WO2010091483A1 - Electronic identity card on smartcard - Google Patents
Electronic identity card on smartcard Download PDFInfo
- Publication number
- WO2010091483A1 WO2010091483A1 PCT/BE2009/000007 BE2009000007W WO2010091483A1 WO 2010091483 A1 WO2010091483 A1 WO 2010091483A1 BE 2009000007 W BE2009000007 W BE 2009000007W WO 2010091483 A1 WO2010091483 A1 WO 2010091483A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- smartcard
- citizen
- key
- block
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H10/00—ICT specially adapted for the handling or processing of patient-related medical or healthcare data
- G16H10/60—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
- G16H10/65—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records stored on portable record carriers, e.g. on smartcards, RFID tags or CD
Definitions
- the data are stored on the memory area of the Chip, in separate files, each with different encryption and pin-codes. In this way we can achieve maximum protection of privacy for the owner. Every consultation is only possible with the appropriate access of the control-card and the pin-code. This gives the guarantee that the police can only consult the data. There is also a pin-code for the police agent system, so if the PDA or the computer system is unguarded for a short time it puts itself in safe mode, and before reactivating you need the initial access code. Three invalid attempts will result that the software on the PDA erasing itself and the card will be put on non-active, protecting the system against hacking.
- the program will ask to insert a citizen Id card. As soon as the card is inserted, the citizen's picture and the ID data are displayed on the screen. This makes it virtually impossible to cheat, because the policeman can compare the face of the citizen to the picture he has on the screen and the photo on the citizen's. Further selection has to be made with one of the tabs on the bottom, every selection will open a pull down menu.
- the first tab (fig. 6) contains the basic emergency medical data: this gives the blood group, medical contra-indications, etc. Also important phone numbers are stored to contact in case of accident, and the relation of these persons to the holder. Next the codicil, and the way of terminating life in case of terminal coma.
- Issuing new cards is made very simple and can be done at a local police station or at authorized issuing points (fig.3).
- the software is completely menu-driven and can be used even by non-computer experts.
- the processor will allocate an area of the memory free for access, then reading or writing can be process in this case data is not passing through the encrypting process.
- data is retrieve out of memory then the personal encryption key code will apply-in and scramble. It is very interesting and useful to transfer data to a central storage device to be processed.
- This device includes a micro component into a one-piece solid state media (Fig.2) that capacity range from 8 to 32 Kbytes small and light enough that can be carried into a purse, pocket or wallet.
- Fig.2 solid state media
- Mac and Linux Os to be used with desktops & notebooks computer system.
- SmartCard Storage capacities could vary from 8 to 32Kbytes
- a Software pilot monitors the computer Ports channel to detect if an eventual insertion.
- the pilot detect is type, characteristics and is ID and determine if they are valid, then signal its presence to the program that start decrypting process of the controller personal data.
- This data is encrypted with the encryption technology using a time out.
- the hidden key-ID is unique for every citizen the data is always sent in blocks of equal length, but key dependent, in different sequence. Every block has a check sum for integrity.
- the data can be different for every block to go, in different steps for up counting or down counting sequence, depending on a control word, send in the beginning of the sequence, and processed with the key number.
- the system is using a matrix of 256 numbers, who can be used in variable sequence, for coding and decoding the data, this sequence depends on the key number, the check sum and the control word in combination of the key ID type.
- Data regeneration can only be processed in the proper key in order to secure information's stored within the key it self, this data is encrypted and has always the same block length, making it temper proof.
- the build-in Crypto-Processor will reconvert the data into a readable text when both SmartCards, Citizen and Controller are connected trough the computer system.
- the Administrator key is used for creating the different type of SmartCard, also permits data recuperation and verification in case of lose or data corruption.
- the key can be used to process data, block by block so there is virtually no limit on file length. This with the guaranty of maximum security. After job done the standard data is swapped again in the key. Because every key has its own encryption protocol the data can only be used in its proper key.
- Local communication framework is a concept shown in (fig. 3) how a local framework of card distribution and information communication transfer and online data update and transfer trough the Internet that will backup and maintain in a secure way the user individual page to store the citizen history and remain point within the card in away allowing the authority to maintain a precis and temper proof the veracity and the exactitude of the point.
- Global communication framework is a concept See (fig.4)
- Access to the backup internet portal in being generally granted only the authority using their special administration SmartCard with valid identification.
Abstract
Digital Identity Card on SmartCard...and it's concept. This tool captures, securely stores, analyze and maintains all related identification information require by the state and the personal data from the citizen in a digitally and electronically form as...citizen identity, photo, date of validity, personal related information, and basic medical emergency data all this data I are stored within a small solid state micro-processor device that is set with a standard industry credit card size light and small enough to easily fit into a wallet and could be connect to any computer, desktop or mobile system equipped with a SmartCard reader. The Digital Identity Card on SmartCard can be carried by the citizen anywhere and permits when needed to instantly give access to the authorized person or controller the precious information needed as..emergency medical data in case of accident and also his location and address history. With the use of user-friendly software all related data of the citizen including technical, administrative, data will be display. Furthermore it permits to the control authority to access summarized report of the situation of the citizen. Moreover, using a dedicated internet portal site for communication and backup purpose, facilities are given to the control authority to download citizen image and latest data of a citizen that has lost or forget his identity Card. A secure communication and storage algorithm based on Rijndael in conjunction with a security technique using the SmartCard microchip device in order to secure data storage.
Description
DESCRIPTION
ELECTRONIC IDENTITY CARD ON SMARTCARD
Basic Concept
To allow to each citizen the right and the possibility to own, carry and access at any moment, anywhere without any mean of specialized intervention, his status and overall file history.
While incredible advances are continually made in the delivery of citizen information, this field still suffers from a lack of integrated information as controllers, security researchers for traffic prevention and counterfeiting, and countries struggle to share knowledge across sites and countries.
Is a unique concept-based technology that makes information knowledge more accessible and usable whenever and wherever it is needed. The dynamic, comprehensive terminology has numerous benefits for citizens, controllers, security agencies enterprises and life saving organisations.
• Enables consistent coding of history concepts, leading to more complete and accurate information.
• Improves co-ordination of citizen information and control agent.
• Provides access to important information that might otherwise be buried among paper records.
• Helps ensure comparability of data recorded by multiple in field control agents across diverse and often incompatible area platforms and systems.
• Enables flexible queries and the complete, consistent recall needed for better workflow management and strategic information support.
• Enables more accurate recording through reduced vulnerability to miscoding.
• Facilitates progress toward the electronic record information.
Security concept on data storage and manipulation.
Hardware: Based on a credit card size media industry standard equipped with a processor regardless his brand of processor called Smartcard using a memory of 8 Kbytes or more , Digital storage: Digital photo of owner, ID data, medical emergency data, Identification info, 103 general information files and an optional application.
Functions: The data are stored on the memory area of the Chip, in separate files, each with different encryption and pin-codes. In this way we can achieve maximum protection of privacy for the owner. Every consultation is only possible with the appropriate access of the control-card and the pin-code. This gives the guarantee that the police can only consult the data. There is also a pin-code for the police agent system, so if the PDA or the computer system is unguarded for a short time it puts itself in safe mode, and before reactivating you need the initial access code. Three invalid attempts will result that the software on the PDA erasing itself and the card will be put on non-active, protecting the system against hacking.
Once the login procedure is fulfilled the program will ask to insert a citizen Id card. As soon as the card is inserted, the citizen's picture and the ID data are displayed on the screen. This makes it virtually impossible to cheat, because the policeman can compare the face of the citizen to the picture he has on the screen and the photo on the citizen's. Further selection has to be made with one of the tabs on the bottom, every selection will open a pull down menu.
The first tab (fig. 6) contains the basic emergency medical data: this gives the blood
group, medical contra-indications, etc. Also important phone numbers are stored to contact in case of accident, and the relation of these persons to the holder. Next the codicil, and the way of terminating life in case of terminal coma.
Issuing new cards is made very simple and can be done at a local police station or at authorized issuing points (fig.3). The software is completely menu-driven and can be used even by non-computer experts.
Advantage of the system: By using a digital photo the system is difficult to counterfeit.
Fast checkup and registration of violating citizens.
No errors in data entry and no extra processing time. After proper identification the data can go trough the secure way (crypt-decrypt) or flow much faster..
In this case the processor will allocate an area of the memory free for access, then reading or writing can be process in this case data is not passing through the encrypting process. In other case data is retrieve out of memory then the personal encryption key code will apply-in and scramble. It is very interesting and useful to transfer data to a central storage device to be processed.
Prior to be resented though the encrypting processor, access to data is being denied before it is restored within its proper key. This gives the possibility to swap data without any loss of safety of the key's proper information by using temporarily the memory capacity of the Chip.
The SmartCard Structure: See figure : 1
Front side of the Identity Card with details information
The SmartCard Structure: See figure : 2
Back side of the Identity Card with details information
This device includes a micro component into a one-piece solid state media (Fig.2) that capacity range from 8 to 32 Kbytes small and light enough that can be carried into a purse, pocket or wallet.
Card reader with connecting cables or PCMCIA card adapters are required. It fits standard computer ports that equipped all system today. Conforms to industry standards mechanical specifications. Runs on Microsoft Windows 95, 98, 98SE, Windows ME, Windows 2000, Windows NT1
Mac and Linux Os, to be used with desktops & notebooks computer system.
SmartCard Storage capacities could vary from 8 to 32Kbytes
Security Concept Application Structure: See figure : 5
Achieving a secure way to process the ID card trough reader writer devices.
A Software pilot monitors the computer Ports channel to detect if an eventual insertion. In the event that a SmartCard is connected the pilot detect is type, characteristics and is ID and determine if they are valid, then signal its presence to the program that start decrypting process of the controller personal data. This data is encrypted with the encryption technology using a time out. The hidden key-ID is unique for every citizen the data is always sent in blocks of equal length, but key dependent, in different sequence. Every block has a check sum for integrity.
The data can be different for every block to go, in different steps for up counting or down counting sequence, depending on a control word, send in the beginning of the sequence, and processed with the key number. The system is using a matrix of 256 numbers, who can be used in variable sequence, for coding and decoding the data, this sequence depends on the key number, the check sum and the control word in combination of the key ID type. Data regeneration can only be processed in the proper key in order to secure information's stored within the key it self, this data is encrypted and has always the same block length, making it temper proof.
The build-in Crypto-Processor will reconvert the data into a readable text when both SmartCards, Citizen and Controller are connected trough the computer system. The Administrator key is used for creating the different type of SmartCard, also permits data recuperation and verification in case of lose or data corruption.
SmartCard Using Microchip Secure Data Storage
Because only the holder of the SmartCard may expose the data we can use a unique base figure for every SmartCard. This is more safe then PKI, you need no public key for encryption. There is only one central data base where the double of every SmartCard data is stored so in case of defect or lost a new SmartCard can be made with the recovered data of the backup media pipe Line Techniques
All data must go transit trough the Crypto-processor. The data is always encrypted going
This way. This gives the security by making backups. In case of processing large amount of data, data is always process within the SmartCard, This guaranty of maximum security.
Because every SmartCard has its own encryption protocol the data can only be used in its proper SmartCard.
The key can be used to process data, block by block so there is virtually no limit on file length. This with the guaranty of maximum security. After job done the standard data is swapped again in the key. Because every key has its own encryption protocol the data can only be used in its proper key.
Security Techniques Using Personal Encrypted Variable Hidden Key. Above the standard encryption the data is always transferred at standard block length. So it is impossible to find the beginning or end of the data in this block. Every block has its own hidden key. The place where this key is hidden is different for every block. This key is telling the construction of the block, the offset for the beginning, left or right reading and the binary bite manipulation. Electronic Communication Concept See (fig. 3)
Achieving an Internet communication way.
Local communication framework is a concept shown in (fig. 3) how a local framework of card distribution and information communication transfer and online data update and transfer trough the Internet that will backup and maintain in a secure way the user individual page to store the citizen history and remain point within the card in away allowing the authority to maintain a precis and temper proof the veracity and the exactitude of the point.
Global communication framework is a concept See (fig.4)
Access to the backup internet portal in being generally granted only the authority using their special administration SmartCard with valid identification.
In case of loss of the citizen's Identity Card the authority will request to the administrator to issue a new SmartCard.
Claims
1.. Digital Identity Card on SmartCard
A secure way to store the citizen data and information.
The overall system concept that capture and maintain all history and data from citizen in a digitally and electronically form and stored them within the memory area of the chip of the Smartcard.
This SmartCard can be connected to any computer desktop or mobile system equipped with a SmartCard Reader- Writer. The Chip device includes a Crypto- processor into a one-piece solid state media that capacity range from 16 to 32 Kbytes that is mounted on the SmartCard is small and light enough that can be carried into a purse, pocket or wallet.
A SmartCard Reader Writer connecting cables or PCMCIA card adapters are required. It fits standard ports that equipped all computer system today.
2.. SmartCard Using Microchip Secure Data Storage
Because only the holder of the SmartCard may expose the data we can use a unique base figure for every SmartCard. This is more safe then PKI, you need no public key for encryption. There is only one central data base where the double of every SmartCard data is stored so in case of defect or lost a new SmartCard can be made with the recovered data of the backup media
3.. Pipe Line Techniques
All data must go transit trough the Crypto-processor. The data is always encrypted going this way. This gives the security by making backups. In case of processing large amount of data, data is always process within the SmartCard, This guaranty of maximum security. Because every SmartCard has its own encryption protocol the data can only be used in its proper SmartCard.
4.. Security Techniques Using Personal Encrypted Variable Hidden Key. Above the standard encryption the data is always transferred at standard block length. So it is impossible to find the beginning or end of the data in this block. Every block has its own hidden key. The place where this key is hidden is different for every block. This key is telling the construction of the block, the offset for the beginning, left or right reading and the binary bite manipulation.
5.. Hardware Extra Latch Security Techniques
The hardware is constructed so that in case of defect or jam, it always displays the least significant data block.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/BE2009/000007 WO2010091483A1 (en) | 2009-02-11 | 2009-02-11 | Electronic identity card on smartcard |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/BE2009/000007 WO2010091483A1 (en) | 2009-02-11 | 2009-02-11 | Electronic identity card on smartcard |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010091483A1 true WO2010091483A1 (en) | 2010-08-19 |
Family
ID=40983767
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/BE2009/000007 WO2010091483A1 (en) | 2009-02-11 | 2009-02-11 | Electronic identity card on smartcard |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2010091483A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022233333A1 (en) * | 2021-05-07 | 2022-11-10 | 丘炎卫 | Digital security system interaction system supporting network security |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5623637A (en) * | 1993-12-06 | 1997-04-22 | Telequip Corporation | Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys |
US6393565B1 (en) * | 1998-08-03 | 2002-05-21 | Entrust Technologies Limited | Data management system and method for a limited capacity cryptographic storage unit |
US20050240778A1 (en) * | 2004-04-26 | 2005-10-27 | E-Smart Technologies, Inc., A Nevada Corporation | Smart card for passport, electronic passport, and method, system, and apparatus for authenticating person holding smart card or electronic passport |
US20080192928A1 (en) * | 2000-01-06 | 2008-08-14 | Super Talent Electronics, Inc. | Portable Electronic Storage Devices with Hardware Security Based on Advanced Encryption Standard |
-
2009
- 2009-02-11 WO PCT/BE2009/000007 patent/WO2010091483A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5623637A (en) * | 1993-12-06 | 1997-04-22 | Telequip Corporation | Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys |
US6393565B1 (en) * | 1998-08-03 | 2002-05-21 | Entrust Technologies Limited | Data management system and method for a limited capacity cryptographic storage unit |
US20080192928A1 (en) * | 2000-01-06 | 2008-08-14 | Super Talent Electronics, Inc. | Portable Electronic Storage Devices with Hardware Security Based on Advanced Encryption Standard |
US20050240778A1 (en) * | 2004-04-26 | 2005-10-27 | E-Smart Technologies, Inc., A Nevada Corporation | Smart card for passport, electronic passport, and method, system, and apparatus for authenticating person holding smart card or electronic passport |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022233333A1 (en) * | 2021-05-07 | 2022-11-10 | 丘炎卫 | Digital security system interaction system supporting network security |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2935807C (en) | Systems and methods for multi-factor remote user authentication | |
AU770753B2 (en) | Distributed data archive device and system | |
CN101375259B (en) | Data security system | |
KR0145026B1 (en) | Access control apparatus and method thereof | |
US20050187792A1 (en) | Optical prescription card | |
US7860793B2 (en) | Smart secure storage | |
CA2365644A1 (en) | Portable electronic charge and authorization devices and methods therefor | |
JP2002101092A (en) | Individual authentication device and its system and its method, individual authentication information storage medium, individual authentication program storage medium, individual authentication information registering method and individual authentication information authenticating method | |
CN101147161A (en) | Loading internal applications on a smartcard | |
US20070062156A1 (en) | Automatic medicine packing system | |
EP1271277A3 (en) | Security system and software to prevent unauthorized use of a computing device | |
JPH1139483A (en) | Fingerprint authentication card, memory card, authentication system, authentication device and portable equipment | |
CN101183468A (en) | Terminal login system and method | |
CN112104627A (en) | Block chain-based data transmission method and device, electronic equipment and storage medium | |
JP2012073902A (en) | Personal authentication system, personal authentication method, program and recording medium | |
US20120066349A1 (en) | Method and system using two or more storage devices for authenticating multiple users for a single transaction | |
US20020194024A1 (en) | Sabotage-proof and censorship-resistant personal electronic health file | |
CN107944307A (en) | A kind of computer security management system | |
KR20090072717A (en) | New data storage usb disc, computer interface usb device and method by flash memory's bad patten | |
WO2010091484A2 (en) | Electronic driving licence with points on smart card | |
CN103473512A (en) | Mobile storage medium management method and mobile storage medium management device | |
CN101099207B (en) | Portable data support with watermark function | |
SE526732C2 (en) | Security arrangement for ensuring access to device such as portable computer, has key unit with input and communication units to identify user before key unit accepts locking-unlocking | |
WO2010091483A1 (en) | Electronic identity card on smartcard | |
WO2002093508A1 (en) | Portable personal medical file system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09775645 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205ADATED 21.11.11) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09775645 Country of ref document: EP Kind code of ref document: A1 |