karsof systems e-visa
TRANSCRIPT
Karsof eVisa Solution
Karsof Systems LLC
Total e-Border Control System
• Complete registration repository module for all visitors
• Relationship channel management module to enhance the inter-services i.e. of all data collected at the country’s entry and exit points
• Compliance module to track and monitor delinquent foreigners
• High-quality authentication process
• Enhanced features and functions for e-VISA processing using biometric technology systems
• Efficient and effective process management for issuing passports
• Underlying IT platform proven to be a more cost effective platform
• Ascertains authorized identity of citizens, diplomatic staff and family
• Allows government authorities to more easily and accurately monitor authorized foreign workers
• Standardizes data elements and government system interoperability, providing the potential for further enhancement of identity checking by allowing confirmation of identity against information contained in biometrics
• Helps national security programs achieve goals by ensuring regulations, practices and procedures are followed in order to safeguard against acts of unlawful interference
• Increases confidence of the public on personal and national security
• Platform to provide enhanced services to the public
• Enhances security and convenience of existing and new applications using high security technology
Introduction to E-visas
• Uses electronic data collected for entry
programs • Faster and more ergonomic methods to read
data from an official travel document • Facilitates the identity management of visa
holders through machine assisted identity confirmation
• Facilitates travelers through check-in and border processes
1. Visas communicate data in a machine-readable format to airline authorities and border officials in transit and receiving countries.
2. The machine-readable zone provides a systematic way to gather and compare personal data electronically, particularly when the passport document is not already machine readable.
3. E-visas allow additional biometric and other data to be stored and read.
4. This offers the possibility of facilitated or self-service inspection, and the capacity to verify biometric information that is stored on or linked to the visa.
e-Visa types – Advantages
Chip visa sticker A sticker IC contactless chip has many advantages for visa issuers, including the capacity to carry biometric data on a document without requiring a real-time database at all points of service to verify biographic and biometric data. This is a particularly useful concept given that many travel documents are not machine readable. However, overcoming technical constraints will be key to the adoption of this method.
Chip in a multi-use visa card: Multi-use documents have increased in use in national and multi-lateral settings. As biometric and card technology matures, card visas will grow in popularity because of their durability and ease of use.
Unique Data Encrypted
in the Karsof™ Microprocessor
Chip
rear outer Layer
sheet pre-printing
Karsof™ Secure CHIP
sheet pre-printing
Karsof™ Card Reader Security Features
Unique Data from the Karsof™ Chip and the Unique Code from the Karsof™ Smart Chip Card will be authenticated each other for the Card and Reader
Hand Shake by Reader with Card
Encrypted Data is mutually transferred
e-Visa System
Checking Document Authenticity and Validity
It is essential for border agencies to check that the e-Visa presented is genuine and has not been tampered with since issue.
This can be done through examination of the face of the document (through image processing and a database of passport security features) or by a check of the integrity of the chip contents, or reference to a central passport issue database, or any combination of these.
No system should be planned without this key requirement ,and suppliers’ solutions should be independently tested.
Identification and/or identity verification
Clearly border control agencies should identify each e-Visa holder with a high degree of confidence.
The biographical/biometric data may be cross-checked against other elements in the document and against issuer databases. See section on biometric matching.
Determination of Eligibility
Once a passenger’s nationality, identity, and risk have been established, they should be checked against a rule-based system which determines whether or not that person may be admitted without examination by a border control officer.
Passenger movement logging
Systems should record details of passengers (both biographic and biometric) who enter and exit. Consideration should be given to how much of the data contained in e-VISAs is essential to border control and national security, and whether legal powers exist to capture, store, and use such data.
Solution Overview
Make borders more secure:
Most countries have many entry and exit points. A new approach is needed to prevent the entry of illegal or high-risk travelers. Biometric security technologies can help make borders more secure.
Start at country gateways:
Biometric security solutions can be used during visa or travel card applications at a country’s gateway, and can then be used to authenticate and check the background of applicants before they leave their countries.
Multiple checkpoints:
Biometric security also needs to be implemented at checkpoints to ensure that only the authorized travelers are allowed through.
Linking the databases:
Sharing criminal, blacklists and terrorist watch list database both locally and internationally.
Integrating systems:
Biometric security solutions must be integrated to other critical systems such as immigration department’s centralized database and other intelligence bureau databases and applications
Zero false identification:
The use of biometrics security technology can eradicate the false identification of travelers and their travel documents.
International cooperation:
Fosters better international cooperation through the use of integrated technologies and global standards.
Reliability and accuracy of screening:
Biometrics data from national and international criminal databases and terrorist watch lists will increase the reliability and accuracy of screening at immigration checkpoints.
Karsof eServices Delivery Suite
Portal Engine
Application Logic Process
Open Architecture
eServices Development
Continuous Enhancement
Enterprise Application Integration Engine
Robust O/S
Robust O/S
Advanced Linux
Server
Multi-Threaded Coding
Multi-Layer Security
Business Continuity Business
Continuity
True Seamless (never fail)
Active Architecture
Zero downtime
Advanced Security
Advanced Security
4096 bit Encryption
High Level Application Security
Security Accelerator
5 tier Access Security
Transaction Level PKI
Single Database
Single Database
Karsof™ Database (ORDBMS)
Unlimited Record Storage
Dynamic Code based Search
Architecture overview K
arsof B
usin
ess Co
ntin
uity System
Karso
f Ce
ntral M
on
itorin
g System
Karso
f Security So
ftware
Karsof VPN - Internet / Intranet / Extranet
Karsof Database (Object Oriented RDBMS)
Karsof Servers (Intel Architecture)
Karsof Operating System
Presentation
Application
Integration
Database
Common Services
Operating System
Hardware
Networks
Karsof Web Application Framework
Client Servers
Karsof EAI Engine – Connection to other system
Karsof Security Extensions
Karsof E-Visa System
Security Document Layers
Unique data encrypted in the Karsof
microprocessor chip
rear outer Layer
sheet pre-printing
Karsof secure chip
sheet pre-printing
Karsof Card Reader Security Features
Unique data from the Karsof chip and the unique code from the Karsof smart chip card will
be authenticated each other for the card and reader
Hand shake between
reader and card
Encrypted data is mutually transferred
• Physical dimension - 54mm x 86mm (width/length) • Thickness - 0.75mm +/- 0.10mm • Material – polycarbonate, design cards
Security Document Features
• Security with 4096-bit encryption
• PKI-based access control for individual areas
• Multiple segments of data storage with individual access control
• Intrusion detection and auto lock mechanism
• Encrypted storage with unique keys and methods for every card
• Configurable frequencies with dynamic encryption
• Built-in frequency integrity checker to prevent snooping
• Access restricted and control of the readers
• Dynamic protocol and encryption for data storage and retrieval
• Secure printing controls are built in during printing
• Uses open standard communications coding
Karsof™ Compression
Karsof Fast Track Kiosk
• Foreign visitors and foreign workers personal identification will be authenticated by matching database at the kiosk.
• This system provides a speedy clearance because it automatically authenticates their identification. At the same time, it also eliminates fraud and illegal immigrants entering into the country.
• Foreign visitors and foreign workers personal identification will be authenticated by matching database at the kiosk.
• This system provides a speedy clearance because it automatically authenticates their identification. At the same time, it also eliminates fraud and illegal immigrants entering into the country.
Our Manufacturing Plant
Our competitive edge
• Karsof Systems owns a manufacturing plant that
produces its own suite of encrypted products and security documents
• Specialized printer from biometric scanners, laser engraving printer, passport readers, security ink, auto stamping to mobile enforcement system, smart cards
Karsof Biometric Technology
“One to Many” and “One to One” identification and recognition method
• “One to Many” identification and recognition method verifies individual fingerprints from a large database of fingerprints without interference or aid by the use of any other media or instruments.
Unique Features
• 4096-bit dynamic, multi-layer encryption
• 16 bytes for storage of a fingerprint, 1st of its kind in the world
• Fastest identification – 0.5 seconds
• Integrated with existing sub-systems
• Fingerprint identification speed not affected by the size of the database. Five patented technologies
• Biometric verification of electronic transactions over the Web
• Storage of biometric Features
• Method of identifying an individual using biometrics
• Computer network security
• Applications in biometrics
Single Platform, Single Algorithm, Any Database
• Retina
• Iris
• Facial
• DNA
Single Algorithm for
verification and identification
• Fingerprint
Thank You
• For more information, visit our website at: www.karsofsystems.com
• Or email us on [email protected]
• Or give us a call on (877) 9KARSOF or (877) 952-7763
Jeff Rosen – Vice President Sales
Barney T. Villa – Senior Vice President