Biometrics/SmartCard Workshop. 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida. Identification Technology. Verification of all three elements. X. Authentication Domains. Document- holder. Document. Data. General Principles. Document Authentication
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
28th International Traffic Records Forum
August 4, 2002
Verification of all three elements
(Who authenticates the authenticator?)
Real device or,
A device to capture document, document holder information
Authentication requires logic within document
Cryptographic authentication best, but requires key infrastructure
Identification System Server(s)
CENTRAL SERVER ARRAYS
CARD READER &
“Smart Cards and Biometrics in Privacy-Sensitive Secure Identification Systems”
Range of Data Input Formats
Fingerprint, Facial, Iris, Hand Geometry
After the card is read, the MatrixID display shows the following:1. The date/ time and method used to verify the cardholder.2. The date the card was issued and the Issuing Authority.3. That the document passes the integrity checks built into the MatrixID Data Structure4. The card holder’s photo, signature and fingerprint image. 5. The MatrixID will prompt the cardholder to verify their identity by comparing a live scan with the stored image.
This page depicts the case where the presented fingerprints do not match. The cardholder is not validated.
This page depicts the ca do not match. The cardholder is not validated.This page depicts the case where the presented fingerprints match and the cardholder is validated.rd matches the presenter and the cardholder identity is validated.
New Paradigms to create Transparent Trust