology)
 Barcode Reader
 Latest technologies (4G,Wi-Fi, GPS..)
 Android 4.2.2
5
Content
 Objective and Project Definition
 Device Used: C-One E-ID
 Biometrics
◦ Fingerprint
 Machine Readable Passport
◦ Machine Readable Zone (MRZ)
◦ Logical Data Structure
◦ Communication with IC/Chip
◦ E-Passport Security features
◦ Smart Card Security features
 Project Development
◦ MRZ Project
◦ Smart Card and E-passport projects:
◦ Fingerprint project
 Document verification application
 Conclusion and Recommendations
6
Biometrics
 Distinctive, measurable characteristics
used to label and describe individuals
 Face recognition, iris,
fingerprint, DNA,
palm print..
7
Fingerprint
 Why fingerprint?
 Uniqueness, consistency over time.
 Used for identification by automated
systems
 Minutias
8
Content
 Objective and Project Definition
 Device Used: C-One E-ID
 Biometrics
◦ Fingerprint
 Machine Readable Passport
◦ Machine Readable Zone (MRZ)
◦ Logical Data Structure
◦ Communication with IC/Chip
◦ E-Passport Security features
◦ Smart Card Security features
 Project Development
◦ MRZ Project
◦ Smart Card and E-passport projects:
◦ Fingerprint project
 Document verification application
 Conclusion and Recommendations
9
Machine Readable Passport (MRP)
 Travel document specified by International
Civil Aviation Organization
 E-passport and Smart cards developed by
Inkript are types of MRP.
 Lebanon was forced to apply ICAO standards
on civil documents to facilitate citizen travelling
10
Machine Readable Zone
 Mandatory zone located on the MRP’s
data page
 Used to store information used for the
BAC mechanism to read
files of the MRP :
◦ Passport Number
◦ Date of Birth
◦ Expiry date
11
Logical Data Structure
 For both IC integrated in E-passport and
in Residency permits
 Structured data as files called Data
Groups.
◦ DG1 : Personal Info
◦ DG2 : Owner Photo
◦ DG3 : Fingerprint (optional)
 Elementary files required to validate
integrity ( EFcom ; EFSoD )
12
Logical Data Structure (2)
13
Communication with the IC/Chip
 IC or Chip will be connected to a Card
Acceptance Device (CAD)
 Chip speaks to the outside world using its
own data packages:APDU
 APDU contains Command or a
Response message
 Master- Slave model.
 The Chip always waits for a command
APDU from the terminal
14
E-passport Security Features
while reading the chip
 Gain Access to the contactless
 Authentication of the data
 Authentication of the IC
 Additional access control mechanism
15
E-passport Security Features (2)
Gain Access to the contactless
 To prevent eavesdropping
 Chip Access Control mechanism :
◦ Only authorized access.
◦ Using cryptographic protocol
 Info are needed from the MRZ to derive the keys.
 Two Chip Access Control mechanism:
◦ BAC: Basic Access control
◦ PACE: Password authenticated connection
establishment
16
Read the
MRZ_Information
visually from MRZ
SHA-1 Hash of
MRZ_Information
Take the most
significant 16 bytes
of SHA-1 Hash as
Key Seed
Derive KEnc and
KMAc
Setup a secure
connection with
the IC
Granted access to
non sensitive data
(Personal info and
Photo)
17
E-passport Security Features (3)
Gain Access to the contactless (2) – BAC Mechanism
 Content of Data security object (SOD)
and LDS are authentic.
 Execute the hash of the LDS and compare
it to the existing hash in SOD file.
 It’s a passive authentication.
18
E-passport Security Features (4)
Authentication of Data
 Against Chip substitution
 Active Authentication mechanism
 Based on challenge-response protocol
19
E-passport Security Features (5)
Authentication of the IC/Chip
 Access fingerprint (and IRIS) file should be
more restricted.
 Extended Access Control mechanism is
used.
◦ EAC = Chip Authentication + Terminal Authentication
 Terminal authentication: two move
challenge response protocol
20
E-passport Security Features (6)
Additional control access mechanism
Used Smart Card Security Features
specifically in this project
 Same structure of internal chip.
◦ LDS
◦ Apdu commands
 Smart Card: another confidential info instead of the
MRZ_Information to perform BAC mechanism
21
E-passport Smart Card
Standard ICAO ICAO
Extract BAC key- and thus
accessing DG1 and DG2 -
using
MRZ Another Confidential
info
Security Features to access
DG1,DG2
ICAO Standard ICAO Standard
Security Feature to access
DG3 (Fingerprints)
EAC – Mentioned and
explained by ICAO
No security
Content
 Objective and Project Definition
 Device Used: C-One E-ID
 Biometrics
◦ Fingerprint
 Machine Readable Passport
◦ Machine Readable Zone (MRZ)
◦ Logical Data Structure
◦ Communication with IC/Chip
◦ E-Passport Security features
◦ Smart Card Security features
 Project Development
◦ MRZ Project
◦ Smart Card and E-passport projects:
◦ Fingerprint project
 Document verification application
 Conclusion and Recommendations
22
Project Development
Read the MRZ
• OCR Tesseract
• Regula Document Reader
Read E-Passport
or Smart Card
Scan fingerprint
Compare the
two fingerprints
23
Project Development (2)
MRZ Project
 OCRTesseract Project:
◦ Open source project /Use online trained data.
 Regula Document Reader:
◦ Proprietary project for Regula Forensic.
24
Unsuccessful trials which leads to:
Enter manually the MRZ_information
needed for BAC mechanism
Project Development (3)
Read the
MRZ
• OCRTesseract
• Regula Document Reader
• Enter It Manually
Read E-
Passport or
Smart Card
• JMRTD Solution
• Coppernic Solution
• The integration of two solutions
25
Project Development (4)
Smart Card and E-passport projects
 Java Machine ReadableTravel Document
 Most popular to read
E-passport.
◦ Android supported :AJMRTD
◦ Uses NFC to read E-passport.
◦ Read DG1 and DG2.
26
Incompatibility between NFC and
RFID technology
Project Development (5)
Smart Card and E-passport projects
 Coppernic solution:
◦ Able to read DG1 and DG2 file from the E-
passport.
◦ Complexity of integrating the EAC
mechanism to read DG3. (Fingerprint DG)
◦ Unsuccessful trial to read Fingerprint from E-
passport
27
We managed to develop a similar
application that reads only Smart Card
Coppernic Sample E-Passport Smart Card
Power Management Power up the RFId Power Up the Smart Card Reader
Keys for BAC mechanism MRZ_Information Another Confidential Info
Reading DG1 (Personal
Information
Extracting these info using
Coppernic methodology
Implementing JMRTD to extract the response
Reading DG2(Display
Picture)
Implementing JMRTD to parse the response
Reading DG3 Not supported yet due
the need of additional
security mechanisms
I managed to read DG3 since it does not
require any additional security and I
extracted the fingerprint template using
JMRTD
28
Project Development (6)
Smart Card and E-passport projects
Project Development (7)
Read the
MRZ
• OCR Tesseract
• Regula Document Reader
• Enter It Manually
Read E-
Passport or
Smart Card
• JMRTD Solution
• Coppernic Solution
• The integration of 2
Scan
fingerprint
• Neurotechnology
Compare
the two
fingerprints
• Neurotechnology
29
Fingerprint Sample
 Neurotech Solution
 Features:
◦ Reading fingerprint
◦ Extracting its minutias
◦ One to One verification
 One finger to another finger (Ex:Thumb toThumb)
 One finger to the 2 hands (Ex: Index to a person’s finger)
◦ One to Many verification
 One finger to a database of fingers (Ex:Thumb to many
Thumbs)
30
Content
 Objective and Project Definition
 Device Used: C-One E-ID
 Biometrics
◦ Fingerprint
 Machine Readable Passport
◦ Machine Readable Zone (MRZ)
◦ Logical Data Structure
◦ Communication with IC/Chip
◦ E-Passport Security features
◦ Smart Card Security features
 Project Development
◦ MRZ Project
◦ Smart Card and E-passport projects:
◦ Fingerprint project
 Document verification application
 Conclusion and Recommendations
31
Document verification application
32
Real Situation
33
Real Situation (2)
34
Real Situation (3)
35
Real Situation (4)
36
Successful implementation of the
project
Content
 Objective and Project Definition
 Device Used: C-One E-ID
 Biometrics
◦ Fingerprint
 Machine Readable Passport
◦ Machine Readable Zone (MRZ)
◦ Logical Data Structure
◦ Communication with IC/Chip
◦ E-Passport Security features
◦ Smart Card Security features
 Project Development
◦ MRZ Project
◦ Smart Card and E-passport projects:
◦ Fingerprint project
 Document verification application
 Conclusion and Recommendations
37
Conclusion
 Importance of such a device with these
advanced capabilities lies in the increased
need to control borders and critical areas
in such a country.
 Enhance catching terrorists and forgers
over borders controls.
38
Recommendations
 More research to read E-passports using
C-One E-ID
 Reading MRZ visually and using the
camera by a well trained data.
 Compare the fingerprint of any person
remotely with the database available on
the server
 One level of security can be added to
prevent non authorized agents to use the
device.
39
THANKYOU
40

More Related Content

What's hot

Multi-Task Learning in Deep Neural Networks.pptx
Multi-Task Learning in Deep Neural Networks.pptxMulti-Task Learning in Deep Neural Networks.pptx
Multi-Task Learning in Deep Neural Networks.pptx
ibrahimalshareef3
 
Webofthing_WOT_vs_IOT.pptx
Webofthing_WOT_vs_IOT.pptxWebofthing_WOT_vs_IOT.pptx
Webofthing_WOT_vs_IOT.pptx
jainam bhavsar
 
Object tracking presentation
Object tracking  presentationObject tracking  presentation
Object tracking presentation
MrsShwetaBanait1
 
40G 100G gigabit ethernet technology overview
40G 100G gigabit ethernet technology overview40G 100G gigabit ethernet technology overview
40G 100G gigabit ethernet technology overview
MapYourTech
 
Sky x technology
Sky x technologySky x technology
Sky x technology
kedar1993
 
Image to image translation with Pix2Pix GAN
Image to image translation with Pix2Pix GANImage to image translation with Pix2Pix GAN
Image to image translation with Pix2Pix GAN
S.Shayan Daneshvar
 
CNN Quantization
CNN QuantizationCNN Quantization
CNN Quantization
Emanuele Ghelfi
 
Transfer Learning and Fine-tuning Deep Neural Networks
 Transfer Learning and Fine-tuning Deep Neural Networks Transfer Learning and Fine-tuning Deep Neural Networks
Transfer Learning and Fine-tuning Deep Neural Networks
PyData
 
Project tango
Project tangoProject tango
Project tango
sabi_123
 
3d internet ppt
3d internet ppt3d internet ppt
3d internet ppt
palsantosh
 
Expert System With Python -1
Expert System With Python -1Expert System With Python -1
Expert System With Python -1
Ahmad Hussein
 
Module 1: ConfD Technical Introduction
Module 1: ConfD Technical IntroductionModule 1: ConfD Technical Introduction
Module 1: ConfD Technical Introduction
Tail-f Systems
 
“Event-Based Neuromorphic Perception and Computation: The Future of Sensing a...
“Event-Based Neuromorphic Perception and Computation: The Future of Sensing a...“Event-Based Neuromorphic Perception and Computation: The Future of Sensing a...
“Event-Based Neuromorphic Perception and Computation: The Future of Sensing a...
Edge AI and Vision Alliance
 
Multimodal Deep Learning
Multimodal Deep LearningMultimodal Deep Learning
Multimodal Deep Learning
Universitat Politècnica de Catalunya
 
Model based rl
Model based rlModel based rl
Model based rl
Seolhokim
 
Masked Autoencoders Are Scalable Vision Learners.pptx
Masked Autoencoders Are Scalable Vision Learners.pptxMasked Autoencoders Are Scalable Vision Learners.pptx
Masked Autoencoders Are Scalable Vision Learners.pptx
Sangmin Woo
 
Big Data Helsinki v 3 | "Federated Learning and Privacy-preserving AI" - Oguz...
Big Data Helsinki v 3 | "Federated Learning and Privacy-preserving AI" - Oguz...Big Data Helsinki v 3 | "Federated Learning and Privacy-preserving AI" - Oguz...
Big Data Helsinki v 3 | "Federated Learning and Privacy-preserving AI" - Oguz...
Dataconomy Media
 
Human pose estimation with deep learning
Human pose estimation with deep learningHuman pose estimation with deep learning
Human pose estimation with deep learning
engiyad95
 
Human Pose Estimation by Deep Learning
Human Pose Estimation by Deep LearningHuman Pose Estimation by Deep Learning
Human Pose Estimation by Deep Learning
Wei Yang
 
Federated learning in brief
Federated learning in briefFederated learning in brief
Federated learning in brief
Shashi Perera
 

What's hot (20)

Multi-Task Learning in Deep Neural Networks.pptx
Multi-Task Learning in Deep Neural Networks.pptxMulti-Task Learning in Deep Neural Networks.pptx
Multi-Task Learning in Deep Neural Networks.pptx
 
Webofthing_WOT_vs_IOT.pptx
Webofthing_WOT_vs_IOT.pptxWebofthing_WOT_vs_IOT.pptx
Webofthing_WOT_vs_IOT.pptx
 
Object tracking presentation
Object tracking  presentationObject tracking  presentation
Object tracking presentation
 
40G 100G gigabit ethernet technology overview
40G 100G gigabit ethernet technology overview40G 100G gigabit ethernet technology overview
40G 100G gigabit ethernet technology overview
 
Sky x technology
Sky x technologySky x technology
Sky x technology
 
Image to image translation with Pix2Pix GAN
Image to image translation with Pix2Pix GANImage to image translation with Pix2Pix GAN
Image to image translation with Pix2Pix GAN
 
CNN Quantization
CNN QuantizationCNN Quantization
CNN Quantization
 
Transfer Learning and Fine-tuning Deep Neural Networks
 Transfer Learning and Fine-tuning Deep Neural Networks Transfer Learning and Fine-tuning Deep Neural Networks
Transfer Learning and Fine-tuning Deep Neural Networks
 
Project tango
Project tangoProject tango
Project tango
 
3d internet ppt
3d internet ppt3d internet ppt
3d internet ppt
 
Expert System With Python -1
Expert System With Python -1Expert System With Python -1
Expert System With Python -1
 
Module 1: ConfD Technical Introduction
Module 1: ConfD Technical IntroductionModule 1: ConfD Technical Introduction
Module 1: ConfD Technical Introduction
 
“Event-Based Neuromorphic Perception and Computation: The Future of Sensing a...
“Event-Based Neuromorphic Perception and Computation: The Future of Sensing a...“Event-Based Neuromorphic Perception and Computation: The Future of Sensing a...
“Event-Based Neuromorphic Perception and Computation: The Future of Sensing a...
 
Multimodal Deep Learning
Multimodal Deep LearningMultimodal Deep Learning
Multimodal Deep Learning
 
Model based rl
Model based rlModel based rl
Model based rl
 
Masked Autoencoders Are Scalable Vision Learners.pptx
Masked Autoencoders Are Scalable Vision Learners.pptxMasked Autoencoders Are Scalable Vision Learners.pptx
Masked Autoencoders Are Scalable Vision Learners.pptx
 
Big Data Helsinki v 3 | "Federated Learning and Privacy-preserving AI" - Oguz...
Big Data Helsinki v 3 | "Federated Learning and Privacy-preserving AI" - Oguz...Big Data Helsinki v 3 | "Federated Learning and Privacy-preserving AI" - Oguz...
Big Data Helsinki v 3 | "Federated Learning and Privacy-preserving AI" - Oguz...
 
Human pose estimation with deep learning
Human pose estimation with deep learningHuman pose estimation with deep learning
Human pose estimation with deep learning
 
Human Pose Estimation by Deep Learning
Human Pose Estimation by Deep LearningHuman Pose Estimation by Deep Learning
Human Pose Estimation by Deep Learning
 
Federated learning in brief
Federated learning in briefFederated learning in brief
Federated learning in brief
 

Similar to Document Verification through C-One E-Id - Copy

IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
IRJET Journal
 
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעפתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
Zeev Shetach
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
IJRTEMJOURNAL
 
3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)
Tejas Lalwani
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
SHASHANK WANKHADE
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
IRJET Journal
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
Paras Garg
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
Narudom Roongsiriwong, CISSP
 
Student tracking _managemenet_web_based_system
Student tracking _managemenet_web_based_systemStudent tracking _managemenet_web_based_system
Student tracking _managemenet_web_based_system
9491812871
 
Design and Analysis of Ignition based on RFID by Arduino Nano Compiler
Design and Analysis of Ignition based on RFID by Arduino Nano CompilerDesign and Analysis of Ignition based on RFID by Arduino Nano Compiler
Design and Analysis of Ignition based on RFID by Arduino Nano Compiler
IRJET Journal
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
SanjayKumarYadav58
 
Blue Eyes Technology RAMA.pptx
Blue Eyes Technology RAMA.pptxBlue Eyes Technology RAMA.pptx
Blue Eyes Technology RAMA.pptx
PrasannaKumarpanda2
 
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET Journal
 
Android Malware Detection Literature Review
Android Malware Detection Literature ReviewAndroid Malware Detection Literature Review
Android Malware Detection Literature Review
Ahmed Sabbah
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
 
Card reader
Card readerCard reader
Card reader
Manoj Kumar
 
Smart Verification of Passenger using AI
Smart Verification of Passenger using AISmart Verification of Passenger using AI
Smart Verification of Passenger using AI
ijtsrd
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
Martijn Oostdijk
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
IRJET Journal
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codes
Md. Hasibur Rashid
 

Similar to Document Verification through C-One E-Id - Copy (20)

IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעפתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)3.2.qr code based information access system in shopping mall (1)
3.2.qr code based information access system in shopping mall (1)
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
Student tracking _managemenet_web_based_system
Student tracking _managemenet_web_based_systemStudent tracking _managemenet_web_based_system
Student tracking _managemenet_web_based_system
 
Design and Analysis of Ignition based on RFID by Arduino Nano Compiler
Design and Analysis of Ignition based on RFID by Arduino Nano CompilerDesign and Analysis of Ignition based on RFID by Arduino Nano Compiler
Design and Analysis of Ignition based on RFID by Arduino Nano Compiler
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
 
Blue Eyes Technology RAMA.pptx
Blue Eyes Technology RAMA.pptxBlue Eyes Technology RAMA.pptx
Blue Eyes Technology RAMA.pptx
 
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
 
Android Malware Detection Literature Review
Android Malware Detection Literature ReviewAndroid Malware Detection Literature Review
Android Malware Detection Literature Review
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
Card reader
Card readerCard reader
Card reader
 
Smart Verification of Passenger using AI
Smart Verification of Passenger using AISmart Verification of Passenger using AI
Smart Verification of Passenger using AI
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codes
 

Document Verification through C-One E-Id - Copy

  • 1. DocumentVerification through C-One E-Id Prepared by: Rima HAJOU Supervised by: Dr. Lina OUEIDAT Date: 13 July 2016 Hosting Company: Inkript R&D Department (March – June 2016)
  • 2. Content  Objective and Project Definition  Device Used: C-One E-ID  Biometrics ◦ Fingerprint  Machine Readable Passport ◦ Machine Readable Zone (MRZ) ◦ Logical Data Structure ◦ Communication with IC/Chip ◦ E-Passport Security features ◦ Smart Card Security features  Project Development ◦ MRZ Project ◦ Smart Card and E-passport projects: ◦ Fingerprint project  Document verification application  Conclusion and Recommendations 2
  • 3. Objective and Project Definition  Current users are able to do many different tasks on the go using just a small pocket device.  Implement eGovernment mechanisms for documents. How?  Using handheld device, we will be able to identify a person based on their personal ID or E- Passport. 3 A mobile android application that read an ID document, extract the fingerprint data and compare it to the scanned fingerprint using the readers integrated in C-One E-ID device.
  • 4. Content  Objective and Project Definition  Device Used: C-One E-ID  Biometrics ◦ Fingerprint  Machine Readable Passport ◦ Machine Readable Zone (MRZ) ◦ Logical Data Structure ◦ Communication with IC/Chip ◦ E-Passport Security features ◦ Smart Card Security features  Project Development ◦ MRZ Project ◦ Smart Card and E-passport projects: ◦ Fingerprint project  Document verification application  Conclusion and Recommendations 4
  • 5. C-One E-ID  Why a handheld device?  Why C-One E-ID ?  Fingerprint sensor  Contact and Contact less card-readers (RFID Technology)  Barcode Reader  Latest technologies (4G,Wi-Fi, GPS..)  Android 4.2.2 5
  • 6. Content  Objective and Project Definition  Device Used: C-One E-ID  Biometrics ◦ Fingerprint  Machine Readable Passport ◦ Machine Readable Zone (MRZ) ◦ Logical Data Structure ◦ Communication with IC/Chip ◦ E-Passport Security features ◦ Smart Card Security features  Project Development ◦ MRZ Project ◦ Smart Card and E-passport projects: ◦ Fingerprint project  Document verification application  Conclusion and Recommendations 6
  • 7. Biometrics  Distinctive, measurable characteristics used to label and describe individuals  Face recognition, iris, fingerprint, DNA, palm print.. 7
  • 8. Fingerprint  Why fingerprint?  Uniqueness, consistency over time.  Used for identification by automated systems  Minutias 8
  • 9. Content  Objective and Project Definition  Device Used: C-One E-ID  Biometrics ◦ Fingerprint  Machine Readable Passport ◦ Machine Readable Zone (MRZ) ◦ Logical Data Structure ◦ Communication with IC/Chip ◦ E-Passport Security features ◦ Smart Card Security features  Project Development ◦ MRZ Project ◦ Smart Card and E-passport projects: ◦ Fingerprint project  Document verification application  Conclusion and Recommendations 9
  • 10. Machine Readable Passport (MRP)  Travel document specified by International Civil Aviation Organization  E-passport and Smart cards developed by Inkript are types of MRP.  Lebanon was forced to apply ICAO standards on civil documents to facilitate citizen travelling 10
  • 11. Machine Readable Zone  Mandatory zone located on the MRP’s data page  Used to store information used for the BAC mechanism to read files of the MRP : ◦ Passport Number ◦ Date of Birth ◦ Expiry date 11
  • 12. Logical Data Structure  For both IC integrated in E-passport and in Residency permits  Structured data as files called Data Groups. ◦ DG1 : Personal Info ◦ DG2 : Owner Photo ◦ DG3 : Fingerprint (optional)  Elementary files required to validate integrity ( EFcom ; EFSoD ) 12
  • 14. Communication with the IC/Chip  IC or Chip will be connected to a Card Acceptance Device (CAD)  Chip speaks to the outside world using its own data packages:APDU  APDU contains Command or a Response message  Master- Slave model.  The Chip always waits for a command APDU from the terminal 14
  • 15. E-passport Security Features while reading the chip  Gain Access to the contactless  Authentication of the data  Authentication of the IC  Additional access control mechanism 15
  • 16. E-passport Security Features (2) Gain Access to the contactless  To prevent eavesdropping  Chip Access Control mechanism : ◦ Only authorized access. ◦ Using cryptographic protocol  Info are needed from the MRZ to derive the keys.  Two Chip Access Control mechanism: ◦ BAC: Basic Access control ◦ PACE: Password authenticated connection establishment 16
  • 17. Read the MRZ_Information visually from MRZ SHA-1 Hash of MRZ_Information Take the most significant 16 bytes of SHA-1 Hash as Key Seed Derive KEnc and KMAc Setup a secure connection with the IC Granted access to non sensitive data (Personal info and Photo) 17 E-passport Security Features (3) Gain Access to the contactless (2) – BAC Mechanism
  • 18.  Content of Data security object (SOD) and LDS are authentic.  Execute the hash of the LDS and compare it to the existing hash in SOD file.  It’s a passive authentication. 18 E-passport Security Features (4) Authentication of Data
  • 19.  Against Chip substitution  Active Authentication mechanism  Based on challenge-response protocol 19 E-passport Security Features (5) Authentication of the IC/Chip
  • 20.  Access fingerprint (and IRIS) file should be more restricted.  Extended Access Control mechanism is used. ◦ EAC = Chip Authentication + Terminal Authentication  Terminal authentication: two move challenge response protocol 20 E-passport Security Features (6) Additional control access mechanism
  • 21. Used Smart Card Security Features specifically in this project  Same structure of internal chip. ◦ LDS ◦ Apdu commands  Smart Card: another confidential info instead of the MRZ_Information to perform BAC mechanism 21 E-passport Smart Card Standard ICAO ICAO Extract BAC key- and thus accessing DG1 and DG2 - using MRZ Another Confidential info Security Features to access DG1,DG2 ICAO Standard ICAO Standard Security Feature to access DG3 (Fingerprints) EAC – Mentioned and explained by ICAO No security
  • 22. Content  Objective and Project Definition  Device Used: C-One E-ID  Biometrics ◦ Fingerprint  Machine Readable Passport ◦ Machine Readable Zone (MRZ) ◦ Logical Data Structure ◦ Communication with IC/Chip ◦ E-Passport Security features ◦ Smart Card Security features  Project Development ◦ MRZ Project ◦ Smart Card and E-passport projects: ◦ Fingerprint project  Document verification application  Conclusion and Recommendations 22
  • 23. Project Development Read the MRZ • OCR Tesseract • Regula Document Reader Read E-Passport or Smart Card Scan fingerprint Compare the two fingerprints 23
  • 24. Project Development (2) MRZ Project  OCRTesseract Project: ◦ Open source project /Use online trained data.  Regula Document Reader: ◦ Proprietary project for Regula Forensic. 24 Unsuccessful trials which leads to: Enter manually the MRZ_information needed for BAC mechanism
  • 25. Project Development (3) Read the MRZ • OCRTesseract • Regula Document Reader • Enter It Manually Read E- Passport or Smart Card • JMRTD Solution • Coppernic Solution • The integration of two solutions 25
  • 26. Project Development (4) Smart Card and E-passport projects  Java Machine ReadableTravel Document  Most popular to read E-passport. ◦ Android supported :AJMRTD ◦ Uses NFC to read E-passport. ◦ Read DG1 and DG2. 26 Incompatibility between NFC and RFID technology
  • 27. Project Development (5) Smart Card and E-passport projects  Coppernic solution: ◦ Able to read DG1 and DG2 file from the E- passport. ◦ Complexity of integrating the EAC mechanism to read DG3. (Fingerprint DG) ◦ Unsuccessful trial to read Fingerprint from E- passport 27 We managed to develop a similar application that reads only Smart Card
  • 28. Coppernic Sample E-Passport Smart Card Power Management Power up the RFId Power Up the Smart Card Reader Keys for BAC mechanism MRZ_Information Another Confidential Info Reading DG1 (Personal Information Extracting these info using Coppernic methodology Implementing JMRTD to extract the response Reading DG2(Display Picture) Implementing JMRTD to parse the response Reading DG3 Not supported yet due the need of additional security mechanisms I managed to read DG3 since it does not require any additional security and I extracted the fingerprint template using JMRTD 28 Project Development (6) Smart Card and E-passport projects
  • 29. Project Development (7) Read the MRZ • OCR Tesseract • Regula Document Reader • Enter It Manually Read E- Passport or Smart Card • JMRTD Solution • Coppernic Solution • The integration of 2 Scan fingerprint • Neurotechnology Compare the two fingerprints • Neurotechnology 29
  • 30. Fingerprint Sample  Neurotech Solution  Features: ◦ Reading fingerprint ◦ Extracting its minutias ◦ One to One verification  One finger to another finger (Ex:Thumb toThumb)  One finger to the 2 hands (Ex: Index to a person’s finger) ◦ One to Many verification  One finger to a database of fingers (Ex:Thumb to many Thumbs) 30
  • 31. Content  Objective and Project Definition  Device Used: C-One E-ID  Biometrics ◦ Fingerprint  Machine Readable Passport ◦ Machine Readable Zone (MRZ) ◦ Logical Data Structure ◦ Communication with IC/Chip ◦ E-Passport Security features ◦ Smart Card Security features  Project Development ◦ MRZ Project ◦ Smart Card and E-passport projects: ◦ Fingerprint project  Document verification application  Conclusion and Recommendations 31
  • 36. Real Situation (4) 36 Successful implementation of the project
  • 37. Content  Objective and Project Definition  Device Used: C-One E-ID  Biometrics ◦ Fingerprint  Machine Readable Passport ◦ Machine Readable Zone (MRZ) ◦ Logical Data Structure ◦ Communication with IC/Chip ◦ E-Passport Security features ◦ Smart Card Security features  Project Development ◦ MRZ Project ◦ Smart Card and E-passport projects: ◦ Fingerprint project  Document verification application  Conclusion and Recommendations 37
  • 38. Conclusion  Importance of such a device with these advanced capabilities lies in the increased need to control borders and critical areas in such a country.  Enhance catching terrorists and forgers over borders controls. 38
  • 39. Recommendations  More research to read E-passports using C-One E-ID  Reading MRZ visually and using the camera by a well trained data.  Compare the fingerprint of any person remotely with the database available on the server  One level of security can be added to prevent non authorized agents to use the device. 39