On August 24th, I shared a post titled "Call for Critiques" to explain how we can easily establish a public service for the identification of individuals and organizations (https://lnkd.in/ea2w5nR8). As art of this endeavor, I also consulted with numerous identity specialists.
The uniqueness of this project lies in its DIRECT approach to identification, relying on data from relevant government agencies rather than intermediary documents like ID cards or passports, which can be susceptible to forgery. The chosen solution is made possible through a novel encryption method resistant to brute force attacks, enabled by advancements in quantum computing. I received a significant number of responses, primarily through email or in direct conversations. They confirm that the complete dematerialization of identity documents is possible. read more... |
It's wonderful to see how some people project themselves into the future, forgetting the essential: the present moment. Few documents feature a chip, and only a few smartphones can read them, but that doesn't matter. Some are proposing to launch Digital Identity based on what might exist one day... if all goes well.
It's possible to be content with what already exists, without waiting, and provide everyone with a high-quality digital identity without the need to equip ID cards, passports, and soon all documents that are rightfully feared to be used for costly frauds, which ultimately burden us, the taxpayers. I published a description of this system on LinkedIn a few weeks ago at https://lnkd.in/ea2w5nR8, and thousands of people have read it. I have also engaged with many professionals, and no one has found any flaws in the proposed system. . read more... |
Dozens of counterfeit spare parts have been uncovered within the engines of select Airbus A320 and Boeing 737 aircraft. The European Aviation Safety Agency (EASA), which raised the alarm in early August, has initiated an investigation to ascertain the extent of this fraudulent activity.
The impact of counterfeiting goes beyond inconveniences for passengers. It also affects manufacturers. They not only lose out on the contribution of spare parts to offset aircraft development costs, but their responsibility and reputation are on the line in case of accidents. However, there's a simple solution: sanding a small portion of the protected component and capturing it with a flash, which generates reflections on deformations. These reflections create a unique signature, a nearly impossible-to-replicate Physical Unclonable Function (PUF), stored in the aircraft's database. Using a smartphone, anyone can later verify - from the same point of view by taking another flash photo - the component's authenticity and remaining lifespan. read more... |
DIGITAL IDENTITY COULD BECOME GLOBAL, PRIVATE, AND UNREGULATED ! Until now, the identification of individuals was within the realm of states. Births, marriages, and deaths were registered at the local municipality. This constituted civil registration, forming the basis of the country's entire social organization and democracy. In Europe, we have established strict rules, notably through the GDPR, to prevent the abusive exploitation of our identity and biometric information. One of the objectives is to prevent the use, by entities with varying intentions, of facial recognition to better understand our actions, movements, and intentions. By knowing our health status or travel plans, users of such data could adjust insurance and travel prices, for instance. These are fundamental rights that could slip away from us. . read more... |
Here is an innovation that could change many things in identity: the identification of organizations and individuals could become a public service!
The quality of this service would be much better than what is done today because the identification would be DIRECT, made on the basis of the biometric files of the administrations concerned and not on that of intermediate documents such as identity cards or passports which may have been falsified. We have developed a cutting-edge encryption method that would enable official administrations to offer their citizens and residents an identification method that's virtually fraud-proof. Recently, as a specialist in identity verification (hologram authentication), we've developed a cutting-edge encryption method that enables official administrations to offer their citizens and residents a means of high-security digital identification. It also allows businesses and indeed any entity to create similar identification systems. This method is described in detail in the attached note. It ensures that even if a server storing identity photos or other biometric details was breached, these details couldn't be used to compile a biometric database. read more... |
If you visit the page https://lnkd.in/e2uwHYvS, you'll see that LinkedIn is gradually offering all its clients the option to verify their identity.
Everyone, individuals and professionals alike, will be able to verify online that the person they've just met isn't impersonating someone else. The biometric database made up of identity photos is public since LinkedIn is open to all, allowing anyone to use it to identify people with surveillance cameras in public or private places. Some will be alarmed, but as they've done from the start, by letting various devices listen to their conversations, read their emails, and track their internet usage, they'll see it as "normal", just one of the facets of the modern world. . read more... |
Our identity-based access control system utilizes advanced technologies to provide unparalleled security while simplifying access to physical spaces and digital networks. This cutting-edge solution will transform everyday life and eliminate the need for traditional keys, access codes and passwords.
The method is simple yet effective. Once the person in charge of access control informs the system of an access authorization tied to the individual's unique identifier, the authorized person can swiftly and securely access premises or digital networks. All they need to do is identify the access point, such as scanning a barcode or clicking a link, and present their face to a smartphone to gain entry. No more hassle with lost, forgotten, or stolen keys, access codes or passwords! . read more... |
A signed barcode is sufficient, provided that a few simple rules are followed: In addition to the most important data, it should contain references to a digital file and an integrity control element for that file (such as a hash and/or checksum).
Here's how this method establishes an identity, whether face-to-face or online. - Scanning the signed barcode - Displaying the signed text - Displaying the ID Photo - Acquiring the Portrait - Confirming the Identity . read more... |
We must stop developing digital identity projects that involve the manufacture of NFC chips, their insertion into identity documents and the storage of information from these chips in the secure element of a smartphone. All of this is very complicated, whereas a simple signed file containing the photograph of the holder and all the details of his identity would constitute a much less expensive and much more secure solution to provide all citizens with a digital identity.
Here's how it works: the public authorities will send everyone a "SIF" (for "Secured Identity File") which is a digital file containing the official identity photo of the holder, the details of his identity, and a digital signature guaranteeing the integrity of this file. . read more... |
Access control systems are getting smarter, and many companies have been tempted to use NFC technology as a key, although it is both expensive and dangerous.
NFC keys are generally designed to be secure and resistant to fraud attempts. However, it is important to note that their security can be influenced by several factors. For instance, if the key is physically unprotected and falls into the wrong hands, it might be possible for an attacker to copy or reproduce it. Furthermore, their security can also be affected by vulnerabilities in the computer systems used to manage and control them. . read more... |
I was surprised by the performance of my latest post...
(English version and French version) - Hologram authentication - the good practices - The essential evolution of identification procedures - What future for identity businesses? . read more... |
My passport is therefore freely accessible, and any fraudster can print a copy after replacing my passport photo with his! The “facial liveness detection” that ID verifiers are so proud of is no longer worth anything if they compare the fraudster's selfie with the photo he affixed to a copy of my ID.
Each of you is probably in the same situation because copies of your identity documents are everywhere, on many servers of companies that have verified your identity online. Travel agencies around the world are indeed only cases among others. . read more... |
A hologram is a security device that one must be able to authenticate if it is to protect a product or document against counterfeiting. Otherwise, it is only decorative.
Several companies indicate that they authenticate holograms, but their methods are not effective, and put users at risk of identity theft or acquisition of counterfeit products, and all those who offer such authentication services of significant legal risks. Optic-ID just published a document describing the good practices. . read more... |
The two major disruptions of digital identity and quantum computing will transform how we identify ourselves online and offline.
Issuers of identification means, such as passports, identity cards, and payment cards, will need to rethink their protection methods to address these challenges. Physically Unclonable Functions (PUFs) are a promising solution, offering unique and unpredictable characteristics that are difficult to clone or reproduce. Identity verifiers will also need to adapt to these new technologies to continue ensuring reliable identity verification. I have tried to find answers to these challenges, but this is of course only a personal contribution to the debate that I propose to engage in. . read more... |
Authenticating a hologram consists in verifying that its appearance from a certain point of view and under certain lighting conditions is as expected, and also in verifying that this appearance changes when changing point of view or lighting conditions.
The appearance of a hologram depends on the point of view from which it is observed and the position of the light source. So, just looking at the hologram without knowing the precise position of the point of view or doing this operation in ambient light, without measuring the position of the lighting sources, does not make it possible to authenticate it properly. With the naked eye, the position of the viewpoint can be assessed imprecisely, but it is impossible to measure the position of the light sources if the operation is carried out in ambient light. One can use artificial intelligence with a machine learning algorithm that is trained using a dataset containing both genuine hologram images and counterfeit hologram images to enable it to learn to identify features distinctive features of authentic holograms, but there too, it must be ensured that the acquisitions made during the authentication procedure were carried out from a point of view and under lighting conditions similar to those of the images used for this training which are used by the algorithm. Authenticating a hologram consists in verifying that its appearance from a certain point of view and under certain lighting conditions is as expected, and also in verifying that this appearance changes when changing point of view or lighting conditions. read more... |
Julien RETAILLEAU, head of service at the French Gendarmerie, has just explained that out of 100,000 gendarmes, only 600 had been trained in the authentication of identity documents... Only zero point six percent! It would be interesting to have the same data for the Police and for the postal organization.
When you go to get a registered letter from the post office, the employee checks that your name matches the one to whom the mail is addressed, and if the photo looks like you, it usually doesn't go any further. More seriously, the Digital Identity service of the French postal organization is satisfied with this too week identification procedure to open access to more than 1,000 online services via the platform set up by the French State, called FranceConnect! Such identification, if requested by a usurper, allows him after a single fraudulent identification, to modify your tax returns, to open accounts and take out loans under your name, to have access to your medical records, to declare the sale of your car, to order a new one, to sign to launch a Referendum of Shared Initiative, and even... to declare the birth of a child and soon to vote online! read more... |
Here is an improved list mentioning remote identity verification services providers who have initiated a certification process in France, where it is likely that one day it will be compulsory to carry out this activity and therefore remain an international operator.
I hope I did not forget anybody... Please let me know what changes you would like me to make to this list or if you would like to add information to your citation. I will update it regularly. read more... |
In France, remote identity services are certified by the National Information Systems Security Agency (ANSSI).
It is not possible to become or remain one of the world leaders without acquiring this official certification. Acquisition of identification data comprises acquiring a video of the identity document presented by the user. The French rule obliges ID verification companies to acquire a VIDEO and not a still image. read more... |
A document may look authentic, but the best-trained human operator cannot verify without precise measuring equipment that the hologram protecting it has exactly the shape, color and position it should have for the point of view considered and for the positions of the light sources. He often cannot even measure them. Fraudsters therefore have good days ahead of them.
It is for this reason that customs officers and border police use automatic machines that photograph the documents from different known angles and lighting and compare them with the appropriate references. read more... |
Optic-ID has received from both the USPTO and the EPO the text proposed for grant for its second international patent, which will therefore, like the basic patent, be protected in Europe and the USA.
This request protects a new method of authentication of 3D security devices such as holograms, in which the user no longer needs to place the Smartphone in a specific location, and can place it in an unexpected location at the start. . read more... |
Al the fraudster has to do is to make a photography of your ID card, replace your photo by his with an image editor, add the appearance of the required hologram, print the result and show it to his smartphone when he is asked to. The identity verification company will then ask him to shoot a selfie and compare his appearance with… his own photography. He will be registered as being you!
Under your name, he may then open bank accounts, order products, make reservations, view your health records, and enter into your web pages and computers! These are only examples and he certainly has much more imagination. Optic-ID has developed technologies enable authenticating holograms and other security devices protecting identity cards, passports, banknotes and many other documents and products. All this is done instantly using any smartphone. read more... |
More than 400 malicious Android and iPhone applications, which have gone undetected by the defenses of the Google Play Store (Android) and the iPhone App Store, potentially infect millions of devices, and are used to obtain your passwords.
These apps, all available on the Google Play Store and Apple's App Store, are proposed as photo editing apps, VPN services, business apps and other utilities to trick users into downloading them. read more... |
In many occasions, one wishes to prove his age without providing his identity.
This is possible by limiting the information on one side of the identity card to the holder's photo and date of birth, and by transferring all the other information to the other side. Photo and date of birth can be secured by conventional 3D security devices (holograms, lenticular images, etc.), as is already the case on recent identity cards from major countries. To prove your age, all you have to do is acquire a short video of the card, changing the location slightly, then verifying with a selfie that the photo of the wearer is indeed compatible with that affixed to the card. This very fast procedure can be done both face-to-face and remotely with Optic-ID technology. It therefore becomes very easy to protect minors from pornography, tobacco, alcohol and many other adult activities, and this new version of ID card will not be more expensive than the secure cards that exist today. in the world today. read more... |
Some customers wanted tickets in the paper format, not nominative, to be able to transfer them in case of impediment, and that is understandable. This is what paved the way for the manufacture of counterfeits: from one authentic ticket, fraudsters have printed thousands, all of which bearing the same barcode. The first customer may enter the stadium, but the following ones are refused.
The solution is however simple: the 3D PUFs, the “Physical Unclonable Functions *”. Very easy to print, and impossible to copy. The holder of a counterfeit ticket only has to show it to his smartphone to find out whether or not he will be allowed into the stadium. read more (in French)... |
Imagine an ID card that you can receive by email, print as many times as you want, and even display on your Smartphone.
It is the most secure in the world because no one can change the photo or the details of the identity of the holder. read more... Read the note. |
This new service uses the NFC chip. It will therefore enable everyone - without the holder's consent - to catch his name, date and place of birth, gender, and e-mail address! For an example, a point of sale will save all its visitors details and will then be able to send them emails without asking their opinion.
Another feature of the service is that it does not allow the holder's photo to be acquired, which the CNIL would have prohibited. It therefore does not make it possible to ensure by a “selfie” that it is indeed the document holder who identifies himself online. read more... |
This small 3D marking is a very easy to print “PUF”, and if you had to show it to the camera of your smartphone to pay or access your account, it is clear that one would need to have your payment card in your hands.
Fishing attempts and other techniques used to steal your credit card numbers would no longer be of interest to hackers. read more... |
Identification by photo or video of an identity document will live its last days because banks and companies will not be able to be satisfied for long with current practices that make identity theft too easy.
Indeed, all a forger needs to do is to photograph a third party's identity document, reproduce it after replacing the photo with his own using any image editing software, and present this document to his smartphone to identify himself under the name of this third party whose identity can then be used for everything, to sign contracts in his name, to place orders on the Internet or to empty his bank accounts, just to take a few examples. The current procedures consist mainly of reading the mentions on the documents and no one can claim that they make it possible to guarantee that a document presented is indeed an unforged original. read more... |
“Some candidates decide to call on people who seem more attractive to them in order to replace them and better convince recruiters.
This is all the more possible in large companies where the staff in charge of human resources is not always in direct contact with new recruits." However, an official document makes it possible to verify that the appearance of the candidate is indeed authentic, on the condition that his photo has not been replaced by another, and for that, it suffices to verify the authenticity of this document, and in particular the hologram with which 80% of identity documents in the world are provided. read more... |
An event has just occurred: an issuer of identity documents is considering acquiring our patents to deprive its competitors of them, considering that if it becomes the only one able to issue documents that may be authenticated online, its position could become almost monopoly in the market.
Countries are indeed sensitive to this possibility of identification, because it is the means for citizens to complete formalities and secure their relations with their banks and their entire environment. Major customers could therefore quickly turn away from documents and holograms that cannot be authenticated by smartphone. read more... |
if a fraudster photographs your identity document and sends to the identity verifier a reproduction in which he has replaced your photo with his, he can sign contracts in your place, order products and services, consult your medical file, empty your banck accounts, etc.
That's why the best document verification companies want to check that the ID document you upload is not a fake. More and more don't satisfy themselves with simply reading the document. They need to check the ID document is the original. This requires verifying the hologram which is present on 80% of ID documents. read more... |
The new French identity card will soon be able to be authenticated in a very secure way by all professionals and by the general public, using any smartphone.
You can even use it to complete formalities, sign documents, view your accounts, pay and vote online. This new French technology, protected by strong international patents, will be applied to many other documents around the world, and to banknotes. more info: https://lnkd.in/dqx3vcP |
Optical PUFs allow on line identification.
You know what is a Physical Unclonable Function. It is a kind of digital fingerprint of an object, which can serve as its unique identifier. read more... |
Franck Guigan 2024.11.03