Latest Technology of Security Document

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

Symantec 2010 Windows 7 Migration EMEA Results. Methodology Applied Research performed survey 1,360 enterprises worldwide SMBs and enterprises Cross-industry.
Symantec 2010 Windows 7 Migration Global Results.
AKC Rally Signs These are copies of the 2008 AKC Rally signs, as re-drawn by Chuck Shultz. Use them to print your own signs. Be prepared to use a LOT of.
Completing the Accounting Cycle Accounting Principles, Ninth Edition
Variations of the Turing Machine
1
Distributed Systems Architectures
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 4 Computing Platforms.
Processes and Operating Systems
Slide 1 FastFacts Feature Presentation August 12, 2010 We are using audio during this session, so please dial in to our conference line… Phone number:
Task Group Chairman and Technical Contact Responsibilities ASTM International Officers Training Workshop September 2012 Scott Orthey and Steve Mawn 1.
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
FIGURE 8.1 Process and controller.
Process a Customer Chapter 2. Process a Customer 2-2 Objectives Understand what defines a Customer Learn how to check for an existing Customer Learn how.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt FactorsFactors.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Wants.
Plan My Care Brokerage Training Working in partnership with Improvement and Efficiency South East.
1 Advanced Tools for Account Searches and Portfolios Dawn Gamache Cindy Bylander.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
NexSentry Imaging Solutions
Photo Slideshow Instructions (delete before presenting or this page will show when slideshow loops) 1.Set PowerPoint to work in Outline. View/Normal click.
Site Safety Plans PFN ME 35B.
Computer Literacy BASICS
Impressive Star Softwares (P) Ltd. Presents Sent Item Box-Detail of Mails from Tally ( 1.0 )
Welcome. © 2008 ADP, Inc. 2 Overview A Look at the Web Site Question and Answer Session Agenda.
1 Java Card Technology Prepared by:Ali Toyserkani Adopted from: Introduction to Java Card Technology C. Enrique Ortiz.
Narita International Airport Corporation All Rights Reserved. Yoshihiro Ozawa Planning Department Narita International Airport Corporation 21 April 2005.
© SafeNet Confidential and Proprietary Administering SafeNet StorageSecure Smart Card Module 3: Lesson 5 SafeNet StorageSecure Storage Security Course.
Version 1.0 digitaloffice.intel.com Intel ® vPro Technology Intel ® Active Management Technology Setup and Configuration HP Laptop – Compaq 6910p Small.
Configuration management
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 2: Managing Hardware Devices.
1 CIFTlab1.2 Software for Clinical Diagnostic Laboratories 1.
Turing Machines.
1. Documents types Visas (ID-2) ICAO standard passports (ID-3) ID cards and driving licences (ID-1) Travel and identity documents.
Discovering Computers Fundamentals, 2012 Edition
PP Test Review Sections 6-1 to 6-6
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 31 Slide 1 Service-centric Software Engineering.
User Friendly Price Book Maintenance A Family of Enhancements For iSeries 400 DMAS from Copyright I/O International, 2006, 2007, 2008, 2010 Skip Intro.
EIS Bridge Tool and Staging Tables September 1, 2009 Instructor: Way Poteat Slide: 1.
Health Artifact and Image Management Solution (HAIMS)
Bellwork Do the following problem on a ½ sheet of paper and turn in.
70-270: MCSE Guide to Microsoft Windows XP Professional Second Edition, Enhanced Chapter 3: Using the System Utilities.
CS 6143 COMPUTER ARCHITECTURE II SPRING 2014 ACM Principles and Practice of Parallel Programming, PPoPP, 2006 Panel Presentations Parallel Processing is.
Operating Systems Operating Systems - Winter 2010 Chapter 3 – Input/Output Vrije Universiteit Amsterdam.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
 Copyright I/O International, 2013 Visit us at: A Feature Within from Item Class User Friendly Maintenance  Copyright.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Mobility Tool Fremtidens afrapportering 2013 – Erasmus Mobilitet / IP 2014 – Erasmus+ aktioner.
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
SLP – Endless Possibilities What can SLP do for your school? Everything you need to know about SLP – past, present and future.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
By CA. Pankaj Deshpande B.Com, FCA, D.I.S.A. (ICA) 1.
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
1 Titre de la diapositive SDMO Industries – Training Département MICS KERYS 09- MICS KERYS – WEBSITE.
Chapter 12 Working with Forms Principles of Web Design, 4 th Edition.
A lesson approach © 2011 The McGraw-Hill Companies, Inc. All rights reserved. a lesson approach Microsoft® PowerPoint 2010 © 2011 The McGraw-Hill Companies,
Import Tracking and Landed Cost Processing An Enhancement For AS/400 DMAS from  Copyright I/O International, 2001, 2005, 2008, 2012 Skip Intro Version.
Page 1 Orchard Harvest ™ LIS Find a Patient Training.
Presented by: HCN Clinical Operations Team. 2 TopicPage Top Reasons to have and use the Patient Portal3 Sample Portal Websites4 Portal 1016 Meaningful.
1 DIGITAL INTERACTIVE MEDIA Wednesday, October 28, 2009.
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
THE MALAYSIAN ELECTRONIC PASSPORT
THE MALAYSIAN ELECTRONIC PASSPORT
Presentation transcript:

Latest Technology of Security Document Seminar on Information Security Technologies Toward e-Government 19 NOV 2003 TOSHIBA CORPORATION SOCIAL NETWORK & INFRASTRUCTURE SYSTEM COMPANY SYSTEM COMPONENTS DIV.

Contents Our Company Issuing Systems for Travel Document (Passport, Visa) Biometrics Technology (Face Recognition) Smart Card (JavaCard™ ) Summary Questions and Answers 2 / TOSHIBA Latest Technology of Security Document

TOSHIBA CORPORATION Toshiba, a world leader in high technology, is an integrated manufacturer of electrical and electronic products spanning; Information & communications equipment and systems - PC and other computer systems- Storage devices- Telecommunications equipment-  Social automation systems- Medical electronics equipment- Space related products, etc.  Electronic components & materials  Power systems & industrial equipment Consumer products 3 / TOSHIBA Latest Technology of Security Document

Social Network & Infrastructure Systems Company (In-house company) Social Network & Infrastructure Systems Company provides microwave communications systems, broadcasting systems, automated equipment systems, and radio application systems, that utilize cutting-edge IT and computer technologies. Capitalizing on our accumulated know- how and our customers’ confidence in us, we are committed to providing products and services in a timely manner that are excellent in quality and backed by the latest technologies so as to contribute to society and industry, and thus realize an affluent future. Airport surveillance radar / Secondary surveillance radar Transmitter system for terrestrial digital broadcasting Face recognition access control system 4 / TOSHIBA Latest Technology of Security Document

System Components Division ( Products ) MRTD Issuing Systems Banknote Processor Letter Sorting Systems Automated Entrance for Station Security Systems Face Recognition Systems Sport Lottery Terminals IC Card System 5 / TOSHIBA Latest Technology of Security Document

Today's Issue "Add biometrics data on the passport" The global request about the machine readable travel document (MRTD) after the 9.11 U.S. terrorism Preparation of the US Law "Enhanced Border Security and Visa Entry Reform Act" Simplifying passenger travel and the immigration examination Security improvement against forgery Toshiba's Security product Issuing Systems for MRTD (Passport, Visa) Biometrics Technology (Face Recognition) Smart Card (JavaCard ®) 6 / TOSHIBA Latest Technology of Security Document

1. Issuing Systems for Travel Document 7 / TOSHIBA Latest Technology of Security Document

Passport Issuing Systems Data center Passport database Network Passport office Consumables Controller (PC) Passport Printer Scanner LAN Local computer Ink ribbon Toshiba’s Passport Issuing Systems Laminate film 8 / TOSHIBA Latest Technology of Security Document

Feature of Passport Printer Reliability Toshiba is innovating systems for passport issuing to achieve high availability of the equipment with less maintenance. Toshiba recommends small sized system able to install in a small passport issuing office such as oversea sites. Toshiba prepares two types of passport issuing system to realize passport issuing in small issuing sites to large issuing sites. By using our system it is capable to unify passport. System print to the passport which contain IC Inlet in the back cover or the center of the booklet, and can write data automatically into IC inside the passport printer. Small Floor Space Unify Passport Record data to IC Inlet 9 / TOSHIBA Latest Technology of Security Document

High speed / High Definition / High durability printing Color pile printing accuracy Image- processing technology Printing method Laminate film Ink ribbon MRP booklet Indirect heat Transfer printing Ink Product composition technology 10 / TOSHIBA Latest Technology of Security Document

Example of Anti-Forgery Use (1) Printing Print Character Information, Photograph and Applicant’s Signature on the personal data page in single operation. Ghost Printing (Option) Print light color small sized photograph (Ghost Printing) on the character of personal data page. This is effective against photograph forgery. Invisible Fluorescent Printing (Option) Print signature, authority, minute character etc. by invisible fluorescent ink. Capable to see by using black lights. Ghost Printing Printing Invisible Fluorescent Printing 11 / TOSHIBA Latest Technology of Security Document

Example of Anti-Forgery Use (2) Thin Laminate Film with Transparent Hologram Our system laminates thin film with transparent hologram on the process of printing. Thickness of Toshiba’s high valued film is less than 10 micro meter. It is difficult to peel off with no damage to the film. It is big efficiency against forgery. This thin laminate film can be also laminated by the system automatically. Other anti-forgery methods (Option) A minute character 12 / TOSHIBA Latest Technology of Security Document

Record of biometrics to IC Chip Print passport which contain IC Inlet in the back cover or the center of the booklet Write data automatically into IC inside the passport printer. ISO/IEC 14443 Type-B, Minimum 32kB (512kB) System writes bio data internally to avoid writing mistake Center of the booklet Back cover Personal data page 13 / TOSHIBA Latest Technology of Security Document

Lineup of Passport printer Type-S Type-S is the high anti-forgery secured system realizes personal data page print and laminate inside page or inside cover page of the passport by single operation. By print and laminate in single operation, it will be efficient for facilitation. Type-F Type-F is an option type realizes high speed, full automated system. By setting blank passport booklets in advance, printer issues passport continuously without operator’s passport booklet feeding by hand. 14 / TOSHIBA Latest Technology of Security Document

Basic Specification for Type-S Capable Booklet Size to print (ICAO Standard ) 125 x 88 mm ( 24 to 60 pages ) Capable of printing “Inside cover page” or “Inside page” Printing Method (Thermal transfer printing ) Portrait, Signature; Full color (YMC each color 256 tones) Character; Black only Invisible Fluorescent Printing; Single fluorescent color Resolutions; 400dpi Lamination; Less than 10 micro meter Write data into IC automatically MRZ data, VIZ data, Portrait data, Digital signature, etc 15 / TOSHIBA Latest Technology of Security Document

Facilitation (Operation of Type-S) Open blank passport booklet feed into the system by the operator. Automatically print and laminate the passport, and write data into IC ,and eject. Printer(Type-S) Manual booklet Feed/Eject Printing, Lamination, Write IC 16 / TOSHIBA Latest Technology of Security Document

Passport printer (Type-F) Blank passport (max. 50) are set into the feed stocker in advance. Process of page feed, turn over, printing, laminating, folding, write data into IC chip and stock is done automatically in single operation. Feed stocker Page turn over Printing and lamination PASS PORT Feed Stocker Write data into IC Eject stocker PASS PORT Page fold Eject Stocker 17 / TOSHIBA Latest Technology of Security Document

System’s Expandability and Option Passport Printer Automatic verification of MRZ Color printing function to additional page Visa printing (Type-S) Scanner Automatically scan and read application portrait and character. (one side or both sides) Automated portrait adjustment (Adjustment of position, light etc.) Direct applicant photographing for portrait data input 18 / TOSHIBA Latest Technology of Security Document

2. Biometrics Technology (Face Recognition) 19 / TOSHIBA Latest Technology of Security Document

Why security must be needed? Toshiba research (Against 60 companies) A B C D E F G H I J A : Security Policy E : Physical Environment Security I : Business Continue Contol B : Security Organization F : Communication employment control J : Conformity C : Property Classify & Control G : Access Control D : Person Security H : System Maintenance & development 20 / TOSHIBA Latest Technology of Security Document

Risk and Damage against your company Important information Outsourcing Staff and other related working staff Procedure Visitor and other unknown person Mobile PC Legal Problem Trust loss, Loss against after trouble, Business Loss, Leakage of secrets, Budget harm, Lawsuit corresponds, Nomination stop proposal etc. 21 / TOSHIBA Latest Technology of Security Document

Biometrics Technology Highly expected as personal identification method Advantage point compare with prior security systems Wont be left, stolen, lost No consumables needed Unnecessary to remember Can not lend to another person, difficult to imitate Needs Against MRTD and ID forgery, biometrics technique is highly expected for personal identification. Small size, low cost, high rate of identification recognition system is required. 22 / TOSHIBA Latest Technology of Security Document

Toshiba Face Recognition Feature No physical contact required; - Stand in front of the camera and captured - Remote surveillance - Using a video camera in TOSHIBA approach Real time management Easy Registration Data renewing function Less influence by hair style, accessories, mustache etc. 23 / TOSHIBA Latest Technology of Security Document

Face recognition system specifications Recognition methods (Toshiba original) Conventional Face Recognition –Subspace Method- Recognition performance Failure Reject Rate Less than 1% Failure Accept Rate Less than 0.1% Recognition speed 10 frames per second (For 1:1 recognition) Necessary time for entry 1 second 24 / TOSHIBA Latest Technology of Security Document

Feature Point Extraction Process Flow of SDK Start Image Input Face Region Detection Feature Point Extraction Normalization Accumulated N Images? Normalized Images Pattern Matching (MSM) Dictionary Matching 25 / TOSHIBA Latest Technology of Security Document

Access Control System with Face Recognition system Sample Access Control System with Face Recognition system Automatic door Control Unit -Recognition engine -Camera control -Ten keyboard control -Door control -Lighting control Electric key Control Panel Operation Unit Door 26 / TOSHIBA Latest Technology of Security Document

Access Control System Overview Sample Access Control System Overview Color LCD Speaker Lighting Ten Keyboard Camera 27 / TOSHIBA Latest Technology of Security Document

Image of Access Control System Sample Image of Access Control System 1. Stand in front of Face Recognition System 2. Recognize 3. Door Opens 28 / TOSHIBA Latest Technology of Security Document

PC Log-on system using Biometrics system Sample PC Log-on system using Biometrics system Identify the user by natural non physical contact. Not need to input password. 1 second recognition only by seating. Risk of forgetting password, leakage, stolen, copy, rent, forgetting identification card are out of consideration. Non contact is preferable compare to iris and fingerprint forget Do not forget Impossible to copy rent Leakage, stolen Waiting time Non contact Short time Proximity infrared rays Contact Some people cannot register Useful Face Recognition 29 / TOSHIBA Latest Technology of Security Document

Use for Immigration and Border Control Toshiba is expecting the use of “Face Recognition System” especially in the travel business field such as Immigration and Border Control related organization all over the world. Enhanced Air Travel Business Process Improved Check-in and Boarding Self Service Transaction Machine(s) Enhanced Border Clearance 30 / TOSHIBA Latest Technology of Security Document

3. Smart Card (JavaCard™ ) 31 / TOSHIBA Latest Technology of Security Document

Feature of TOSHIBA IC Card business - From CHIP to System - Develop and manufacture Silicon Develop OS and Application, and manufacture Smart Card Develop and manufacture devices System integration and consultation - Standardization Activities - Contribute ISO standard as Japanese delegate PC/SC, JCF, Global Platform Japanese IC Card Promotion Association, NICSS  32 / TOSHIBA Latest Technology of Security Document

TOSHIBA Group and IC Card system Social Network & Infrastructure Systems Company System System Integration Terminal Terminals Dedicated Terminal Toshiba TEC issuance Card issuance Personalization/Delivery Toshiba support IC Card business from Silicon to System and service. Card design Card printing embedding Card Production Develop OS and Application COT Toshiba Social Network & Infrastructure Systems Company Silicon LSI Toshiba Semiconductor Company COT:Chip On Tape COS:Card Operating System 33 / TOSHIBA Latest Technology of Security Document

TOSHIBA’s plentiful performance of IC Card biz Since TOSHIBA started R&D of IC Card in the 1980s, we have fulfilled a major role in IC Card field, establishment of ISO and standardization of specification. Up to now, we have many successful records in IC Card field. Credit card VISA,MasterCard,JCB Membership card Gasoline service station membership card  Employee ID Card In and out time record、Cashless system   Insurance Card      General purpose card of public organization ETC Card Electric Toll Collection System   BS digital broadcast card PKI Card Basic resident register card (Publication from Aug 2003) 34 / TOSHIBA Latest Technology of Security Document

TOSHIBA Java Card™(PROFINIA® 10) Specification Open Platform Card Specification Version 2.0.1’ Java Card™ 2.1.1 Runtime Environment(JCRE) Specification Revision 1.0 Java Card™ 2.1.1 Virtual Machine Specification Revision 1.0 Java Card™ 2.1.1 Application Programming Interface Revision 1.0 35 / TOSHIBA Latest Technology of Security Document

TOSHIBA Java Card™(PROFINIA® 10) LSI Specification  CPU    16bitCISC(900L1 Toshiba)  NV memory   32KByte  Co-Processor   Loading  I/O Interface / Protcol   ISO/IEC 7816 / T=1 36 / TOSHIBA Latest Technology of Security Document

TOSHIBA Java Card™(PROFINIA® 10) Download scheme LSI COS (JavaCard) Open Platform Java Applet n ・・・・・ Applet 1 CAP file Loader I/O Interface ISO/IEC 7816 Download Java Compiler + Converter Source code Java language (General language) Provided by Sun Microsystems Provided by Toshiba 37 / TOSHIBA Latest Technology of Security Document

TOSHIBA IC Card line up ※1 PKI :Public Key Infrastructure ※2 T=1 :Protocol regulated in ISO/IEC7816.(T=14: Japanese ISO plan) 38 / TOSHIBA Latest Technology of Security Document

IC Card Printer Integration of process of print IC Card, issuance IC card and magnetic encoding. 39 / TOSHIBA Latest Technology of Security Document

IC Card reader writer Upper interface is RS-232C base Control by PC/SC driver 40 / TOSHIBA Latest Technology of Security Document

IC Card reader writer Upper interface is USB1.1 base Control by PC/SC driver 41 / TOSHIBA Latest Technology of Security Document

IC Card reader writer PC Card Type II Control by PC/SC driver 42 / TOSHIBA Latest Technology of Security Document

Basic resident register Noncontact IC Card applicable to basic resident register which provide multi application by download of Java. IC outline - Communication interface: ISO/IEC14443typeB(Noncontact I/F) - Memory:32KB - CPU:TOSHIBA original low power consumption CPU - High speed cipher coprocessor Spec of Card surface - Magnetic stripe - Emboss is possible - Material: Non-PVC Card application language - Java ROM RAM Memory CPU Coprocessor Logic Non contact IF [sample card ] 43 / TOSHIBA Latest Technology of Security Document

ETC Card By two way communication between terminal in car and terminal in toll booth, toll can be collected without stopping vehicle. This system started in Japan in 2000. Wireless application in toll booth 5.8GHz ETC Circuit ASIC Micro computer Signal communication Transmit/ReceiveMMIC IF MAC (ETC Circuit) CPU Toll -SAM OBU-SAM Communication DSRC  ETC : Electronic Toll Collection System OBU : On Board Unit SAM : Secure Application Module DSRC : Dedicated Short Range Communications MAC: Medium Access Control IC Card 44 / TOSHIBA Latest Technology of Security Document

BS Digital Card CAS Administration center Broadcast station Viewer Digital information IC Card Scrambled screen Key for de-scramble Information of viewer Revision record of key, etc IC Card vendor Information of issuance of key IRD Vendor CAS Administration center ・Card issuance ・Key ・Viewer contract info. ・Record of viewed program Record of viewed program Debit (Pay per View) Distribution of IRD+IC Card Viewer contract info. Application Broadcast station Viewer Role of IC Card ・De-scramble of screen (Key is inside IC Card) ・Viewer contract info. ・Record of viewed program Record of viewed program (Telephone line) 45 / TOSHIBA Latest Technology of Security Document

Insurance association Insurance IC Card Printer Insurance association Issuance IC Card Hospital Accounting system Master ・Receipt operation ・Info.of health check、 and measurement of physical check. Input info. Advice. ・Facility of medical check  Check of reservation PC PC IC Card R/W Printer Issuance of IC Card IC Card R/W Insured person Instead of existing paper insurance card, Insurance IC Card may provide following Merits. More convenient Improvement health care More self-conscious of health This system has been adopted by Yachiyo-city Kumamoto prefecture, TOSHIBA health Insurance association, and TOYOTA health insurance association. 46 / TOSHIBA Latest Technology of Security Document

Security Communication PKI Card Medical agency Cybermall Government institution Shopping Public service Medical service IC Card Portable Internet Certifying body Security Communication by SSL, S/MIME Certification of public key Interception, Falsification, Spoofing Public facility CSP(IE)/PKCS#11(NS) IC Card Portable IC Card Home user KIOSK terminal Browser 47 / TOSHIBA Latest Technology of Security Document

Summary 48 / TOSHIBA Latest Technology of Security Document

Activity for the Future Toshiba will provide system attributes to the social activity and useful system in the world by integrated core technology such as high printing technique, identification system, mechanical paper handling technique and anti-forgery technique. Toshiba provides best solution with integrated printing material, LSI, cards and booklets, visual media and visual database system etc. Toshiba provides high secured system with integrated issuing, biometrics and IC card technology. 49 / TOSHIBA Latest Technology of Security Document

Thank you for your attention Contact Representative Seiji Kubota System Components Division Business Development and System Marketing Department Phone Number : +81-3-3457-2709 Email Address : seiji3.kubota@toshiba.co.jp 50 / TOSHIBA Latest Technology of Security Document