Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
ELECTRONIC IDENTITY CARD ON SMARTCARD
Document Type and Number:
WIPO Patent Application WO/2010/091483
Kind Code:
A1
Abstract:
Digital Identity Card on SmartCard...and it's concept. This tool captures, securely stores, analyze and maintains all related identification information require by the state and the personal data from the citizen in a digitally and electronically form as...citizen identity, photo, date of validity, personal related information, and basic medical emergency data all this data I are stored within a small solid state micro-processor device that is set with a standard industry credit card size light and small enough to easily fit into a wallet and could be connect to any computer, desktop or mobile system equipped with a SmartCard reader. The Digital Identity Card on SmartCard can be carried by the citizen anywhere and permits when needed to instantly give access to the authorized person or controller the precious information needed as..emergency medical data in case of accident and also his location and address history. With the use of user-friendly software all related data of the citizen including technical, administrative, data will be display. Furthermore it permits to the control authority to access summarized report of the situation of the citizen. Moreover, using a dedicated internet portal site for communication and backup purpose, facilities are given to the control authority to download citizen image and latest data of a citizen that has lost or forget his identity Card. A secure communication and storage algorithm based on Rijndael in conjunction with a security technique using the SmartCard microchip device in order to secure data storage.

Inventors:
CHICHE GEORGES (BE)
Application Number:
PCT/BE2009/000007
Publication Date:
August 19, 2010
Filing Date:
February 11, 2009
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
CHICHE GEORGES (BE)
International Classes:
G06K19/07; G06F17/30; G06Q10/00
Foreign References:
US20050240778A12005-10-27
US6393565B12002-05-21
US5623637A1997-04-22
US20080192928A12008-08-14
Download PDF:
Claims:
CLAIM

1.. Digital Identity Card on SmartCard

A secure way to store the citizen data and information.

The overall system concept that capture and maintain all history and data from citizen in a digitally and electronically form and stored them within the memory area of the chip of the Smartcard.

This SmartCard can be connected to any computer desktop or mobile system equipped with a SmartCard Reader- Writer. The Chip device includes a Crypto- processor into a one-piece solid state media that capacity range from 16 to 32 Kbytes that is mounted on the SmartCard is small and light enough that can be carried into a purse, pocket or wallet.

A SmartCard Reader Writer connecting cables or PCMCIA card adapters are required. It fits standard ports that equipped all computer system today. 2.. SmartCard Using Microchip Secure Data Storage

Because only the holder of the SmartCard may expose the data we can use a unique base figure for every SmartCard. This is more safe then PKI, you need no public key for encryption. There is only one central data base where the double of every SmartCard data is stored so in case of defect or lost a new SmartCard can be made with the recovered data of the backup media

3.. Pipe Line Techniques

All data must go transit trough the Crypto-processor. The data is always encrypted going this way. This gives the security by making backups. In case of processing large amount of data, data is always process within the SmartCard, This guaranty of maximum security. Because every SmartCard has its own encryption protocol the data can only be used in its proper SmartCard.

4.. Security Techniques Using Personal Encrypted Variable Hidden Key. Above the standard encryption the data is always transferred at standard block length. So it is impossible to find the beginning or end of the data in this block. Every block has its own hidden key. The place where this key is hidden is different for every block. This key is telling the construction of the block, the offset for the beginning, left or right reading and the binary bite manipulation.

5.. Hardware Extra Latch Security Techniques

The hardware is constructed so that in case of defect or jam, it always displays the least significant data block.

Description:
DESCRIPTION

ELECTRONIC IDENTITY CARD ON SMARTCARD

Basic Concept

To allow to each citizen the right and the possibility to own, carry and access at any moment, anywhere without any mean of specialized intervention, his status and overall file history.

While incredible advances are continually made in the delivery of citizen information, this field still suffers from a lack of integrated information as controllers, security researchers for traffic prevention and counterfeiting, and countries struggle to share knowledge across sites and countries.

Is a unique concept-based technology that makes information knowledge more accessible and usable whenever and wherever it is needed. The dynamic, comprehensive terminology has numerous benefits for citizens, controllers, security agencies enterprises and life saving organisations.

• Enables consistent coding of history concepts, leading to more complete and accurate information.

• Improves co-ordination of citizen information and control agent.

• Provides access to important information that might otherwise be buried among paper records.

• Helps ensure comparability of data recorded by multiple in field control agents across diverse and often incompatible area platforms and systems.

• Enables flexible queries and the complete, consistent recall needed for better workflow management and strategic information support.

• Enables more accurate recording through reduced vulnerability to miscoding.

• Facilitates progress toward the electronic record information.

Security concept on data storage and manipulation.

Hardware: Based on a credit card size media industry standard equipped with a processor regardless his brand of processor called Smartcard using a memory of 8 Kbytes or more , Digital storage: Digital photo of owner, ID data, medical emergency data, Identification info, 103 general information files and an optional application.

Functions: The data are stored on the memory area of the Chip, in separate files, each with different encryption and pin-codes. In this way we can achieve maximum protection of privacy for the owner. Every consultation is only possible with the appropriate access of the control-card and the pin-code. This gives the guarantee that the police can only consult the data. There is also a pin-code for the police agent system, so if the PDA or the computer system is unguarded for a short time it puts itself in safe mode, and before reactivating you need the initial access code. Three invalid attempts will result that the software on the PDA erasing itself and the card will be put on non-active, protecting the system against hacking.

Once the login procedure is fulfilled the program will ask to insert a citizen Id card. As soon as the card is inserted, the citizen's picture and the ID data are displayed on the screen. This makes it virtually impossible to cheat, because the policeman can compare the face of the citizen to the picture he has on the screen and the photo on the citizen's. Further selection has to be made with one of the tabs on the bottom, every selection will open a pull down menu.

The first tab (fig. 6) contains the basic emergency medical data: this gives the blood group, medical contra-indications, etc. Also important phone numbers are stored to contact in case of accident, and the relation of these persons to the holder. Next the codicil, and the way of terminating life in case of terminal coma.

Issuing new cards is made very simple and can be done at a local police station or at authorized issuing points (fig.3). The software is completely menu-driven and can be used even by non-computer experts.

Advantage of the system: By using a digital photo the system is difficult to counterfeit.

Fast checkup and registration of violating citizens.

No errors in data entry and no extra processing time. After proper identification the data can go trough the secure way (crypt-decrypt) or flow much faster..

In this case the processor will allocate an area of the memory free for access, then reading or writing can be process in this case data is not passing through the encrypting process. In other case data is retrieve out of memory then the personal encryption key code will apply-in and scramble. It is very interesting and useful to transfer data to a central storage device to be processed.

Prior to be resented though the encrypting processor, access to data is being denied before it is restored within its proper key. This gives the possibility to swap data without any loss of safety of the key's proper information by using temporarily the memory capacity of the Chip.

The SmartCard Structure: See figure : 1

Front side of the Identity Card with details information

The SmartCard Structure: See figure : 2

Back side of the Identity Card with details information

This device includes a micro component into a one-piece solid state media (Fig.2) that capacity range from 8 to 32 Kbytes small and light enough that can be carried into a purse, pocket or wallet.

Card reader with connecting cables or PCMCIA card adapters are required. It fits standard computer ports that equipped all system today. Conforms to industry standards mechanical specifications. Runs on Microsoft Windows 95, 98, 98SE, Windows ME, Windows 2000, Windows NT 1

Mac and Linux Os, to be used with desktops & notebooks computer system.

SmartCard Storage capacities could vary from 8 to 32Kbytes

Security Concept Application Structure: See figure : 5

Achieving a secure way to process the ID card trough reader writer devices.

A Software pilot monitors the computer Ports channel to detect if an eventual insertion. In the event that a SmartCard is connected the pilot detect is type, characteristics and is ID and determine if they are valid, then signal its presence to the program that start decrypting process of the controller personal data. This data is encrypted with the encryption technology using a time out. The hidden key-ID is unique for every citizen the data is always sent in blocks of equal length, but key dependent, in different sequence. Every block has a check sum for integrity. The data can be different for every block to go, in different steps for up counting or down counting sequence, depending on a control word, send in the beginning of the sequence, and processed with the key number. The system is using a matrix of 256 numbers, who can be used in variable sequence, for coding and decoding the data, this sequence depends on the key number, the check sum and the control word in combination of the key ID type. Data regeneration can only be processed in the proper key in order to secure information's stored within the key it self, this data is encrypted and has always the same block length, making it temper proof.

The build-in Crypto-Processor will reconvert the data into a readable text when both SmartCards, Citizen and Controller are connected trough the computer system. The Administrator key is used for creating the different type of SmartCard, also permits data recuperation and verification in case of lose or data corruption.

SmartCard Using Microchip Secure Data Storage

Because only the holder of the SmartCard may expose the data we can use a unique base figure for every SmartCard. This is more safe then PKI, you need no public key for encryption. There is only one central data base where the double of every SmartCard data is stored so in case of defect or lost a new SmartCard can be made with the recovered data of the backup media pipe Line Techniques

All data must go transit trough the Crypto-processor. The data is always encrypted going

This way. This gives the security by making backups. In case of processing large amount of data, data is always process within the SmartCard, This guaranty of maximum security.

Because every SmartCard has its own encryption protocol the data can only be used in its proper SmartCard.

The key can be used to process data, block by block so there is virtually no limit on file length. This with the guaranty of maximum security. After job done the standard data is swapped again in the key. Because every key has its own encryption protocol the data can only be used in its proper key.

Security Techniques Using Personal Encrypted Variable Hidden Key. Above the standard encryption the data is always transferred at standard block length. So it is impossible to find the beginning or end of the data in this block. Every block has its own hidden key. The place where this key is hidden is different for every block. This key is telling the construction of the block, the offset for the beginning, left or right reading and the binary bite manipulation. Electronic Communication Concept See (fig. 3)

Achieving an Internet communication way.

Local communication framework is a concept shown in (fig. 3) how a local framework of card distribution and information communication transfer and online data update and transfer trough the Internet that will backup and maintain in a secure way the user individual page to store the citizen history and remain point within the card in away allowing the authority to maintain a precis and temper proof the veracity and the exactitude of the point. Global communication framework is a concept See (fig.4)

Access to the backup internet portal in being generally granted only the authority using their special administration SmartCard with valid identification.

In case of loss of the citizen's Identity Card the authority will request to the administrator to issue a new SmartCard.