Optic-ID

Optic-ID brings to states, businesses, consumers and citizens
secure solutions to identify face-to-face and online,
and to facilitate their economic and social life.

Answers to critiques

On August 24th, I shared a post titled "Call for Critiques" to explain how we can easily establish a public service for the identification of individuals and organizations (https://lnkd.in/ea2w5nR8). As art of this endeavor, I also consulted with numerous identity specialists.
The uniqueness of this project lies in its DIRECT approach to identification, relying on data from relevant government agencies rather than intermediary documents like ID cards or passports, which can be susceptible to forgery.

The chosen solution is made possible through a novel encryption method resistant to brute force attacks, enabled by advancements in quantum computing.

I received a significant number of responses, primarily through email or in direct conversations. They confirm that the complete dematerialization of identity documents is possible.  read more...

This Digital Identity concept is not working yet

It's wonderful to see how some people project themselves into the future, forgetting the essential: the present moment. Few documents feature a chip, and only a few smartphones can read them, but that doesn't matter. Some are proposing to launch Digital Identity based on what might exist one day... if all goes well.

It's possible to be content with what already exists, without waiting, and provide everyone with a high-quality digital identity without the need to equip ID cards, passports, and soon all documents that are rightfully feared to be used for costly frauds, which ultimately burden us, the taxpayers.

I published a description of this system on LinkedIn a few weeks ago at https://lnkd.in/ea2w5nR8, and thousands of people have read it. I have also engaged with many professionals, and no one has found any flaws in the proposed system. .   read more...

Aviation parts counterfeits

Dozens of counterfeit spare parts have been uncovered within the engines of select Airbus A320 and Boeing 737 aircraft. The European Aviation Safety Agency (EASA), which raised the alarm in early August, has initiated an investigation to ascertain the extent of this fraudulent activity.

The impact of counterfeiting goes beyond inconveniences for passengers. It also affects manufacturers. They not only lose out on the contribution of spare parts to offset aircraft development costs, but their responsibility and reputation are on the line in case of accidents.

However, there's a simple solution: sanding a small portion of the protected component and capturing it with a flash, which generates reflections on deformations. These reflections create a unique signature, a nearly impossible-to-replicate Physical Unclonable Function (PUF), stored in the aircraft's database. Using a smartphone, anyone can later verify - from the same point of view by taking another flash photo - the component's authenticity and remaining lifespan.  read more...

AMAZON now announces its intention to compete with MICROSOFT/LINKEDIN in Digital Identity


DIGITAL IDENTITY COULD BECOME GLOBAL, PRIVATE, AND UNREGULATED !
Until now, the identification of individuals was within the realm of states. Births, marriages, and deaths were registered at the local municipality. This constituted civil registration, forming the basis of the country's entire social organization and democracy.

In Europe, we have established strict rules, notably through the GDPR, to prevent the abusive exploitation of our identity and biometric information. One of the objectives is to prevent the use, by entities with varying intentions, of facial recognition to better understand our actions, movements, and intentions. By knowing our health status or travel plans, users of such data could adjust insurance and travel prices, for instance. These are fundamental rights that could slip away from us. .   read more...

Call for critiques

Here is an innovation that could change many things in identity: the identification of organizations and individuals could become a public service!

The quality of this service would be much better than what is done today because the identification would be DIRECT, made on the basis of the biometric files of the administrations concerned and not on that of intermediate documents such as identity cards or passports which may have been falsified.

We have developed a cutting-edge encryption method that would enable official administrations to offer their citizens and residents an identification method that's virtually fraud-proof.

Recently, as a specialist in identity verification (hologram authentication), we've developed a cutting-edge encryption method that enables official administrations to offer their citizens and residents a means of high-security digital identification.

It also allows businesses and indeed any entity to create similar identification systems.
This method is described in detail in the attached note. It ensures that even if a server storing identity photos or other biometric details was breached, these details couldn't be used to compile a biometric database.  
read more...

Call for critiques

If you visit the page https://lnkd.in/e2uwHYvS, you'll see that LinkedIn is gradually offering all its clients the option to verify their identity.
Everyone, individuals and professionals alike, will be able to verify online that the person they've just met isn't impersonating someone else.
The biometric database made up of identity photos is public since LinkedIn is open to all, allowing anyone to use it to identify people with surveillance cameras in public or private places.
Some will be alarmed, but as they've done from the start, by letting various devices listen to their conversations, read their emails, and track their internet usage, they'll see it as "normal", just one of the facets of the modern world. .   read more...

Our new identity-based access control system

Our identity-based access control system utilizes advanced technologies to provide unparalleled security while simplifying access to physical spaces and digital networks. This cutting-edge solution will transform everyday life and eliminate the need for traditional keys, access codes and passwords.

The method is simple yet effective. Once the person in charge of access control informs the system of an access authorization tied to the individual's unique identifier, the authorized person can swiftly and securely access premises or digital networks. All they need to do is identify the access point, such as scanning a barcode or clicking a link, and present their face to a smartphone to gain entry. No more hassle with lost, forgotten, or stolen keys, access codes or passwords! .   read more...

Digital Identity: A signed barcode is sufficient!

A signed barcode is sufficient, provided that a few simple rules are followed: In addition to the most important data, it should contain references to a digital file and an integrity control element for that file (such as a hash and/or checksum).

Here's how this method establishes an identity, whether face-to-face or online.
- Scanning the signed barcode
- Displaying the signed text
- Displaying the ID Photo
- Acquiring the Portrait
- Confirming the Identity .   read more...

Stop developing digital identity projects with NFC chips!

We must stop developing digital identity projects that involve the manufacture of NFC chips, their insertion into identity documents and the storage of information from these chips in the secure element of a smartphone. All of this is very complicated, whereas a simple signed file containing the photograph of the holder and all the details of his identity would constitute a much less expensive and much more secure solution to provide all citizens with a digital identity.

Here's how it works: the public authorities will send everyone a "SIF" (for "Secured Identity File") which is a digital file containing the official identity photo of the holder, the details of his identity, and a digital signature guaranteeing the integrity of this file. .   read more...

The key of the future could be an OPUF

Access control systems are getting smarter, and many companies have been tempted to use NFC technology as a key, although it is both expensive and dangerous.

NFC keys are generally designed to be secure and resistant to fraud attempts. However, it is important to note that their security can be influenced by several factors. For instance, if the key is physically unprotected and falls into the wrong hands, it might be possible for an attacker to copy or reproduce it. Furthermore, their security can also be affected by vulnerabilities in the computer systems used to manage and control them. .   read more...

29,078 impressions of my latest post in 3 days!

I was surprised by the performance of my latest post...
(English version and French version)

- Hologram authentication - the good practices
- The essential evolution of identification procedures
- What future for identity businesses? .   read more...

8,000 passports published on line after an attack

My passport is therefore freely accessible, and any fraudster can print a copy after replacing my passport photo with his! The “facial liveness detection” that ID verifiers are so proud of is no longer worth anything if they compare the fraudster's selfie with the photo he affixed to a copy of my ID.

Each of you is probably in the same situation because copies of your identity documents are everywhere, on many servers of companies that have verified your identity online. Travel agencies around the world are indeed only cases among others. .   read more...

Hologram authentication: the good practices

A hologram is a security device that one must be able to authenticate if it is to protect a product or document against counterfeiting. Otherwise, it is only decorative.

Several companies indicate that they authenticate holograms, but their methods are not effective, and put users at risk of identity theft or acquisition of counterfeit products, and all those who offer such authentication services of significant legal risks.

Optic-ID just published a document describing the good practices. .   read more...

What are the future challenges of identity businesses?

The two major disruptions of digital identity and quantum computing will transform how we identify ourselves online and offline.

Issuers of identification means, such as passports, identity cards, and payment cards, will need to rethink their protection methods to address these challenges. Physically Unclonable Functions (PUFs) are a promising solution, offering unique and unpredictable characteristics that are difficult to clone or reproduce.

Identity verifiers will also need to adapt to these new technologies to continue ensuring reliable identity verification.

I have tried to find answers to these challenges, but this is of course only a personal contribution to the debate that I propose to engage in. .   read more...

Why it is impossible to authenticate a hologram with the naked eye, or simply with a Smartphone using an artificial intelligence

Authenticating a hologram consists in verifying that its appearance from a certain point of view and under certain lighting conditions is as expected, and also in verifying that this appearance changes when changing point of view or lighting conditions.

The appearance of a hologram depends on the point of view from which it is observed and the position of the light source. So, just looking at the hologram without knowing the precise position of the point of view or doing this operation in ambient light, without measuring the position of the lighting sources, does not make it possible to authenticate it properly.

With the naked eye, the position of the viewpoint can be assessed imprecisely, but it is impossible to measure the position of the light sources if the operation is carried out in ambient light.

One can use artificial intelligence with a machine learning algorithm that is trained using a dataset containing both genuine hologram images and counterfeit hologram images to enable it to learn to identify features distinctive features of authentic holograms, but there too, it must be ensured that the acquisitions made during the authentication procedure were carried out from a point of view and under lighting conditions similar to those of the images used for this training which are used by the algorithm.

Authenticating a hologram consists in verifying that its appearance from a certain point of view and under certain lighting conditions is as expected, and also in verifying that this appearance changes when changing point of view or lighting conditions.   read more...

Protect documents with a hologram and check that its appearance from a point of view is what you should perceive from this point of view, and that this appearance changes when you change your point of view.

Julien RETAILLEAU, head of service at the French Gendarmerie, has just explained that out of 100,000 gendarmes, only 600 had been trained in the authentication of identity documents... Only zero point six percent! It would be interesting to have the same data for the Police and for the postal organization.

When you go to get a registered letter from the post office, the employee checks that your name matches the one to whom the mail is addressed, and if the photo looks like you, it usually doesn't go any further.

More seriously, the Digital Identity service of the French postal organization is satisfied with this too week identification procedure to open access to more than 1,000 online services via the platform set up by the French State, called FranceConnect!

Such identification, if requested by a usurper, allows him after a single fraudulent identification, to modify your tax returns, to open accounts and take out loans under your name, to have access to your medical records, to declare the sale of your car, to order a new one, to sign to launch a Referendum of Shared Initiative, and even... to declare the birth of a child and soon to vote online!   read more...

List of major ID verification services companies

Here is an improved list mentioning remote identity verification services providers who have initiated a certification process in France, where it is likely that one day it will be compulsory to carry out this activity and therefore remain an international operator.

I hope I did not forget anybody... Please let me know what changes you would like me to make to this list or if you would like to add information to your citation. I will update it regularly.   read more...

ID verification companies must acquire a VIDEO and not a still image.

In France, remote identity services are certified by the National Information Systems Security Agency (ANSSI).

It is not possible to become or remain one of the world leaders without acquiring this official certification.

Acquisition of identification data comprises acquiring a video of the identity document presented by the user.

The French rule obliges ID verification companies to acquire a VIDEO and not a still image.   read more...

Could an identity document be authenticated with the naked eye?

A document may look authentic, but the best-trained human operator cannot verify without precise measuring equipment that the hologram protecting it has exactly the shape, color and position it should have for the point of view considered and for the positions of the light sources. He often cannot even measure them. Fraudsters therefore have good days ahead of them.

It is for this reason that customs officers and border police use automatic machines that photograph the documents from different known angles and lighting and compare them with the appropriate references.   read more...

Our second international patent is OK!

Optic-ID has received from both the USPTO and the EPO the text proposed for grant for its second international patent, which will therefore, like the basic patent, be protected in Europe and the USA.

This request protects a new method of authentication of 3D security devices such as holograms, in which the user no longer needs to place the Smartphone in a specific location, and can place it in an unexpected location at the start. .  read more...

How easy it is to steal your identity!

Al the fraudster has to do is to make a photography of your ID card, replace your photo by his with an image editor, add the appearance of the required hologram, print the result and show it to his smartphone when he is asked to. The identity verification company will then ask him to shoot a selfie and compare his appearance with… his own photography. He will be registered as being you!

Under your name, he may then open bank accounts, order products, make reservations, view your health records, and enter into your web pages and computers! These are only examples and he certainly has much more imagination.

Optic-ID has developed technologies enable authenticating holograms and other security devices protecting identity cards, passports, banknotes and many other documents and products. All this is done instantly using any smartphone.  read more...

Password Identification has lived!

More than 400 malicious Android and iPhone applications, which have gone undetected by the defenses of the Google Play Store (Android) and the iPhone App Store, potentially infect millions of devices, and are used to obtain your passwords.

These apps, all available on the Google Play Store and Apple's App Store, are proposed as photo editing apps, VPN services, business apps and other utilities to trick users into downloading them.  read more...

Reorganize identity cards to protect minors

In many occasions, one wishes to prove his age without providing his identity.

This is possible by limiting the information on one side of the identity card to the holder's photo and date of birth, and by transferring all the other information to the other side.

Photo and date of birth can be secured by conventional 3D security devices (holograms, lenticular images, etc.), as is already the case on recent identity cards from major countries.

To prove your age, all you have to do is acquire a short video of the card, changing the location slightly, then verifying with a selfie that the photo of the wearer is indeed compatible with that affixed to the card. This very fast procedure can be done both face-to-face and remotely with Optic-ID technology.

It therefore becomes very easy to protect minors from pornography, tobacco, alcohol and many other adult activities, and this new version of ID card will not be more expensive than the secure cards that exist today. in the world today.  read more...

Will the tickets counterfeit scandal start again?

Some customers wanted tickets in the paper format, not nominative, to be able to transfer them in case of impediment, and that is understandable. This is what paved the way for the manufacture of counterfeits: from one authentic ticket, fraudsters have printed thousands, all of which bearing the same barcode. The first customer may enter the stadium, but the following ones are refused.

The solution is however simple: the 3D PUFs, the “Physical Unclonable Functions *”. Very easy to print, and impossible to copy. The holder of a counterfeit ticket only has to show it to his smartphone to find out whether or not he will be allowed into the stadium.   read more (in French)...

Optical Digital ID

Imagine an ID card that you can receive by email, print as many times as you want, and even display on your Smartphone.

It is the most secure in the world because no one can change the photo or the details of the identity of the holder.  read more...

Read the note.

Holograms strong authentication

One day soon, public services, companies including banks, but also individuals will not accept that identity documents are insufficiently verified.

No verification can claim to be serious if it does not include the authentication of security devices such as hologram. This requires acquiring at least two images, from two different locations and comparing each of them with a reference corresponding to a close point of view, the effect of ambient light having been neutralized,.

The identification market represents more than 17 billion dollars and market shares will be redistributed.

The French project of NFC chip on an ID card

\n
This new service uses the NFC chip. It will therefore enable everyone - without the holder's consent - to catch his name, date and place of birth, gender, and e-mail address! For an example, a point of sale will save all its visitors details and will then be able to send them emails without asking their opinion.

Another feature of the service is that it does not allow the holder's photo to be acquired, which the CNIL would have prohibited. It therefore does not make it possible to ensure by a “selfie” that it is indeed the document holder who identifies himself online.   read more...

Payment card security

This small 3D marking is a very easy to print “PUF”, and if you had to show it to the camera of your smartphone to pay or access your account, it is clear that one would need to have your payment card in your hands.
Fishing attempts and other techniques used to steal your credit card numbers would no longer be of interest to hackers.   read more...

With enhanced identification, online identification and the design of identity documents will change dramatically.

Identification by photo or video of an identity document will live its last days because banks and companies will not be able to be satisfied for long with current practices that make identity theft too easy.
Indeed, all a forger needs to do is to photograph a third party's identity document, reproduce it after replacing the photo with his own using any image editing software, and present this document to his smartphone to identify himself under the name of this third party whose identity can then be used for everything, to sign contracts in his name, to place orders on the Internet or to empty his bank accounts, just to take a few examples.
The current procedures consist mainly of reading the mentions on the documents and no one can claim that they make it possible to guarantee that a document presented is indeed an unforged original.   read more...

Job interview: the video pushes many candidates to cheat with this method

“Some candidates decide to call on people who seem more attractive to them in order to replace them and better convince recruiters.

This is all the more possible in large companies where the staff in charge of human resources is not always in direct contact with new recruits."

However, an official document makes it possible to verify that the appearance of the candidate is indeed authentic, on the condition that his photo has not been replaced by another, and for that, it suffices to verify the authenticity of this document, and in particular the hologram with which 80% of identity documents in the world are provided.   read more...

Why the market of identity documents and holograms could soon become quasi-monopolistic

An event has just occurred: an issuer of identity documents is considering acquiring our patents to deprive its competitors of them, considering that if it becomes the only one able to issue documents that may be authenticated online, its position could become almost monopoly in the market.

Countries are indeed sensitive to this possibility of identification, because it is the means for citizens to complete formalities and secure their relations with their banks and their entire environment. Major customers could therefore quickly turn away from documents and holograms that cannot be authenticated by smartphone.   read more...

Dynamic 3D authentication

Using "fishing" methods to steal your passwords and copying the cryptos from your bank cards are the main means used by hackers to steal account holders.

With our optical key technology, this is no longer possible, as you must take your personal key out of your pocket and show it to a smartphone camera to pay, access your bank accounts and your company intranet. Nobody can copy it to do operations for you.

With 3D dynamic authentication, even a spy hidden in your own smartphone could not allow your identity to be stolen since it could not even replay the authentication scenario which is randomly chosen at the last moment and therefore unpredictable.

Hologram Authentication

if a fraudster photographs your identity document and sends to the identity verifier a reproduction in which he has replaced your photo with his, he can sign contracts in your place, order products and services, consult your medical file, empty your banck accounts, etc.

That's why the best document verification companies want to check that the ID document you upload is not a fake. More and more don't satisfy themselves with simply reading the document. They need to check the ID document is the original. This requires verifying the hologram which is present on 80% of ID documents.   read more...

Signed photography

The easiest identity theft is the fraudster who photographs a third party's ID card and puts their photo in place of that of the cardholder.

Here is a technique that will prevent this: a photo that cannot be changed because its description is included in a message protected by an encrypted signature.

The next question to ask is whether it is not more convenient, cheaper and more secure than a document.

Flexible holograms

All "3D markings" such as holograms or color change patterns can now be used to protect against counterfeiting textile products, fashion accessories, bottles, labels and more generally all media that are not flat or must remain flexible.

How it works ? just add to the marking a graphic whose deformation makes it possible to determine the inclination of parts of the 3D marking. Each of these parts will be analyzed separately by the Optic-ID smartphone application, in ambient light and without any accessories.

This innovation is protected by the FR2101306 application which will be extended internationally.

Authenticable !


It is surely a good thing to protect documents and products with holograms or other security devices.
But their mere presence is useless if not everyone can authenticate them.
Only a smartphone application is able to know them all in detail and to verify them seriously.
Optic-ID will be this application for the future, from 2022.

Global leaderships


It is no longer a mystery to anyone. Serious conversations are underway for the sale of the Optic-ID project.

Negotiations are progressing in parallel with several partners who are all world leaders in their field, and it is one of them who will lead this major project from the first quarter of next year.

Many partnerships will be organized in ordrer to build major wordlwide leaderships in very important markets.

The world of the web and the economy will evolve towards more transparency for all participants, and more responsibility for everyone.

It was time.

New French ID card


The new French identity card will soon be able to be authenticated in a very secure way by all professionals and by the general public, using any smartphone.

You can even use it to complete formalities, sign documents, view your accounts, pay and vote online.

This new French technology, protected by strong international patents, will be applied to many other documents around the world, and to banknotes.

more info: https://lnkd.in/dqx3vcP

New barcodes


Secured Barcodes are now impossible to copy, and enable online identification, payments, ballots, etc.

They will replace all passwords!

They will also secure all products against counterfeiting and grey markets, using any handheld smartphone, without any accessory.

Physical Unclonable Functions


Optical PUFs allow on line identification.

You know what is a Physical Unclonable Function. It is a kind of digital fingerprint of an object, which can serve as its unique identifier.   read more...


Franck Guigan 2024.11.03