The detection and prevention of ID Fraud

Slides:



Advertisements
Similar presentations
HiPath SIcurity Card Manager Smartcard Management and Personalization System Sales Presentation.
Advertisements

© 2006 FedEx. All rights reserved. FedEx Ship Manager ® at fedex.com Shipping Administration.
What do Immigration Officers look for in a travel document?
Part 2 of 2 View part one first for: Introduction Tobacco Affects Everyones Health Your Legal Responsibility Keeping Tobacco Away From Kids May 2013.
Chapters 1 & 2 DRIVER EDUCATION
12 November 2002Digital Identity Forum – London Biometrics and ID Bill Perry Independent Consultant Phone:
1. Documents types Visas (ID-2) ICAO standard passports (ID-3) ID cards and driving licences (ID-1) Travel and identity documents.
The Parking Shop Blue Badge Scheme. Overview of our approach Services include: data capture, digital printing, progression, payment processing, archiving,
Roll out of Biometric Residence Permits RTW documentation
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Alicia Albright, Spencer Ruch, Jim Knapp, Brian Holkeboer, Anthony Santilli.
Alicia Albright, Spencer Ruch, Jim Knapp, Brian Holkeboer, Anthony Santilli.
Review of Patents Agenda Item 3: Report of the New Technologies Working Group.
International Business and Technology Consultants AMS confidential & proprietary Identification Security Meeting The New Challenge Barry Goleman American.
1 Ultimate in Card Security Enhancing the Security of RFID/Smart Cards using Secure OVD Detection 94 Old Camplain Road Hillsborough NJ
STI, Part of Al Falasi Group UAE
Nairobi, Kenya 29-31October Fifth Special Meeting of the Counter- Terrorism Committee with International, Regional and Subregional Organizations.
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
Department of Labor HSPD-12
Exclusively available under patent registration ADVANCED SECURITY VIA ELECTRONIC ENGRAVING (ASEE)
1 MRTD Programme: Consolidating Comprehensive Security and Enhancing Facilitation Mauricio Siciliano Mauricio Siciliano ICAO MRTD Programme ICAO/McGill.
Respecting Privacy in Global Networks/ Guernsey, Wednesday 11 th April, Paula Ortiz López Spanish Data Protection Agency.
BARTEX Your Logo Here BARTEX CORPORATION’S BORDER REGISTRATION and SECURITY SYSTEM BARTEX CORPORATION’S BORDER REGISTRATION and SECURITY SYSTEM.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Ronny Depoortere January 16th, 2012 Chisinau. Identification – Business Case The ability to uniquely identify citizens and foreign residents is the corner.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
1.Requirements to apply for a new Smart ID Card?
The REAL ID Act and the States SEARCH Membership Group Meeting July 18, 2007.
DL/ID Card Design Specification Responsible Retailing Forum Rich Carter (AAMVA) 2004 Responsible Retailing Forum The Next Generation of State IDs.
P O L I C E D E P A R T M E N T  Biometric passport – Passport Act – Issuing a biometric passport – Development project  Biometric Passport To Biometric.
"Plagiarism Prevention Technology for Promoting Critical Thinking and Maintaining Academic Integrity" Pootorn Ruangying, Products Specialist Book Promotion.
Ronny Depoortere 19th March, 2012 Warsaw. Identification – Business Case The ability to uniquely identify citizens and foreign residents.
INTRODUCTION  Soch Solutions has launched an innovative e-queue system for crowd management.  Using the online advance queue web application, visitors.
Identity verification in the private sector Chris Gration 30 March 2006.
PASSPORT SYSTEM – STANDARD AND E-PASSPORT The Passport includes standard international Security Features such as: Hologram Ultra Violet Print (can be seen.
Driver Theory Chapter 1 NJ Driver License System.

BIOMETRICS.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
ESTABLISHING IDENTIFICATION Lesson Three Click on sound.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
NJ DMV CHAPTER 10 WESTFIELD HIGH SCHOOL DRIVER EDUCATION
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
Can you spot the honest customer… …from the fraudster? Presentation by: Alex Bowes, Corporate Sales Manager, 192.com Business Services.
THE MALAYSIAN ELECTRONIC PASSPORT
Presentation by: Jay Krasner Automation in patient registration.
Module 1 4 th November, Module 1 4 th November, 2010 Objectives In this module you will learn to Explain Unique Identity Define Aadhaar Explain.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
Registration The Registration system is a fully integrated solution for today's registration requirements in any country. Covering ID, Passports, Visa’s,
Objectives In this module you will learn to Explain Unique Identity Define Aadhaar Explain the UIDAI Eco-system Interpret the benefits of Aadhaar.
Instructions Taking a photo of ID documents using a smartphone or tablet.
What do Immigration Officers look for in a travel document?
THE MALAYSIAN ELECTRONIC PASSPORT
Computer vision and biometric technology in credit risk
Technical Report PKI for
Rich Carter Director, Technology Standards and Programs
Agenda Item 3: Report of the New Technologies Working Group
Canadian Passport.
SOLUTION LAND TITLES.
Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang
A Real Problem % 5,000 #1 $2,100 12% 6% Identity Fraud
Biometric technology.
Technical Report PKI for
SOLUTION ID CARDS AND DRIVER’S LICENSES
10 Advantages of Integrating Biometrics with Membership Management Software.
Explorers – aula 2. A passport is an easily recognized travel document that identifies you and authorizes you to travel. If you're from the United.
E-identities (and e-signatures)
Agenda Item 3: Report of the New Technologies Working Group
RECORDING AND DOCUMENTING IMMIGRATION CONTROLS
Presentation transcript:

The detection and prevention of ID Fraud Keesing Technologies Rosalie Koerts (+31 207 157 812) www.keesingtechnologies.com www.id-documentscan.com EVS 15 May 2013 Bled, Slovenia

www.keesingtechnologies. com Agenda Identity Identity documents: Security features and combating imposter fraud Keesing Technologies Demonstration: ID document verification in seconds www.keesingtechnologies. com

Identity An identity is not: What is an identity? A passport DNA A person of flesh and blood What is an identity? a set of data that came into existence upon birth which can be reduced to a single, unique person It’s an administrative concept! www.keesingtechnologies.com

Identity document Purpose of an identity document: Facilitation of business: proof of someone’s identity and nationality Facilitation of travel Many different documents: Passport Identity card Visa / Residence permit Driving licence “Special” passport www.keesingtechnologies.com

Checking an identity document (1/4) Use your head Interpret what you are looking at Beware of imposter fraud Use appropriate tooling Verify as much as possible automatically Whenever in doubt, ask the experts… www.keesingtechnologies.com

Checking an identity document (2/4) www.keesingtechnologies.com

Checking an identity document (3/6) www.keesingtechnologies.com

Security features Every identity document has its own, unique characteristics and security features These features draw on some (more or less) standard concepts, such as: Machine Readable Zone (MRZ) UV Photo attachment RFID Chip Optically Variable Features Secondary Portrait Image www.keesingtechnologies.com

Machine Readable Zone (1/2) Contains: Information about the document bearer Information about the identity document Check digits Approximately 70% of all forged documents contain MRZ errors (!) www.keesingtechnologies.com

UV (1/2) Under UV, special patterns may appear www.keesingreferencesystems.com

Photo attachment (1/3) Photo’s are glued, stapled, laminated or integrated Photo’s are integrated by laser engraving or printing Photo substitution is a very popular attack Prevented by laminates: check for damage or double laminate! Checking photo attachment is difficult to perform automatically! www.keesingtechnologies.com

Photo attachment (2/3) www.keesingtechnologies.com

Photo attachment (3/3) www.keesingtechnologies.com

Optically variable feature (1/3) www.keesingrtechnologies.com

Optically variable feature (2/3) www.keesingtechnologies.com

Optically variable feature (3/3) www.keesingtechnologies.com

Secondary portrait image (1/3) www.keesingtechnologies.com

Secondary portrait image (2/3) www.keesingtechnologies.com

Secondary portrait image (3/3) www.keesingtechnologies.com

Biometrics and profiling (1/3) Imposter or look-a-like fraud Tactical profiling versus technical profiling Both picture and behavior are very important www.keesingtechnologies.com

About Keesing Technologies Established in 1923; part of Hologram Industries since 2010 The most comprehensive database of identity documents ( > 2,600) Advanced and proven authentication solutions Helping more than 6,000 organisations and government institutions worldwide to securely authenticate identity documents www.keesingtechnologies.com

Keesing DocumentChecker The world’s most comprehensive database of international ID documents Access to +2,600 documents: passports, identity cards, driving licenses, visa’s Information about documents from over 200 countries and organisations Access to Keesing Expert Helpdesk www.keesingtechnologies.com

Keesing ID AuthentiScan Automated check, authentication and validation of international identity documents (highest level of multiple cross checks) Immediate access to Keesing DocumentChecker No specialist knowledge required Various possibilities for reporting and/or data sharing PDF report available of all checked identity documents Access to Keesing Expert Helpdesk Available for online and offline use Already used by dozens of local authorities www.keesingtechnologies.com

Extensive authentication. Straight forward solution. Live Demonstration Extensive authentication. Straight forward solution. www.keesingtechnologies.com

Efficiency Know that the ID document presented exists, is authentic and valid Immediate access to detailed information of the performed checks Unique completion with immediate access to Keesing reference database (2,600 ID documents) Always access to Keesing Expert Helpdesk www.keesingtechnologies.com

Checking the world’s ID documents since 1923 Meet us! Visit www.keesingtechnologies.com/events and find out where you can meet us for a live demo of our solutions. Or contact us for further information via: E: sales@keesingtechnologies.com T: +31 20 7157 800 Checking the world’s ID documents since 1923 www.keesingtechnologies.com