1 Ultimate in Card Security Enhancing the Security of RFID/Smart Cards using Secure OVD Detection 94 Old Camplain Road Hillsborough NJ 08844 www.zbausa.com.

Slides:



Advertisements
Similar presentations
The detection and prevention of ID Fraud
Advertisements

RFID Access Control System March, 2003 Softrónica.
Match On Card Technology and its use for PKI Mgr. Miroslav Valeš Sales Manager Eastern Europe May 9, 2001 CATE 2001 Security and Protection.
TRACK N TRACE PHARMA PACKING LINE TRACK N TRACE PHARMA PACKING LINE
devices... Inputs and Output Keyboard The commonest way to enter data into a computer. Each key is simply a switch, which when pressed, results in a.
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Review of Patents Agenda Item 3: Report of the New Technologies Working Group.
International Business and Technology Consultants AMS confidential & proprietary Identification Security Meeting The New Challenge Barry Goleman American.
Cypak, the Future of Ink on Packaging September 12 th 2007, London Danevert Åsbrink, VP Sales, Cypak AB, Sweden.
STI, Part of Al Falasi Group UAE
Department of Labor HSPD-12
Automatic Data Capture Devices & Methods
Commercial Data Processing Lesson 2: The Data Processing Cycle.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Introduction to Fingerprint Biometrics By Tamar Bar.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Retinal Scan Sami Lyden. Presentation ● Biometrics – Method – Advantages – Disadvantages ● Retinal recognition – Scanners – Methods ● Comparison ● Developement?
SMT Proprietary and Confidential
Speed | Innovation | Happiness Confidential. © 2012 Bilcare Limited Bilcare Technologies and Fortified-ID Holdings Limited 2015 FAQ.
DL/ID Card Design Specification Responsible Retailing Forum Rich Carter (AAMVA) 2004 Responsible Retailing Forum The Next Generation of State IDs.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
GCSE Information Technology Input Devices and Methods Objectives:  To understand what input devices are.  Identify their individual uses  Be able to.
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Karthiknathan Srinivasan Sanchit Aggarwal
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
IT Introduction to Information Technology CHAPTER 05 - INPUT.
Authentication Approaches over Internet Jia Li
Chapter 10: Authentication Guide to Computer Network Security.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Using ISO tags for Authentication Eddie LaCost Embedded RF.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
1 DL/ID Security and Real ID Richard Carter, AAMVA.
SEMINAR TOPIC ON GLOBAL WIRELESS E-VOTING
Input By Hollee Smalley. What is Input? Input is any data or instructions entered into the memory of a computer.
 Data or instructions entered into memory of computer  Input device is any hardware component used to enter data or instructions 2.
Manipulating data Data management: validation and verification.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Biometrics Stephen Schmidt Brian Miller Devin Reid.
AirGuard Know who you’re flying with. AirGuard Know who you’re flying with Click Here.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Biometrics Authentication Technology
12.4 Essential Questions How is a hologram made? When does total internal reflection occur? How are optical fibers used? Using Light Copyright © McGraw-Hill.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
WELCOME.
Chapter 11 Enhancing an Online Form and Using Macros Microsoft Word 2013.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
CS 350 – Software Design A Problem That Cries Out for Flexible Code – Chapter 3 Imagine you want to extract information from a CAD system to feed an expert.
1 Teaching Innovation - Entrepreneurial - Global The Centre for Technology enabled Teaching & Learning, N Y S S, India DTEL DTEL (Department for Technology.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
BIOMETRIC VOTING SYSTEM ( A novel way to vote ). INTRODUCTION :  It has always been an arduous task for the election commission to conduct free and fair.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Using Technology to provide an innovative sustainable model for delivery of Cashless Health Insurance                              r r r r r y y g s s.
Input Devices.
Agenda Item 3: Report of the New Technologies Working Group
Authentication.
Transportation Worker Identification Credential (TWIC) Next Generation (NEXGEN) Card Update for National Maritime Security Advisory Committee (NMSAC)
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Biometric technology.
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Agenda Item 3: Report of the New Technologies Working Group
Presentation transcript:

1 Ultimate in Card Security Enhancing the Security of RFID/Smart Cards using Secure OVD Detection 94 Old Camplain Road Hillsborough NJ Schaumburg Ill September 17 th 2009 Authors: Victor Zazzu & Wenyu Han

Threats to ID Security 2

Various Methods to Verify a Hologram Security Patch 1.Human Eye 2.Simple Viewer to detect latency image. 3.Microscope to detect micro-printing. 4.Forensic Lab instrument to detect each manufacturers Hologram’s unique optical patterns. 5.Presented today is a method of Machine- Reading & Instantly verify the unique fingerprint of the hologram +.

4 Enhancing Security of ID Cards via Eclipse System The Eclipse system is is designed to enhance the security of an ID card by automatically detecting & correlating multiple, random artifacts of the manufacturing process via, 1)Use of Specially designed OVD (Holograms) 2)Non-registered placement of the OVD. 3)Random generation of optical marks.

ID Card Design Requirements  We have developed a design method for manufacturing Machine-Readable RFID Personal Identification cards which are extremely difficult to counterfeit.  Our design constraints were :  Easy to use.  Extremely difficult to counterfeit.  Fast reading & instant verification.  No special or overly complex manufacturing procedures.  Minimal impact to the card costs.  Extremely low false positive reads.  The system has to be secure for both on-line and/or off-line operation. 5

CONFIDENTIAL6 Enhancing Security of ID Cards via Eclipse System 1)We developed a system in which we call “ Eclipse “. 2)The Eclipse security system identifies each card by forming a unique optical pattern. 3) We are essentially giving the card an optical fingerprint, 4) The optical pattern is machine readable and instantly verifiable. 5)We use the optical pattern to form an encryption key for the RFID data. 6)When used in combination with a biometric scanner the complete verification process is covered.

7 Eclipse RFID ID Card Security System When using the Eclipse system: 1)Each card becomes unique by carrying its own “Eclipse optical pattern”. 2)The Eclipse optical pattern on each card is meaningless until it is enabled by the issuing location. 3)Each card is enabled by detecting its unique optical pattern, generating the encrypted code & subsequently storing that information on the RFID chip and/or secured database.

CONFIDENTIAL8 Physical Eclipse Code. Primary Laser ablated microscopic patterns 1)The First Eclipse pattern is incorporated as part of the holographic material. a)The pattern is depicted here by the triangles although it may be any geometric shape. b)The step & repeat of the first Eclipse pattern is, by design, a non- integer multiple of the Tag’s dimension. 2)The Second Eclipse pattern is formed as via an independent operation by laser ablation. Secondary optical codes Hot Stamped Holographic Eclipse patch

9 Eclipse RFID ID Card Security System 1)The Eclipse optical patterns are then independently scanned and mathematically convolved with; i)Each other ii)The RFID unique identifier iii)Other unique data (such as SS# number, etc ) To generate a verification data set that valid for this and only this specific card. 2)The Eclipse code is then stored in a secure portion of the RFID’s memory, or a secure database.

10 Eclipse Code Design

11 Eclipse Code Design

CONFIDENTIAL12 Eclipse Code Design

13 Eclipse Code Design

14 The Eclipse Example A visual inspection of the Hologram appears as simple decorative design Taken with a Digital camera This picture was taken in a condition as to exaggerate some of the eclipse patterns for this presentation. The illuminated points shown in this image are part of the ECLIPSE code plus some additional diversionary elements.

15 Enhanced Security Card System Using the Eclipse system 1.A secure optical card with 12 laser ablated holes and only 2 additional optical features would yield greater than combinations. 2.Each additional security feature greatly increases the possible code combinations. 3.The combinations can increase with higher resolution sensors. 4.Using the technique outlined here additional optical elements may also be used either singularly or in combination; a)such as glitter flakes or b)energy converting ink.

16 Eclipse RFID ID Card Security System 1)Machine readability a)Simple insertion into the scanner starts the process. b)No human decision needed to determine authenticity! c)Fast and efficient detection. d)Instant match-on-card verification. e)Easy to use. 2)Easy to manufacturing the cards a)Minimal cost per card impact 3)Extremely difficult to counterfeit, genufeit or modeifeit the host card.

17 Summary The machine readable multi-random OVD system presented here guarantees the validity of the RFID card; and when combined with a biometric scan, which in turn will verify the person; The resultant security system will yield as close to un-counterfeitable RFID based ID Card System as possible.

Acknowledgements Thanks to our development partners: Crown Roll-Leaf Inc., Paterson, NJ Composecure LLC, Mountainside, NJ 18