e-Breeder Documents – closing the gap in the identity management chain

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
Installation & User Guide
1. Documents types Visas (ID-2) ICAO standard passports (ID-3) ID cards and driving licences (ID-1) Travel and identity documents.
Chapter 14 – Authentication Applications
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Digital Certificate Installation & User Guide For Class-2 Certificates.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Digital Certificate Installation & User Guide For Class-2 Certificates.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
SLIDE 1 Westbrook Technologies from Fortis: A Healthcare Solution for Medical Records, Billing and HIPAA.
International Business and Technology Consultants AMS confidential & proprietary Identification Security Meeting The New Challenge Barry Goleman American.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Nairobi, Kenya 29-31October Fifth Special Meeting of the Counter- Terrorism Committee with International, Regional and Subregional Organizations.
Secure Communication Architectures.
SCORINGPETS The world’s first and only universal tag traceback system Developed by ScoringSystem, Inc
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
UbIdentity Ubiquitous Identity Management in the Cloud 20/03/2014 Dan BUTNARU Product Line Manager Trusted Identity.
Anonymous, Liberal and User-Centric Electronic Identity Supports Citizen Privacy Protection in e-Government OASIS eGov Workshop - 1 May 2008 Libor Neumann.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Employee Central Presentation
Database Design Concepts Info 1408 Lecture 2 An Introduction to Data Storage.
© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation.
P O L I C E D E P A R T M E N T  Biometric passport – Passport Act – Issuing a biometric passport – Development project  Biometric Passport To Biometric.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
European Electronic Identity Practices Country Update of Austria Peter F Brown Office of the CIO, Austrian Federal Chancellery Chair, CEN eGov Focus Group.
What is A-Tracker A-Track is a Palm OS application that allows a company to track its equipment - office equipment, computers, vehicles, automobiles, library,
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Dao Dinh Kha National Centre of Digital Signature Authentication - Agency of Information Technology Application A vision on a national Electronic Authentication.
Secure Electronic Transaction (SET)
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
Configuring Directory Certificate Services Lesson 13.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Advanced Secure Technologies Secure Document Technologies.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Workshop OAS/ICAO Bogota, Colombia November 10-12, 2008 Passport Canada Standards and Best Practices Debbie Richer District Manager, Edmonton.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Registration The Registration system is a fully integrated solution for today's registration requirements in any country. Covering ID, Passports, Visa’s,
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Enterprise | education | public printing locations PrinterOn for Manufacturing.
Digital Gujarat Portal – Citizen User Manual. How Do I Open A Portal? Go to the URL :- Screen 1.1:-
Check By Phone Software - A Tool To Accept Checks Payments in Seconds Submitted By :
QUESTRA HOLDINGS ACCOUNT REGISTRATION
ESign Aashutosh.
DIGITAL SIGNATURE SERVICE
Installation & User Guide
SOLUTION LAND TITLES.
Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang
Digital Signatures and Forms
SOLUTION DOCUMENTS.
SOLUTION ID CARDS AND DRIVER’S LICENSES
Installation & User Guide
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
PKI (Public Key Infrastructure)
The OTENTIK trust network
E-identities (and e-signatures)
Presentation transcript:

e-Breeder Documents – closing the gap in the identity management chain NEOLOGY   Dr. Bernhard Deufel Senior Segment Development Manager USA Mexico 12760 Danielson Ct. Suite A Juan Escutia 21 Poway, Ca 92064 Col. Hipodromo Condesa, 06140 Mobile: +49 151 4618 1380 eMail: bernhard.deufel@smartrac-group.com © Neology Inc. 2015

E-Breeder - Introduction Breeder documents (e.g. birth certificates) have No common format / content No specification of system of security or security features No standards, no interoperability No international foundations Consequences: breeder documents can be counterfeited very easily

ICAO: TRIP Strategy Breeder Docs, civil registries, integrity of the issuance process, etc. EVIDENCE OF IDENTITY API/PNR, watch lists, information sharing. INTEROPERABLE APPLICATIONS MRP, e-Passports Visas, ID Cards. MRTDs IDENTIFICATION MANAGEMENT IINSPECTION SYSTEMS AND TOOLS DOCUMENT ISSUANCE & CONTROL PKD, forensic travel Doc examination, etc. Integrity of the issuance process, etc.

Delivery and check with e-Pasports Leveraging Travel privacy» EU: Fidelity Programme / Origins Programme SO WE NEED A (WORLDWIDE) MINIMUM SECURITY STANDARD FOR BREEDER DOCUMENTS. «FIDELITY: Fast and trustworthy Identity Delivery and check with e-Pasports Leveraging Travel privacy» The focus of FIDELITY is the security and usability of e-travel documents and more particularly ePassports.

BREEDER DOCUMENT CONSIDERATIONS WHAT’S THE SOLUTION? Analogue breeder docs are: Use cases for breeder docs: Yet, the lifetime of the doc is not crucial: Difficult to verify by untrained people, especially identifying the origin, authenticity and integrity of content. Missing means of direct information, database access and digital verification. Identity Docs for children. Applying for /opening bank accounts. Obtaining a driving license. Social Security card, etc. Breeder docs are often issued and used for a specific one time purpose Many breeder docs need to verified and often the verification is performed by untrained people. Many important processes depend on genuine breeder docs. WHAT’S THE SOLUTION?

TWO POSSIBLE APPROACHES ARE THINKABLE QR Code vs. Chip Technology TWO POSSIBLE APPROACHES ARE THINKABLE Easy to apply Non transferable Printed during personalization

Why RFID? The integration of RFID transponders (is a small embedded computer system) into physical documents has led to the evolution of machine readable documents. This technology brings considerable advantages to breeder documents: RFID Stickers can collect context information (e.g. images, biometrics) if used with a chip offering sufficient memory (>2kB). Context information can be separated into private and public data. Stickers can exchange relevant information with other computer systems. RFID stickers can be read with smartphones. Enable automated document tracking. Increase the security of the document. Improve document handling processes. Usage of the identical eco system as in the e-PP and e-ID world.

Document and Sticker Format DOCUMENT FORMAT Basically the existing document design can be maintained. The blank document must have a pre-printed barcode, called Form Control Number (FCN). It is the number which is used for the inventory control of the blanks as well as for linking the personalization data to the document itself. The blank document must offer an area where a RFID sticker can be placed (e.g. size 3cm × 3cm). FNC RFID STICKER The sticker will be self-adhesive with an adhesive that firmly sticks to the birth certificate. Any attempts to remove the sticker from the birth certificate will lead to a destruction of the sticker. The sticker has a preprinted Inventory Control Number (ICN) which is initialized during sticker production. The sticker contains an RFID chip.

Data can easily be stored on chips with 2k of EEPROM memory! Personalization Data Forenames of child (48) Surname of child (48) Sex of the child (1) Date of Birth (8) Time of Birth (5) Place of Birth (32) Forename of the first parent (48) Surname of the first parent (48) Birth name of the first parent (48) Sex of the first parent (1) Date of birth of the first parent (8) Place of birth of the first parent (32) Citizenship of the first parent (3) Credential number of the first parent (16)   Forename of the second parent (48) Surname of the second parent (48) Birth name of the second parent (48) Sex of the second parent (1) Date of birth of the second parent (8) Place of birth of the second parent (32) Citizenship of the second parent (3) Credential number of the second parent (16) Name of the issuing authority (48) Date of issuance (8) Place of issuance (32) Name of issuing officer (48) Address of issuing authority (48) Citizen Registration Number (8) Data can easily be stored on chips with 2k of EEPROM memory!

SAM Secure Access Module (SAM) All SAMs in the system are in turn issued and managed by a central entity that is responsible for the security of the system. Components making up the system can be manufactured by multiple vendors and managed by different parties allowing maximum flexibility. To increase the security in the system and perform an effective management, it will be only possible activate a slave SAM installed in a remote reader through an authorization from the backend system. The backend system will have a Master HSM, which will calculate and deliver the activation keys (Master Key) for the slave SAM. In this way, only the authorized readers will be able to issuance the eBreeder certificates. SAM

Security Elements Single sign-on authentication process. Digital Certificate. Authenticity of blank certificates through FCN. Reader UID Authentication. Secure reader SAM Authentication. Secure sticker authentication through ICN.

eBreeder Personalization System

The e-Breeder App User taps smart-pohone to the NCF label adhered to the breeder document. Corresponding e-breeder app launches, allowing access to data provided in the «Document Information» tab for verification of document authenticity. Multi-level access rights allows authorized users to access more detailed underlying data-up to a complete population registry dataset.

Summary of the Advantages of a digital approach RFID Labels are attachable to any paper based document, e.g. eBirth Certificates, eVehicle registration, Weapon IDs, University Diploma, Land Titles etc. Allows verification of authenticity and integrity through cryptographic procedures. Allows usage of SmartPhones with NFC interface for easy verification. Can provide additional (private) information stored on the chip which are only accessible if appropriate keys are present with SAM. The system architecture supports offline and online functionality by default. Can be operated in insecure (disconnected) environments (hospitals, universities). Information travels with the people.

Thank you for your attention!