SlideShare une entreprise Scribd logo
1  sur  41
Comda GroupThe leading integrator of IT security solutions
We do IT better!
About Comda
2
A leading company in Information
Security & Communication, expert
in e-Signature solutions
A pioneer in creating a safe
environment for IT users
Implements secured technologies
for organizations and individuals
while maintaining privacy
Company overview
The Comda Group is composed of 4 companies:
3
An Israeli leading IT Security integrator & Software developer since 1985,
supplying cutting-edge IT security solutions
A public Certificate Authority (CA) licensed by the Israeli government
We stand for your Values
A technology company, developing advanced digital signature solutions,
focusing on highly secure qualified e-signature solutions for enterprises.
An EU regulated CA (QTSP in progress) with offices in London
4
Vast experience in PKI and biometric projects
Biometric solutions for IT and Access Control Solutions
Public Key Infrastructure projects for strong identification management
Cryptographic solutions including Smart Cards and HSMs
Cellular and Landline Network Encryption
Forefront Identity Management
Digital Certificates & Smart Cards
5
Comda implements advanced solutions provided by leading
brands, including:
Technology Solutions
Biometric Driver’s License
6
An innovative solution for governments and road traffic
authorities.
New era for driver licensing
7
Our unique biometric solution adapts to the specific needs of
the driver’s license market to enhance road safety while fighting
identity fraud
• Secure Credential issuance with 3D Photo ID
• Face recognition technology
TM
Our cards and systems comply with ISO IEC/18013
international standards and European and US regulations.
Our cards and systems are designed to evolve with future
market needs.
Thinking ahead
8
We provide solutions to cover the wide-ranging needs
of identity management programs, tailored to the
customer’s specific needs.
Matches the specific needs of
governments and road traffic authorities
9
Top notch solutions
10
Our innovative technologies include cutting
edge face recognition and anti-fraud features.
“The most accurate biometric algorithms rank in the
World.” (NI ST PFT test, 2010)
Facial recognition enables the applicant’s identity to be verified.
• We can authenticate the person, i.e., check that the person
is who she/he claims to be. This avoids identity theft.
• We can identify the person, i.e., check that the person exists
only once in the database. This prevents anyone from
having multiple driver’s licenses.
Biometric technology for a secure
driver’s license issuance process
11
Analyzes the 3-dimensional structure of an individual’s
face, thereby significantly enhancing performance.
Accuracy, Speed, Robustness
12
13
An invisible near-infrared light pattern is projected on the user’s face
Camera captures distortions in the pattern caused by the face’s surface
The precise 3D geometry of the face is calculated with over 40,000
points
Unique facial features are extracted and stored as a template in the
database (enrollment phase) or are used to match templates already
stored in the database






 STORAGE
MATCHING
Our solutions conform to the latest
standards in terms of security and
applications.
Beyond the standards
We enable you to use the largest
cryptographic keys, including elliptic
curves up to 521 bits. This permits
identification, online authentication
and electronic signatures with
maximum security.
We comply with ECC Specifications,
Common Criteria EAL 5+ security
certification for driver’s license
Applications, and the ISO/IEC 18013
standard for driver’s licenses.
Standards and security
14
We offer a choice of card bodies to meet a
variety of needs regarding lifetime and
personalization modes
 Based on the smart card
(ID1 format) form factor.
 Various materials:
Polycarbonate, TESLIN & PET.
 Contact or contactless modes.
 Specific inks and
state-of-the-art
secure printing.
Flexibility and adaptability
15
Smart card applications implemented
in the card post-issuance process:
 Demerit point management
 Car insurance certificate
 Car inspection certificate
 Toll fee payment
 Parking payment
Applications for end-users
16
3D Photo ID™ is the most
advanced Card Technology today .
It reinforces biometric verification.
It includes a laser engraved 3D
portrait as a superior first line
security feature ‒ obvious
at a glance and easy to validate.
This technology is very difficult to
counterfeit and inherently
establishes ownership between the
card and the rightful cardholder.
And more….
State-of-the-art printed security features -
3D Photo ID ™
17
Electronic Driver’s License
18
eDL is the most common technology and it is wildly
used by authorities across the world to
combat fake driving licenses
A preferred solution across the world
19
 An eDL verifies the identity of
a driver and his/her
entitlement to drive and use a
vehicle.
 It is designed to reduce
identity fraud by ensuring
that the document can be
validated visually and
electronically to match the
identity of its holder.
Security and confidentiality
20
The solution is composed of identification systems,
electronic authentication, and digital signature elements
that ensure the accuracy and level of security required
to meet the needs of governments and road traffic
authorities.
Robust technology that meets the
challenges of fraud, abuse and errors
21
eDL technology is used as a multi-purpose identity
document.
One card ‒ Many uses
22
For example, in Mexico and Australia, eDL is used
to prove identity, age and access in traffic checks,
opening bank accounts, and ID control.
23
Smart card technology has been adopted in everyday
usage (banking, SIM cards, passports, e-prescriptions).
To the user, smart cards represent a secure, trusted,
convenient, and effective way to perform a wide
variety of tasks.
Raising expectations
24
Using a secure technology to issue a digital driving
license can:
 Improve public safety on roads
 Slash identity fraud
 Improve the operational efficiency of back office
procedures
 Facilitate the creation of accurate databases
Changes lives!
25
Electronic cards for very strong authentication
Israeli Electric Corporation (IEC)
26
Case Study
 IEC is a government company, the sole supplier of electricity
for the State of Israel.
 Its activities include: generation, transmission, distribution,
supply, and sale of electricity.
 The IEC serves 2.48 million households.
 It has 13,000 employees, 5,000 external contactors, and
12,000 visitors every year.
 It has 10 remote power supply locations all over Israel.
Background
27
28
CMS Project Benefits
 Strong authentication for IT systems.
 During card issue, the system performs automatic data
retrieval from the HR system (SAP), security system (APAC), AD
and MS-CA.
 The new system is 5 times faster than the old one.
 20 cards issued per minute.
 Various cards can be issued (employees, sub- contractors,
visitors, weapon badges, ex-employees, etc.).
 Remote personalization at each power supply station.
Card Enrollment Smart Card
29
 Choose PIN
 The Password is personal and needs to follow complexity rules
 Card owners type their own PIN
 Full card area printing
 Two side printing – color or black & white
 Auto feed
 Magnetic stripe
 Contact or contactless smart cards
 Barcode
 Lamination unit
 190 cards per hour (300 dpi)
Print and encode Smart Cards
30
DATACARD SP75 PLUS
Usage
31
Employee smart card
Sub Contractor smart card
The Project
32
 2 year project
 Personnel included 6 Comda employees:
project managers, developers and system integrators
 5,000 man hours invested in total
 Budget of 1 million US$ so far
Biometric Case Studies
33
The Bank of Israel
34
The implementation of Comda Biologon.
Bank of Israel workers can access their workstation by means of
fingerprint only or fingerprint with OTP if accessed from home.
• Requires a biometric fingerprint login by Technical Support
personnel on every desktop or remote desktop at the bank.
• The project included integration with L1/Sagem’s DFR500
scanners and Comda’s Biologon server using the Biologon SDK
of L1.
• The system operates on a 2008 Microsoft Server.
First International Bank
35
 Biometric fingerprint login for employees to remote desktop
stations using Microsoft RDP (Remote Desktop Protocol).
Municipalities
36
Bnei Brak Municipality
Bezeq International
37
 Get fingerprint template from biometric reader connected to station
 Send template to Bio service running on Bio service IIS using HTTP protocols
 Validate template with other Bio templates stored in AD under user's schema
 After successful validation , retrieve user password, encrypt it, and send it
encrypted to the station
 Check user credentials using VMware to view client
 Continue SSO process as planned
 Biometric fingerprint identification for prisoners going on
vacation and returning
 The system connects to the Service’s central database for
conclusive prisoner identification
 The system has been used in numerous prisoner /
terrorist exchange procedures
 1:1
 DFR500
 They ask for a site license and do not want to pay and
install each license separately
Israeli National Prison Service
38
• Biometric fingerprint identification for all applicants to unemployment
monthly payments
• 2,000,000 users (citizens)
• 250 terminals across all cities in Israel
Israeli Employment Ministry
39
• Comda can provide state of the art e-DRIVING and smart card
licensing systems.
• Comda can integrate with a local company to deploy a license
issuance system all over the country.
• Comda can deploy an advanced biometric system that
identifies citizens and provides strong authentication.
• Comda will use top notch solutions and products available on
the market to make sure you get the best system to meet your
specific needs.
• Comda has 31 years of diverse experience in this field!
Summary
40
41
Thank You

Contenu connexe

Tendances

Cleartech Infosys Capabilities
Cleartech Infosys CapabilitiesCleartech Infosys Capabilities
Cleartech Infosys Capabilities
cleartech
 
Edi, supply chain & internet
Edi, supply chain & internetEdi, supply chain & internet
Edi, supply chain & internet
shakil7111984
 
Electronic Data Interchange
Electronic Data InterchangeElectronic Data Interchange
Electronic Data Interchange
Nikhil Agarwal
 

Tendances (19)

Traffic Management System by Info Access
Traffic Management System by Info AccessTraffic Management System by Info Access
Traffic Management System by Info Access
 
EDI,SWIFT,EFT etc
EDI,SWIFT,EFT etcEDI,SWIFT,EFT etc
EDI,SWIFT,EFT etc
 
Cleartech Infosys Capabilities
Cleartech Infosys CapabilitiesCleartech Infosys Capabilities
Cleartech Infosys Capabilities
 
Edi basics
Edi basicsEdi basics
Edi basics
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery System
 
Edi, supply chain & internet
Edi, supply chain & internetEdi, supply chain & internet
Edi, supply chain & internet
 
Edi new
Edi newEdi new
Edi new
 
Non-Financial Use Cases of Mobile Express
Non-Financial Use Cases of Mobile ExpressNon-Financial Use Cases of Mobile Express
Non-Financial Use Cases of Mobile Express
 
Electronic Data Interchange
Electronic Data InterchangeElectronic Data Interchange
Electronic Data Interchange
 
Company Secretary and Information technology
Company Secretary and Information technologyCompany Secretary and Information technology
Company Secretary and Information technology
 
E D I
E  D  IE  D  I
E D I
 
Introduction to EDI
Introduction to EDIIntroduction to EDI
Introduction to EDI
 
Fhir vs edi in healthcare
Fhir vs edi in healthcareFhir vs edi in healthcare
Fhir vs edi in healthcare
 
US Security for Cyber Security
US Security for Cyber SecurityUS Security for Cyber Security
US Security for Cyber Security
 
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
 
Electronic Data Interchange
Electronic Data InterchangeElectronic Data Interchange
Electronic Data Interchange
 
Technology: Challenges and Opportunities for Company Secretary
Technology: Challenges and Opportunities for Company SecretaryTechnology: Challenges and Opportunities for Company Secretary
Technology: Challenges and Opportunities for Company Secretary
 
Introduction to EDI(Electronic Data Interchange)
Introduction to EDI(Electronic Data Interchange)Introduction to EDI(Electronic Data Interchange)
Introduction to EDI(Electronic Data Interchange)
 
Introduction to EDI Basics
Introduction to EDI BasicsIntroduction to EDI Basics
Introduction to EDI Basics
 

Similaire à פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע

Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
OKsystem
 

Similaire à פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע (20)

General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
Guarding Your Digital Fortress: Advanced Data Security Options in Kolkata at ...
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltd
 
"Client authentication in e-commerce solutions" by Jānis Kūliņš from Tieto La...
"Client authentication in e-commerce solutions" by Jānis Kūliņš from Tieto La..."Client authentication in e-commerce solutions" by Jānis Kūliņš from Tieto La...
"Client authentication in e-commerce solutions" by Jānis Kūliņš from Tieto La...
 
Semlex Group : Introduction
Semlex Group : IntroductionSemlex Group : Introduction
Semlex Group : Introduction
 
M Commerce
M CommerceM Commerce
M Commerce
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Loqr
LoqrLoqr
Loqr
 
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECTBRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
 
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature  (e-Sign) Cloud Network & eCommerce ApplicationControls for Digital Signature  (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
 
Finger print based security system
Finger print based security systemFinger print based security system
Finger print based security system
 
Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
SymbolPR
SymbolPRSymbolPR
SymbolPR
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 

Plus de Zeev Shetach

Plus de Zeev Shetach (10)

חמש שיטות לתעדוף משימות פיתוח
חמש שיטות לתעדוף משימות פיתוחחמש שיטות לתעדוף משימות פיתוח
חמש שיטות לתעדוף משימות פיתוח
 
Online Digital Signature Portal
Online Digital Signature Portal Online Digital Signature Portal
Online Digital Signature Portal
 
פורטל חתימות אונליין - החתימו לקוחות, עובדים, חברי צוות ועוד- מכל מקום
פורטל חתימות אונליין - החתימו לקוחות, עובדים, חברי צוות ועוד- מכל מקוםפורטל חתימות אונליין - החתימו לקוחות, עובדים, חברי צוות ועוד- מכל מקום
פורטל חתימות אונליין - החתימו לקוחות, עובדים, חברי צוות ועוד- מכל מקום
 
Digital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrustDigital Signatures solution by ComsignTrust
Digital Signatures solution by ComsignTrust
 
פרשיית דלף מידע ברשתות חברתיות ובסלולר - משרד הביטחון
 פרשיית דלף מידע ברשתות חברתיות ובסלולר - משרד הביטחון פרשיית דלף מידע ברשתות חברתיות ובסלולר - משרד הביטחון
פרשיית דלף מידע ברשתות חברתיות ובסלולר - משרד הביטחון
 
How to be trusted in 2017
How to be trusted in 2017How to be trusted in 2017
How to be trusted in 2017
 
Electronic Signatures Guidance - by BEIS
Electronic Signatures Guidance - by BEISElectronic Signatures Guidance - by BEIS
Electronic Signatures Guidance - by BEIS
 
Rsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentationRsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentation
 
המדריך לחסכון ארגוני באמצעות טכנולוגיה
המדריך לחסכון ארגוני באמצעות טכנולוגיההמדריך לחסכון ארגוני באמצעות טכנולוגיה
המדריך לחסכון ארגוני באמצעות טכנולוגיה
 
ComsignTrust Overview
ComsignTrust OverviewComsignTrust Overview
ComsignTrust Overview
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע

  • 1. Comda GroupThe leading integrator of IT security solutions We do IT better!
  • 2. About Comda 2 A leading company in Information Security & Communication, expert in e-Signature solutions A pioneer in creating a safe environment for IT users Implements secured technologies for organizations and individuals while maintaining privacy
  • 3. Company overview The Comda Group is composed of 4 companies: 3 An Israeli leading IT Security integrator & Software developer since 1985, supplying cutting-edge IT security solutions A public Certificate Authority (CA) licensed by the Israeli government We stand for your Values A technology company, developing advanced digital signature solutions, focusing on highly secure qualified e-signature solutions for enterprises. An EU regulated CA (QTSP in progress) with offices in London
  • 4. 4 Vast experience in PKI and biometric projects Biometric solutions for IT and Access Control Solutions Public Key Infrastructure projects for strong identification management Cryptographic solutions including Smart Cards and HSMs Cellular and Landline Network Encryption Forefront Identity Management Digital Certificates & Smart Cards
  • 5. 5 Comda implements advanced solutions provided by leading brands, including: Technology Solutions
  • 7. An innovative solution for governments and road traffic authorities. New era for driver licensing 7 Our unique biometric solution adapts to the specific needs of the driver’s license market to enhance road safety while fighting identity fraud • Secure Credential issuance with 3D Photo ID • Face recognition technology TM
  • 8. Our cards and systems comply with ISO IEC/18013 international standards and European and US regulations. Our cards and systems are designed to evolve with future market needs. Thinking ahead 8
  • 9. We provide solutions to cover the wide-ranging needs of identity management programs, tailored to the customer’s specific needs. Matches the specific needs of governments and road traffic authorities 9
  • 10. Top notch solutions 10 Our innovative technologies include cutting edge face recognition and anti-fraud features. “The most accurate biometric algorithms rank in the World.” (NI ST PFT test, 2010)
  • 11. Facial recognition enables the applicant’s identity to be verified. • We can authenticate the person, i.e., check that the person is who she/he claims to be. This avoids identity theft. • We can identify the person, i.e., check that the person exists only once in the database. This prevents anyone from having multiple driver’s licenses. Biometric technology for a secure driver’s license issuance process 11
  • 12. Analyzes the 3-dimensional structure of an individual’s face, thereby significantly enhancing performance. Accuracy, Speed, Robustness 12
  • 13. 13 An invisible near-infrared light pattern is projected on the user’s face Camera captures distortions in the pattern caused by the face’s surface The precise 3D geometry of the face is calculated with over 40,000 points Unique facial features are extracted and stored as a template in the database (enrollment phase) or are used to match templates already stored in the database        STORAGE MATCHING
  • 14. Our solutions conform to the latest standards in terms of security and applications. Beyond the standards We enable you to use the largest cryptographic keys, including elliptic curves up to 521 bits. This permits identification, online authentication and electronic signatures with maximum security. We comply with ECC Specifications, Common Criteria EAL 5+ security certification for driver’s license Applications, and the ISO/IEC 18013 standard for driver’s licenses. Standards and security 14
  • 15. We offer a choice of card bodies to meet a variety of needs regarding lifetime and personalization modes  Based on the smart card (ID1 format) form factor.  Various materials: Polycarbonate, TESLIN & PET.  Contact or contactless modes.  Specific inks and state-of-the-art secure printing. Flexibility and adaptability 15
  • 16. Smart card applications implemented in the card post-issuance process:  Demerit point management  Car insurance certificate  Car inspection certificate  Toll fee payment  Parking payment Applications for end-users 16
  • 17. 3D Photo ID™ is the most advanced Card Technology today . It reinforces biometric verification. It includes a laser engraved 3D portrait as a superior first line security feature ‒ obvious at a glance and easy to validate. This technology is very difficult to counterfeit and inherently establishes ownership between the card and the rightful cardholder. And more…. State-of-the-art printed security features - 3D Photo ID ™ 17
  • 19. eDL is the most common technology and it is wildly used by authorities across the world to combat fake driving licenses A preferred solution across the world 19
  • 20.  An eDL verifies the identity of a driver and his/her entitlement to drive and use a vehicle.  It is designed to reduce identity fraud by ensuring that the document can be validated visually and electronically to match the identity of its holder. Security and confidentiality 20
  • 21. The solution is composed of identification systems, electronic authentication, and digital signature elements that ensure the accuracy and level of security required to meet the needs of governments and road traffic authorities. Robust technology that meets the challenges of fraud, abuse and errors 21
  • 22. eDL technology is used as a multi-purpose identity document. One card ‒ Many uses 22 For example, in Mexico and Australia, eDL is used to prove identity, age and access in traffic checks, opening bank accounts, and ID control.
  • 23. 23
  • 24. Smart card technology has been adopted in everyday usage (banking, SIM cards, passports, e-prescriptions). To the user, smart cards represent a secure, trusted, convenient, and effective way to perform a wide variety of tasks. Raising expectations 24
  • 25. Using a secure technology to issue a digital driving license can:  Improve public safety on roads  Slash identity fraud  Improve the operational efficiency of back office procedures  Facilitate the creation of accurate databases Changes lives! 25
  • 26. Electronic cards for very strong authentication Israeli Electric Corporation (IEC) 26 Case Study
  • 27.  IEC is a government company, the sole supplier of electricity for the State of Israel.  Its activities include: generation, transmission, distribution, supply, and sale of electricity.  The IEC serves 2.48 million households.  It has 13,000 employees, 5,000 external contactors, and 12,000 visitors every year.  It has 10 remote power supply locations all over Israel. Background 27
  • 28. 28 CMS Project Benefits  Strong authentication for IT systems.  During card issue, the system performs automatic data retrieval from the HR system (SAP), security system (APAC), AD and MS-CA.  The new system is 5 times faster than the old one.  20 cards issued per minute.  Various cards can be issued (employees, sub- contractors, visitors, weapon badges, ex-employees, etc.).  Remote personalization at each power supply station.
  • 29. Card Enrollment Smart Card 29  Choose PIN  The Password is personal and needs to follow complexity rules  Card owners type their own PIN
  • 30.  Full card area printing  Two side printing – color or black & white  Auto feed  Magnetic stripe  Contact or contactless smart cards  Barcode  Lamination unit  190 cards per hour (300 dpi) Print and encode Smart Cards 30 DATACARD SP75 PLUS
  • 31. Usage 31 Employee smart card Sub Contractor smart card
  • 32. The Project 32  2 year project  Personnel included 6 Comda employees: project managers, developers and system integrators  5,000 man hours invested in total  Budget of 1 million US$ so far
  • 34. The Bank of Israel 34 The implementation of Comda Biologon. Bank of Israel workers can access their workstation by means of fingerprint only or fingerprint with OTP if accessed from home.
  • 35. • Requires a biometric fingerprint login by Technical Support personnel on every desktop or remote desktop at the bank. • The project included integration with L1/Sagem’s DFR500 scanners and Comda’s Biologon server using the Biologon SDK of L1. • The system operates on a 2008 Microsoft Server. First International Bank 35
  • 36.  Biometric fingerprint login for employees to remote desktop stations using Microsoft RDP (Remote Desktop Protocol). Municipalities 36 Bnei Brak Municipality
  • 37. Bezeq International 37  Get fingerprint template from biometric reader connected to station  Send template to Bio service running on Bio service IIS using HTTP protocols  Validate template with other Bio templates stored in AD under user's schema  After successful validation , retrieve user password, encrypt it, and send it encrypted to the station  Check user credentials using VMware to view client  Continue SSO process as planned
  • 38.  Biometric fingerprint identification for prisoners going on vacation and returning  The system connects to the Service’s central database for conclusive prisoner identification  The system has been used in numerous prisoner / terrorist exchange procedures  1:1  DFR500  They ask for a site license and do not want to pay and install each license separately Israeli National Prison Service 38
  • 39. • Biometric fingerprint identification for all applicants to unemployment monthly payments • 2,000,000 users (citizens) • 250 terminals across all cities in Israel Israeli Employment Ministry 39
  • 40. • Comda can provide state of the art e-DRIVING and smart card licensing systems. • Comda can integrate with a local company to deploy a license issuance system all over the country. • Comda can deploy an advanced biometric system that identifies citizens and provides strong authentication. • Comda will use top notch solutions and products available on the market to make sure you get the best system to meet your specific needs. • Comda has 31 years of diverse experience in this field! Summary 40

Notes de l'éditeur

  1. Minister: Cheick Toure
  2. QTSP =  Qualified Trusted Services Provider
  3. Public Key Infrastructure (PKI) Hardware Security Modules (HSMs)
  4. Electronic Driver’s License
  5. SAP = SystemAnalyse und Programmentwicklung, System Analysis and Program development APAC = Australian Partnership for Advanced Computing ?? AD = Active Directory ?? MS-CA = Microsoft Certificate Authority
  6. PIN = Personal Identification Number
  7. dpi = dots per inch
  8. OTP = One Time Password
  9. SDK = Software Development Kit
  10. AD = Active Directory