1 / 18

Ultimate in Card Security Enhancing the Security of RFID/Smart Cards using Secure OVD Detection

Ultimate in Card Security Enhancing the Security of RFID/Smart Cards using Secure OVD Detection. Schaumburg Ill September 17 th 2009. Authors: Victor Zazzu & Wenyu Han. 94 Old Camplain Road Hillsborough NJ 08844 www.zbausa.com. Threats to ID Security.

bert-duke
Download Presentation

Ultimate in Card Security Enhancing the Security of RFID/Smart Cards using Secure OVD Detection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ultimate in Card SecurityEnhancing the Security of RFID/Smart Cards using Secure OVD Detection Schaumburg Ill September 17th 2009 Authors: Victor Zazzu & Wenyu Han 94 Old Camplain Road Hillsborough NJ 08844 www.zbausa.com

  2. Threats to ID Security

  3. Various Methods to Verify a Hologram Security Patch Human Eye Simple Viewer to detect latency image. Microscope to detect micro-printing. Forensic Lab instrument to detect each manufacturers Hologram’s unique optical patterns. Presented today is a method of Machine-Reading & Instantly verify the unique fingerprint of the hologram +.

  4. Enhancing Security of ID Cards via Eclipse System The Eclipse system is is designed to enhance the security of an ID card by automatically detecting & correlating multiple, random artifacts of the manufacturing process via, • Use of Specially designed OVD (Holograms) • Non-registered placement of the OVD. • Random generation of optical marks.

  5. ID Card Design Requirements • We have developed a design method for manufacturing Machine-Readable RFID Personal Identification cards which are extremely difficult to counterfeit. • Our design constraints were : • Easy to use. • Extremely difficult to counterfeit. • Fast reading & instant verification. • No special or overly complex manufacturing procedures. • Minimal impact to the card costs. • Extremely low false positive reads. • The system has to be secure for both on-line and/or off-line operation.

  6. Enhancing Security of ID Cards via Eclipse System • We developed a system in which we call “ Eclipse “. • The Eclipse security system identifies each card by forming a unique optical pattern. • We are essentially giving the card an optical fingerprint , • The optical pattern is machine readable and instantly verifiable. • We use the optical pattern to form an encryption key for the RFID data. • When used in combination with a biometric scanner the complete verification process is covered.

  7. Eclipse RFID ID Card Security System When using the Eclipse system: • Each card becomes unique by carrying its own “Eclipse optical pattern”. • The Eclipse optical pattern on each card is meaningless until it is enabled by the issuing location. • Each card is enabled by detecting its unique optical pattern, generating the encrypted code & subsequently storing that information on the RFID chip and/or secured database.

  8. Physical Eclipse Code. Primary Laser ablated microscopic patterns Secondary optical codes Hot Stamped Holographic Eclipse patch • The First Eclipse pattern is incorporated as part of the holographic material. • The pattern is depicted here by the triangles although it may be any geometric shape. • The step & repeat of the first Eclipse pattern is, by design, a non-integer multiple of the Tag’s dimension. • The Second Eclipse pattern is formed as via an independent operation by laser ablation.

  9. Eclipse RFID ID Card Security System • The Eclipse optical patterns are then independently scanned and mathematically convolved with; • Each other • The RFID unique identifier • Other unique data (such as SS# number, etc ) To generate a verification data set that valid for this and only this specific card. • The Eclipse code is then stored in a secure portion of the RFID’s memory, or a secure database.

  10. Eclipse Code Design

  11. Eclipse Code Design

  12. Eclipse Code Design

  13. Eclipse Code Design

  14. The Eclipse Example A visual inspection of the Hologram appears as simple decorative design This picture was taken in a condition as to exaggerate some of the eclipse patterns for this presentation. The illuminated points shown in this image are part of the ECLIPSE code plus some additional diversionary elements. Taken with a Digital camera

  15. Enhanced Security Card System Using the Eclipse system • A secure optical card with 12 laser ablated holes and only 2 additional optical features would yield greater than 1030 combinations. • Each additional security feature greatly increases the possible code combinations. • The combinations can increase with higher resolution sensors. • Using the technique outlined here additional optical elements may also be used either singularly or in combination; • such as glitter flakes or • energy converting ink.

  16. Eclipse RFID ID Card Security System • Machine readability • Simple insertion into the scanner starts the process. • No human decision needed to determine authenticity! • Fast and efficient detection. • Instant match-on-card verification. • Easy to use. • Easy to manufacturing the cards • Minimal cost per card impact • Extremely difficult to counterfeit, genufeit or modeifeit the host card.

  17. Summary The machine readable multi-random OVD system presented here guarantees the validity of the RFID card; and when combined with a biometric scan, which in turn will verify the person; The resultant security system will yield as close to un-counterfeitable RFID based ID Card System as possible.

  18. Acknowledgements Thanks to our development partners: Crown Roll-Leaf Inc., Paterson, NJ Composecure LLC, Mountainside, NJ

More Related