RAC_HL_03.png
RAC_UC#01__05.png
 
RAC_UC#01__07.png

STATUS QUO

2D biometric face scan matched to the picture as per scanned document.

LIMITATIONS

DOCUMENT FRAUD HARD TO DETECT:

• Misuse of authentic documents: limited capacity of 2D biometric scanning to accurately read the fact
• Counterfeit/altered documents: no reference database exists

RIDDLE&CODE SOLUTION

Embed or attach a non-removable crypto tag to the physical document, which stores biometric and other data on the blockchain.

BENEFITS

• Detects counterfeit or altered documents
• Flexibility: crypto tag can be updated with new biometric data at any time
• Full data privacy is guaranteed - biometric data (stored on the blockchain) is linked to the document’s public key. Public keys are stored on the State’s database and matched with personal data.

RAC_UC#01__09.png

STATUS QUO

Matching of the data read from the scanned document against the central database.

LIMITATIONS

Matching is not done in real-time because of occasional spotty access time to the central database.
 

 

RIDDLE&CODE SOLUTION

Scanned data is matched against the data stored on the blockchain.


BENEFITS

• Immediate validation of the data
• During validation process only verification of data is certified, but no private data is transmitted
• Full data privacy is guaranteed - biometric data (stored on the blockchain) is linked to the document’s public key. Public keys are stored on the State’s database and matched with personal data.

RAC_Web_Zeichenfläche 29.png
RAC_UC#01__24.png
HL_PD_19.png
RAC_UC#01__27 Kopie.png
RAC_UC#01__28_only1.png

Non-removable crypto tag is embedded into the document.

RAC_UC#01__31.png

The crypto tag gets provisioned* and attested** with facial biometric data from the user.

RAC_UC#01__37.png
RAC_UC#01__40.png

The police officer scans the tag with a NFC- enabled device and compares the retrieved data with a real time biometric face scan.

HL_PD_21.png
RAC_UC#01__27.png
RAC_UC#01__28_only1.png

Non-removable crypto tag is embedded into the document.

RAC_UC#01__30.png
RAC_UC#01__33.png

The crypto tag gets provisioned* and attested** with fingerprint data from the user + his/her telephone number.

The user downloads the App.

RAC_UC#01__37.png
RAC_UC#01__39.png

The police officer scans the tag with a NFC-enabled device, in order to validate the document authenticity.

RAC_UC#01__44.png
RAC_UC#01__46.png

If there are serious doubts regarding the identity of the user, the police officer can then confirm the passport holders identity by fingerprint scans.

*Process by which the key pairs are created. **Process by which the public key of the crypto tag is registered on the blockchain of choice.

RAC_Web_Zeichenfläche 29.png
HL_PD_16.png
 
RAC_Web_Zeichenfläche 29.png
 
powered by Typeform