270 likes | 378 Views
Secure ID. Rich Carter Director, Technology Standards and Programs. Who is AAMVA?. American Association of Motor Vehicle Administrators Established in 1933 Non-profit, tax exempt Membership: All U.S. and Canadian jurisdictions U.S. and Mexican federal governments
E N D
Secure ID Rich Carter Director, Technology Standards and Programs
Who is AAMVA? • American Association of Motor Vehicle Administrators • Established in 1933 • Non-profit, tax exempt • Membership: • All U.S. and Canadian jurisdictions • U.S. and Mexican federal governments • Over 150 associate members • Provides forum for information exchange • Promotes uniform practices and reciprocity
How did we get here? • First driver licenses issued early in last century • Increased emphasis on driver safety • More concern about validity of card • Addition of photo to card • Acceptance as proof of identification • Issuance of non-driver ID cards • 911
DL/ID Card Functional Requirements • Evidence of privilege to drive • Identification • Age verification • Address/residency verification • Automated administrative processing
Uniform Identification Subcommittee • Responsible for implementation of the Secure ID Strategy • Coordinates activities of 14 UID Task Groups
UID Task Groups • UID1 – Acceptable ID List • UID2 – Residency/Non-Residency/Legal Presence • UID3 – Fraudulent Document Recognition (FDR) Training • UID4 – Internal Controls • UID5 – Oversight Compliance System
UID Task Groups • UID6 – Model Legislation • UID10 – Enforcement and Controls • UID11 – Driver License Agreement (DLA) • UID13 – Process/Procedures • UID 14 - Privacy
UID7 – Card Design Specifications • Basic layout • As much as possible will follow ISO draft for International Driver License • Data elements assigned to zones • List of required and optional data elements
UID7 – Card Design Specifications • Machine-readable technology (MRT) • PDF-417 is common MRT • Space allocated for an optional second MRT • List of required and optional data elements
UID7 – Card Design Specifications • Security Devices • Layered approach • Three levels • Six threats • Common level one device is an Optical Variable Device with three dimensional effects and other high security design elements
UID8 – Verification • Verification of information presented by applicants • Best practices on SSN verification • Recommendation on use of third party services • Verification of immigration documents • Spawned work on a number of CDL Fraud Initiatives
Task 7 – On-line Verification of DL • Provide yes/no verification of information on DL • Project Status • Business Requirements complete • Developing specifications and implementation guide
Pilot States Colorado Massachusetts New Mexico Business Partners American Bankers Association American Driving Records ChoicePoint, Inc. eFunds Imaging Automation, Inc. National Retail Federation Positive Access Corporation The Logix Company TML Information Services, Inc. Task 7 – On-line Verification of DL
Task 8 – Digital Image Access • Transmit digital image from state to state • Project Status • Contractor hired • Will probably use XML based solution
Pilot States Pennsylvania Delaware Massachusetts New Mexico Iowa Business Partners Digimarc Viisage DeLaRue Unisys SafeCard ID Identity Systems Datacard Task 8 – Digital Image Access
Task 9 – Status Query on Any Driver • Provide status response on any driver • Requires changes to state system
Task 10 – EVVER • Electronic Verification of Vital Events Records • Access to Electronic Verification of Vital Events (EVVE) • NAPHSIS developing EVVE with SSA • Pilot will develop interface between Dl systems and EVVE
Task 10 – EVVER • Pilot States • Colorado • Iowa • Minnesota
UID9 – Unique Identifier • One driver/one license/one driver control record • A person can have only one driver license • All driver safety information is kept on a single driver control record • All cards issued to a person are linked • The driver license or ID card is issued to the right person • The process and therefore the credential can be trusted
Associating the Identity with the Person • One person can have multiple identities • Multiple persons can share one identity • This could result from • Purposeful actions • Inaccurate processing • Undesirable regardless of the cause
Possible uses of a Biometric • Are you who you say you are? • Are you one of these people? • Are you also somebody else?
Our Main Problem • Are you also somebody else?
UID9 Efforts • Unique identifier without use of biometrics • Study on possibility of using biometrics as the unique identifier
CDL Fraud Initiative Task 13 • Using a structured decision making approach • Can we use biometrics to meet our requirements? • If so, which biometric or biometrics will work best? • Goal is to present initial report to the AAMVA Board in September 2004
More to consider than just technical requirements • In addition to considering the technical requirements, there are many other considerations. • Social issues • Legal issues • Political issues • Budget issues
Capture Speed Privacy Acceptability Generation Conversion Cost Uniqueness Standard Non-cooperative Use Automated Record Link Template Security Requirements
UID12 – DRIVerS Infrastructure • Task Group will not form until funding is available • Two possible development paths • Upgrade and modernize CDLIS first • Develop a new system for all drivers