220 likes | 400 Views
The detection and prevention of ID Fraud Keesing Technologies Rosalie Koerts (+31 207 157 812) www.keesingtechnologies.com www.id-documentscan.com. EVS 15 May 2013 Bled, Slovenia. Agenda. Identity Identity documents: Security features and combating imposter fraud
E N D
The detection and prevention of ID Fraud Keesing TechnologiesRosalie Koerts (+31 207 157 812) www.keesingtechnologies.com www.id-documentscan.com EVS 15 May 2013 Bled, Slovenia
Agenda • Identity • Identity documents: • Security features and combating imposter fraud • Keesing Technologies • Demonstration: ID document verification in seconds www.keesingtechnologies. com
Identity • An identity is not: • A passport • DNA • A person of flesh and blood • What is an identity? • a set of data • that came into existence upon birth • which can be reduced to a single, unique person • It’s an administrative concept! www.keesingtechnologies.com
Identity document • Purpose of an identity document: • Facilitation of business:proof of someone’s identity and nationality • Facilitation of travel • Many different documents: • Passport • Identity card • Visa / Residence permit • Driving licence • “Special” passport www.keesingtechnologies.com
Checking an identity document (1/4) • Use your head • Interpret what you are looking at • Beware of imposter fraud • Use appropriate tooling • Verify as much as possible automatically • Whenever in doubt, ask the experts… www.keesingtechnologies.com
Checking an identity document (2/4) www.keesingtechnologies.com
Security features • Every identity document has its own, unique characteristics and security features • These features draw on some (more or less) standard concepts, such as: • Machine Readable Zone (MRZ) • UV • Photo attachment • RFID Chip • Optically Variable Features • Secondary Portrait Image www.keesingtechnologies.com
Machine Readable Zone (1/2) • Contains: • Information about the document bearer • Information about the identity document • Check digits • Approximately 70% of all forged documents contain MRZ errors (!) www.keesingtechnologies.com
Under UV, special patterns may appear UV (1/2) www.keesingreferencesystems.com
Photo attachment (1/3) • Photo’s are glued, stapled, laminated or integrated • Photo’s are integrated by laser engraving or printing • Photo substitution is a very popular attack • Prevented by laminates: check for damage or double laminate! • Checking photo attachment is difficult to perform automatically! www.keesingtechnologies.com
Photo attachment (2/3) www.keesingtechnologies.com
Photo attachment (3/3) www.keesingtechnologies.com
Opticallyvariable feature (1/3) www.keesingrtechnologies.com
Opticallyvariable feature (2/3) www.keesingtechnologies.com
Secondary portrait image (1/3) www.keesingtechnologies.com
Biometrics and profiling (1/3) • Imposter or look-a-like fraud • Tactical profiling versus technical profiling • Both picture and behavior are very important www.keesingtechnologies.com
About Keesing Technologies • Established in 1923; part of Hologram Industries since 2010 • The most comprehensive database of identity documents ( > 2,600) • Advanced and proven authentication solutions • Helping more than 6,000organisations and government institutions worldwide to securely authenticate identity documents www.keesingtechnologies.com
Keesing DocumentChecker • The world’s mostcomprehensive database of international ID documents • Access to +2,600 documents:passports, identity cards, driving licenses, visa’s • Information about documents from over 200 countries and organisations • Access to Keesing Expert Helpdesk www.keesingtechnologies.com
Keesing ID AuthentiScan • Automated check, authentication and validation of international identity documents (highest level of multiple cross checks) • Immediate access to Keesing DocumentChecker • No specialist knowledgerequired • Various possibilities for reporting and/or data sharing • PDF report available of all checked identity documents • Access to Keesing Expert Helpdesk • Available for online and offline use • Alreadyusedbydozens of localauthorities www.keesingtechnologies.com
Live Demonstration Extensive authentication. Straight forward solution. www.keesingtechnologies.com
Efficiency Know that the ID document presented exists, is authentic and valid Immediate access to detailed information of the performed checks Unique completion with immediate access to Keesing reference database (2,600 ID documents) Always access to Keesing Expert Helpdesk www.keesingtechnologies.com
Meet us! Visit www.keesingtechnologies.com/events and find out where you can meet us for a live demo of our solutions. Or contact us for further information via: E: sales@keesingtechnologies.com T: +31 20 7157 800 Checking the world’s ID documents since 1923 www.keesingtechnologies.com