How to Stop Documents Leaks: Unmask Anonymous Leakers

How to Stop Documents Leaks: Unmask Anonymous Leakers

Article provided by Sergey Voynov. G-71 Inc.

Over the past decades, the development of the Internet and social networks, in particular, have led generations of people to metamorphoses. The ease of finding and obtaining any information, as well as the opportunity to share it (and sometimes an obsessive desire) unwittingly formed the culture of disregard for confidentiality.

At the same time, there are still many situations where it is necessary to keep information confidential, such as in business, government, and personal relationships, but it is becoming increasingly difficult to protect. And I’m not talking about ways to control unauthorized access to this information. I am talking about the preservation of confidential information by those to whom this information has been entrusted, although sometimes it can be controversial and raise issues around freedom of speech and the freedom of the press.

Back in the 18th century, Benjamin Franklin said: “Three can keep a secret if two of them are dead.” However, neither in those days nor today, humanity has found an effective way of communication without the need to entrust secrets to at least someone. Let a limited circle of people, but someone still needs to know them.

The effective way to protect confidential information is a combination of technology, policy, and education to create a culture of confidentiality and security that can adapt to changing technologies and social norms.

If you ask most cybersecurity experts a question on the topic of ways and technologies to protect confidential documents from leakage, then most of the answers will focus on the means of protection that somehow control or restrict unauthorized access to these documents. However, according to statistics, 3/4 of all leaks are not hacking – this is a leak by those who had authorized access to documents. That is, access control tools do not work here. The only way to force those who have been entrusted with documents to comply with their non-disclosure obligations is to ensure a guaranteed determination of the culprit of the leak. Only the inevitability of disclosure and an understanding of responsibility can ensure compliance with the security requirement and radically reduce intentional leaks.

Thus, it becomes obvious that in these cases we have to talk about detective solutions, which can be divided into two non-interchangeable principal approaches. The first is the classification of document files and the addition of metadata to files containing information about who this file belonged to when it was merged. But the metadata disappears as soon as the document ceases to be a file and becomes an image on the screen or a paper document. The screen can be photographed, a paper document can be copied. Therefore, a second approach becomes necessary – the marking of documents should be used. It can be visible, in the form of static or dynamic watermarks, or more resistant to removal and more user-friendly – invisible Anti-Leaks marks based on a steganographic approach to labeling.

You can easily find information about specific vendors of these solutions on the Internet, or by contacting multi-vendor system integrators. Each of the security systems has its strengths, but it’s important to note that these technologies are just tools and require specialized knowledge and expertise to use effectively. Additionally, unmasking anonymous leakers can be controversial and raise issues around privacy and freedom of speech, so it’s important to carefully consider the potential consequences before taking any action.

5 capabilities you need in a name screening system

5 capabilities you need in a name screening system

Guest article provided by Jeanne Le Garrec, BasisTech 

Everyone who has ever had to assess or verify another human being’s identity knows the struggle. The stress of missing a name that appears on a watchlist. The time wasted investigating false positives. The complexity and frustration of parsing foreign names, often in foreign scripts.

Currently, banks, fintechs, insurance companies, law enforcement agencies, and other institutions dealing in high-stakes identity verification use three methods to determine who’s who: fingerprints, facial recognition, and name screening.

Issues have arisen with the first two methods.

Fingerprints can change over time. Facial recognition is a reliable method of identity verification, but it can be costly and perceived as intrusive.

That leaves name screening.

Name screening is both an effective and cost-effective method of identity verification. But not all name screening technologies are created equal. If you plan to implement or upgrade your organization’s name screening technology, make sure you invest in software that:

1. Uses AI for fuzzy matching

Fuzzy logic is a computing approach that improves upon Boolean processes by considering degrees of truth. In name screening, fuzzy logic is most commonly used to account for typos, transpositions, and other name differences and errors. It identifies similar but non-identical pieces of text appearing in separate records. It then ranks the likelihood of these similar pieces of text being a match.

This capability is important to name screening for a variety of reasons. Perhaps the most important of these is the different name components and name orders used in different datasets. A person’s name may be recorded using a first and last name (“Harold Jones”); a first, middle, and last name, (“Harold Andrew Jones”); a first name, middle initial and last name, (“Harold A. Jones”). Any one of these scenarios can be reversed by placing the last name first: “Jones, Harold Andrew” and so on. Boolean processes typically don’t consider disordered names a match — fuzzy matching does.

2. Tunes easily The identity verification field is always evolving. Criminals get smarter, new regulations are implemented to combat criminal activity, and organizations debut new processes to comply with those regulations. You need a name-screening solution that easily adapts to a changing environment. Your name screening solution should be capable of being tuned and updated easily, without significant time investment or production disruption.

3. Provides explainable scores Every organization and screening officer is accountable for the choices they make. Why did you permit this bank customer to onboard? Why did you allow that traveler to enter the county? Sometimes, regulators and others will want to know how the name-screening system scored the match as it did, and which AI models were used in the scoring process. Because of this, you should consider investing in a name screening system that offers “explainable AI.” Explainable AI is a set of methods and processes that enables users to better understand what AI is doing, on what data it’s basing its decisions, and how it calculated match scores.

4. Empowers you to adjust scoring parameters Understanding your name screening software’s scoring system will help you better understand why two names have been deemed a “match” or a “mismatch.” Unhappy with the decisions your system has made? The best name screening technologies allow you to track the “matches” that you would consider a mismatch, track the “mismatches” you would consider a match, and adjust scoring parameters accordingly.

5. Allows for benchmarking and testing You need the ability to benchmark and test your name screening solution in a specific sandbox, or with an independent sandbox provider. If a software provider will not allow you to test name screening software independently, consider it a red flag. Your solution should be tested before implementation, and whenever significant tuning or parameter adjustments have taken place.

Identity verification is inherently complicated, but the right name screening technology can ease the process. If you need to implement or improve name screening technology, make sure to take into account the criteria discussed above. To learn more, visit

Israel’s Cognyte embroiled in Myanmar in spyware scandal

Israel’s Cognyte embroiled in Myanmar in spyware scandal

First published on Editor: Harry Baldock

Reports suggest the company won a tender to sell spyware to state-run telecoms operator Myanmar Posts and Telecommunications (MPT) just one month before the military overthrew the Burmese government.

Israeli software firm Cognyte is coming under scrutiny this week following media reports that the company’s surveillance technology may have been used to commit human rights abuses in Myanmar.

Documents shared by activist group Justice for Myanmar show a January 2021 letter from MPT to the Burmese regulator referencing Cognyte as the winning vendor for an intercept technology tender.

The documents show that the purchase order was issued “by 30th Dec 2020” – a little over a month before a military junta overthrew Myanmar’s civilian government.

Eitay Mack, an Israeli human rights lawyer, has reportedly sent a letter to the Israeli Attorney General calling for a criminal investigation into Cognyte and the nation’s defence and foreign ministries, accusing them of aiding the Burmese military to commit crimes against humanity.

The letter claims that Cognyte “should have known” they were providing technology that would be used to commit crimes against humanity, noting that the Burmese military had already openly rejected the results of the November 2020 democratic election when the contract was signed.

But beyond the moral implications of selling surveillance technology to repressive regimes, there is also a legal element at play here.

Back in 2016, the Myanmar military became infamous for their genocidal oppression of the Muslim Rohingya people, killing thousands and forcing hundreds of thousands more to flee to neighbouring countries. In response, various nations placed sanctions on Myanmar, with the US and the EU both ceasing to supply the Myanmar government with military equipment.

Israel, however, continued to export weapons and equipment to the Burmese government until 2018, only stopping when media pressure grew too intense.

As such, Mack argues that any 2020 deal between Cognyte to sell this equipment to MPT was illegal, with intercept spyware tech classified as defence equipment under Israeli law.

It is currently unclear whether the spyware technology has been actively deployed by MPT, though anonymous sources speaking to Reuters confirmed that the technology was tested by the operator. Other sources also confirmed that some form of intercept spyware was used by the operator, though Cognyte was not referenced specifically.

Cognyte and MPT have refused to comment on the matter.

Julien DROUET, VP Identity Solutions at IDEMIA

Julien DROUET, VP Identity Solutions at IDEMIA

Julien DROUET, VP Identity Solutions at IDEMIA

Trained as an engineer with over 20 years of experience in the telecom, banking and now identity industries, Julien Drouet has worked in several highly successful international companies.


1. How can we efficiently secure identity documents against fraud?


As the proven leader in identity technologies, IDEMIA recognizes that document security features are the cornerstone of securing identity. Our vision is clear when it comes to developing our security features portfolio: we build ID documents that are hard to reproduce, but easy to inspect.

Our ID documents are hard to reproduce: each year we invest heavily in R&D to develop innovative security features that will serve this vision. We produce more than 150M ID documents every year (passports, ID cards, driver’s license, etc.) thanks to our extensive expertise, and what we have learned from our customers is that fraudsters mainly target the portrait, as it is the main link between an ID document and its holder. As a consequence, we focus on securing the portrait.

With that in mind, we recently launched LASINK™ 3D, the latest added security feature to our LASINK™ family, which consists of three security features:

– LASINK™ origin: with LASINK™ Origin, the main color portrait of the document’s holder is engraved directly into the polycarbonate structure by a laser during the personalization stage. LASINK™ Origin color photos have a unique linear pattern that acts as a signature to authenticate the document.

– LASINK™ Helios: a polychromatic color portrait integrated in a DOVID. LASINK™ Helios received the award of ‘Best Applied Security Product’ from the International Hologram Manufacturers Association (IHMA)

– LASINK™ 3D: a 3D color portrait in a transparent window.

LASINK™ Helios and LASINK™ 3D are secondary portraits of high quality that come reinforce the protection of the primary portrait.

Although the portrait is our highest priority, we have also developed additional security features with moving effects, or what we call a Motion Print. Additionally, we have created features that interlink the data in the document, like steganography, which conceals data within the document. The data can then be decrypted by various devices, such as a mobile phone, when the holder’s identity is checked.

Our documents are widely acknowledged for the high security level they provide. Since 2019, our eID cards in Estonia, Latvia, Morocco and Colombia, have been awarded as best new ID cards by the industry during the High Security Printing conferences.

Our vision also includes innovations to make authentication and inspection of ID documents easier. We are developing security features that can be inspected via automated inspection, through Optical Machine Authentication (OMA) using a scanner or a smartphone. Thus, authentication becomes easier and quicker all while being secure and reliable. Today, LASINK Origin can be authenticated through OMA which opens new use cases for the market. For instance, we can imagine in the near future a fully remote authentication with verification of LASINK™ Origin genuineness, completed by a selfie check.

At IDEMIA, we are truly focused on providing our customers with immediate innovative document security features, while ensuring that we are prepared to meet future digital needs.


2. While physical identity still coincides with digital identity, has the bridge widened as technologies have advanced?


We believe that physical and digital ID complement and complete each other because your digital ID is often derived from your physical ID. At IDEMIA, we strongly believe in an ID ecosystem where the physical and digital ID can co-exist perfectly.

A person’s physical identity has a crucial role when it comes to digital ID issuance. It provides the basis, or Root of Trust, from which identity attributes can be securely derived. For example, a smartphone can be used to both capture and verify a person’s identity so that they can easily use their identity and claim their rights. This is the way in which the physical and digital ID are expected to co-exist and enable a whole suite of secure services for citizens at a cost that is affordable for governments.

In addition to our expertise in physical ID documents, IDEMIA is also working on several digital identity projects. In the United States of America, we have partnered with Departments of Motor Vehicles for more than six years. We are the No. 1 issuer of driver’s licenses in the U.S. and we have also been issuing mobile driver’s licenses for years in Arizona, Delaware, Oklahoma, Mississippi and more. This not only enables law enforcement officers to perform secure and fast ID checks, but also allows for other use cases such as attribute sharing. For example, in the case of age checks at liquor stores, a person can choose to only show their age attribute without having to show all of their personal data.

We are also working on similar projects in Latin America. We are working with the Columbian Government to equip citizens with a new physical identity card alongside a digital extension on smartphones. The new digital ID provides a robust foundation to extend this infrastructure to future use cases. It will allow online authentication services, starting with governmental use cases and expanding to private sector services —such as access to financial services.

With regard to Europe, we are closely following the wallet trend that consists of storing multiple identity documents within your smartphone, an expanding trend thanks to the expected regulation eIDAS II and its interoperable European Mobile ID wallet.


3. How does IDEMIA’s technology contribute to more secure national identity schemes?


The first consideration here is that it is up to governments to decide what and how they want to develop and secure their national identity scheme, and IDEMIA, works directly with governments to help them achieve these goals.

IDway is IDEMIA’s identity management system that securely manages ID credential requests (both physical and digital). It guarantees the delivery of a foundational, legal, trusted identity. The full suite can handle the management of a citizen’s identity from birth and throughout life.

IDEMIA has been deploying ID management systems globally for more than 25 years. To give you one figure, IDEMIA ID systems now serve almost 40% of Latin America’s population.

One of our latest deployments was in Nepal: with a vision of continually developing and modernizing its digital infrastructure, the country is undergoing mass transformation and is evolving fast. As a long-term partner of Nepal, IDEMIA has already been supporting the Nepalese people on this journey by providing national ID cards, an AFIS system and Machine Readable documents.

IDway is a modular solution, meaning that it can be tailored to local needs, existing infrastructure and the needs of governments. Governments can protect their investments as the modularity allows for easier evolution of the systems.

It is also fully compliant with the OSIA standards which enable seamless interoperability. With this open standards approach, governments can be confident that their systems can evolve without compatibility issues in the future.

We developed IDway using a DevSecOps approach, securing the solution at every stage of development. This well-known approach is based on a central multi-biometric engine which ensures the uniqueness of each individual’s identity through a deduplication process.

Moreover, IDEMIA has extensive expertise in biometrics. Our algorithms regularly rank in the top tier in the NIST benchmarks. The latest results from the NIST and DHS has confirmed our leading position in the three main biometrics: face, fingerprints and iris. For example, our technology was ranked first on the False Match Rate (FMR) fairness test among the 100 most accurate algorithms from the NIST, with more than twice the fairness of the 20 most accurate solutions. In India, IDEMIA is a major contributor to the world’s largest biometric-based ID program, “Aadhaar”, and has enabled mass-enrolment of more than 1.3 billion people to date.

IDEMIA is the leader in identity technologies and we are very proud of the innovation and expertise we provide to our government partners.


4. Can you describe some of the most exciting applications you have developed across different sectors in the last few years?


We are particularly proud to be part of the digital transformation of a country, as it also means more inclusion. Thanks to our extensive expertise in identity, both physical and digital, we have recently supported Morocco and Colombia in modernizing their ID ecosystem.

The Kingdom of Morocco is widely recognized for its digitalization. With the aim of increasing efficiency within public services and improve overall citizen satisfaction, they established a strategic plan to digitalize government services.

IDEMIA has provided support throughout this important project, from the supply of state-of-the-art eID cards in 2020 (over 10m card already delivered) to the implementation of an authentication platform for digital services in 2022, and the design of a dedicated smartphone app.

Today, citizens of Morocco can now connect to the platform to access several governmental and private services, using their new eID card. They enjoy easier and more convenient access to online public and private services, but most importantly more secure access thanks to the use of the eID card.

Colombia has also taken major action toward digital transformation of the country. As part of the national digital strategy, the Colombian Government has emphasized a citizen-centric approach and has made the development of remote services a priority. To do so, they decided to go for a coupled approach in which they requested a new national ID card and its derived version on smartphone to co-exist.

As a long-term partner of the National Civil Registry of Colombia (RNEC), IDEMIA was selected to support them in the deployment of this project.

Since 2020, Colombian citizens have had access to a brand-new ID card, made of the most up-to-date security features, and also the ability to have their ID card in their smartphone. With their mobileID, they can easily authenticate online or in-person.

We are also closely following the developments of the European wallet. Our role is to ensure that governments will be able to take advantage of the benefits of a secure and reliable digital ID, and guide them in defining and implementing the right secure digital identity scheme. As the leader in identity technologies, we intend to play a significant part in the ecosystem.

(Contributed by IDEMIA)

IDEMIA’s LASINK™ security features for identity documents

IDEMIA’s LASINK™ security features for identity documents


Guest article provided by IDEMIA.

We caught up with Thomas Poreaux, Head of ID Document Products at IDEMIA, to find out more about their security features and their innovations for identity documents.

Could you tell us about IDEMIA’s LASINK™ technology? How is IDEMIA contributing to the security of identity documents?

Document fraud has a history of evolving rapidly, despite the tremendous prevention measures that are continually being enforced by issuing authorities and document manufacturers. Part of this is because fraudsters have access to sophisticated equipment and materials that allow them to create seemingly authentic ID documents.

An ID document’s portrait is the crucial link between the credential and the person claiming to be the bearer. So, when it comes to authenticating an ID document, the focus is always on the main portrait, and this is precisely why it is a target for fraudsters.

At IDEMIA, we strive to stay one step ahead of fraudsters. For our cutting-edge ID documents, we use a polycarbonate material that makes the documents robust and durable. The polycarbonate build-up is made up of layers of plastic materials that overlap and intertwine. Separating the layers is impossible because they are fused together under immense pressure at a high temperature.

In addition to that, we use an exclusive personalisation technique with our LASINK™ Origin solution, to securely laser engrave primary colour portraits directly into the inner layers of the polycarbonate structure. As polycarbonate cannot be delaminated, it is nearly impossible for fraudsters to falsify the portrait without destroying the card completely. IDEMIA’s personalisation technique is a secret and therefore prevents the use of stolen blank documents, as they cannot be properly personalised without our software.

IDEMIA’s LASINK™ family is made up of LASINK™ Origin for primary colour portraits and LASINK™ Helios and LASINK™ 3D for secondary portraits.

Today, LASINK™ Origin is the most popular and commonly used technology to laser engrave colour portraits into ID documents. Currently, there are 20 million ID documents in circulation worldwide, notably in Morocco, Costa Rica, Colombia, Estonia, Latvia and others that incorporate IDEMIA’s LASINK™ technology. By 2025, it will be approximately 60 million.

How can the security of identity documents be enhanced to counteract the threat of counterfeiting?

As I mentioned previously, the primary portrait is the most attacked feature on an ID document. LASINK™ Origin is as close as you can get to a tamper-proof solution to protect the portrait.

Another element that makes LASINK™ so unique is that a high level of expertise is necessary for the accurate implementation of this technology:

· During the manufacturing process, a special colour matrix, made up of thin lines, is printed on a layer of the blank polycarbonate document. Right now, there is no other printing technology (inkjet, dye sublimation, retransfer, standard laser etc.) that is able to reproduce LASINK’s™ pattern.

· The bearer’s colour photograph is processed by the LASINK™ Image Generator to create a grayscale view of the portrait.

· A high-definition laser engraver personalises the grayscale portrait with the exact registration of the colour matrix, revealing the colour portrait at the core of the polycarbonate document.

Also, greater security can be achieved if you facilitate document authentication for everyone: experts and non-experts. Colour portraits generated by LASINK™ are easier to authenticate, as flesh tones are better perceived by the human eye than grayscale hues.

Furthermore, the structure of LASINK™ generates a unique moiré effect when viewed through a dedicated lens that cannot be imitated with any other colour portrait technologies. And finally, for forensic examination, we included specific security features than can be authenticated using a microscope.

What will be the role of physical ID documents in the future?

Merging physical and digital, what is known as ‘phygital’, is today’s reality. A secure, foolproof digital ID is often derived from a physical ID. Therefore, it is fundamental that the physical ID document is up-to-date, modern and as secure as possible. An ID needs to provide the same level of trust and confidence in the digital world as it does in the physical world―it is official proof that a person is who they claim to be. A trusted physical document is a solid basis from which a secure digital identity is often created.

To help with verification, IDEMIA’s ID documents are developed for Optical Machine Authentication to enable secure, reliable, and fast authentication with maximum convenience. In recent years, we have seen a significant increase in the use of digital services, which means that the number of use cases where an individual’s identity document needs to be verified is also rising. For example, when someone wants to open an online bank account, it is mandatory by law to verify the applicant’s identity. This is why we have developed pioneering technology that automates the authentication of LASINK™ security features. All you have to do is scan the ID document using a scanner or a smartphone, and the software will tell you instantly if it is genuine or not.

Travel the world contactless with seamless travel

Travel the world contactless with seamless travel

Travel and mobility are key factors in our fast-paced and globalized world. Seamless travel describes concepts that offer a user-friendly and secure travel experience by allowing digitalized processing at borders. However, there are still several challenges to overcome when it comes to its implementation.

By Corinna Schindler*

Over the last few decades, economic crises and critical security situations have repeatedly hit international air traffic and the travel industry. However, customer demand has never collapsed for long. It is therefore not surprising that passenger numbers are already recovering and even increasing following the COVID-19 pandemic.

Against this backdrop, airport operators, airlines, and authorities are facing increasing challenges in terms of the structural organization of air travel. Higher passenger numbers mean a greater need for more efficient and easy processes throughout the entire customer journey. At the same time, safety standards must not be compromised. Seamless travel is one possible solution to these complex challenges. The concept of seamless travel aims to minimize the traveler’s individual touchpoint with controls, check-ins, and physical documents and in its place provide a simplified, convenient travel experience.

Seamless travel: The journey starts in the app

Digitalized travel starts with the planning and organization of a trip. Users can easily book their hotel in just a few clicks, view suitable flights and pay for everything online from the comfort of their home. At their destination, they can easily reserve a rental car, and the corresponding app even takes care of check-in via self-service.

But one component remains physical for the time being: travelers must always carry ID cards or passports with them. In some places, they even still must physically apply for a visa or an entry application for their destination country. In the future, steps such as updating and applying for documents, such as passports, could also be implemented digitally.

However, the most serious obstacles on the road to fully digitized and seamless travel arise at the airport itself.

Contactless through the airport of tomorrow

Individual concepts of seamless travel have been implemented to varying degrees in certain regions. Within the Schengen Area, for example, EU citizens can scan their passports at an e-gate, which is far faster than the manual inspection lines.

However, current concepts and processes are not yet truly contactless. Passengers still need to provide credentials to enter security zones and the aircraft itself, such as in the form of a printed boarding pass or by showing their passport.

So, what would a traveler’s journey look like in an airport that truly embraces seamless travel? After booking online, passengers pass through the arrivals’ hall and, on the way to airport security, walk through a biometric corridor. There, a state-of-the-art camera system verifies the individuals and compares their passport and biometric data with both the information in the database and the passenger list. In this ideal scenario, the entire process takes place while they are on the move, so that travelers don’t even notice the security check. As well as simplifying and speeding up the process, it also eliminates contact points with equipment and direct contact with airport personnel – aspects that have become particularly important since the COVID-19 pandemic. Likewise, the toolset for identifying fraudulent identity documents has also developed. Even when identification is carried out via automatic biometric methods, manual checks are possible in cases of doubt or irregularities.

Once at the destination, the passenger data is already stored on the system and no additional checks are required. The rental car company will also have received the required information and the booked car will be available without customers having to wait. Immediately, the entire trip becomes less bureaucratic, more convenient and far faster due to reduced waiting times. If optimally implemented, passengers will no longer even be aware that they are passing through the various zones of an airport; instead, they can expect a contactless and seamless travel experience. However, the road to reaching this goal is a long one, full of challenges.

A concept in its infancy

Even if there are concrete ideas about seamless travelling concepts, decisive foundations for their implementation are still missing. What are the reasons for this? In addition to the technical requirements, the main obstacles lie in the need for international cooperation at all levels. While the private sector, especially airlines and airport operators, has already joined forces in umbrella organizations such as the International Civil Aviation Organization (ICAO) or the International Air Transportation Association (IATA), there are significant challenges of cooperation between government authorities with sovereign tasks.

Travelers’ personal data is a basic prerequisite to realize international seamless travel – both at the point of departure and destination. But the exchange of data between individual countries is not yet uniformly regulated. And even though there are isolated bilateral agreements and corresponding programs for air travelers, for example between the US and Germany, there is a lack of standardization – a problem that certainly cannot be solved in the short term. Such a solution would have to consider a lot of different legal aspects, as well as data protection issues. This shows that there is still a lot of work to be done in this area before a seamless travel concept can be implemented globally.

Different data protection laws in various countries are still an unsolved problem in this regard. Working groups such as the Secure Identity Alliance (SIA) are endeavoring to develop standards for interfaces and system concepts to realize an efficient exchange between countries.

To accelerate respective developments, some airlines and local authorities have already joined forces and offer their customers programs that promise fast processing of entry and exit procedures thanks to stored data. As sensitive personal data is collected here, providers should focus on cyber security, transparent handling and obtaining consent to ensure acceptance from travelers.

A question of technology

In addition, technology still faces some challenges. A biometric corridor that can identify and assign people beyond doubt requires powerful cameras, as well as the appropriate software. Notable innovation under development includes long e-gates that perform biometric identification. The use of a long field of vision is often the preferred method of choice here – capturing compliant images has become increasingly reliable in recent years. However, in a government environment, such as when running security checks, fingerprints are still considered more accurate. Iris identification is one trend attracting attention. This is considered highly secure. However, given the iris’s comparatively small area, high-resolution cameras need to perform the scan while in motion. Although the technology still has some challenges to overcome, iris scanning may prove to be a viable solution in the future.

The self-service offering is an important aspect of modern travel for passengers. The easier and less complicated it is for passengers to submit their personal data in advance, the less waiting time this process will take further down the line. To this end, approaches such as e-kiosks in airports have proved to be highly successful. Here, travelers fill out a questionnaire before their flight, scan their passport and verify their identity using biometric methods – such as facial recognition. Once the data has been successfully collected, they currently receive a printout that is checked by security. This solution, which is particularly widespread in the US, is a step towards simplified travel and offers great potential.

However, even if modern airports implement the latest solutions and enable seamless travel, not all countries are at the same technological level. Airports that cannot implement current technologies will therefore continue to exist in the future and will inevitably limit seamless travel offerings.

Quo vadis, seamless travel?

Many aspects influence the trend towards seamless travel. Automation and digitization are constantly leading to new solutions, for example in the field of touchless biometrics. Contactless biometric verification is not yet accurate enough for governmental standards and verifications, but shows huge potential for the future.

One of the biggest challenges is certainly the interaction between many different parties, especially the different requirements for private and government sectors. While airports and airline operators strive for an increase in digital technology, the security stakeholders don’t want to exclude human checkpoints altogether. Here, the focus is on safe and repeatable execution.

Nevertheless, the trend is clearly moving in the direction of seamless travel, albeit at locally varying speeds and despite the many local and global discussions that remain open. On the way to this goal, it is important to create new standards in international cooperation that enable collaboration between states and airlines and thus ensure the best future travel experience.

* Corinna Schindler is Global Vice President Business Line Verification at Veridos.

For further information on Veridos and their Smart Travel solutions  please visit: SmartTravel – Veridos Identity Solutions


Bigger than ever: ID Week Europe 2023 upscales to Amsterdam venue

Bigger than ever: ID Week Europe 2023 upscales to Amsterdam venue

Identity Week Europe 2023 is in our sight. Bigger than ever.

To accommodate 5000+ visitors, we are upscaling Identity Week America 2023 to the impressive RAI, in Amsterdam, with added capacity, magnificence and central links to Europe.

Now with a consolidated base of the identity industry, we’re calling for speakers, previous and new, to join our lively panel and roundtable discussions in 2023 and deliver solo presentations around the evolution of biometrics, digital ID and physical security documents.

We cannot wait to wait to bring another epic edition of ID Week to the forefront. A year in advance, we study the trends in the industry and have research conversations with speakers to build an idea of which topics are high on the identity agenda.

Join our line-up of leading identity experts from 13-14 June in Amsterdam for Identity Week Europe 2023.

Open to industry experts, professionals, entrepreneurs, universities, R&D centres, associations and organisations, share your powerful ideas, case studies and innovative initiatives.

The deadline to submit your speaking enquiry is Friday 25 November 2022.

If you have any questions, or would like to speak to a team member directly please contact

Incode & TOTM Technologies Form Strategic Partnership to Meet Accelerated Demand for Omnichannel Identity Experiences in Indonesia

Incode & TOTM Technologies Form Strategic Partnership to Meet Accelerated Demand for Omnichannel Identity Experiences in Indonesia

Incode, the next-generation identity verification platform, recently announced that it has forged a partnership with TOTM Technologies as its reseller, to offer one of the world’s most powerful identity solutions, Incode Omni, to the Indonesian market as part of its Asia Pacific expansion.

Incode is a Fintech Power 50 company and industry leader in privacy-centric identity verification for global enterprises.The Omni platform is used by the world’s largest financial institutions, governments, marketplaces, hotels and hospitals to customise their user experience, at scale while drastically reducing security and fraud risk. With its unique passive liveness technology, word class facial recognition, and advanced deep learning techniques, Incode Omni meets the most stringent compliance and security standards for global brands such as Jumeirah Hotels, Rappi, and Citi.

Indonesia is a key market for Incode and TOTM in Asia-Pacific. Indonesian enterprises are accelerating their digital transformation to address a growing base of digitally savvy mobile-first users who are demanding frictionless onboarding processes and a simpler experience. According to Statista, 72% of Indonesians are smartphone users while close to 73% now have internet access. What’s more, the pandemic added 21 million new digital consumers, with the majority (72%) from non-metropolitan areas.

As an end-to-end identity management and biometrics products provider, TOTM Technologies powers enterprises with digital identity and onboarding solutions spanning use cases such as national identity, fintech and finance, healthcare, and critical infrastructure access control.  TOTM Technologies recognises identity as a key that opens unlimited doors and is determined to broaden the horizon of Indonesian companies by bringing world-class, secure, and customer-first biometric products from Incode into the region.

Ricardo Amper, Founder and CEO of Incode, said, “We are proud to team with a widely recognized partner like TOTM Technologies. TOTM Technologies’ technical expertise and experience, large customer base, and understanding of a big Asian market like Indonesia are unparalleled in the region. With its support, I expect nothing less than hyper-growth in Indonesia as we continue our global expansion into Asia Pacific.”

Allen Ganz, Vice President of Business Development, Incode, said, “TOTM Technologies has a strong track record in helping enterprises transform their business operations with next-generation biometric and identity solutions, coupled with strong technical support across many shared industry verticals. Our first in Asia Pacific, this partnership is a milestone in our global channel roadmap where we aggressively expand our partner ecosystem to meet the demand for our offerings.”

Pierre Prunier, CEO and Executive Director of TOTM Technologies, said, “Indonesian businesses are showing great interest in identity verification and management solutions, especially with the acceleration of digitalisation due to the pandemic. We are confident that Incode’s best-in-breed solutions and disruptive technology will deliver the secure, frictionless, and differentiated user experience that our customers are prioritizing and are looking to offer in their highly competitive sectors.”

Q&A with Jean-Luc Khaou at MineSec

Q&A with Jean-Luc Khaou at MineSec

At Identity Week Asia, Payments Consulting Network Technical Director, David Lunt caught up with MineSec Managing Director, Jean-Luc Khaou, for a deep dive into SoftPOS and how MineSec is supporting the enablement of digital payments for Small and Medium-sized Businesses (SMBs). 

Read the highlights of the interview below. 

DL: Can you please describe how MineSec helps SMBs accept digital payments?

JLK: MineSec is an innovation enabler that accelerates access to digital payment technology for all SMB merchants. We help customers jumpstart their SoftPOS payment innovation and grow their business by converting smartphones to contactless payment acceptance devices. With our white-label SoftPOS solution, MineSec enables Digital Payment Inclusion for SMB merchants looking for more support to accept electronic payments as cash use fades. 

MineSec SoftPOS solution converts any smartphone to a payment Point Of Sale and complies with stringent international security standards. The solution comprises a Software Development Kit (SDK) and an Attestation & Monitoring (A&M) server, also called Know-Your-Device (KYD) server. The SDK provides Contactless Kernels, security protections, and APIs for customers to develop their own SoftPOS applications. The A&M server checks the security exposure of the application and device.  

With our team based in Singapore, Hong Kong and Shenzhen, we support all our customers across Asia, the Middle East and Europe. 

DL: What payments services do you offer your target merchants?  

JLK: We offer a way for SMBs to accept contactless payments without the traditional hardware and its related implementation costs. Payments are increasingly going contactless and digital, but many SMB merchants are excluded from the current contactless payments wave. They lack support from Payment Service Providers (PSP) who see lower returns for their implementation efforts and hardware cost to onboard small and medium business merchants. 

SoftPOS allows merchants to accept digital payments by converting smartphones into POS terminals. They can simply download a SoftPOS app to complete the mobile onboarding process and start accepting contactless payments. 

With MineSec SoftPOS solution, PSPs can now capture the market that they have been leaving behind – offering merchants omnichannel payment services cost-effectively and flexibly for both PSPs and merchants. 

Our solution has all payment kernels (Visa, MasterCard, Amex, UPI, Discover, and JCB) and QR code payment solutions integrated, enabling MineSec to be currently activated in over 10 countries in Asia, Middle-East and Europe where merchant SoftPOS applications are powered by MineSec technology. 

DL: Are there any industry sectors or client types that you focus on? 

JLK: We work with FinTech, PSPs and POS vendors of all types. Some want full control of their solution, whereas others just want a ready-to-go white-label solution for fast market access. 

MineSec solution is agnostic to industry sectors and can be used by SMBs in brick-and-mortar shops, restaurants, delivery, event, and transportation services.  

DL: What do you see as the key strengths of MineSec’s services? 

 JLK: We also want to simplify the SMB’s journey to access contactless payment and offer a solution that is easier and more modular to deploy. MineSec will keep enriching our products horizontally and vertically. We have recently announced the integration of KYC/KYB services from a technology provider to enhance identity security for a more seamless onboarding process for merchants.  

We are unique in how open and modular our solution architecture is – allowing our customers to have many choices in configuring their bespoke SoftPOS solution. 

Finally, MineSec features a comprehensive back-end SaaS solution that offers PSPs all the necessary cloud-based platforms to operate and monitor devices, merchants, and transactions. 

DL: How do you differentiate MineSec from other softPOS providers? 

JLK: In addition to the advanced SoftPOS solution we offer to the market, we have gained tremendous trust from our customers, thanks to the credibility of our in-house experts. Customers rely on MineSec to get certifications and effectively deploy their SoftPOS services.   

What makes us different also is how our A&M server is designed to provide a Know-Your-Device security service. We implemented configurable business rules to adapt to country-specific requirements so that PSP can be meeting the needs of their merchants in any country they operate. 

DL: What key achievements over the last 12 months can you share? 

JLK: MineSec was incorporated in May 2020. During the first 6 months, we focussed on the development of the MVP, create our value proposition, and then convinced our first customer to deploy our solution. 

We have invested all our efforts in the product, ensuring that we acquire all the mandatory certifications for our solution rollout and to gain more customers. So in 2021, we signed on to 6 new customer projects and had the first production deployment in Hong Kong. 

As of today, we are certified by PCI, Visa, MasterCard, American Express, Discover, and UnionPay to use MineSec white-label SDK in their networks. We also have 7 direct customers and 5 indirect customers. Indirect customers are users of MineSec solutions in countries where our direct customers have sold their solution as white-label, powered by MineSec SDK. By end of 2022, thousands of merchants will be using SoftPOS powered by MineHades SDK and MineZeus KYD services. 

DL: Looking ahead, what service innovations are you implementing in the next 12 months? 

JLK: We are working with technology partners to integrate KYC/KYB services or other innovative payment acceptance solutions such as cryptocurrency. Our objective is to bring services to SMBs that will enable them to increase their revenues and flexibility in payment acceptance.  

DL: What key SMB industry trends do you see occurring over the next 2-3 years? 

JLK: While developing our business based on growth projections, it was also surprising to learn, from SMBs and partners in the market, that the focus of SMBs is to adapt very quickly to the uncertain future. If they have an opportunity to grow and scale up, they need a solution that allows them to catch that opportunity and do it very quickly. And if they need to scale down, they must be able to do it, again very quickly, without incurring liabilities and costs without any income.  When we were looking at the millions of commercial merchants in Asia, most of them hold very low inventories and expect their suppliers to be as flexible as them to answer the consumers’ demands. This will remain the trend of the economy in the next 2-3 years. MineSec, as well as our customers and stakeholders in the eco-system, should be designing solutions and services that can be as flexible. SMBs will benefit from having solutions that allow swift scale up and down – paying only as much as they use.  

I am convinced that this can only be done with a digital solution like MineSec SoftPOS solution. The new digital economy will be the web3.0 economy where buyers and sellers can interact instantly, securely, efficiently, and without any intermediary. 

DL – What key criteria or features should a SMB consider when evaluating payment service providers? 

As an SMB, they should be working with PSPs which provide flexible services that facilitates merchant digital onboarding and service activation.

MineSec Limited exhibited at Identity Week Asia 2022 while David Lunt moderated the panel ‘Panel: Securing online payments through robust ID’. Identity Week is a conference and exhibition that brought together the brightest minds in the identity sector to promote innovation, new thinking, and more effective identity solutions.  

UNDP: Global Leaders Commit to Cooperation to Advance the Use of Digital Public Goods in Support of Inclusive Development Outcomes

UNDP: Global Leaders Commit to Cooperation to Advance the Use of Digital Public Goods in Support of Inclusive Development Outcomes

Implementing safe, trusted, and inclusive digital public infrastructure supported by robust governance frameworks is critical for countries to build resilient futures. On June 1st, government leaders, international development organisations, and philanthropic funders gathered to pledge large-scale technology sharing, funding, and their commitment to support this international cooperation agenda.

In June, global leaders jointly committed to advancing the use of digital public goods (DPGs) – the open-source solutions needed to build digital public infrastructure (DPI) that can enable countries to provide better services and foster inclusive economic growth. The event was convened by the Digital Public Goods Alliance (DPGA), Government of Norway, Government of Sierra Leone, and United Nations Development Programme.

Digital public infrastructure – the digital systems like cash transfers, digital identification, and data exchange that enable the effective provision of essential society-wide functions – can play a critical role in building resilience, including pandemic and crisis recovery. At the event, global leaders committed to implement and fund digital public infrastructure through a newly established Digital Public Goods Charter, which serves as a framework to increase international cooperation on this agenda.

The DPG Charter, co-led by the DPGA and the Digital Impact Alliance (DIAL), outlines a clear vision for a coordinated global approach to build safe, trusted, and inclusive digital public infrastructure using DPGs. Doing so can enable countries – regardless of income levels – to transform services and service delivery for people and communities everywhere.

The DPG Charter, and the commitments made by global leaders, are especially relevant given the devastating socio-economic impacts of the COVID-19 pandemic and mounting climate disruption. These challenges, compounded with the unprecedented food, energy, and financial crisis precipitated by the war in Ukraine, are creating an urgent need to act.

Investing in digital public infrastructure that puts human rights at the centre, and promotes gender-sensitive, whole-of-society approaches, can alleviate near-term economic shocks and build resilient systems for the future. The benefits are proven: countries that had well governed digital public infrastructure in place weathered the pandemic better than countries without. These countries were able to respond to challenges faster by capitalising on the use of pre-established, high-quality, welfare-enhancing digital systems.

DPGs are built on open standards, and therefore support greater interoperability. This can reduce duplication, save time and money in implementation, and provide opportunities for digital cooperation globally. The DPG Charter promotes leveraging DPGs for digital public infrastructure, which in turn can create a fairer and more inclusive playing field for countries and local digital ecosystems worldwide – by increasing participation of micro-merchants including women in e-commerce; improving children’s access to education; ensuring last-mile digitisation of payments and cash transfers; and strengthening crisis preparedness and resilience.

This event, and the pledges made, mark the starting point for global cooperation on DPGs for DPI –and funding to support it– between governments, multilateral organisations, donors, and the private sector. These efforts are in line with the UN Secretary-General’s Roadmap for Digital Cooperation, and the activities of the Global Digital Compact and the Summit of the Future in 2023.

Below are some of the leaders who pledged their support to advancing this initiative:

Alkesh Kumar Sharma, Secretary in the Ministry of Electronics and Information Technology, India: “By joining the DPGA, we commit to making available India’s digital public infrastructure such as Universal Payments Interface (UPI) as global digital public goods, and will offer technical assistance to implementing countries to advance global welfare for all.”

Eva-Maria Liimets, Minister of Foreign Affairs, Estonia: “Estonia remains committed to support the development of the X-road solution and to advocate it as a digital public good which can boost digitalisation, and also plans to invest a minimum of EUR20 million in open-source AI solutions in 2022-2023.”

Niels Annen, Parliamentary State Secretary to the Federal Minister for Economic Cooperation and Development, Germany: “Germany has invested EUR 20 million in the GovStack Initiative to accelerate digital government services development by sharing interoperable and reusable digital building blocks – additional funding is currently subject to the approval of the German Parliament.”

Zunaid Ahmed Palak, State Minister, ICT Division, Ministry of Posts, Telecommunications and Information Technology, Bangladesh: “In order to respond to Prime Minister Sheikh Hasina’s call of building an equitable, high-income Smart Bangladesh by 2041, this requires an uncompromising and relentless focus on ensuring digital equity enabled by DPGs and digital public infrastructure at scale. Which is precisely why today I am proud to announce that the Government of Bangladesh will be joining the Digital Public Goods Alliance and wholeheartedly endorsing the vision of the Digital Public Goods Charter.”

Paula Ingabire, Minister of ICT and Innovation, Rwanda: “Rwanda fully endorses the vision laid out in the Digital Public Goods Charter. We are committed to advancing the DPG agenda. As we join the Digital Public Goods Alliance today, we commit to bringing our expertise and sharing lessons learned as well as learning from the successes of the different partners.”

Mykhailo Fedorov, Vice Prime Minister and Minister of Digital Transformation, Ukraine: “It’s the digital public infrastructure that makes it possible for us to continue to deliver services to our citizens. It also became the bedrock for data-driven decision-making processes […] Jointly with UNDP under very difficult conditions we have provided digital public services for receiving IDP [internally displaced people] status. We are working on a platform for payment and deduplication from international humanitarian agencies through Diia services.”

Bill Gates, co-chair of the Bill & Melinda Gates Foundation, and Nandan Nilekani, Co-Founder and Chairman of Infosys Technologies Limited, spoke in support of the DPG Charter and confirmed their strong commitment to help advance investments in digital public infrastructure, enabled by DPGs, for financial inclusion, social protection and inclusive development.

Other participating countries pledging support and commitments at the event included: Norway, the Philippines, Sierra Leone, Sweden, Uganda, as well as leadership from USAID, UNDP, and UNICEF.

(Source: UNDP, June 2022)

Holograms: A Digital and Optical Vision for Industries in Transition

Holograms: A Digital and Optical Vision for Industries in Transition

Protecting and authenticating security and ID documents presents challenges for holograms but the technology’s capacity to evolve and integrate in the optical and digital space, reflects its continued potency in security applications, says Dr Paul Dunn, chair of the International Hologram Manufacturers Association (IHMA).

New optical and digital developments are reshaping the role and nature of holograms in document and ID security. They are also driving innovative and sophisticated design solutions for often non-descript security documents, simultaneously enhancing the security of an identity document, as governments and issuing agencies around the world, as well as other global entities, wrestle with losing billions of dollars a year in revenue through incessant counterfeiting of documents and insidious ID fraud.

Meanwhile the cost of paying for anti-counterfeiting measures to bring criminals to justice can add up to hundreds of millions of dollars. The problem has also been exacerbated in the last two years by the impact of COVID, which has accelerated digital transformation in almost every industry, accompanied by drastic opportunities for increased fraud.

Providing innovative and sophisticated solutions for security documents requires not only a design that will make a document attractive; it also means enhancing the intrinsic security of that document. Secure document conception can be achieved for ID cards and passports, for example, by integrating security features with exclusive designs that highlight attack attempts and facilitate controls such as checking that an ID document matches the bearer.

Today, propelled by advances in materials and applications, holograms designed to protect and authenticate, are integral elements of optical variable elements (OVE) on ID documents, helping to verify identities both in person and remotely.

Ground breaking technologies such as Idemia’s Lasink Helios are to the fore in these applications: its technology is linked to a DOVID (Diffractive Optical Variable Image Device) and combined with holographic technology displays striking optical effects, such as colour variations of the portrait including a full polychromatic view with true colors, which vary depending on the angle of view. Easy to inspect, resistant to multiple types of fraud and durable, the use validates both secondary and main portrait images on documents, thus confirming the identity of the document holder – both images are interlinked to make forgery virtually impossible, deterring any attempted fraud.

Primary protection

The IHMA estimates that there are three billion identity documents issued worldwide, the evolving challenges posed by fraud see governments, issuing authorities and law enforcement turning to innovation to stay ahead of criminals and fraudsters. Here, the use of direct laser interference patterning (DLIP) applied by the Fraunhofer Institute for Material and Beam Technology in Germany can be seen as a versatile tool for producing holographic motifs and diffraction-based elements on most materials; the optical security elements can be written directly on the surface as well as in the volume of a transparent material for improved authentication and greater individualisation of security documents.

Conventionally, a DOVID protects the most important information of a document i.e., the primary image of the document holder. It can additionally cover the holder’s data and a secondary image. So conventionally all this information is printed or laser engraved by the manufacturer and protected by DOVIDs. However, rather than simply protecting the information, security solutions provider OVD Kinegram’s novel technology allows for the creation of a secondary image and/or data directly. The laser personalized KINEGRAM is highly secure and protects against ID fraud and document falsification. This three-layer system is laser processed to radically alter their appearance from a black to mirror like effect, or transparent or even eye-catching optical effects.

Besides offering intrinsic protection, the use of two metal layers/effects provides further benefits and protection – both appearances are in perfect registration and thus cannot be copied by unauthorised printing processes. Moreover, the ability to integrate the embedded KINEGRAM elements over a larger area in perfect optical harmony with other features (such as the security print) leads to a document design that is intuitive and self-explanatory, and hence readily available for human inspection. The design tells a story that even the untrained eye can immediately understand, while the solution protects the personalised data and the photograph of the passport’s data page for ID3 format passport data pages and ID1 format identity cards or driving licences.

Today, the use of optical and physical technologies to protect valuable documents against existing and emerging threats is paramount – for instance, the role of optical and digital technologies in securing health status passports is gaining increasing traction – while great strides are being made in the areas of micro and nano-optical structures and other new approaches to document security. Indeed, the future evolution of optical and digital document security is set to play an important role in the transition to digital documentation for some time to come.

New digital NanoCast technology from NanoGrafix enables the online production of variable holograms or any other optical structures on any printing press with the special NanoCast module. Each hologram can be different and have different holographic encrypted information that can be used for authentication and track and trace purposes. This technology can be installed on any existing machinery in order to “print” these holograms or optical structures onto banknotes, security documents such as Tax Stamps, ID documents, etc. With this module security printers no longer need to outsource holograms or any other optical structure. The holograms are instantly produced and can be different from one another. Each banknote or secure document will then have for the first time a unique holographic identifier. No more outsourcing of security features or extra handling and storage of printed materials. In this way, the chances of documents being compromised are reduced while ensuring a readily available supply of ‘instant’ holograms to support global authentication and anti-counterfeiting programmes.

Smartphone technology is also increasingly being used in combination with hologram programmes to facilitate authentication. In this fast-evolving landscape, security features such as holographic foil-stripes that cannot be replicated are being created. This type of technology allows law enforcement and other specialists ‘read’ a document using a smart phone or LED lighting, in the process providing a robust way to authenticate and thwart counterfeiting and forgery.

Pointing the way

The continued use of holography in optical and digital document security points to the technology’s underlying versatility, cost-effectiveness and graphical flexibility. Indeed, it will continue to flourish in those markets where a highly effective security feature is required as governments and other issuers of

ID cards, passports and driving licences have to implement security technologies to protect an increasing array of documents from counterfeiting attacks.

The optical and digital space heralds exciting development opportunities for holograms, which can deliver an exceptional representation of the 3D world and pose a significant step forward in the search for better imaging. The opportunity for further integration by innovative, forward-thinking companies is huge, as digital holographic technology, increasingly operating via smartphones and devices, provide a visceral and ardent interpretation of the world, allowing people to see and sense images in a way that is realistic, comfortable and natural.

Moreover, the use of well-designed and properly deployed authentication solutions, as advocated by the ISO 12931 standard, enables those with ID protection responsibilities to verify the authenticity of a legitimate product, differentiating it from counterfeits. Even those that carry a fake authentication feature can be distinguished from the genuine item if the latter carries a carefully thought-out authentication solution. The advantages holography offers will continue even as digital and mobile ID technologies gain increasing levels of traction.

The IHMA ( is made up of more than 80 of the world’s leading hologram companies. Members include the leading producers and converters of holograms for banknote security, ID cards and passports, other secure documents, brand protection, packaging, graphics and other commercial applications around the world, and actively cooperate to maintain the highest professional, security and quality standards.

Sony unlocks in-camera forgery-proof technology

Sony unlocks in-camera forgery-proof technology

Today, Sony has today announced the availability of its in-camera forgery proof photo technology for corporate business users. Using digital signatures processed at capture, Sony technology supports to detect any modification to an image thus protecting it from fraudulent usage.

Following widespread issues with unauthorised editing and misconduct around digital photo data, Sony has developed forgery-proof technology, based on standard cryptography, for corporate users to safeguard images against future misuse.

With Sony’s in-camera signing mode activated, images are immediately cryptographically signed by the camera processor upon capture. Following this, any pixel modification, tampering or potential forgery will cancel the image signature, as the image manipulation will be detected by the customer’s own certificate server during examination.

Available on the Alpha 7 IV camera, with expansion to other models to be considered in sequence, this new functionality streamlines the lengthy process required from image submission through to verification, all with the addition of extra security.

The Alpha 7 IV also combines a 33.0MP full-frame back-illuminated Exmor R™ CMOS image sensor with BIONZ XR™ imaging engine to deliver high-speed processing and outstanding resolution.

Sony’s new forgery-proof signing mode ensures the secure creation and transmission of images based on cryptographic methods, as the fundamental need for certifying unmodified and secure images grows in many applications, across multiple industries.

This technology is particularly applicable for passports and ID verification but goes further in tackling image manipulation in the media, medical and law enforcement fields. For the insurance and construction sectors, this technology will offer a secure foundation for inspection and recording of damage​.

Yasuo Baba, Director of Digital Imaging and European Product Marketing at Sony, commented:

“It is Sony’s missions to strengthen business solutions with cutting-edge imagery technology and our in-camera digital signing is a real game changer for combatting image manipulation and forgery across multiple industries. Whilst appropriate adaptations for each industry need to be made, the digital signature is multilingual and can be used internationally, enabling organisations worldwide to streamline mandatory image signing with Sony technology.”

Currently compatible with the Alpha 7 IV, and subject to receipt of a license to enable Sony’s signing mode, this facility will be available for business users with plans for further model expansion to follow. In tandem, Sony will continue to examine how we can utilise our industry-leading imaging technology to further support enhanced security across multiple industries, with plans to expand the line-up of supported cameras hereafter.

GoTrust Idem Key is the first FIDO Security Key able to access MojeID’s Czech government and high assurance EU eIDAS services

GoTrust Idem Key is the first FIDO Security Key able to access MojeID’s Czech government and high assurance EU eIDAS services

GoTrustID Inc. (GoTrust) has announced that their Idem Keys with FIDO2 Security Level 2 certification are being used in the Czech Republic by CZ.NIC’s MojeID service to provide the highest level of eIDAS assurance for digital transactions throughout the entire EU.

MojeID became the first eIDAS approved eID service that leverages the FIDO standards and certification program. This is a remarkable milestone that benefits Czech citizens by letting them utilise phishing resistant technology.

As the Idem Keys are qualified to the top assurance level they can also be used for lower-level assurances, meaning that Idem Keys can access any type of eIDAS transaction. The GoTrust Idem keys have USB-A, USB-C and NFC interfaces. All Idem Keys work with Windows, MAC, Chromebook, iOS and Android phones. The iPhone and Android phone are supported using the NFC interface and as a bonus the Idem Key can be used for physical access in commercial environments. Idem Keys are waterproof with IP68 rating and are available from the top 2 online stores in the Czech Republic.

The benefit of using the FIDO standard is that the Idem Keys work with any web-based services, anywhere without downloading a driver or middleware. The MojeID Identity service provided by CZ.NIC is authorized by the Czech Ministry of the Interior for accessing online government services and all eIDAS compliant online services in the EU.

The only FIDO Security Key on the market today to meet the requirements of high assurance of eIDAS and work across every user device is the GoTrust Idem Key. “We were delighted to find exactly the FIDO Security Key we required to get eIDAS High accreditation,” commented Ondřej Filip, CEO at CZ.NIC.