THIS invention relates to a method and system for creating an identification document.
Existing identification documents generally comprise an image of an individual to whom the document is issued, together with personal identification data such as the name and identity number of the individual. Due to a general increase in fraud and terrorist activity worldwide, the degree of security offered by conventional identification documents is widely considered to be inadequate, and various measures have been proposed to increase the security of such documents. For example, one approach that has been adopted is the inclusion of smart card technology in passports or other identification documents. However, the inclusion of “high tech” security measures is of limited value in areas where the necessary equipment is not available to apply the necessary identification procedures.
It would be desirable to provide an identification document with enhanced security, the benefits of which can be utilised even in relatively remote locations, or other locations where dedicated security equipment is not available. It would similarly he desirable to provide methods of creating and authenticating such identification documents.
According to the invention there is provided a method of creating an identification document, the method comprising:
The identification document will typically be an identification card printed with human discernable information, including an image of the individual corresponding to the image of the individual included in the first two-dimensional symbolic barcode and the personal identification data included in both the first and second two-dimensional symbolic barcodes.
The biometric data may include fingerprint data acquired from the individual.
The biometric data may further or alternatively include voiceprint data acquired from the individual.
The data included in the first and/or second barcodes is preferably encrypted.
The data contained in the second barcode for use in the biometric identification process is preferably a password corresponding to a password spoken by the user when acquiring the voiceprint data.
The password and the corresponding voiceprint data are preferably stored in the central database for subsequent use in the biometric identification process.
Further according to the invention there is provided a method of authenticating an identification document created by the above defined method, comprising:
The authentication step may include contacting a registered user of the document creation system, receiving current identification data from the user, and comparing the received current identification data with data in the central database and the data extracted from the second two-dimensional symbolic barcode of the identification document.
The current identification data received from the user may be biometric data such as fingerprint or voiceprint data.
The invention extends to a system for implementing the method.
Referring to
As shown in
The background of the card may be printed with various security features known as such to those skilled in the art, designed to make copying of the document more difficult and to make it possible to identify all but the most sophisticated copies by visual examination.
When an individual applies for an identity document, their personal details are captured and a unique identity number is created. Additional related data such as private and public keys and personal PIN codes are also created. A digital image of the individual's face is acquired using a digital camera and a digitally scanned image of the individuals signature is also acquired. These images are compressed.
One or more fingerprint images are acquired from the applicant and one or more corresponding finger biometrics templates are created. The personal data and related data mentioned above, the compressed facial image and signature image and the fingerprint template or templates are stored in a record from a main identification database which forms part of a national population identity database or register. At the time of storing a new record on the database, the finger biometric templates and/or other data to be stored can be checked against existing records to determine whether there are duplicate records or applications, possibly with different names.
The next step in the process is the recording of a voice identification password for the individual. The individual 12 is required to register his/her Voice on a telephone, cellular telephone or a voice acquisition device connected to a computer at the registration station 14. The individual is guided through the registration process via voice commands and instructed to pronounce a password. Data defining the password and the resulting voiceprint are transmitted to a voice recognition server 16 as a voice record that is indexed by the individual's unique identity number.
The next step in the process is the printing of the human readable details on the card. These details will include the individual's name, identification number and other details as indicated above. An image 18 of the individual's face and signature and, possibly, one or more fingerprints will also be printed on the card.
Apart from the generally conventional information referred to above, first and second two-dimensional symbolic barcodes 20 and 22 are also printed on the card, as described below.
The first, high, resolution, two-dimensional symbolic barcode 20 contains a substantial amount of data including the compressed data for the facial and signature images, the individual's personal details and one or more finger biometrics templates.
It Will be appreciated by those skilled in the art that other biometrics templates can be acquired instead of, or in addition to finger biometrics templates. For example, biometric data corresponding to an individual's retina or paint geometry could be acquired.
The first barcode 20 may or may not be copy protected. It may be considered that copy protection of the barcode is unnecessary due to the fact that it can only be read by relatively sophisticated scanners, and due to the fact that it is encrypted. The contents of the first two-dimensional barcode can be read by government departments and other organisations that have the necessary specialised scanners, computer equipment and software to scan and decrypt the contents of the barcode.
The barcode may be protected using the methods described in International patent application no PCT/B01/00362.
The second two-dimensional symbolic barcode 22 printed on the card is a coarser, lower resolution and therefore lower density barcode designed to be imaged by conventional imaging devices such as facsimile machines or digital cameras provided on cellular telephones. The second barcode contains the identity number and personal details of the card holder as well as the above mentioned digital keys, personal PIN code and one or more passwords. The second barcode can be used for remote identification at remote locations or any other location where the sophisticated equipment used by government departments and large organisations is not available. Specifically, it can be used in identification procedures by individuals, retail outlets, traffic police at the roadside, and many other locations.
The identity cards may be printed with a colour card printer 24 in the case of plastics (PBC PPT) cards or with colour laser printers or certain inkjet printers in the case of laminated paper inlay cards. Once the card has been printed, it can be issued to the individual to be identified.
An example of an identity card 10 created by the method and system of the invention is shown in
The identification of an individual using the method of the invention will now be described with reference to
In order to identify the loan applicant, the applicant 12 presents his/her identity card, as produced by the method and system of the invention. Using a conventional imaging, device such as a facsimile machine or, conveniently, a cellular telephone 26 equipped with a digital camera, an image of the second, low resolution barcode is acquired and transmitted to an authentication server 18. Preferably, a telephone number for the identification center where the identification server resides is printed on the identity card. The identification server decrypts the transmitted image of the second barcode and extracts the data from it. Assuming that the barcode contains a password for voice identification, a message is transmitted from the identification server 18 to the telephone 26 and the individual to be identified is requested to speak the password into the same cellular telephone used to transmit the barcode image data to the identification server. The password spoken by the person to be identified is transmitted to a voice authentication server 20 for comparison with the stored voiceprint biometrics. If the spoken password matches the biometrics of the stored password, the caller can be advised telephonically or via SMS, for example, that identification of the individual has been successful.
By way of a further example, the individual could have his/her fingerprint biometrics read by a fingerprint reader, with the resulting biometric data being transmitted to the authentication server for verification. However, the use of a spoken password is advantageous as it does not require specialized hardware.
It will be appreciated that the above described process can be varied in a number of different ways. For example, the process may be carried out in a number of steps in a single telephone call, or multiple telephone calls may be required.
It will be appreciated that the above described method and system can be combined with other technology. For example, a financial transaction card could be created having a magnetic stripe, a contact or contact-less memory or smart card chip.
Number | Date | Country | Kind |
---|---|---|---|
2004/3771 | May 2004 | ZA | national |
This application is a continuation of U.S. patent application Ser. No. 11/596,743, filed Jul. 30, 2007.
Number | Date | Country | |
---|---|---|---|
Parent | 11596743 | Jul 2007 | US |
Child | 14030898 | US |