International Business and Technology Consultants AMS confidential & proprietary Identification Security Meeting The New Challenge Barry Goleman American.

Slides:



Advertisements
Similar presentations
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Advertisements

Dr. Marc Valliant, VP & CTO
Section 2.3 – Authentication Technologies 1. Authentication The determination of identity, usually based on a combination of – something the person has.
Notable Notary Notes 2010 Local Issuance Office training.
IDMarc and Document Inspector. © Digimarc Corporation - Confidential Digimarc Secure ID Leadership Digimarc driver licenses in 30 states and Wash. D.C.
12 November 2002Digital Identity Forum – London Biometrics and ID Bill Perry Independent Consultant Phone:
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Alicia Albright, Spencer Ruch, Jim Knapp, Brian Holkeboer, Anthony Santilli.
Janice Kephart Director of National Security Policy, Center for Immigration Studies Heritage Foundation July 14, 2009.
Alicia Albright, Spencer Ruch, Jim Knapp, Brian Holkeboer, Anthony Santilli.
Department of Health and Human Services Personal Identity Verification Training APPLICANT.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
European Electronic Identity Practices Country Update of …………… Speaker: Date:
A Division of ScoringSystem, Inc. Site-Specific Recordkeeping™ Developed by ScoringSystem, Inc. Connecting the World of Soccer Copyright 2005 ScoringSystem,
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
By: Monika Achury and Shuchita Singh
FIT3105 Biometric based authentication and identity management
Liberian Registry INTERTANKO ASSOCIATES COMMITTEE MEETING March 29, 2006.
PERSONAL RECORDS.  What is Personal Identification?  Do you have any forms of Personal Identification? Is so, What?  When would you need Personal Identification?
The REAL ID Act and the States SEARCH Membership Group Meeting July 18, 2007.
DL/ID Card Design Specification Responsible Retailing Forum Rich Carter (AAMVA) 2004 Responsible Retailing Forum The Next Generation of State IDs.
Certificate and Key Storage Tokens and Software
P O L I C E D E P A R T M E N T  Biometric passport – Passport Act – Issuing a biometric passport – Development project  Biometric Passport To Biometric.
I DENTITY M ANAGEMENT Joe Braceland Mount Airey Group, Inc.
By Garland Land NAPHSIS Consultant. Importance of Birth Certificates Needed for: Social Security Card School Enrollment Driver’s License Passport.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Number Five Software One provider Multiple Solutions professional card design software The most flexible and powerful solution for card issuing! The best.
Hosted by: June 23-26, 2003 New York City Mobile & Handheld Readers The Need for Mobile & Handheld Readers in Today's Biometric.
Vital Statistics in Canada Certificate Renewal. Background 10 Provinces and 3 Territories issue Vital Event Certificates in Canada; Jurisdictions collaborate.
HIGHLIGHTS OF THE NAPHSIS SECURITY GUIDELINES MANUAL
Presented by: Jay Maxwell CIO, AAMVA The Driver’s License: Finally, National Standards Presented by: Jay Maxwell CIO, AAMVA.
1 Social Security Cards and Numbers Recent Developments.
CHAPTER ONE YOUR NJ DRIVER LICENSE. I. Your NJ Driver License A. Things to have on you when driving: 1. Drivers License 2. Proof of Insurance 3. Registration.
University Health Care Computer Systems Fellows, Residents, & Interns.
Real ID Vibhas Chandrachood, Executive Director Office of Application Development Commonwealth Office of Technology Commonwealth of Kentucky December 15,
Employment Eligibility Verification The I-9 Form Bluefield State College New River Community & Technical College.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Identification Verification. Verification Required Election Day Registration Mail-in Only if Driver’s License # or Social Security # does not validate.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
The Role of Vital Records in Driver’s License Administration Linda Lewis President and CEO, AAMVA.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
Workshop OAS/ICAO Bogota, Colombia November 10-12, 2008 Passport Canada Standards and Best Practices Debbie Richer District Manager, Edmonton.
Section 2.3 – Authentication Technologies 1. Authentication The determination of identity, usually based on a combination of – something the person has.
Commercial Data Processing Credit. Management Information CDP makes it easier for managers to control and process the information that is needed in the.
THE MALAYSIAN ELECTRONIC PASSPORT
Intelligence Reform: The Process Begins National Association for Public Health Statistics and Information Systems June 7, 2005.
Hiring/Onboarding in Compliance Meetings with Supervisors.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Physical security By Ola Abd el-latif Abbass Hassan.
1 AAMVA EVVE Pilot Project: Where We Are Walter Jackson AAMVA Project Manager June 5, 2006.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
1 I-9 Completion for People Managers Hiring Manager Training Version January 2016.
AAMVA: Region 1 Conference License Security & Fraud Control Connecticut DMV Document Audit Web Application (“DAW”) Lynn C. Blackwell Division Chief July.
Instructions Taking a photo of ID documents using a smartphone or tablet.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
The Solution SSIVS.
THE MALAYSIAN ELECTRONIC PASSPORT
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Rich Carter Director, Technology Standards and Programs
Canadian Passport.
JP Morgan spends $500 million per year on cyber security
Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang
Privacy and Information
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
SOLUTION ID CARDS AND DRIVER’S LICENSES
A SEMINAR REPORT ON BIOMETRICS
COEN 351 Authentication.
Pacific Regional Workshop on Legal Identity and Identity Security 8-10th July 2019 PALAU Efrecia R. Kazuma.
Presentation transcript:

International Business and Technology Consultants AMS confidential & proprietary Identification Security Meeting The New Challenge Barry Goleman American Management Systems, Inc. November 2001

AMS confidential & proprietary 2 The terrorist threat has put a renewed focus on Identification DMV identification documents are the most widely accepted form of identification for financial transactions and domestic travel States use various standards and source documents to establish identity prior to issuing a driver license/ID card Source (breeder) documents can be altered and/or counterfeited Counterfeit driver license/ID cards are easy to produce and are difficult to authenticate because of the number of different state documents in circulation and the variety of security features they contain

AMS confidential & proprietary 3 The Three Pillars of Secure Identification 1.Verify ‘breeder’ documents— Prevent the issuance of valid driver/identification cards by persons with counterfeit birth or immigration documents. 2.Issue secure ID—Driver and identification cards that comply with national standards and contain high security features including biometrics. 3.Authenticate—Visual and machine readable instant authentication of ID document and biometric.

AMS confidential & proprietary 4 Verify Breeder Documents 1.On-line access to ‘breeder’ document data: — SSN verification; — Passport and INS; — Employee data; and — Vital statistics data (birth and death certificates) 2.State-to-State exchange of driver and identification data: — Driver Record Information Verification System (DRIVerS); — The existing Commercial Driver License Information System (CDLIS) for commercial drivers. 3.A system of standard messages to connect inter- and intra-state identification databases.

AMS confidential & proprietary 5 Verifying Identification with Access to new sources of verification data Designed for fraud prevention in financial transactions Currently available, minimal set up Fee based—per transaction charges A means to verify questionable or out-of- state applicants Back office or on-line with applicant available to resolve questions

AMS confidential & proprietary 6 AAMVAnet or Other Secure IP Network VERIFY DMV Photo ID Workstation DMV System w/ Enhanced Search Capabilities Wage File Vital Statistics State 1 Intra State Network DRIVerS Federal ID Files CDLIS PDPS DMV Other State Networks ISSUE Verify AUTHENTICATE Airline Ticket Counter Facial Recognition Camera Handheld Authentication

AMS confidential & proprietary 7 Issue Secure Identification 1.Federal standards for issuance and document security 2.Central driver license issuance when documents cannot be verified on-line—issue temporary ‘driver’s license only’ 3.Privacy regulations to prevent unauthorized access to personal data 4.Plan for future Biometric Identifier — Thumb or hand geometry — Facial recognition — Retinal or iris scan

AMS confidential & proprietary 8 ISSUE National Standard Secure ID I D E N T I F I C A T I O N NAME ________________________________ ADDRESS _____________________________ STATE ____________________ZIP _______ SIGNATURE __________________________ I D E N T I F I C A T I O N Front Back 2D Barcode and Biometric Metalized Security Photo License Printer AUTHENTICATE VERIFY DMV Photo ID Workstation DMV System w/ Enhanced Search Capabilities Airline Ticket Counter Facial Recognition Camera Handheld Authentication Issue

AMS confidential & proprietary 9 Authenticate 1.ID documents must include easily recognizable high security features to prevent or detect counterfeiting 2.Standard Format and Data for all states 3.Card cannot be altered or color copied 4.Both, Optically visible elements that do not require additional hardware for verification; and 5.Possible ‘smart card’ chip, 2D barcode or other technology features for instant verification with handheld device.

AMS confidential & proprietary 10 Cardholder AUTHENTICATE Authenticate ISSUE VERIFY DMV Photo ID Workstation DMV System w/ Enhanced Search Capabilities Airline Ticket Counter Facial Recognition Camera Handheld Authentication

AMS confidential & proprietary 11 Intelli-Check authentication of licenses Authentication of out-of-state and Canadian licenses Machine readable features are more difficult to counterfeit ID-Check hardware device reads: — Magnetic stripes and barcodes (1D & 2D) — State and provincial driver licenses and identification cards — Military ID’s Add software to your own barcode reader stations Identification verification station equipped with Intelli-Check and Identicate access.

AMS confidential & proprietary 12 AUTHENTICATE ISSUE VERIFY DMV Photo ID Workstation DMV System w/ Enhanced Search Capabilities Other Files State Files Federal ID Files Secure IP Network Three Pillars—Verify, Issue, Authenticate Airline Ticket Counter Facial Recognition Camera Handheld Authentication

AMS confidential & proprietary 13 Richard Clarke Office of Homeland Security, cyberspace security adviser Questioned on National ID “…current government-issued identification, such as passports and driver licenses, should have the latest authentication and anti-tampering technologies.” San Francisco Chronicle Nov 8, 2001