Upload
tranthuy
View
220
Download
1
Embed Size (px)
Citation preview
Citizen Biometric Authentication based on e-Document verification. e-Government perspective. Mindshare 2017
Ruslans ArzaniksHead of Development
WHO WE ARE
X Infotech is a global provider of software solutions for digital identity documents and smart cards.
WHAT WE DO
We help governments, local document producers and banks to implement eID and financial/social cards programs, providing the complete IT infrastructure and empowering them to take full and autonomous control of their projects and businesses.
OUR MARKETS
Government electronic Identity, electronic payment/smart cards, electronic Healthcare cards, Border Control solutions.
OUR CUSTOMERS
Governments (ministries and federal units), Banks and Financial institutions.
About us
Customers in45+
countries
≈100 experts
in the team
Quick facts
15 years ofdeep market
expertise
Electronicpassports and cards:
25+successful
projects
Payment cards:200+
successfulprojects
HEADQUARTERED IN EUROPE100% SUCCESSFUL PROJECTS IN 45+ COUNTRIES
Projects completed
Government Projects
eID card for Ghana (ongoing)
Residence Permit Card in Ireland (2016)
Passport Card in Ireland (2015)
Border Control Solution for Tunisia (2015)
Biometric Enrolment Solution for Lithuanian Police (2015)
eID Card in Moldova (2014)
EAC, SAC ePassport in Liechtenstein (2014)
ePassport in Ireland (2013)
Payment card with Biometric ID App for South Sudan (2013)
BAC/EAC ePassport in South East Asia (2013)
eID Card in South East Asia (2012-2013)
eID Card in Latvia (2012)
Scholar Card in Latvia (2012)
Electronic Identity Documents
Government Projects
PKI solution for Electronic Identity Documents
PKI solutions for ePassport in Peru (2016)
PKI solution for eID card & ePassport in Uruguay (2015)
Diplomatic passports
European Union laissez-passer (2015)
ECOWAS laissez-passer in Nigeria (2015)
Social Cards
Social card project in Kenya-Huduma card (2016)
The Hunger Safety Net Programme (2012)
Orphans and vulnerable children project in Kenya (2012)
Egypt social card (2009)
e-Government, Biometrics and Identity Ecosystem
1. e-Government is an economic growth booster, and bridges the gap between government and citizens.
2. Identity Ecosystem is a secure option for citizens to get instantly authenticated and interact with Authorities and banks through electronic devices.
e-Government + Identity
Strong e-Government ecosystem
1. Strong e-Government system = implementation of strong identity system + implementation of secure verification system.
2. Electronic identity and biometric verification systems are paramount for e-Government.
3. The starting point for any e-Government system is robust electronic identity documents.
e-Government solution is not just a trend – it’s acruicial factor to drive country’s development intoday’s world.
Strong e-Government ecosystem
Authentication/verification system must be UI-friendly, convenient and easy to use on the end-user side.
Even if a technology behind the system is industry proven, exceptionally scalable and sophisticated, it will be accepted by the market only when it’s user-friendly.
Next step – is to create a secure and robust system of remote verification and identification of citizens to provide access to publicly available services.
eID documents to access e-Government
1. e-ID card or an e-Passport can be used as a key to access various “doors” or ecosystems within e-Government.
2. e-ID cards don’t require multiple applications. The primary functions are identification and authentication, and can be integrated with external systems/portals for secure authentication and electronic transactions.
3. Main requirement to e-ID documents for authentication – high quality and integrated secure components to avoid fraud.
Types of e-Government Systems
• Population registry
• Civil and criminal biometric databases
• Document issuing system and registry
• Border control system
• Healthcare system
• Public transport system
• Social security system (including subsidy distribution and management)
• Education (including remote education)
• Work / job market
• Real estate and vehicle registries (and its management)
• Company register
• Driver registry
Implementing e-GovernmentBenefits for Authorities
1. Security becomes paramount2. Transparent Government3. Reducing Corruption
Implementation of e-Government together with a strong IdentityEcosystem positively impacts:
• Convenience for citizens.
• Self-service approach.
• Time and money for citizen communication with government.
• Reduction on governmental spending on administration.
• Economical growth.
• Attractive investment landscape.
• Country stability, tourism and other businesses.
Biometric Authentication to access services
с
Form-factors of Authentication
FaceFingerIrisVoice
Document SmartphoneTabletPKI token ID token
Login NamePIN/PasswordPhone Number
VerificationIdentification
Authentication
Something I know
Something I have
Something I am
Complexity of Authentication Process
Problems faced when selecting a solution for online authentication
When solving these problems, "quality - reliability" must not be compromised.
The goal is to find the ideal (optimal) combination of software platforms and authentication form-factors to ensure user convenience
and the maximum reliability.
usability security usabilitysecurity
usability security
Type Advantage Disadvantage
PIN / Password Short, simple, easy to remember
Low level of security
Phone Number Easy to remember Low level of security
Token, Code Calculator Average-level of security It is necessary to receive a token or a code card at the bank upon request and carry it with you
Electronic signature High-level of security PIN must be stored and the driver must be downloaded, according to the latest version of the OS
Document (ID, identity card) High-level of security Not always supported for remote authentication
Fingerprints combined with a document or electronic signature verification
Highest-level of security, always with you
Application and/or the driver must be downloaded
Face recognition combined with a document or electronic signature verification
Highest-level of security, always with you
Application and/or the driver must be downloaded
Suggested authentication options based on X Infotech solutions
Type Comments
Password + PIN Minimum level of security
Phone Number (or email) + PIN Minimum level of security
ОТР (One Time Password, one-time passwords) using SMS
Weak level of security
Electronic signature + Face recognition
High level of security, maximum protectionYou still need to remember the PIN for the e-signature as well as download the card drivers on the computer whenever a new version of the OS is released.
Electronic document verification using RFID technology and a tablet/phone + Face recognition
High level of security, maximum protectionThere is no need to remember the PIN-code. Nothing is required except that you connect to the Internet, have an NFC-enabled mobile device (running Android OS), and have your electronic document.
The vendor-independent solution permits clients to deploy authentication products for:
eDocument & Biometric Verification is integrated with X Infotech Authorization Server, X Infotech Integration Services and X Infotech Identity Management - central face\fingerprint verification service and biometric database.
WEB/Desktop application Mobile application
Authorization Server
+Identity
Management+
Integration Services
Liveness detection App supports live photo/video capture with automatic quality validation and photo/video compression. Liveness detection ensures that the client is a live person, not a photo or video. The feature can be turned on/off in application settings.
eDocument & Biometric Verification
AUTHORIZATIONAuthentication
X Infotech Solution, Authorization Server
Web interface
Add a user and rights
Android smartphone, NFC
Solution Functionality
X Infotech Solution, IDMS
Identity Management (IDMS) is a Biometric registry which serves as an integration layer between AFIS/ABIS engines and service systems, and can perform 1:1 or 1:N matching.
Authorization server supports three factor authentication — knowledge, possession, inherence.
ExternalSERVICE
SUPPLIERX Infotech Integration
services
Authentication with Smartphone
User identifies himself with smartphone and a public
service web page
2. Authorization
User is authorized and can use the services
1. Authentication
Authentication with Smartphone
DOCUMENT
FACE RECOGNITION
Select authentication method
Authentication with Smartphone
Authentication with Smartphone
Authentication with Smartphone
Document-based Authentication
Document-basedAuthentication with
Face matching