|Publication number||US20060005050 A1|
|Application number||US 10/864,353|
|Publication date||Jan 5, 2006|
|Filing date||Jun 10, 2004|
|Priority date||Jun 10, 2004|
|Also published as||CN101002214A, CN101002214B, US7243840, US7905415, US20050274794, US20080272196|
|Publication number||10864353, 864353, US 2006/0005050 A1, US 2006/005050 A1, US 20060005050 A1, US 20060005050A1, US 2006005050 A1, US 2006005050A1, US-A1-20060005050, US-A1-2006005050, US2006/0005050A1, US2006/005050A1, US20060005050 A1, US20060005050A1, US2006005050 A1, US2006005050A1|
|Inventors||Eli Basson, Boaz Shuman, Igor Merling, Eli Hassan, Ilan Kander|
|Original Assignee||Supercom Ltd.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (16), Referenced by (17), Classifications (11), Legal Events (2)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The present invention relates to tamper-free and forgery-proof identification documents, and in particular to smart passports.
Security, particularly at major airports has become a significant concern. No printable identification is currently available to positively identify a passenger with high reliability. No means is currently available to transmit such information securely and to associate that information with user specific permissions
All passengers entering the USA have been required to bring a Machine Readable Travel Document (MTRD), i.e. a machine-readable passport since October 2003. Starting October 2004, the passport is required to contain biometric data that uniquely identifies its bearer. This turns the passport into a “smart” passport, which comprises a contactless chip that stores the personal biometric information as digital information. The chip is accessed contactlessly by a reader that retrieves the biometric information and compares it with information stored in a database, to verify the identity of the passport bearer. The International Civil Aviation Organization (ICAO) is setting the standard to be followed by all such smart passport issuers.
Smart documents are known in the art. Smart cards have been used to store personal information and even biometric information about their owners to facilitate electronic transactions. The information is stored on embedded chips, see for example U.S. Pat. No. 6,219,439, the content of which is incorporated herein by reference, U.S. Pat. No. 6,219,439 further describes a identifying characteristic authentication system using a smart card having stored physiological data of a user on a chip disposed therein, and a fingerprint scan (or retina scan, voice identification, saliva or other identifying characteristic data) for comparison against the stored data. The system is self-contained so that the comparison of the identifying characteristic data with the data stored on the chip is done immediately on board the reader without relying upon communications to or from an external source in order to authenticate the user. This arrangement also prevents communication with external sources prior to user authentication being confirmed, so as to prevent user data from being stolen or corrupted.
U.S. Pat. No. 6,101,477 describes a smart card for travel-related use, such as for airline, hotel, rental car, and payment-related applications. Memory space and security features within specific applications provide partnering organizations (e.g., airlines, hotel chains, and rental car agencies) the ability to construct custom and secure file structures. U.S. Pat. No. 5,291,560 describes a personal identification system based on iris analysis. U.S. Pat. No. 5,363,453 describes a personal identification system based on biometric fingerprint data. However, there is no encryption of the biometric information involved.
EP 0019191B1 discloses a paper of value (e.g. an ID) with an integrated circuit in which a checkable coding is written, the communication with the integrated circuit preferably being effected contactlessly via antennas. The integrated circuit is set in the gap of an at least partly metalized carrier foil. This foil is then laminated between two paper webs. Since the carrier foil is only laminated in between the two paper webs, however, there is the danger that the layers can be separated from each other relatively easily so that the plastic inlay provided with the chip can be used for possible forgeries. Further, this security element is a strictly machine-checkable security element that can only be checked by means of special detectors.
U.S. patent application 20030164611 by Schneider discloses a security paper for producing documents of value, such as bank notes, certificates, etc., with at least one multilayer security element. The security element is disposed at least partly on the surface of the security paper and has at least one visually checkable optical effect and at least one integrated circuit. Other recent U.S. patent applications relevant to the subject of the present invention include applications Nos. 20040081332, 20030117262, 20030116630, 20030099379, 20030093187 and 20020143588.
All prior art solutions deal with only partial aspects of the problem. All known solutions require basically a new product, fabricated with processes and steps materially different from existing processes and steps used in present day regular (non-smart) passports. Since these processes and steps differ from each other, there is no “standardized” manufacturing of a smart passport. No prior art solution is known to be a full solution that allows a regular passport to be transformed into a smart passport without requiring major production system changes and/or major fabrication step changes. Therefore, it would be advantageous to provide a smart passport that will not require major overhaul of existing methods and systems, yet fulfill its total security and forgery/tamper-proof functions. It would be further advantageous to find a “generic” solution that can incorporate various chips and operating systems (OSs) into the smart passport, which can then be issued by all authorized issuers that use such different chips and OSs.
The present invention discloses a method and system for providing secure, tamper-free and forgery-proof smart documents, in particular smart passports. The present invention further discloses a smart inlay that has inventive physical security components or “features”, and which can be inserted into any standard passport, thereby turning it into a smart passport. The smart inlay of the present invention is functionally flexible in that provides full accommodation of existing and emerging standards in the filed of smart documents, in particular of smart passports. These standards will include requirements for global interoperability, technical reliability, practicality and durability. The emerging standards will most likely require a digital representation of personal biometric information on a contactless chip in the passport booklet or in a visa The digital representation will include data. The biometric representation may be that of a face and fingerprint or iris. The contactless chip may be made by a variety of manufacturers, according to the ISO 14443A/B or ISO 15693 standards. The booklet may include the smart inlay in its cover (using a cover substantially identical with that of existing, non-smart passports) or in a data page. In a visa, the visa sticker will contain the chip and its antenna.
The biometric information is expected to provide a singular match (comparison) of a person to data stored in a database for identity verification. All digital information on the chip will be cryptographically signed to prevent forgery. The planned biometric storage needs include ca. 12 KB (kilo-bytes) for a face, 10 KB for a fingerprint, 30 KB for an iris and 5 KB for text+overhead. At the least, a smart passport will require will need 32 or 64 KBs. The required antenna size is the same as in ID-1 size documents similar to a credit size card. The inlay has to be mechanically reinforced to protect the inlaid chip and antenna. Finally, the smart passport has to be readable by a contactless reader that supports both ISO 14443A and 14443B standards.
The present invention provides a smart inlay that can accommodate a variety of chips, for example a Philips P5CT072 72K E2PROM or a ST Micro Electronics ST19XR34 34K E2PROM. The present invention further provides an upgrade path from a regular (non-smart) paper passport to a smart passport.
According to the present invention, there is provided a smart inlay comprising a core substrate operative to store and exchange information contactlessly with an external reader, the core substrate further conditioned to bind to a passport surface, at least one physical security feature coupled to the core substrate and operative to render the smart inlay tamper-proof, and a logical security feature incorporated in the core substrate and operative to render the smart inlay forgery-proof.
According to the present invention there is provided a smart passport comprising a passport booklet and a smart inlay incorporated in the passport booklet, whereby the smart inlay imparts tamper-proof and forgery-proof properties to the passport.
According to the present invention there is provided a method for tamper-proofing and forgery-proofing a passport, comprising the steps of providing a smart inlay operative to uniquely identify an authorized bearer of the passport, the smart inlay adaptively fitting into the passport, and attaching the smart inlay to the passport.
According to one feature in the method for tamper-proofing and forgery-proofing a passport of the present invention, the step of providing a smart inlay further includes providing an inlay with a core substrate operative to store and exchange information contactlessly with an external reader, the core substrate further conditioned to bind to a passport surface; at least one physical security component coupled to the core substrate and operative to render the inlay tamper-proof; and a logical security component incorporated in the core substrate and operative to render the smart inlay forgery-proof.
According to another feature in the method for tamper-proofing and forgery-proofing a passport of the present invention, the step of attaching the smart inlay to the passport includes attaching the inlay to the inside of a cover of the passport.
According to yet another feature in the method for tamper-proofing and forgery-proofing a passport of the present invention, the step of attaching the smart inlay to the passport includes attaching the inlay to at least one inside page of the passport.
According to the present invention there is provided a method for preventing tampering in a smart passport that includes a contactless chip physically connected to an antenna, comprising the steps of providing at least one physical security component operative to disconnect the chip from the antenna and using the at least one physical component to protect the smart passport form tamper attempts.
The invention is herein described, by way of example only, with reference to the accompanying drawings, wherein:
The present invention discloses devices and methods for providing secure, tamper-free and forgery-proof smart documents, in particular smart passports. The present invention discloses in particular a smart inlay to be used in a smart passport, and security features that make such a smart passport tamper-proof and forgery-proof. The present invention further provides an upgrade path from a regular (non-smart) paper passport to a smart passport.
or Scapa Tape G175 (www.scapatapesnacom). The core substrate has a typical thickness of 220-240 micron, while the smart inlay has a typical size that fits in a page of a smart passport, see for example
In the case of the first adhesive layer being the only layer in the process, the preferred adhesive is a thermo-set adhesive such as serial number 9534 manufactured by Apollo (www.apolloadhesives.com). Thermo-set adhesives behave irreversibly and have a wide range of bond-breaking temperatures that reaches over 200 degrees C. This makes the adhesive itself the “strong” link in the composite layer structure, and ensures failure in places other that the adhesive, providing yet another inventive physical security feature. Furthermore, if the first adhesive is the only adhesive used, it is further preferably patterned, as explained with reference to
In step 354, a chip module 308 (shown in more detail in
As mentioned, when the smart inlay (and its “dumb” section in case of a smart cover) produced in steps 350-356 is about to be attached to a cover, a second adhesive layer 114′ (used if the first adhesive layer does not fulfill that function) is introduced between the inlay and the cover and used to fill any voids in glue layer 306′. The introduction of this layer is shown in an additional step 358. It has been determined experimentally that attempts to peel off the inlay from the cover show distinct tampering effects when second adhesive layer 114′ is also applied in a patterned form (independently of the form, patterning or even presence of a first adhesive layer), as shown in both step 358 and in a cross section in
Embodiment H shows in cross section a composite adhesive structure in which a first adhesive 380 and a second adhesive 382 (both having a tooth-like appearance as in
The invention thus advantageously provides a number of physical security features, some of which have been mentioned above and some of which will be discussed in more detail now. All physical security features are geared toward providing a tamper-proof product. First, the tear lines mentioned and shown with regard to
The smart passport is now prepared using the smart inlay provided in step 534. If in the form of a smart cover, the smart inlay is glued or attached otherwise to a passport booklet in step 550, the booklet is folded in step 552, and each individual passport is cut in step 554. A fourth test (process 406 in
All publications, patents and patent applications mentioned in this specification are herein incorporated in their entirety by reference into the specification, to the same extent as if each individual publication, patent or patent application was specifically and individually indicated to be incorporated herein by reference. In addition, citation or identification of any reference in this application shall not be construed as an admission that such reference is available as prior art to the present invention.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5291560 *||Jul 15, 1991||Mar 1, 1994||Iri Scan Incorporated||Biometric personal identification system based on iris analysis|
|US5363453 *||Mar 22, 1993||Nov 8, 1994||Tms Inc.||Non-minutiae automatic fingerprint identification system and methods|
|US5973710 *||May 15, 1995||Oct 26, 1999||Supercom, Ltd.||Method and apparatus for printing on passports and the like|
|US6101477 *||Jan 23, 1998||Aug 8, 2000||American Express Travel Related Services Company, Inc.||Methods and apparatus for a travel-related multi-function smartcard|
|US6108022 *||Apr 12, 1996||Aug 22, 2000||Supercom Ltd.||Method for producing identification documents and documents produced by it|
|US6219439 *||Jul 9, 1999||Apr 17, 2001||Paul M. Burger||Biometric authentication system|
|US20020143588 *||Mar 22, 2002||Oct 3, 2002||Yoshihisa Ishigami||Card system for immigration/emigration control and card for use in the system|
|US20030093187 *||Oct 1, 2002||May 15, 2003||Kline & Walker, Llc||PFN/TRAC systemTM FAA upgrades for accountable remote and robotics control to stop the unauthorized use of aircraft and to improve equipment management and public safety in transportation|
|US20030099379 *||Nov 26, 2001||May 29, 2003||Monk Bruce C.||Validation and verification apparatus and method|
|US20030116630 *||Oct 16, 2002||Jun 26, 2003||Kba-Giori S.A.||Encrypted biometric encoded security documents|
|US20030117262 *||Jun 10, 2002||Jun 26, 2003||Kba-Giori S.A.||Encrypted biometric encoded security documents|
|US20030132301 *||Dec 31, 2002||Jul 17, 2003||Massachusetts Institute Of Technology||Manually operated switch for enabling and disabling an RFID card|
|US20030164611 *||Jul 4, 2001||Sep 4, 2003||Walter Schneider||Antifalsification paper and security document produced therefrom|
|US20040081332 *||Oct 23, 2002||Apr 29, 2004||Tuttle William J.||Apparatus and method for document reading and authentication|
|US20050236489 *||Sep 1, 2004||Oct 27, 2005||Francois Droz||Portable information carrier with transponders|
|US20050242194 *||Mar 11, 2005||Nov 3, 2005||Jones Robert L||Tamper evident adhesive and identification document including same|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7665668 *||Aug 18, 2006||Feb 23, 2010||Mastercard International, Inc.||Cut here to destroy indicator|
|US7669245 *||Jun 8, 2005||Feb 23, 2010||Searete, Llc||User accessibility to electronic paper|
|US7719425||Feb 7, 2006||May 18, 2010||Colby Steven M||Radio frequency shielding|
|US7739510||May 12, 2005||Jun 15, 2010||The Invention Science Fund I, Inc||Alert options for electronic-paper verification|
|US7774606||Dec 12, 2006||Aug 10, 2010||The Invention Science Fund I, Inc||Write accessibility for electronic paper|
|US7856555||Dec 13, 2006||Dec 21, 2010||The Invention Science Fund I, Llc||Write accessibility for electronic paper|
|US7865734||May 12, 2005||Jan 4, 2011||The Invention Science Fund I, Llc||Write accessibility for electronic paper|
|US8016667 *||Jul 22, 2004||Sep 13, 2011||Igt||Remote gaming eligibility system and method using RFID tags|
|US8074878 *||Mar 24, 2010||Dec 13, 2011||F3M3 Companies, Inc.||System and method of pre-approving applicants for visa processing using an emerging country's international travel approval control card|
|US8425314||Aug 9, 2011||Apr 23, 2013||Igt||Remote gaming eligibility system and method using RFID tags|
|US8640259||Feb 14, 2006||Jan 28, 2014||The Invention Science Fund I, Llc||Notarizable electronic paper|
|US8816826||Oct 12, 2009||Aug 26, 2014||Steven M. Colby||Passive radio frequency data logger|
|US8963778||Jul 4, 2008||Feb 24, 2015||Arjowiggins Security Integrale Solutions||Fibrous substrate for insert including an antenna|
|US20060019745 *||Jul 22, 2004||Jan 26, 2006||Igt||Remote gaming eligibility system and method using RFID tags|
|US20110002107 *||Oct 10, 2008||Jan 6, 2011||Junsuke Tanaka||Transponder and Booklet|
|WO2009051787A1 *||Oct 17, 2008||Apr 23, 2009||Winefather Llc||Tamper-resistant microchip assembly|
|WO2011056915A1 *||Nov 4, 2010||May 12, 2011||Carlyle Rampersad||International alpha-numeric demographic identity code|
|International Classification||G06K19/077, G06K19/073, G06F11/30, G06K5/00|
|Cooperative Classification||G06K19/073, G06K19/025, G06K19/07749|
|European Classification||G06K19/02C, G06K19/077T, G06K19/073|
|Jun 10, 2004||AS||Assignment|
Owner name: SUPERCOM LTD., ISRAEL
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BASON, ELI;SHUMAN, BOAZ;MERLING, IGOR;AND OTHERS;REEL/FRAME:015454/0559
Effective date: 20040603
|Nov 30, 2006||AS||Assignment|
Owner name: ON TRACK INNOVATIONS LTD., ISRAEL
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SUPERCOM LTD.;REEL/FRAME:018564/0875
Effective date: 20061127