1 / 21

8th Asian High Security Printing Conference Beijing PRC Authors: Victor Zazzu & Wenyu Han

Enhancing the Security of RFID/Smart Cards using a Novel Secure OVD Machine Readable Detection System. 8th Asian High Security Printing Conference Beijing PRC Authors: Victor Zazzu & Wenyu Han October 2009. ZBA History as Related to Secure Hologram Detectors. Incorporated - 1994

Download Presentation

8th Asian High Security Printing Conference Beijing PRC Authors: Victor Zazzu & Wenyu Han

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Enhancing the Security of RFID/Smart Cards using a Novel Secure OVD Machine Readable Detection System 8th Asian High Security Printing Conference Beijing PRC Authors: Victor Zazzu & Wenyu Han October 2009

  2. ZBA History as Related to Secure Hologram Detectors • Incorporated - 1994 • Developed Hologram Insertion Reader - 1996 • Developed Hologram/Mag/Barcode Reader - 1998 • Developed Reader for Laser Ablated Codes - 2003 • Developed Reader for Random Optical Patterns - 2006 • Developed Hologram Latency Image Viewer - 2007 • Formed VSD Tech In DongGuan China - 2008

  3. Various Methods to Verify a Hologram Security Patch Human Eye Simple Viewer to detect latency image. Microscope to detect micro-printing. Lab instrument to detect the Hologram’s unique optical patterns. Machine Read & Instantly verify the unique fingerprint of the hologram +.

  4. Known Counterfeit Items • ID cards • Expensive Liquors • Cigarettes • Prescription drugs • Consumer electronics • The list is essentially endless

  5. Threats to Document & ID Security

  6. Enhancing Security of ID Cards via Optical Detecting System The following system is designed to enhance the security of an ID card by automatically detecting & correlating multiple, random artifacts of the manufacturing process via, • Use of Specially designed OVD (Holograms) • Non-registered placement of the OVD code. • Random generation of optical marks. • Random overlay placement.

  7. ID Card Design Requirements • We have developed a design method for manufacturing Machine Readable RFID Personal Identification cards which are extremely difficult to counterfeit. • Our design constraints were : • Easy to use. • Extremely difficult to counterfeit the cards. • Fast reading & instant verification. • No special or overly complex manufacturing procedures. • Minimal impact to the card costs. • Extremely low false positive reads. • The system has to be secure for both on-line and/or off-line operation.

  8. Enhancing the Security of ID Cards • The system is based upon the fundamental parameter of detecting random optical features. • The optical pattern is machine readable and instantly verifiable. • The optical pattern gives each card its own fingerprint. • The optical pattern is also used to calculate a set of encryption keys for the RFID data. • When used in combination with a biometric scanner the total verification process is covered.

  9. RFID Card Security System When using the Optical Security system • Each Card becomes unique by carrying its own unique “optical pattern”. • The optical code on each card prior to being issued is “meaningless” until it is enabled by a issuing system. • Each card is enabled by: • Scanning the unique optical pattern, • Reading the RFID card’s unique serial number , • Mathematically generate an encryption key, and • Subsequently, store that information along with the personal data on the RFID chip and/or secured database.

  10. Hologram Patch Laser ablated patterns Holographic optical patterns Hot Stamped Holographic patch • The optical code consists of multiple independent optical patterns. • A first pattern is formed as part of the Hologram’ s origination. • The first pattern is depicted here by the parallelograms although it may be any geometric shape. • The step & repeat of the hologram pattern is specifically chosen to be a non-integer multiple of the patch’s dimension. • A second pattern is incorporated into the holographic material using Laser ablation.

  11. Major Card Manufacturing Steps • This system uses conventional card manufacturing techniques: • The RFID inlay is laminated between two PVC or PET layers and the card is die cut to ISO7810. • Hologram is hot stamped at the appropriate location. • The card is lasered to generate the second pattern . • At this point the cards are 100% quality tested to remove any defects in the patterns. • This process has just made each card unique,

  12. Optical-RFID Card Security System • Each of the multiple optical patterns are scanned independently, • The optical patterns are then mathematically convolved with: • Each other • The RFID Unique identifier • Other unique personal data (such as SS# number etc ) To generate a verification data set that valid for this and only thisspecific card. • The convolved code is then stored in a secure portion of the RFID’s memory, or a secure database.

  13. Hologram Design Geometric shapes for machine reading

  14. Hologram Design Decorative shapes to hide machine readable features

  15. Hologram Design

  16. Hologram Design

  17. Card Example Hologram appears as decorative to the human eye This picture was taken in a condition as to exaggerate some of the patterns for this presentation. The Illuminated points shown in this image are part of the code and part of the diversionary elements. Taken with a Digital camera

  18. Security Code Combinations • Each additional security feature greatly increases the possible code combinations. • A secure optical card with 12 laser ablated holes and only 2 additional optical features would yield greater than 1030 combinations. • The combinations can increase with higher resolution sensors. • Using the technique outlined here additional optical elements may also be used either singularly or in combination; • such as glitter flakes or • energy converting ink.

  19. Summary • Machine readability • Simple insertion into the scanner starts the process. • No human decision needed to determine authenticity! • Fast and efficient detection. • Instant match-on-card verification. • Easy to use. • Easy to manufacturing the cards • Minimal cost per card impact • Extremely difficult to counterfeit, genufeit or modeifeit the host card.

  20. Summary The machine readable multi-random OVD system presented here guarantees the validity of the RFID Card, and when combined with a biometric scan, that will verify the person; The resultant security system will yield as close to un-counterfeitable RFID based ID Card System as possible. .

  21. Acknowledgements Thanks to our development partners: Crown Roll-Leaf Inc., Paterson, NJ Composecure LLC, Mountainside, NJ

More Related