12.01.2013 Views

Biometrics - Buro Jansen & Janssen

Biometrics - Buro Jansen & Janssen

Biometrics - Buro Jansen & Janssen

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Smart cards are also introduced as personal identification cards at regional, national and<br />

international levels, such as in citizen cards, drivers’ licenses, patient cards. It is also<br />

becoming more common that contactless smart cards are integrated in International Civil<br />

Aviation Organisation [ICAO], biometric passports to enhance security for international<br />

travel.<br />

3.13 Smart Card<br />

A smart card is a chip card; it can be compared with a magnetic stripe card, in which<br />

information is stored on memory chip card. The card can be secured. The cards without<br />

security are for example phone cards. The smart card is not just composed of a memory, but<br />

also of a microprocessor, which makes it possible to communicate and make calculations.<br />

Secure Access Road BV [SAR BV] also uses the smart card for its solutions. The card is<br />

being used to speed up the verification processes and ensure reliability. Moreover the cards<br />

can be used as a facility card, parking card and more. The smart card has the chip on the<br />

card. The card needs to be inserted into the reader. Moreover it can save the information in<br />

code.<br />

The smart card technology is usually used to provide further privacy assurance to the<br />

individual. Their public/ private key pair could be embedded on the smart card along with<br />

the encrypted copy if the biometric template. This means that the biometric data has been<br />

reduced to a template and not an original copy of the biometrical data. When one enrols<br />

into a biometric system, the key pair is generated and the enrolled biometric template<br />

encrypted with the public key. On entering, the enrolled biometric is decrypted by the<br />

smart card using the private key and is then uploaded to the biometric device and<br />

compared and matched.<br />

There are still vulnerabilities involved with this system. In order to break the security of the<br />

system, an attacker must substitute an encrypted version of the biometric template both<br />

within the database and within the smart card [Fleming, S.T., p. 131, 2003]. The private key<br />

must also be obtained in order to decrypt the template or break the public‐key<br />

cryptography. In order to fool the system, the attacker would have to steal the smart card<br />

and present cloned or copied biometric data to the scanner. However the risks of these<br />

attacks are lower, because the raw biometric data has never been exposed, it is always<br />

encrypted. Moreover as soon as the loss or theft of a smart card has been discovered, the<br />

encrypted biometrics can be erased.<br />

3.14 Radio Frequency Identification<br />

The Radio Frequency Identification [RFID] is a small chip, which can be read from short<br />

distances. These information systems consisting of RFID chips exchange data with an RFID‐<br />

reader at radio frequencies. RFIDs mostly used in logistics in order to identify cargo, is<br />

29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!